Q1. You administer a Windows 10 Enterprise computer that runs Hyper-V. The computer hosts a virtual machine with multiple snapshots. The virtual machine uses one virtual CPU and 512 MB of RAM.
You discover that the virtual machine pauses automatically and displays the state as paused-critical.
You need to identify the component that is causing the error.
Which component should you identify?
A. no virtual switch defined
B. insufficient memory
C. insufficient hard disk space
D. insufficient number of virtual processors
Answer: C
Q2. Your network contains an Active Directory domain named contoso.com. Contoso.com is synchronized to a Microsoft Azure Active Directory. You have a Microsoft Intune subscription.
Your company plans to implement a Bring Your Own Device (BYOD) policy. You will provide users with access to corporate data from their personal iOS devices.
You need to ensure that you can manage the personal iOS devices.
What should you do first?
A. Install the Company Portal app from the Apple App Store.
B. Create a device enrollment manager account.
C. Set a DNS alias for the enrollment server address.
D. Configure the Intune Service to Service Connector for Hosted Exchange.
E. Enroll for an Apple Push Notification (APN) certificate.
Answer: E
Q3. You administer Windows 10 Enterprise desktop computers that are members of an Active
Directory domain.
You want to create an archived copy of user profiles that are stored on the desktops. You create a standard domain user account to run a backup task.
You need to grant the backup task user account access to the user profiles. What should you do?
A. Add the backup task account to the Remote Management Users group on a domain controller.
B. Add the backup task account to the Backup Operators group on every computer.
C. Add the backup task account to the Backup Operators group on a domain controller.
D. Set the backup task account as NTFS owner on all the profiles.
Answer: B
Q4. You support desktop computers and tablets that run Windows 8 Enterprise. All of the computers are able to connect to your company network from the Internet by using DirectAccess.
Your company wants to deploy a new application to the tablets. The deployment solution must meet the following requirements:
. The application is able to access files stored on an internal solid-state drive (SSD) on the tablets.
. The application is isolated from other applications.
. The application uses the least amount of disk space on the tablet.
You need to deploy the new application to the tablets.
What should you do?
A. Deploy the application as an Application Virtualization (App-V) package. Install the App-V 4.6 client on the tablets.
B. Deploy the application as a published application on the Remote Desktop server. Create a Remote Desktop connection on the tablets.
C. Install the application on a local drive on the tablets.
D. Install the application in a Windows To Go workspace.
E. Install Hyper-V on tablets. Install the application on a virtual machine.
F. Publish the application to Windows Store.
G. Install the application within a separate Windows 8 installation in a virtual hard disk (VHD) file. Configure the tablets with dual boot.
H. Install the application within a separate Windows 8 installation in a VHDX file. Configure tablets with dual boot.
Answer: B
Q5. Employees are permitted to bring personally owned portable Windows 10 Enterprise computers to the office. They are permitted to install corporate applications by using the management infrastructure agent and access corporate email by using the Mail app.
An employee’s personally owned portable computer is stolen.
You need to protect the corporate applications and email messages on the computer.
Which two actions should you perform? Each correct answer presents part of the solution.
A. Prevent the computer from connecting to the corporate wireless network.
B. Change the user’s password.
C. Disconnect the computer from the management infrastructure.
D. Initiate a remote wipe.
Answer: B,D
Q6. HOTSPOT
You have a standalone computer that runs Windows 10 Enterprise. The computer is configured to automatically back up files by using File History. The user of the computer uses the OneDrive desktop app to sync files.
The Previous Versions settings from the local group policy of the computer are shown in the following graphic.
Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
NOTE: Each correct selection is worth one point.
Answer:
Q7. You manage Microsoft Intune for a company named Contoso. Intune client computers run Windows 10 Enterprise.
You notice that there are 25 mandatory updates listed in the Intune administration console.
You need to prevent users from receiving prompts to restart Windows following the installation of mandatory updates.
Which policy template should you use?
A. Microsoft Intune Agent Settings
B. Windows Configuration Policy
C. Microsoft Intune Center Settings
D. Windows Custom Policy (Windows 10 and Windows 10 Mobile)
Answer: A
Q8. You support Windows 10 Enterprise computers that are members of an Active Directory domain. Recently, several domain user accounts have been configured with super-mandatory user profiles.
A user reports that she has lost all of her personal data after a computer restart.
You need to configure the user’s computer to prevent possible user data loss in the future.
What should you do?
A. Remove the .man extension from the user profile name.
B. Configure Folder Redirection by using the domain group policy.
C. Configure the user’s documents library to include folders from network shares.
D. Add the .dat extension to the user profile name.
Answer: B
Q9. You have a Windows 10 Enterprise computer.
The computer has a shared folder named C:\Marketing. The shared folder is on an NTFS volume.
The current NTFS and share permissions are configured as follows.
UserA is a member of both the Everyone group and the Marketing group. UserA must access C:\Marketing from across the network. You need to identify the effective permissions of UserA to the C:\Marketing folder.
What permission should you identify?
A. Full Control
B. Read and Execute
C. Read
D. Modify
Answer: D
Q10. You have a Windows 10 Enterprise computer named Computer1. Computer1 has File History enabled.
You create a folder named Folder1 in the root of the C: drive.
You need to ensure that Folder1 is protected by File History.
What are two possible ways to achieve the goal? Each correct answer presents a complete solution.
A. From File Explorer, include Folder1 in an existing library.
B. Modify the Advanced settings from the File History Control Panel item.
C. From the Settings app, modify the Backup options.
D. From File Explorer, modify the system attribute of Folder1.
Answer: A,C