What command should you run on Computer1?

DRAG DROP
You have a line-of-business universal app named App1. You have an image of Windows 10 Enterprise named Image1.
Image1 is mounted to the C:\Folder1 folder on a Windows 10 Enterprise computer named Computer1. The source for App1 is in the C\:Folder2 folder.
You need to ensure that App1 is included in Image1.
What command should you run on Computer1? To answer, drag the appropriate values to the correct locations. Each value may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

image184 - What command should you run on Computer1?

Answer:

image186 - What command should you run on Computer1?
Explanation:
References: https://technet.microsoft.com/en-us/library/dn376490.aspx

What should you do?

You are a systems administrator for your company. The company has employees who work remotely by using a virtual private network (VPN) connection from their computers, which run Windows 8 Pro.
These employees use an application to access the company intranet database servers. The company recently decided to distribute the latest version of the application through using a public cloud.
Some users report that every time they try to download the application by using Internet Explorer, they receive a warning message that indicates the application could harm their computer.
You need to recommend a solution that prevents this warning message from appearing, without compromising the security protection of the computers.
What should you do?
A. Publish the application through a public file transfer protocol (FTP) site.
B. Publish the application through an intranet web site.
C. Instruct employees to disable the SmartScreen Filter from within the Internet Explorer settings.
D. Publish the application to Windows Store.

Answer: B
Explanation:
As the publication is to be published on the cloud, we should publish in through the Windows Store.

Which permission should you grant to the Sales group?

A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 10. A local printer is shared from a client computer. The client computer user is a member of the Sales AD security group.
You need to ensure that members of the Sales security group can modify the order of documents in the print queue, but not delete the printer share.
Which permission should you grant to the Sales group?
A. Manage queue
B. Manage this printer
C. Print
D. Manage documents
E. Manage spooler

Answer: D
Explanation:
With the Manage Documents permission the user can pause, resume, restart, cancel, and rearrange the order of documents submitted by all other users. The user cannot, however, send documents to the printer or control the status of the printer.

What should you identify?

You have a Microsoft Intune subscription.
You create two compliance policies named Comp1 and Comp2. You create a configuration policy named ConfigPol1. The settings in each policy do not conflict with other policies.
Comp1 has low security settings. Comp2 has medium security settings. ConfigPol1 has high security settings.
You have a device named Device1. Device1 is a member of groups that have Comp1, Comp2 and ConfigPol1 applied.
You need to identify which policies with be enforced on Device1.
What should you identify?
A. Comp1 only
B. Comp2 only
C. Comp1, Comp2 and ConfigPol1
D. Comp1 and Comp2 only
E. Comp1 and ConfigPol1 only
F. ConfigPol1 only
G. Comp2 andConfigPol1 only

Answer: C

Which two actions should you perform?

You administer Windows 10 Enterprise. Your network includes an Active Directory domain and a standalone server in a perimeter network that runs Windows Server 2008 R2.
Your company purchases five new tablets that run Windows 8. The tablets will be used to access domain resources and shared folders located on the standalone server.
You need to implement single sign-on (SSO) authentication for tablet users. You also need to ensure that you can audit personnel access to the shared folder.
Which two actions should you perform? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
A. Create a new Microsoft account for each user.
B. Ensure that the local account for each user on the stand-alone server uses the same password as the corresponding Microsoft account.
C. Join the tablets to a domain.
D. Join the tablets to the same workgroup as the stand-alone server.
E. Enable a guest account on the stand-alone server.
F. On the stand-alone server, create user accounts that have the same logon names and passwords as the user domain accounts.

Answer: C,F

When attempting to establish a VPN connection, which VPN protocol will be used first?

You create a VPN connection that has the VPN type set to Automatic.
When attempting to establish a VPN connection, which VPN protocol will be used first?
A. PPTP
B. L2TP
C. SSTP
D. IKEv2

Answer: D
Explanation:
References: https://blogs.technet.microsoft.com/networking/2014/01/13/configuring-native-vpn-client-through-pc-settings/

Which three actions should you perform?

Topic 5, Configure storage

You have a computer named Computer1 that runs Windows 10 Enterprise. You add a 1 TB hard drive and create a new volume that has the drive letter D.
You need to limit the amount of space that each user can consume on D: to 200 GB. Members of the Administrators group should have no limit.
Which three actions should you perform? Each correct answer presents part of the solution.
A. Run fsutil quota violations D:.
B. Enable the Deny disk space to users exceeding quota limit setting.
C. Enable the Enable Quota Management setting.
D. Set a default quota limit.
E. Run convert D: /FS:NTFS.
F. Add a quota entry.

Answer: B,C,D
Explanation:
To limit the amount of space that each user can consume, you should enable the Enable Quota Management setting, and then enter the appropriate values in the Limit Disk Space To text box and the Set Warning Level To text box, and then select the Deny Disk Space To Users Exceeding Quota Limit check box to enforce identical quota limits for all users.

Which two actions should you perform?

A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 10 Enterprise.
You are configuring security for a portable client computer that does not have a Trusted Platform Module (TPM) chip installed.
You need to configure local Group Policy to tum on Windows BitLocker Drive Encryption on the computer.
Which two actions should you perform? Each correct answer presents part of the solution.
NOTE Each correct selection is worth one point.
A. Enable the Enforce drive encryption type on operating system drives policy setting.
B. Enable the option to allow BitLocker without a compatible TPM.
C. Enable the Require additional authentication at startup policy setting.
D. Configure the TPM validation profile to enable Platform Configuration Register indices (PCRs) 0, 2, 4, and 11.

Answer: B,C
Explanation:
https://www.howtogeek.com/howto/6229/how-to-use-bitlocker-on-drives-without-tpm/

What should you do?

You manage Windows 10 Enterprise desktop and laptop computers for your company. They are part of a Windows Server 2012 R2 Active Directory Domain Services (AD DS) environment. The system administrators implement DFS for flexibility and availability. Laptops are able to connect to the company’s private network by using local Ethernet or secure wireless.
Three users report that their files on the server are missing, and they no longer have drive G.
You need to ensure that the three users’ computers can access the DFS namespace so that you can troubleshoot by using the DFS client.
What should you do?
A. Ascertain whether the three users are connected through a wireless or wired connection.
B. Ensure that the three users have access to the domain NETLOGON share.
C. Ensure that the Net Logon service is running on all servers that are hosting the DFS namespace.
D. Verify that a share is defined on the folder to which drive G is being mapped.

Answer: C

What should you configure?

Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details provided in a question apply only to that question.
A user successfully accesses \\server1\Sources\App1\. The user cannot access \\server1\Sources\App2\.
You need to ensure that the user can access \\server1\Sources\App2\.
What should you configure?
A. Microsoft OneDrive
B. share permissions
C. account policies
D. software restriction policies
E. HomeGroup settings
F. application control policies
G. NTFS permissions
H. Encrypting File System (EFS) settings

Answer: G