1.
A network that is part of your intranet but is extended to users outside of your organization and is accessible from the Internet is a private network.
Correct Answer
D. An extranet
Explanation
The given correct answer is "An extranet". An extranet is a network that is part of an organization's intranet but is extended to external users, such as partners, suppliers, or customers, who are granted access to certain resources or services. It is accessible from the Internet but still maintains a level of security and restricted access, making it a private network.
2.
The network has 12 desktop computers and two servers that host a web-based inventory application that all the employee connected to the same network switch A firewall protects all computers and servers from external networks. Which type of network are you configuring?
Correct Answer
D. Intranet
Explanation
The given scenario describes a network that consists of 12 desktop computers and two servers, all connected to the same network switch. A firewall is in place to protect the network from external networks. This setup suggests that the network is an intranet. An intranet is a private network that is only accessible to authorized users within an organization. It allows for internal communication, collaboration, and sharing of resources.
3.
To share media files between your computer and your video game system, you should create a public network.
Correct Answer
D. A private network
Explanation
To share media files between your computer and your video game system, you should create a private network. This is because a private network provides a secure and controlled environment for sharing files between devices. It ensures that only authorized devices can access the network and prevents unauthorized access from external sources. Creating a private network also helps in maintaining the privacy and security of the shared media files.
4.
Which type of information about users does biometrics evaluate?
Correct Answer
B. pHysical characteristics of user
Explanation
Biometrics evaluates the physical characteristics of a user. This refers to unique and measurable traits such as fingerprints, facial features, iris patterns, and voiceprints. By analyzing these physical characteristics, biometric systems can accurately identify and authenticate individuals.
5.
To strengthen security, you want to utilize multi-factor authentication that uses biometrics. A password and a per-shared security question accomplish this goal.
Correct Answer
C. Thumb print
Explanation
Utilizing a thumbprint for multi-factor authentication strengthens security by adding an additional layer of biometric verification. This means that in addition to a password and a pre-shared security question, the user's thumbprint will also be required to access the system or account. Thumbprints are unique to each individual and are difficult to replicate, making them a reliable form of authentication.
6.
You are an IT intern.
You are incorporating multi-factor authentication as part of security protocols .you are using a smart card to authentication
What else must be used to make this multi-factor authentication
Correct Answer
C. Password
Explanation
In order to make the smart card authentication a multi-factor authentication, a password must be used in addition to the smart card. This is because multi-factor authentication requires the use of at least two different factors to verify the user's identity. The smart card serves as one factor, while the password serves as another factor. By requiring both the smart card and the password, it adds an extra layer of security to the authentication process.
7.
What is an example of the way in which a Trajan horse commonly spreads to other computers?
Correct Answer
C. It downloads from an infected web page .
Explanation
An example of the way in which a Trojan horse commonly spreads to other computers is by downloading from an infected web page. This means that when a user visits a compromised website, the Trojan horse is automatically downloaded onto their computer without their knowledge or consent. Once the Trojan horse is downloaded, it can then carry out malicious activities, such as stealing sensitive information or damaging the system. It is important for users to be cautious when browsing the internet and to have up-to-date security measures in place to prevent such downloads.
8.
What are two ways to lower the risk of a virus or malware infection? Choose two
Correct Answer(s)
A. Enable the Windows firewall .
B. Keep the system updated .
Explanation
Enabling the Windows firewall helps to protect the computer from unauthorized access and blocks potential threats from entering the system. Keeping the system updated ensures that the latest security patches and fixes are installed, which helps to close any vulnerabilities that could be exploited by viruses or malware. By combining these two measures, the risk of a virus or malware infection can be significantly lowered.
9.
What are two strategies to lower the risk of a virus infection that is sent through an email? Choose two
Correct Answer(s)
B. Turn the windows firewall on .
D. Open attachments only from trusted sources .
Explanation
Two strategies to lower the risk of a virus infection sent through an email are turning the Windows firewall on and opening attachments only from trusted sources. By enabling the Windows firewall, it can help block unauthorized access and potentially harmful content. Opening attachments only from trusted sources reduces the likelihood of downloading infected files or executing malicious scripts. These measures can help protect against virus infections and enhance the overall security of email communications.
