Valid Microsoft MCSA: Windows 10 70-698 Exam Questions Free Online

New 70-698 exam questions covers all the exam knowledges, such as local installation, configuration of core local services, and the general local management and maintenance of Windows 10. Passing 70-698 Installing and Configuring Windows 10 exam to get MCSA: Windows 10 certification with Valid Microsoft MCSA: Windows 10 70-698 Exam Questions. Here would like to share free online demo questions of Valid Microsoft MCSA: Windows 10 70-698 Exam Questions for checking.

Valid Microsoft MCSA: Windows 10 70-698 Exam Questions Free Online

1. In this section, you will see one or more sets of questions with the same scenario and problem. Each question presents a unique solution to the problem, and you must determine whether the solution meets the stated goals. Any of the solutions might solve the problem. It is also possible that none of the solutions solve the problem.

Once you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution. Determine whether the solution meets the stated goals.

You have a computer named Computer1 that runs Windows 10.

File History is turned on.

The user of Computer1 reports that previous versions of D:FolderFile1.doc are unavailable from the Previous Versions tab.

You need to ensure that the previous versions of the file are created.

Solution: Modify the Backup settings in the Settings app.

Does this meet the goal?

2. In this section, you will see one or more sets of questions with the same scenario and problem. Each question presents a unique solution to the problem, and you must determine whether the solution meets the stated goals. Any of the solutions might solve the problem. It is also possible that none of the solutions solve the problem.

Once you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution. Determine whether the solution meets the stated goals.

You have a computer named Computer1 that runs Windows 10.

File History is turned on.

The user of Computer1 reports that previous versions of D:FolderFile1.doc are unavailable from the Previous Versions tab.

You need to ensure that the previous versions of the file are created.

Solution: Turn on System Protection for drive D.

Does this meet the goal?

3. In this section, you will see one or more sets of questions with the same scenario and problem. Each question presents a unique solution to the problem, and you must determine whether the solution meets the stated goals. Any of the solutions might solve the problem. It is also possible that none of the solutions solve the problem.

Once you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution. Determine whether the solution meets the stated goals.

You have a computer named Computer1 that runs Windows 10.

File History is turned on.

The user of Computer1 reports that previous versions of D:FolderFile1.doc are unavailable from the Previous Versions tab.

You need to ensure that the previous versions of the file are created.

Solution: Create a backup of drive D by using Backup and Restore (Windows 7).

Does this meet the goal?

4. In this section, you will see one or more sets of questions with the same scenario and problem. Each question presents a unique solution to the problem, and you must determine whether the solution meets the stated goals. Any of the solutions might solve the problem. It is also possible that none of the solutions solve the problem.

Once you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution. Determine whether the solution meets the stated goals.

You have a computer named Computer1 that runs Windows 10.

File History is turned on.

The user of Computer1 reports that previous versions of D:FolderFile1.doc are unavailable from the Previous Versions tab.

You need to ensure that the previous versions of the file are created.

Solution: Add D:Folderto the Documents library.

Does this meet the goal?

5. In this section, you will see one or more sets of questions with the same scenario and problem. Each question presents a unique solution to the problem, and you must determine whether the solution meets the stated goals. Any of the solutions might solve the problem. It is also possible that none of the solutions solve the problem.

Once you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution. Determine whether the solution meets the stated goals.

Your network contains a single Active Directory domain named contoso.com. The domain contains two computers named Computer1 and Computer2.

A user named User1 is a member of the local Administrators group on Computer1 and Computer2.

User1 fails to access the Event Viewer logs on Computer2 from Computer1. User1 can connect to Computer2 remotely by using Computer Management.

You need to ensure that User1 can use Event Viewer on Computer1 to remotely view the Event Viewer logs on Computer2.

Solution: You start the Remote Registry services on Computer2.

Does this meet the goal?

6. In this section, you will see one or more sets of questions with the same scenario and problem. Each question presents a unique solution to the problem, and you must determine whether the solution meets the stated goals. Any of the solutions might solve the problem. It is also possible that none of the solutions solve the problem.

