Note: This question is part of a series of questions that use the same or similar answer
choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details in a question apply only to that question. You make a folder available for offline use. Currently, the folder is synchronizing and will take approximately 15 minutes to complete. You need to ensure that the files continue to synchronize when you close the lid of the computer. Which Control Panel application should you use?
RemoteApp and Desktop Connections
Network and Sharing Center
Phone and Modem
You administer Windows 10 Enterprise client computers in your company network. A computer that is used by non- administrator users has a directory named C:\Folder1.
A shared collection of Microsoft Excel files is stored in the C:\Folder1 directory, with non-administrator users being granted modify permissions to the directory. You discover that some files have been incorrectly modified by a user. You need to determine which users are making changes to the files in the directory. Which two actions should you perform? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.
Set local policy: Computer Configuration\Windows Settings\Security Settings\Local Policies\Audit Policy\Audit object access to Failure.
From the Auditing Entry for Folder1, set the Principal to Everyone, and then set the Type to Failure for the Modify permission.
From the Auditing Entry for Folder1, set the Principal to Guests, and then set the Type to Success for the Modify permission.
Set local policy: Computer Configuration\Windows Settings\Security Settings\Local Policies\Audit Policy\Audit object access to Success.
From the Auditing Entry for Folder1, set the Principal to Guests, and then set the Type to Failure for the Modify permission.
From the Auditing Entry for Folder, set the Principal to Everyone, and then set the
You have a Microsoft Intune subscription. You create two compliance policies named Comp1 and Comp2. You create a configuration policy named ConfigPol1. The settings in each policy do not conflict with other policies. Comp1 has low security settings. Comp2 has medium security settings. ConfigPol1 has high security settings. You have a device named Device1. Device1 is a member of groups that have Comp1, Comp2 and ConfigPol1 applied. You need to identify which policies with be enforced on Device1. What should you identify?
Comp1, Comp2 and ConfigPol1
Comp1 and Comp2 only
Comp1 and ConfigPol1 only
Comp2 andConfigPol1 only
Your network contains an Active Directory domain and 100 Windows 10 client computers. All software is deployed by using Microsoft Application Virtualization (App-
V) 5.0. Users are NOT configured as local administrators. Your company purchases a subscription to Microsoft Office 365 that includes Office 365 ProPlus. You need to create an App-V package for Office 365 ProPlus. What should you do?
Run the Office Customization Tool (OCT), run the App-V Sequencer and then run Setup /Packager.
Download the Office Deployment Tool for Click-to-Run, run the App-V Sequencer and then run Setup /Admin.
Download the Office Deployment Tool for Click-to-Run, run Setup /Download and then run Setup /Packager.
Run the Office Customization Tool (OCT), run Setup /Download and then run the
The Office Deployment Tool allows the administrator to customize and manage Office 2013Volume License or Office 365 Click-to-Run deployments.
The Office Deployment Tool Setup runs the following tasks:
Setup /Download – Downloads files to create an Office 15 installation Setup /Configure – Adds, removes, or configures an Office 15 installation Setup /Packager – Produces an Office 15 App-V package
Your company has a standard power scheme for the sales team. You are replacing a laptop for a sales associate. You import the power scheme onto the new laptop. You need to apply the power scheme. What should you do?
Modify the power scheme under Power and Sleep settings.
Run the gpupdate /F command.
Run the powercfg /S command.
Modify the advanced power settings.
You are the network administrator for Contoso, Ltd. Many users have Windows 10 Enterprise laptops, and your IT department configures all of them to use BitLocker on all fixed drives. Many users carry sensitive corporate data on their USB drives. You need to enable BitLocker for these USB drives. Which key protector option should you use?
a startup key
You support Windows 10 Enterprise laptops that are part of a workgroup. An employee is unable to start Windows Mobility Center on his laptop. You need to make it possible for the employee to use Windows Mobility Center on the laptop. What should you do?
Use Add features to Windows 10 Enterprise to add Windows Mobility Center.
Use Programs and Features to repair the installation of Windows Mobility Center.
Use Local Group Policy Editor to set Turn off Windows Mobility Center to Not Configured.
Use Turn Windows features on or off in Programs and Features to enable Windows Mobility Center.
To Enable or Disable Windows Mobility Center using Group Policy