10.
Computer worms are different from another type of malware or spyware because they are designed to be destructive
Correct Answer
D. Can self-replicate
Explanation
Computer worms are different from other types of malware or spyware because they can self-replicate. Unlike malware or spyware that may only infect a single system or target specific files, worms have the ability to spread and create copies of themselves across multiple systems. This self-replication feature allows worms to rapidly propagate and infect a large number of devices, causing widespread damage and disruption.
11.
Which is a feature of Active Directory Rights Management Services ( AD RMS )?
Correct Answer
C. Allows users to define who can open ., modify , print , on forward a document .
Explanation
AD RMS allows users to define who can open, modify, print, or forward a document. This feature provides a comprehensive permissions system that allows users to control access to sensitive information and protect it from unauthorized use. Users can set specific permissions for each document, ensuring that only authorized individuals can perform certain actions on it. This enhances security and helps organizations maintain control over their data.
12.
When you access a file located on a shared resource,
the most restrictive permissions take precedence.
Correct Answer
A. No change is needed
Explanation
When accessing a file located on a shared resource, the most restrictive permissions take precedence. This means that if there are different permissions set at different levels (such as at the share level or the file system level), the most restrictive permissions will be applied and enforced. Therefore, no change is needed in this scenario as the statement accurately reflects the behavior of accessing files on shared resources.
13.
True Or False
You are trying to access a file in a folder on a windows 8.1 pro computer from a second computer over the network. You have the following permissions :
NTFS: full control
Share: read-only
Correct Answer
A. You will be able to read the file
Explanation
Since the NTFS permissions are set to full control, it means that you have the ability to read, write, modify, and delete the file. However, the share permissions are set to read-only, which means that other users accessing the file over the network can only read the file but cannot make any changes to it. Therefore, you will be able to read the file but not delete or change it.
14.
When you copy a file from one NTFS file system partition to a different NTFS partition, what happens to the file permissions of the copied file?
Correct Answer
B. They inherit the permissions of the destination folder.
Explanation
When a file is copied from one NTFS file system partition to another, the file permissions of the copied file will inherit the permissions of the destination folder. This means that the copied file will have the same permissions as the folder it is being copied into. This ensures consistency and allows the file to be accessed and managed according to the permissions set for the destination folder.
15.
You need to change the permissions of a file. However, the file was created by a user on a system to which you don't know
What are two possible ways to achieve this goal? Choose two
Correct Answer(s)
A. Ask the administrator for modify permission to the file .
B. Have the user grant you the take ownership permission for the file
Explanation
Two possible ways to achieve the goal of changing the permissions of a file are: asking the administrator for modify permission to the file and having the user grant you the take ownership permission for the file.
16.
Your company is deploying a new application on employees’ personal Windows RT devices. The devices are registered with Microsoft Intune
You need to publish the new application to Microsoft Intune cloud storage so that the employees can install the published application.
What are the requirements of the published installation files?
Correct Answer
B. As many files as necessary may be uploaded but no single file may be larger than 2 GB
Explanation
The requirements for the published installation files are that multiple files can be uploaded, but each individual file cannot exceed 2 GB in size. This means that the application can be broken down into smaller files for easier distribution. The cumulative total file size for all the published applications must also be smaller than 2 GB. Additionally, the files must be in a zip format in order to be uploaded to Microsoft Intune cloud storage.
17.
In order to install Microsoft Intune client software on a computer, you need to be a member of that computer’s Administrators group.
Correct Answer
A. No change is needed
Explanation
The correct answer is "No change is needed" because the statement in the question already states that in order to install Microsoft Intune client software on a computer, you need to be a member of that computer's Administrators group. Therefore, no change or additional group membership is required.
18.
The windows store allows users of Windows 8 and Windows 8.1 computers to view and install applications that the users’ administrators make available to them. The computers must be attached to the domain, and the user must be logged in With domain credentials.
