In a school, the students are asked to bring their own tablet devices. They can use one of these three operating systems: Windows 8.1, iOS, or Android devices. The school has an Azure Active Directory and students are authorized to access the Azure AD and other cloud resources. They can login using Microsoft accounts. In order to make sure similar configurations and data sets are available to students, applications must be made available via a virtual desktop environment. Identify an option from below that will help you implement this.
You have a Microsoft account and a two step verification is enabled for it. The network has an Azure Active Directory Domain Services (AD DS) domain to which you connect using Windows RT 8.1 device. The device stays in your continuous use and so you want to avoid an additional verification screen. What step would you take to ensure what you want?
There is a Marketing group and the ProjectX group. JChen is a member of both the groups. A Full Control access is provided to the Marketing group on the Campaigns folder while Read access is provided to the ProjectX group on the Campaigns folder. The Campaigns folder is shared. There is also a Change permission granted to the Marketing group on the share but share access is not provided to the ProjectX group. In the Campaigns folder, there is a file called ColorScheme.docx. A drive is mapped to the Campaigns folder by JChen. Can you identify the options that qualify as the appropriate actions JCheb can perform when accessing Campaigns through the mapped drive? (opt ALL options that apply)
You have bought a computer workstation that has Windows 8.1 as the operating system. You login for the first time. You already have a Microsoft account that you plan on using with this new workstation. Can you identify using which accounts can you log in to Windows 8.1? (opt THREE)
You want to set up an extranet for your organization. At the same time, you want to control access to your private network. Which of the following will you use?
A user wants to take ownership of a file. Can you identify the minimum NTFS permission required for that purpose?
You have bought a new tablet. You are running Windows 8.1 RT on that tablet. A Microsoft account is used to log on to the device. Identify which two statements are true. (opt any TWO)
While setting up your Windows Phone 8.1 you are communicated by an error message that you are unable to connect using your Microsoft Account. Can you identify which two statements justify what is most likely wrong? (opt any TWO)
Work Folders are used by your company. Can you identify three devices that can access the stored data in a Work Folder? (opt any THREE)
You are required to make sure only personnel in the HR department can access the files containing personally identifiable information (PII) when they are using a managed device and get connected to the network. There should be central policy implemented to ensure protection. What do you think you would use?
The devices in use require a username and a password to connect to the local network. In hopes of ensuring more stringent security measure, multifactor authentication is decided to be enforced. Identify which of the following would you use. (opt any TWO)
In event of a failure in Azure, which of the following Microsoft Azure storage replication option can be expected to provide the greatest level of accessibility and durability?
You are asked to provide business work file access and you plan to use Work Folders. Can you identify which of the following will be needed to use Work Folders?
There are common disk errors occurring. There is a Microsoft Windows 8.1 file system that offers automated repair of those errors. Can you identify which of the following could it be?
There is a workstation that has Windows 8.1 with a default installation. You plan to run command line tool on that workstation. Can you identify the procedures that are expected to open a command prompt? (opt any THREE)
You are asked to suggest two actions that must be taken in order to minimize the possibility of malware infection? You have four options below to choose from. Which two would you suggest? (opt any TWO)
You work for an organization where all users use iOS devices. There has been a custom IOS app developed by the company, and Microsoft Intune App Wrapping Tool for iOS is used for distribution. What would you do to deploy the app to iOS devices? (opt any TWO)
You are required to protect the operating system using BitLocker. It will also help you check the integrity of boot components during startup. The PC is running Windows 8.1 Pro and has a legacy BIOS. Can you identify from the options below the minimum disk partition requirements?
You protect emails and files on your network with the help of Azure Rights Management (Azure RMS). It is required to share files with individuals outside the network sometimes. When sending the files, it is important to ensure individuals receiving them are able to read these files. Any and all additional potential risks to network security from your solution must be minimized. Can you identify what is required to support this?
You are using Work Folders in your company. There is data stored in the Work Folders. Can you identify three devices that can be used to access that data?
You upgrade a workstation to Windows 8.1. It is decided to use BitLocker device encryption on the workstation. This workstation is not part of a domain. Can you identify the BitLocker device encryption requirements? (opt any TWO)
In order to support mobile devices, you plan configuring Active Directory Rights Management Services (AD RMS). What would be your step of action?
You are using Microsoft Intune in your organization. When issuing a passcode reset from the Microsoft Intune Administration Console, there is a temporary passcode provided. Can you identify which devices will be protected by that temporary passcode? (opt any TWO)
|Buy Individually Timezone|
About Individual Course:
Our experts featured on QuickStart are driven by our ExpertConnect platform, a community of professionals focused on IT topics and discussions. Interact with these experts, create project opportunities, gain help and insights on questions you may have, and more.