Once you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution. Determine whether the solution meets the stated goals.

Your network contains a single Active Directory domain named contoso.com. The domain contains two computers named Computer1 and Computer2.

A user named User1 is a member of the local Administrators group on Computer1 and Computer2.

User1 fails to access the Event Viewer logs on Computer2 from Computer1. User1 can connect to Computer2 remotely by using Computer Management.

You need to ensure that User1 can use Event Viewer on Computer1 to remotely view the Event Viewer logs on Computer2.

Solution: You modify the Windows Firewall settings on Computer2.

Does this meet the goal?

7. In this section, you will see one or more sets of questions with the same scenario and problem. Each question presents a unique solution to the problem, and you must determine whether the solution meets the stated goals. Any of the solutions might solve the problem. It is also possible that none of the solutions solve the problem.

Once you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution. Determine whether the solution meets the stated goals.

Your network contains a single Active Directory domain named contoso.com. The domain contains two computers named Computer1 and Computer2.

A user named User1 is a member of the local Administrators group on Computer1 and Computer2.

User1 fails to access the Event Viewer logs on Computer2 from Computer1. User1 can connect to Computer2 remotely by using Computer Management.

You need to ensure that User1 can use Event Viewer on Computer1 to remotely view the Event Viewer logs on Computer2.

Solution: You run Enable-PSRemoting on Computer1.

Does this meet the goal?

8. In this section, you will see one or more sets of questions with the same scenario and problem. Each question presents a unique solution to the problem, and you must determine whether the solution meets the stated goals. Any of the solutions might solve the problem. It is also possible that none of the solutions solve the problem.

Once you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution. Determine whether the solution meets the stated goals.

Your network contains a single Active Directory domain named contoso.com. The domain contains two computers named Computer1 and Computer2.

A user named User1 is a member of the local Administrators group on Computer1 and Computer2.

User1 fails to access the Event Viewer logs on Computer2 from Computer1. User1 can connect to Computer2 remotely by using Computer Management.

You need to ensure that User1 can use Event Viewer on Computer1 to remotely view the Event Viewer logs on Computer2.

Solution: You run winrm quickconfig on Computer2.

Does this meet the goal?

9. You have a computer that has a local printer.

You need to share the printer.

Which two tools can you use to achieve the goal? Each correct answer presents a complete solution.

10. A user has a laptop named Computer 1 that runs Windows 10 and has a 64-bit application named App1 installed.

App1 fails to launch and generates an error message indicating that the application is not supported on this version of Windows.

You need to ensure that App1 can run successfully.

What should you do?

11. You have a laptop that has a high resolution display.

The Change the size of the text, apps, and other items setting is set to 175%.

You install a desktop application name App1.

When you start App1, the visual elements are misaligned, and the application interface does not appear as expected.

You need to ensure that App1 is displayed properly without affecting how other applications are displayed.

What should you do?

12. A user has a computer that runs Windows 10.

The user reports that it takes a very long time to start the computer.

You need to identify which user applications cause the greatest delays when starting the computer.

Which tool should you use?

13. You have a computer named Computer1 that has the following four hard disk drives installed:

You need to create a two-way mirror by using Storage Spaces. The solution must minimize data loss.

Which drives should you use?

14. Your company is developing a Universal Windows Platform (UWP) app named App1. App1 is not published in the Windows Store.

You are provided with an AppX package for App1.

You need to install App1 locally.

What should you do first?

15. You purchase licenses for several apps from the Windows Store and you list the apps in your Windows Store for Business.

You need to tell users how to install the apps.

What should you instruct the users to use?

16. Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.

Your network contains a single Active Directory domain named adatum.com.

The network contains five servers configured as shown in the following table:

All of the servers run Windows Server 2012 R2.

Test_Server has a shared folder named ShareA. Only local users have permissions to ShareA.

The network contains a mainframe computer that is administered by using the Telnet protocol.

The domain contains four client computers configured as shown in the following table:

All of the client computers run the 64-bit version of Windows. User3 frequently accesses ShareA. Remote Desktop is enabled on Computer4.