Correct Answer
D. The system Center configuration manager company portal App
Explanation
The given correct answer is "The system Center configuration manager company portal App". This is because the question is asking for an application that allows users to view and install applications made available by their administrators on Windows 8 and Windows 8.1 computers attached to the domain. The System Center Configuration Manager Company Portal App is specifically designed for this purpose, allowing users to access and install applications provided by their administrators while logged in with domain credentials.
19.
Microsoft Azure Remote App provides the ability to centrally manage on-premise systems and corporate result
Correct Answer
B. System Center 2012 R2 Configuration Manager
Explanation
The given correct answer is "System Center 2012 R2 Configuration Manager". This is because the question is asking for a tool or solution that can centrally manage on-premise systems and corporate results. System Center 2012 R2 Configuration Manager is a comprehensive management solution that allows organizations to manage their on-premise systems, including servers, desktops, and mobile devices, from a central location. It provides features such as software distribution, patch management, inventory tracking, and remote control, making it an ideal choice for centrally managing on-premise systems and corporate results.
20.
Which Microsoft Intune Company Portal APP platform requires IT deployment?
Correct Answer
A. Windows pHone 8.1
Explanation
The Microsoft Intune Company Portal app platform that requires IT deployment is Windows Phone 8.1. This means that in order to deploy and manage the Microsoft Intune Company Portal app on Windows Phone 8.1 devices, IT personnel need to be involved. The other options, such as iOS, Windows RT, and Android, do not require IT deployment as they can be easily downloaded and installed by users from their respective app stores.
21.
Your company uses Windows 8.1 work folders on personal devices. The devices are all registered in Microsoft Intune.
You need to enforce the following security requirements on personal devices :
Company data can be removed if an employee is terminated.
Company data cannot be accessed if the device is lost or stolen.
What should you do?
Correct Answer
B. Enable selective wipe , and enforce encryption .
Explanation
Enabling selective wipe allows the company to remove company data from personal devices if an employee is terminated, ensuring that sensitive information is not accessible to unauthorized individuals. Enforcing encryption ensures that company data cannot be accessed if the device is lost or stolen, as the data will be encrypted and unreadable without the proper encryption key. This combination of selective wipe and encryption provides a strong security measure for protecting company data on personal devices.
22.
True Or False
Check the right sentences.
Correct Answer(s)
B. Windows Intune integrates with existing system
center 2012 R2 configuration Manager deployments
C. Windows Intune lets you manage devices to
protect corporate assets by using configuration
policies and remote wipe .
Explanation
The correct answer states that Windows Intune integrates with existing system center 2012 R2 configuration Manager deployments and allows you to manage devices to protect corporate assets using configuration policies and remote wipe. This means that Windows Intune can be seamlessly integrated with the existing system center 2012 R2 configuration Manager deployments and provides features to manage devices and protect corporate assets.
23.
The president of your university asks you to set up a service website for students who line in the dorm . The website’s official launch date is in two days, and you do not have the resources needed to set up the server infrastructure and develop the system.
You need a cloud-based solution that can have the servers and storage available in two days.
Which Microsoft cloud solution achieves this goal?
Correct Answer
D. Microsoft Azure
Explanation
Microsoft Azure is the correct answer because it is a cloud-based solution that provides the necessary server infrastructure and storage. It allows for quick deployment and scalability, making it suitable for setting up a service website within a short timeframe.
24.
Microsoft Azure storage solutions replicate four copies of your data within a single region.
Correct Answer
C. Three
Explanation
The given correct answer is "Three". This means that Microsoft Azure storage solutions replicate three copies of your data within a single region. This ensures data redundancy and increases data durability and availability. By having multiple copies of the data, the chances of data loss or unavailability are minimized, providing a more reliable storage solution for users.
25.
Which feature of an Azure Application detects failed elements and maneuvers around them, and then returns the correct results within a specific time frame?
