You need to meet the quality update requirement for ComputerA.
For how long should you defer the updates?
You need to meet the technical requirement for Computer1.
What should you do? To answer, select the appropriate options in the answer area.
You need to meet the technical requirement for the IT department users.
What should you do first?
You need to meet the technical requirement for User6.
What should you do?
You need to meet the technical requirements for the HR department users.
Which permissions should you assign to the HR department users for the D:\Reports folder? To answer, select the appropriate permissions in the answer area.
NOTE: Each correct selection is worth one point.
You need to meet the technical requirements for EFS on ComputerA.
What should you do?
You need to meet the technical requirements for the San Diego office computers. Which Windows 10 deployment method should you use?
You need to meet the technical requirements for the helpdesk users.
What should you do? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
You need to ensure that you can manage Computer2 by using Windows Admin Center on Server1.
What should you do on Computer2?
On Computer1, you need to configure the custom Visual Effects performance settings. Which user accounts can you use?
Which users can sign in to Computer3 when the computer starts in Safe Mode?
A- User31 only
B. User31 and User32 only
C. User31 andAdmin1 only
D. User31, User 32, User33, and Admin1
E. User31,User32, and User33 only
You need to ensure that you can manage Computer2 by using Windows Admin Center on Server1. What should you do on Computer2?
Which users can sign in to Computer2 by using Remote Desktop?
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE Each correct selection is worth one point.
You need to sign in as LocalAdmin on Computer11.
What should you do first?
You need to recommend a solution to configure the employee VPN connections.
What should you include in the recommendation?
You need to implement a solution to configure the contractors’ computers.
What should you do? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
An employee reports that she must perform a BitLocker recovery on her laptop. The employee does not have her BitLocker recovery key but does have a Windows 10 desktop computer.
What should you instruct the employee to do from the desktop computer?
You need to reduce the amount of time it takes to restart Application1 when the application crashes.
What should you include in the solution? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
You need to ensure that User10 can activate Computer10.
What should you do?
You need to take remote control of an employee’s computer to troubleshoot an issue.
What should you send to the employee to initiate a remote session?
You need to recommend a solution to monitor update deployments.
What should you include in the recommendation?
Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time.
When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design.
Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn’t matter how you accomplish the task, if you successfully perform it, you will earn credit for that task.
Labs are not timed separately, and this exam may more than one lab that you must complete. You can use as much time as you would like to complete each lab. But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided.
Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab.
Username and password
Use the following login credentials as needed:
To enter your password, place your cursor in the Enter password box and click on the password below.
Username: Contoso/Administrator
Password: Passw0rd!
The following information is for technical support purposes only:
Lab Instance: 10921597
You need to create a group named Group2 on Client2. The members of Group2 must be able to change the system time. The solution must use the principle of least privilege.
To complete this task, sign in to the required computer or computers.
You enable controlled folder access in audit mode for several computers that run Windows 10.
You need to review the events audited by controlled folder access.
Which Event Viewer log should you view?
Your network contains an Active Directory domain named contoso.com. The domain contains a computer named Computer1 that runs Windows 10.
Several user settings are configured in a Default Domain Policy Group Policy Object (GPO).
Users sign in to Computer1 as shown in the following table.
You configure the following GPOs on Computer1:
Each GPO has different user settings configured.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a computer named Computer1 that runs Windows 10. The computer contains a folder. The folder contains sensitive data.
You need to log which user reads the contents of the folder and modifies and deletes files in the folder.
Solution: From the properties of the folder, you configure the Auditing settings and from the Audit Policy in the local Group Policy, you configure Audit directory service access.
Does this meet the goal?
Your network contains an Active Directory domain. The domain contains three computers named Computer1, Computer2, and Computer3 that run Windows 10. The computers are on the same network and have network connectivity.
Windows Defender Firewall on Computer1 has the server-to-server connection security rule shown in the following table.
Windows Defender Firewall on Computer2 has the server-to-server connection security rule shown in the following table.
Windows Defender Firewall on Computer3 has the server-to-server connection security rule shown in the following table.
All the connection security rules are enabled and configured to use only the Computer (Kerberos VS) authentication method.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
You have computers that run Windows 11 as shown in the following table.
You ping 192.168.10.15 from Computer1 and discover that the request timed out. You need to ensure that you can successfully ping 192.168.10.15 from Computer1.
Solution: On Computers you allow incoming ICMPv6 traffic in Windows Defender Firewall.
Does this meet the goal?