Your company identifies the following requirements.

• Ensure that you can test unsigned device drivers on Computer1

• Enable Credential Guard on Computer2.

• Run commands and cmdlets remotely on computer2.

• Configure User Account control (UAC) on Computer3 to prompt administrators for credentials when elevated privileges are required.

• Ensure that User1 can view and interact with a desktop session of User3.

• Ensure that User2 can use Telnet to manage the mainframe.

• Ensure that User4 can use Remote Desktop to access Computer4 remotely.

End of repeated scenario.

You need to configure Computer3 to meet the UAC requirement.

What should you use?

17. Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.

Your network contains a single Active Directory domain named adatum.com.

The network contains five servers configured as shown in the following table:

All of the servers run Windows Server 2012 R2.

Test_Server has a shared folder named ShareA. Only local users have permissions to ShareA.

The network contains a mainframe computer that is administered by using the Telnet protocol.

The domain contains four client computers configured as shown in the following table:

All of the client computers run the 64-bit version of Windows. User3 frequently accesses ShareA. Remote Desktop is enabled on Computer4.

Your company identifies the following requirements.

• Ensure that you can test unsigned device drivers on Computer1

• Enable Credential Guard on Computer2.

• Run commands and cmdlets remotely on computer2.

• Configure User Account control (UAC) on Computer3 to prompt administrators for credentials when elevated privileges are required.

• Ensure that User1 can view and interact with a desktop session of User3.

• Ensure that User2 can use Telnet to manage the mainframe.

• Ensure that User4 can use Remote Desktop to access Computer4 remotely.

End of repeated scenario.

On Test_Server, you reset the password for User3.

You need to ensure that User3 can access ShareA.

Which tool should you instruct User3 to use on Computer3?

18. Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.

Your network contains a single Active Directory domain named adatum.com.

The network contains five servers configured as shown in the following table:

All of the servers run Windows Server 2012 R2.

Test_Server has a shared folder named ShareA. Only local users have permissions to ShareA.

The network contains a mainframe computer that is administered by using the Telnet protocol.

The domain contains four client computers configured as shown in the following table:

All of the client computers run the 64-bit version of Windows. User3 frequently accesses ShareA. Remote Desktop is enabled on Computer4.

Your company identifies the following requirements.

• Ensure that you can test unsigned device drivers on Computer1

• Enable Credential Guard on Computer2.

• Run commands and cmdlets remotely on computer2.

• Configure User Account control (UAC) on Computer3 to prompt administrators for credentials when elevated privileges are required.

• Ensure that User1 can view and interact with a desktop session of User3.

• Ensure that User2 can use Telnet to manage the mainframe.

• Ensure that User4 can use Remote Desktop to access Computer4 remotely.

End of repeated scenario.

You need to meet the Credential Guard requirement of Computer2.

Which two Windows features should you install? Each correct answer presents part of the solution.

19. Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.

Your network contains a single Active Directory domain named adatum.com.

The network contains five servers configured as shown in the following table:

All of the servers run Windows Server 2012 R2.

Test_Server has a shared folder named ShareA. Only local users have permissions to ShareA.

The network contains a mainframe computer that is administered by using the Telnet protocol.

The domain contains four client computers configured as shown in the following table:

All of the client computers run the 64-bit version of Windows. User3 frequently accesses ShareA. Remote Desktop is enabled on Computer4.

Your company identifies the following requirements.

• Ensure that you can test unsigned device drivers on Computer1

• Enable Credential Guard on Computer2.

• Run commands and cmdlets remotely on computer2.

• Configure User Account control (UAC) on Computer3 to prompt administrators for credentials when elevated privileges are required.

• Ensure that User1 can view and interact with a desktop session of User3.

• Ensure that User2 can use Telnet to manage the mainframe.

• Ensure that User4 can use Remote Desktop to access Computer4 remotely.

End of repeated scenario.

You need to meet the requirement of User2.

What should you do?

20. Note: This question is part of a series of questions that use the same set of answer choices. Each answer choice may be used once, more than once, or not at all.

