PASS - TAKER : BlackArch

Modern Desktop Administrator

Correct : 35

87% Complete (success)

87 %

False : 5

12% Complete (success)

12 %



BlackArch 2019-11-06T21:25:15

Not Correct

Your company has an isolated network used for testing. The network contains 20 computers that run Windows 10. The computers are in a workgroup. During testing, the computers must remain in the workgroup. You discover that none of the computers are activated. You need to recommend a solution to activate the computers without connecting the network to the Internet. What should you include in the recommendation?

Correct

You plan to deploy Windows 10 to 100 secure computers. You need to select a version of Windows 10 that meets the following requirements: * Uses Microsoft Edge as the default browser. * Minimizes the attack surface on the computer. * Supports joining Microsoft Azure Active Directory (Azure AD) * Only allows the installation of applications from the Microsoft Store. What is the BEST version to achieve the goal?

Correct

You have a computer names Computer1 that runs Windows 7. Computer1 has a local user named User1 who has a customized profile. On Computer1, you perform a clean installation of Windows 10 without formatting the drives. You need to migrate the settings from User1 from Windows 7 to Windows 10. Which two actions should you perform?

Correct

You have a computer named Computer1 that runs Windows 10. The computer contains a folder. The folder contains sensitive data. You need to log which user reads the contents of the folder and modifies and deletes files in the folder. SOLUTION: From the properties of the folder, you configure the Auditing settings and from Audit Policy in the local Group Policy, you configure Audit object access. Does this meet the goal?

Correct

You have a computer names Computer1 that runs Windows 10. The computer contains a folder. The folder contains sensitive data. You need to log which user reads the contents of the folder and modifies and deletes files in the folder. SOLUTION: From the properties of the folder, you configure the Auditing settings and from the Audit Policy in the local Group Policy, you configure Audit directory service access. Does this meet the goal?

Correct

You have a computer names Computer1` that runs Windows 10. You turn on System Protection and create a restore point named Point1. You perform the following changes: Add four files named File1.txt, File2.dll, File3.sys, and File4.exe to the Desktop. Run a configuration script that adds the following four registry keys: * Key1 to HKEY_CURRENT_USER * Key2 to HKEY_CLASSES_ROOT * Key3 to HKEY_LOCAL_MACHINE\SYSTEM * Key4 to HKEY_CURRENT_CONFIG You restore Point 1. Which files are and registry keys are removed?

Correct

You have 10 computers that run Windows 10. You have a Windows Server Update Services (WSUS) server. You need to configure the computers to install updates from WSUS. Which two settings should you configure?

Correct

Your network contains an Active Directory domain. The domain contains 1,000 computers that run Windows 10. You discover that when users are on their lock screen, they see a different background image every day, along with tips for using different features in Windows 10. You need to disable the tips and the daily background image for all the Windows 10 computers. Which Group Policy setting should you modify?

Correct

You have a file named Reg1.reg that contains the following content: "Windows Registry Editor Version 5.00 [HKEY_CLASSES_ROOT\Directory\Background\shell\Notepad] [HKEY_CLASSES_ROOT\Directory\Background\shell\Notepad\command] @="notepad.exe" What is the effect of importing the file?

Correct

You have a computer named Computer1 that runs Windows 10. On Computer1, you create the local users shown below: NAME MEMBER OF User1 Users User2 Users, Guests User3 Power Users, Guest User4 Guests, Users, Administrators User5 Users, Distributed COM Users Which three user profiles will persist after each user signs out? (Choose three)

Correct

You have a computer that runs Windows 10. The computer is in a workgroup. The computer is used to provide visitors with access to the Internet. You need to configure the computer to meet the following requirements: * Always sign in automatically as User1 * Start an application named App1.exe at sign-in What should you use to meet each requirement?

Not Correct

You have 20 computers that run Windows 10. The computers are in a workgroup. You need to create a local user named Admin1 on all the computers. Admin1 must be a member of the Remote Management User group. What should you do?

Correct

You have several computers that run Windows 10. The comptuers are in a workgroup and have BitLocker Drive Encryption (BitLocker) enabled. You join the computers to Microsoft Azure Active Directory (Azure AD). You need to ensure that you can recover the BitLocker recovery key for the computers from Azure AD. What should you do first?

Correct

You have a computer named Computer1 that runs Windows 10. Computer1 is in a workgroup. Computer1 contains the folders shown below: NAME VOLUME FILE SYSTEM PERMISSION Folder1 C NTFS Full control to Everyone Folder2 C NTFS Full control to Everyone Folder3 D NTFS Full control to Everyone On Computer1, you create the users shown below: NAME MEMBER OF User1 Users User2 Backup Operators, Users User3 Cryptographic Operators, Users User4 Administrtators, Users User1 encrypts a file named File1.txt that is in a folder named C:\Folder1 What is the effect of the configuration?

Not Correct

You have a computer named Computer1 that runs Windows 10. You need to configure User Account Control (UAC) to prompt administrators for their credentials. Which settings should you modify?

Correct

You have several computers that run Windows 10. The computers are in a workgroup. You need to prevent users from using Microsoft Store apps on their computer. What are two possible ways to achieve the goal?

Correct

You have a computer named Computer1 that runs Windows 10. You need to prevent standard users from changing the wireless network settings on Computer1. The solution must allow administrators to modify the wireless network settings. What should you use?

