Skip survey header

Microsoft 365 Certified: Modern Desktop Administrator Associate Quiz 18

Enjoy the following 10 question quiz from TestOut.

1. You are managing a workstation that is not part of a Windows domain. Users on this computer should not be permitted to download applications from the Windows Store.

Which administration tool can you use to enable a policy that turns off the Store application for all users on this computer?
*This question is required.
2. A user has complained about not being able to remove a program that is no longer needed on a computer. The Programs and Features page is not available in Control Panel.

You suspect that a policy is enabled that hides this page from the user. But after opening the Local Group Policy Editor, you see that the Hide Programs and Features page is set to Not configured. You know that other users in this domain can access the Programs and Features page.

To determine whether the policy is enabled, where should you look next?
*This question is required.
3. You have two Windows systems named Comp1 and Comp2. Both computers are members of a domain. You have a domain user account named EFS-Recovery. You use this user account to recover some files on Comp1. You need to recover some files on Comp2, but are unsuccessful.

What should you do?
*This question is required.
4. You have created a new folder and added the Authenticated Users group. Which basic permissions will be applied by default? (Choose three) *This question is required.
5. The users in your organization bring their own mobile devices to the office and want to be able to access the network with them. You want to protect your network from malware threats that might be on these devices.

You want to make sure these devices meet certain requirements before they can connect to the network. For example, you want them to meet the following criteria:


1) Hardware and Windows startup components are clean.
2) The kernel is not infected with a rootkit.
3) Boot drivers are clean.

Which Windows feature can you use to protect your network from malware threats that might be on your users' mobile devices?
  *This question is required.
6. You want to set the power scheme using the command line for power management. What command would you issue in Command Prompt? *This question is required.

7. You have a Windows system that you would like to manage remotely. The computer connects to the network behind a firewall that blocks all but the most common ports. Which remote management solution does not require additional firewall ports opened?

*This question is required.
8. Which of the following syntax examples is used by a PowerShell cmdlet? *This question is required.
9. Which of the following meets the minimum licensing requirement to use Microsoft Defender Advanced Threat Protection? *This question is required.
10. What are the vectors that an attacker can use to enter or extract data from an environment called? *This question is required.
This free quiz was provided by: