How many days do you have to roll back the update?

You install a feature update on a computer that runs Windows 10. How many days do you have to roll back the update?A . 5B . 10C . 14D . 30View AnswerAnswer: B Explanation: Microsoft has changed the time period associated with operating system rollbacks with Windows 10 version 1607,...

September 14, 2020 No Comments READ MORE +

What are the categories of event described in the ITIL service operation book?

What are the categories of event described in the ITIL service operation book?A . Informational, scheduled, normalB . Scheduled, unscheduled, emergencyC . Informational, warning, exceptionD . Warning, reactive, proactiveView AnswerAnswer: C

September 14, 2020 No Comments READ MORE +

What is the best tool to use?

You plan to design an application that will use data from Azure Data Lake and perform sentiment analysis by using Azure Machine Learning algorithms. The developers of the application use a mix of Windows- and Linux-based environments. The developers contribute to shared GitHub repositories. You need all the developers to...

September 14, 2020 No Comments READ MORE +

Fill in the blank with the appropriate term. A ______________________ network is a local area network (LAN) in which all computers are connected in a ring or star topology and a bit- or token-passing scheme is used for preventing the collision of data between two computers that want to send messages at the same time

FILL BLANK Fill in the blank with the appropriate term. A ______________________ network is a local area network (LAN) in which all computers are connected in a ring or star topology and a bit- or token-passing scheme is used for preventing the collision of data between two computers that want...

September 14, 2020 No Comments READ MORE +

Which of the following policies is a set of rules designed to enhance computer security by encouraging users to employ strong passwords and use them properly?

Which of the following policies is a set of rules designed to enhance computer security by encouraging users to employ strong passwords and use them properly?A . Information protection policyB . Remote access policyC . Group policyD . Password policyView AnswerAnswer: D Explanation: A password policy is a set of...

September 14, 2020 No Comments READ MORE +

The developers at your company plan to create a web app named App10598168 and to publish the app to https://www.contoso.com

SIMULATION The developers at your company plan to create a web app named App10598168 and to publish the app to https://www.contoso.com. You need to perform the following tasks: - Ensure that App10598168 is registered to Azure Active Directory (Azure AD). - Generate a password for App10598168. To complete this task,...

September 14, 2020 No Comments READ MORE +

The developers at your company plan to publish an app named App11641655 to Azure

SIMULATION The developers at your company plan to publish an app named App11641655 to Azure. You need to ensure that the app is registered to Azure Active Directory (Azure AD). The registration must use the sign-on URLs of https://app.contoso.com. To complete this task, sign in to the Azure portal and...

September 14, 2020 No Comments READ MORE +

Your network contains an on-premises Active Directory domain that syncs to an Azure Active Directory (Azure AD) tenant

HOTSPOT Your network contains an on-premises Active Directory domain that syncs to an Azure Active Directory (Azure AD) tenant. The tenant contains the users shown in the following table. The tenant contains the groups shown in the following table. You configure a multi-factor authentication (MFA) registration policy that has the...

September 14, 2020 No Comments READ MORE +

What should you use?

You have Azure Resource Manager templates that you use to deploy Azure virtual machines. You need to disable unused Windows features automatically as instances of the virtual machines are provisioned. What should you use?A . device compliance policies in Microsoft IntuneB . Azure Automation State ConfigurationC . application security groupsD...

September 14, 2020 No Comments READ MORE +

What should you do first?

Case Study: 2 Contoso Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time. When the Next button is available, click it to access the...

September 14, 2020 No Comments READ MORE +