Your network contains a single Active Directory domain. The domain contains a VPN server that supports all of the VPN protocols.

A user named User1 works from home and has a desktop computer that runs Windows 10 Pro. User1 has an application named App1 that requires access to a server on the corporate network. User1 creates a VPN connection on the computer.

You need to ensure that when User1 opens App1, App1 can access the required data.

What should you do?

21. Note: This question is part of a series of questions that use the same set of answer choices. Each answer choice may be used once, more than once, or not at all.

Your network contains a single Active Directory domain. The domain contains devices that run Windows 10 Enterprise.

You need to prevent computers from connecting to hosts on subnet 131.107.0.0/24.

What should you do?

22. Note: This question is part of a series of questions that use the same set of answer choices. Each answer choice may be used once, more than once, or not at all.

You have 10 computers that run Windows 10 Pro. The computers are in a workgroup.

A computer named PC_User1 has shared folder named Share1. Users are not prompted for credentials when they access Share1.

You modify the permissions on Share1 so that the share is shared only to a user named User1.

You need to ensure that when users from other computers in the workgroup access Share1, they must authenticate by using the credentials of User1.

What should you do?

23. Note: This question is part of a series of questions that use the same set of answer choices. Each answer choice may be used once, more than once, or not at all.

Your network contains a single Active Directory domain. The domain contains a VPN server that supports all of the VPN protocols.

From a computer that runs Windows 10 Pro, a user named User1 creates an SSTP VPN connection to a network named VPN1.

User1 successfully connects to the VPN server. When User1 roams between different Wi-Fi access points, the user loses the connection to the corporate network and must manually re-establish the VPN connection.

You need to ensure that VPN1 automatically maintains the connection while the user roams between Wi-Fi access points.

What should you do?

24. Note: This question is part of a series of questions that use the same set of answer choices. Each answer choice may be used once, more than once, or not at all.

You have a computer named Computer1 that has storage configured as shown in the following table:

Pool1 contains a storage space named Space1 that is 300 GB.

Pool3 contains a storage space named Space2 that is 100 GB.

Pool2 is empty.

You need to add Disk6 to Pool1.

What should you use?

25. Note: This question is part of a series of questions that use the same set of answer choices. Each answer choice may be used once, more than once, or not at all.

You have a computer named Computer1 that has storage configured as shown in the following table:

Pool1 contains a storage space named Space1 that is 300 GB.

Pool3 contains a storage space named Space2 that is 100 GB.

Pool2 is empty.

Space1 contains 10 folders.

You need to access each folder as a separate drive from Windows Explorer.

What should you use?

26. Note: This question is part of a series of questions that use the same set of answer choices. Each answer choice may be used once, more than once, or not at all.

You have a computer named Computer1 that has storage configured as shown in the following table:

Pool1 contains a storage space named Space1 that is 300 GB.

Pool3 contains a storage space named Space2 that is 100 GB.

Pool2 is empty.

You need to add a storage space to Pool2.

What should you use?

27. Note: This question is part of a series of questions that use the same set of answer choices. Each answer choice may be used once, more than once, or not at all.

You have a computer named Computer1 that has storage configured as shown in the following table:

Pool1 contains a storage space named Space1 that is 300 GB.

Pool3 contains a storage space named Space2 that is 100 GB.

Pool2 is empty.

You need to add Disk7 to Pool1.

What should you use first?

28. Note: This question is part of a series of questions that use the same set of answer choices. Each answer choice may be used once, more than once, or not at all.

You have a computer that has a dual-boot configuration. Windows 10 Enterprise is installed on the local disk. Windows 10 Pro is installed in a VHDX file named Disk1.vhdx. Both of the installations are 64-bit versions.

You start the computer to Windows 10 Enterprise.

You need to ensure that you can install an unsigned driver to Windows 10 Pro when the computer starts in Windows 10 Pro.

What should you run?

29. Note: This question is part of a series of questions that use the same set of answer choices. Each answer choice may be used once, more than once, or not at all.

You have a computer named Computer1.

