- (Exam Topic 4)
You have a computer that runs Windows 10 Pro. The computer contains the users shown in the following
table.
You need to use a local Group Policy Object (GPO) to configure one group of settings for all the members of the local Administrators group and another group of settings for all non-administrators.
What should you do?
Correct Answer:
B
Add the Group Policy Object Editor snap-in twice. Select Browse > Users > Administrators when you add the first snap-in and select Browse > Users > Non-Administrators when you add the second snap-in.
- (Exam Topic 4)
You have a computer named Computer1 that runs Windows 11.
You receive a notification that Computer1 is running low on disk space. You need to remove the following files from Computer1:
• Unused apps
• Unused Microsoft OneDrive content
• Non-critical files for Microsoft Defender Antivirus The solution must minimize administrative effort.
Which tool should you use to remove each type of file? To answer, drag the appropriate tools to the correct file types. Each tool may be used once, more not at all. You may need to drag the split bar between panes or scroll to view content.
Solution:
Does this meet the goal?
Correct Answer:
A
- (Exam Topic 4)
You have a workgroup computer named Computer1 that runs Windows 10 and has the users shown in the following table.
You plan to add a key named Key1 to the following three registry branches:
HKEY_CURRENT_CONFIGSoftware
HKEY_LOCAL_MACHINESSoftware
HKEY_CURRENT_USERSoftware
You need to identify which users can add Key1.
What user or users should you identify for each branch? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Solution:
Box 1 and Box 2.
These are system-wide registry keys so only Administrators can modify them. Box 3.
This key affects only the logged in user. Therefore, any user can modify this key.
Does this meet the goal?
Correct Answer:
A
- (Exam Topic 4)
You have a computer that runs Windows 10. The computer contains a folder. The folder contains sensitive data.
You need to log which user reads the contents of the folder and modifies and deletes files in the folder. You need to log which user reads the contents of the folder and modifies and deletes files in the folder.
Solution: from the properties of the folder, you configure the Auditing settings and from the Audit Policy in the local Group Policy, you configure Audit system events.
Does this meet the goal?
Correct Answer:
B
Files and folders are objects and are audited through object access, not though system events. References: https://www.netwrix.com/how_to_detect_who_changed_file_or_folder_owner.html
- (Exam Topic 4)
Your network contains an Active Directory domain. The domain contains 1,000 computers that run Windows 10.
A user reports that his computer has a compatibility issue with the latest Windows 10 feature update.
You need to prevent other computers from installing the feature update for 10 days while you mitigate the issue.
Which Windows Update setting should you configure by using a Group Policy Object (GPO)?
Correct Answer:
A
Reference:
https://docs.microsoft.com/en-us/windows/deployment/update/waas-wufb-group-policy