Correct Answer
B. Fault tolerance
Explanation
Fault tolerance is the feature of an Azure Application that detects failed elements and maneuvers around them, ensuring that the application continues to function without interruption. It is designed to handle failures and errors by implementing measures such as redundancy, backup systems, and automatic failover. This allows the application to return correct results within a specific time frame, even in the presence of failures or errors. Fault tolerance is crucial for ensuring the reliability and availability of an application, especially in scenarios where downtime or data loss can have significant consequences.
26.
Redundant Microsoft Azure application is able to meet increased demand with consistent results in acceptable time windows
Correct Answer
D. Scalable
Explanation
The given correct answer is "Scalable." This means that the redundant Microsoft Azure application can handle increased demand by expanding its resources or capacity, allowing it to consistently deliver results within acceptable time windows. Scalability is crucial for applications that experience varying levels of demand, as it ensures that the system can adapt and handle increased workload without compromising performance or reliability.
27.
Your company needs a service that eliminates a single point of failure on any provisioned service.
Which feature can Microsoft Azure offer to lower the probability of a failure that disrupts business operations?
Correct Answer
C. High availability
Explanation
High availability is the correct answer because it refers to the ability of a system or service to remain operational and accessible even in the event of component failures. By implementing high availability in Microsoft Azure, the company can ensure that there is no single point of failure, reducing the probability of a failure that disrupts business operations. This feature provides redundancy and fault tolerance, allowing the system to automatically switch to a backup or redundant system if one component fails, thus maintaining continuous operation.
28.
True Or False
Check the right answers
Correct Answer
A. You can create a Microsoft Azure virtual
machine by using a platform image.
Explanation
You can create a Microsoft Azure virtual machine by using a platform image, which is a pre-configured image provided by Azure. This image contains the operating system and other software that is already installed and configured. By using a platform image, you can quickly create a virtual machine without having to manually install and configure the software.
29.
You want to use Microsoft Azure Backup .
Which two certificate requirements are necessary to set up your vault ? Choose two
Correct Answer(s)
C. A certificate from a CA that is trusted by Microsoft
D. A self-signed certificate
Explanation
To set up a vault for Microsoft Azure Backup, two certificate requirements are necessary. First, a certificate from a CA (Certificate Authority) that is trusted by Microsoft is needed. This ensures that the certificate is issued by a trusted authority and can be used for secure communication. Second, a self-signed certificate is required. This type of certificate is generated and signed by the user or organization themselves, providing a level of security for internal use. Both of these certificates are necessary to establish a secure and trusted connection for Azure Backup.
30.
Your university’s IT department currently has no Active Directory strategy .
The university needs a solution that allows you to manage users and groups to secure access to Microsoft online services such as Microsoft Office 365.
Which Active Dirctory strategy should the university use?
Correct Answer
C. Azure Active Directory
Explanation
The university should use Azure Active Directory as the Active Directory strategy. Azure Active Directory is a cloud-based identity and access management service that allows the university to manage users and groups, as well as secure access to Microsoft online services such as Office 365. It provides a centralized platform for user authentication, single sign-on, and multi-factor authentication, making it an ideal solution for managing access to Microsoft online services in a university setting.
31.
Your school’s computer lab has an Active Directory installation . The lab manager wants you to configure local IT users to be able to authenticate with their existing domain credentials to Microsoft Azure . Which technology should you install and configure ?
Correct Answer
C. Active Directory Federation Services
Explanation
Active Directory Federation Services (AD FS) should be installed and configured in order to allow local IT users to authenticate with their existing domain credentials to Microsoft Azure. AD FS enables single sign-on (SSO) capabilities, allowing users to access multiple systems and applications with one set of credentials. It establishes a trust relationship between the local Active Directory and Azure Active Directory, enabling users to seamlessly authenticate and access Azure resources using their existing domain credentials.
32.
Widows Server Active Directory enables single sin-on , which simplifies user access to thousands of cloud applications on windows , Mac and iOS devices.
Correct Answer
D. Azure Active Directory
Explanation
Azure Active Directory is the correct answer because it is a cloud-based identity and access management service that allows users to sign in and access various cloud applications on different devices. It provides single sign-on capabilities, simplifying user access to cloud applications on Windows, Mac, and iOS devices. Azure Active Directory is specifically designed for cloud-based applications and integrates well with other Microsoft services and products.
