1.
You are the desktop administrator for a small company. The company has a workgroup environment. Your manager asks you to set up a Windows 10 Enterprise computer and tablet for the company sales associate. The sales associate uses apps downloaded from the Windows Store. The sales associate wants the Windows experience and aps to be as consistent as possible between the computer and the tablet. You need to configure the computer and tablet to synchronize settings. Which account type should you use?
2.
You have a Microsoft Intune subscription. You create two compliance policies named Comp1 and Comp2. You create a configuration policy named ConfigPol1. The settings in each policy do not conflict with other policies. Comp1 has low security settings. Comp2 has medium security settings. ConfigPol1 has high security settings. You have a device named Device1. Device1 is a member of groups that have Comp1, Comp2 and ConfigPol1 applied. You need to identify which policies will be enforced on Device1. What should you identify?
3.
A company has mobile devices that run Windows 10. A device experiences battery life issues. You need to generate an HTML report that includes any potential battery problems. Which command should you run?
4.
You manage desktop computers on your company network. The finance department uses computers that run Windows 7 Enterprise and a 32-bit legacy application. The application has some compatibility issues with Windows 10 Enterprise. The application uses domain single sign-on for authentication. The vendor releases a new version of the application that is fully compatible with Windows 10 Enterprise. These vendors cannot be installed on the same computer due to HKEY_CURRENT_USER registry setting conflicts. You need to migrate the finance department computers to Windows 10 Enterprise while meeting the following requirements: Users are able to use the original version of the application while validating the new version. Once the new version is validated, the old version is removed with minimal effort. Users authenticate only once to use the application. Which technology should you choose?
5.
You administer computers that run Windows XP Professional. These computers have a wide range of line of business (LOB) applications installed. You want to migrate from Windows XP Professional to Windows 10 Enterprise. You need to identify which application will prompt users for elevated privileges. What should you do first?
6.
You are a desktop support technician for your company. You deliver new Windows 10 Enterprise laptops to the software developers. The software developers frequently use laptops to work remotely and are often disconnected from the corporate network. One of the software developers works on an application that must run on Windows XP, Windows Vista, Windows 7, and Windows 10 Enterprise. The software developer needs the ability to test the application natively on each of these operating systems. You need to provide the software developer with a way to test the application on all operating system versions on the new laptop. The software developer must be able to perform the testing while working remotely without access to corporate resources. What should you do?
7.
DRAG DROP You have a Windows 10 Enterprise computer named Computer1 that has the Hyper-V feature installed. Computer1 hosts a virtual machine named VM1. VM1 runs Windows 10 Enterprise. VM1 connects to a private virtual network switch. From Computer1, you need to remotely execute Windows PowerShell cmdlets on VM1. What should you do?
8.
You deploy several tablet PCs that run Windows 10 Enterprise. You need to minimize power usage when the user presses the sleep button. What should you do?
9.
You support Windows 10 Enterprise computers. Your company protects all laptops by using the BitLocker Network Unlock feature. Some employees work from home. You need to ensure that employees can log on to their laptops when they work from home. What should you do?
10.
A company has Windows 10 Enterprise client computers. The company uses Windows BitLocker Drive Encryption with the data-only option on all client computers. You delete a file containing highly confidential information from your computer. You need to clear the free space on the hard drive to minimize the chance of the confidential information being recovered. Which command should you run on the client computer?