Correct

You have three computers that run Windows 10 as shown below: NAME TPM VERSION OPERATING SYSTEM Computer1 None Windows 10 Enterprise Computer2 2.0 Windows 10 Pro Computer3 1.2 Windows 10 Enterprise All of the computers have C and D volumes. They require additional authentication at startup. Group Policy settings is disabled on all the computers. Which volumes can you encrypt by using BitLocker Drive Encryption (BitLocker)?

Correct

Your network contains an Active Direcotyr domain named contoso.com. The domain contains named Computer1 that runs Windows 10. On Computer1, you create an NTFS folder and assign Full control permissions to Everyone. You share the folder as Share1 and assign the permissions shown below: NAME PERMISSION User1 Full Control User2 Change When accessing Share1, which two actions can be performed by User1 but not by User2?

Correct

Your company has a wireless access point that uses WPA2-Enterprise. You need to configure a computer to connect to the wireless access point. What should you do first?

Correct

A user named User1 has a computer named Computer1 that runs Windows 10. User1 connect to a Microsoft Azure virtual machine named VM1 by using Remote Desktop. User1 creates a VPN connection to a partner organization. When the VPN connection is established, User1 cannot connect to VM1. When User1 disconnects from the VPN, the user can connect to VM1. You need to ensure that User1 can connect to VM1 while connected to the VPN. What should you do?

Correct

Your network contains an Active Directory domain. The domain contains a user named Admin1. All computers run Windows 10. You enable Windows PowerShell remoting on the computers. You need to ensure that Admin1 can establish remote PowerShell connection to the computers. The solution must use the prinicple of least privilege. To which group should you add Admin1?

Not Correct

You have 200 computers that run Windows 10 and are joins to an Active Directory domain. You need to enable Windows Remote Management (WinRM) on all the computers by using Group Policy. Which three actions should you perform?

Correct

You have 15 computers that run Windows 10. Each computer has two network interfaces named Interface1 and Interface2. You need to ensure that network traffic uses Interface1, unless Interface1 is unavailable. What should you do?

Correct

Your network contains an Active Directory domain. The domain contains 10 computers that run Windows 10. Users in the finance department use the computers. You have a computer named Computer1 that runs Windows 10. From Computer1, you plan to run a script that executes Windows PowerShell commands on the finance department computers. You need to ensure that you can run the PowerShell commands on the finance department from Computer1. What should you do on the finance department computers?

Correct

You have a computer named Computer1 that runs Windows 10. You test Windows updates on Computer1 before you make the updates available to other users at your company. You install a quality update that conflicts with a customer device driver. You need to remove the update from Computer1 SOLUTION: From an elevated command prompt, you run the wusa.exe command and specify the /uninstall parameter. Does this meet the goal?

Correct

You have a computer named Computer1 that runs Windows 10. You test Windows updates on Computer1 before you make the updates available to other users at your company. You install a quality update that conflicts with a customer device driver. You need to remove the update from Computer1 SOLUTION: From System Restore, you revert the system state to a restore point that was created before the update was installed. Does this meet the goal?

Correct

You have 100 computers that run Windows 10. The computers are in a workgroup. The computers have a low-bandwidth metered Internet connection. You need to reduce the amount of Internet bandwidth consumed to download updates. What should you configure?

Correct

You have 20 computers that run Windows 10. You configure all the computers to forward all the events from all the logs to a computer name Computer1 that runs Windows 10. When you sign in to Computer1, you cannot se any security events from other computers. You can see all the other forwarded events from the other computers. You need to ensure that the security events are forwarded to Computer1. What should you do?

Correct

You have a computer that runs Windows 10. You discover that Windows updates are failing to install on the computer. You need to generate a log file that contains detailed information abut the failures. Which cmdlet should you run?

Correct

You have a computer that runs Windows 10. You can start the computer but cannot sign in. You need to start the computer into the Windows Recovery Environment (WinRE) What should you do?

Correct

Your company purchases 20 laptops that use a new hardware platform. In a test environment, you deploy Windows 10 to the new laptops. Some laptops frequently generate stop errors. You need to identify the cause of the issues. What should you use?

Correct

You have 100 computers that run Windows 10. You have no servers. All the computers are joined to Microsoft Azure Active Directory (Azure AD). The computers have different update settings, and some computers are configured for manual updates. You need to configure Windows Update. The solution must meet the following requirements: * Internet traffic must be minimized. * Costs must be minimized. How should you configure Windows Update? (Choose 1 from each area; three answers)

Correct

You have a computer named Computer1 that runs Windows 10 and has an application named App1. You need to use Performance Monitor to collect data about the processor utilization of App1. Which performance object should you monitor?

Correct

You need to implement a solution to configure the contractors' computers. What should you do? (Choose 1 from each section, two total answers)

Correct

You need to ensure that User10 can activate Computer10. What should you do?

Correct

You need to sign in as Local Admin on Computer11. What should you do first?

Correct

You need to recommend a solution to configure the employee VPN connections. What should you include in the recommendation?

Correct

You need to recommend a solution to monitor update deployments. What should you include in the recommendation?

Not Correct

You need to meet the technical requirements for EFS on ComptuerA. What should you do?