33.
Which term describes the security boundary for an organization that uses Active Directory and defines the scope of authority for administrators?
Correct Answer
C. Forest
Explanation
The correct answer is "Forest." In an organization that uses Active Directory, a forest is a security boundary that defines the scope of authority for administrators. A forest is a collection of one or more domains that share a common schema, configuration, and global catalog. It provides a boundary for security and administrative purposes, allowing administrators to manage resources and control access within their designated forest.
34.
Which feature is provided in Azure Active Directory Basic that is not present in the free edition?
Correct Answer
D. Group-based Application access
Explanation
Group-based Application access is a feature provided in Azure Active Directory Basic that is not present in the free edition. This feature allows administrators to manage access to cloud applications based on group membership, making it easier to grant and revoke access for multiple users at once. It provides a more efficient and centralized way of managing application access, improving security and simplifying administration tasks.
35.
Work Folder allows users to sync data to their device from their user folder located in their corporation’s data center.
Correct Answer
A. No change is needed
Explanation
The given statement states that the Work Folder feature allows users to sync data to their device from their user folder located in their corporation's data center. The correct answer, "No change is needed," implies that the statement is already accurate and does not require any modifications or adjustments.
36.
You are responsible for managing employee mobile devices at your company .
Your company does not want its medical records distributed to these devices.
You need to keep all medical records on corporate resources while still allowing end-users to use their mobile devices for work. Which solution should you deploy?
Correct Answer
B. Workplace Join
Explanation
Workplace Join allows users to join their devices to the organization network withoutjoining the device to the Active Directory domain
37.
The OneDrive feature of Microsoft Azure centralizes applications on the same trusted and reliable platform that governments, financial services companies, and other large
Organizations use for sensitive information.
Correct Answer
D. RemoteApp
Explanation
The OneDrive feature of Microsoft Azure is the correct answer because it centralizes applications on a trusted and reliable platform that is used by governments, financial services companies, and other large organizations for sensitive information. This suggests that RemoteApp, which allows users to access applications from anywhere, would be the most appropriate choice in this context.
38.
You need to provide a way to allow employees to use their own devices to access company applications that are running in the company data center. Which Microsoft product provides this service?
Correct Answer
A. Microsoft Virtual Desktop Infrastructure
Explanation
Microsoft Virtual Desktop Infrastructure (VDI) is the correct answer because it allows employees to access company applications running in the company data center using their own devices. VDI provides a virtual desktop environment that can be accessed remotely, allowing employees to use their personal devices while still accessing the necessary company applications securely. This solution enables flexibility and productivity while maintaining the security and control of company data.
39.
You have implemented Virtual Desktop Infrastructure ( VDI ) for employees in your company who use bring your own device ( BYOD). Some employees report high network latency when loading VDI apps
You need to resolve the network latency issue while still maintaining a secure BYOD environment. Which tool should you use?
Correct Answer
B. Windows To Go
40.
Organizational Units help you apply data governance for bring your own device ( BYOD ) because it allows you to identify data by using the classification of files.
Correct Answer
D. Dynamic access control helps
Explanation
Dynamic Access Control (DAC), originally called claims-based access control, is used for access management. It provides an automatic mechanism to secure and control access to resources.In Windows Server 2012 R2/2016, DAC allows you to Identify data by usingautomatic and manual classification or tagging files in an organization.
41.
What are two types of system-level updates that can be installed automatically on Microsoft surface pro 3?
Choose two
Correct Answer(s)
C. Surface firmware updates
D. Windows software updates
Explanation
Surface Pro 3 is a Microsoft product, and it runs on the Windows operating system. Therefore, it is reasonable to assume that system-level updates for the Surface Pro 3 would include Windows software updates. Additionally, firmware updates are specific to the hardware of the device and are necessary for improving performance, fixing bugs, and adding new features. Hence, surface firmware updates are also a type of system-level update that can be installed automatically on the Microsoft Surface Pro 3.