Computer1 has a virtual hard disk (VHD) named Disk1.vhdx. Disk1.vhdx has an NTFS partition, which is visible in File Explorer as drive E.

You need to provision Windows 10 on Disk1.vhdx.

What should you run?

30. Note: This question is part of a series of questions that use the same set of answer choices. Each answer choice may be used once, more than once, or not at all.

You have a computer that has a dual-boot configuration. Windows 10 Pro is installed on the local disk. Windows 10 Enterprise is installed in a VHDX file named Disk1.vhdx.

You start the computer to Windows 10 Pro, and then you download a driver package.

You need to ensure that the next time the Windows 10 Enterprise installation starts, the driver is installed already.

What should you run first?

31. Note: This question is part of a series of questions that use the same set of answer choices. Each answer choice may be used once, more than once, or not at all.

You have a computer named Computer1 that has a dual-boot configuration. Computer1 has Windows 8.1 and Windows 10 installed.

You need to configure Computer1 to use only 4 GB of RAM when the computer starts in Windows 10.

What should you run?

32. Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.

Start of repeated scenario

Your network contains a single Active Directory domain named contoso.com. All computers are members of the domain and run the 64-bit version of Windows 10 Enterprise.

On a test computer named Computer_Test1, you pin several company-specific applications in a group named Contoso Apps, and then you export the start menu layout to a file named contoso.xml.

You install Client Hyper-V on a computer named Computer6.

You identity the following requirements.

• Install the Hyper V feature on a computer named Computer1.

• Use virtual smart card authentication on a computer named Computer2.

• Enable Secure Boot on a computer named Computer3.

• Connect a computer named Computer4 to a projector by using Miracast.

• Ensure that a user named User 1 can use keyboard shortcuts by pressing one key at a time.

• Ensure that you can share the clipboard between Computer6 and the virtual machines running on Computer6.

• Add the Contoso Apps group to the Start menu of a computer named Computer7.

End of repeated scenario.

You install all of the Contoso apps on Computer7.

You need to meet the requirements of Computer7.

What should you do?

33. Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.

Start of repeated scenario

Your network contains a single Active Directory domain named contoso.com. All computers are members of the domain and run the 64-bit version of Windows 10 Enterprise.

On a test computer named Computer_Test1, you pin several company-specific applications in a group named Contoso Apps, and then you export the start menu layout to a file named contoso.xml.

You install Client Hyper-V on a computer named Computer6.

You identity the following requirements.

• Install the Hyper V feature on a computer named Computer1.

• Use virtual smart card authentication on a computer named Computer2.

• Enable Secure Boot on a computer named Computer3.

• Connect a computer named Computer4 to a projector by using Miracast.

• Ensure that a user named User 1 can use keyboard shortcuts by pressing one key at a time.

• Ensure that you can share the clipboard between Computer6 and the virtual machines running on Computer6.

• Add the Contoso Apps group to the Start menu of a computer named Computer7.

End of repeated scenario.

Which hardware feature must Computer4 must support?

34. Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.

Start of repeated scenario

Your network contains a single Active Directory domain named contoso.com. All computers are members of the domain and run the 64-bit version of Windows 10 Enterprise.

On a test computer named Computer_Test1, you pin several company-specific applications in a group named Contoso Apps, and then you export the start menu layout to a file named contoso.xml.

You install Client Hyper-V on a computer named Computer6.

You identity the following requirements.

• Install the Hyper V feature on a computer named Computer1.

• Use virtual smart card authentication on a computer named Computer2.

• Enable Secure Boot on a computer named Computer3.

• Connect a computer named Computer4 to a projector by using Miracast.

• Ensure that a user named User 1 can use keyboard shortcuts by pressing one key at a time.

• Ensure that you can share the clipboard between Computer6 and the virtual machines running on Computer6.

• Add the Contoso Apps group to the Start menu of a computer named Computer7.

End of repeated scenario.

You need to meet the requirement of Computer6.

What should you configure?

35. Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.

Start of repeated scenario

Your network contains a single Active Directory domain named contoso.com. All computers are members of the domain and run the 64-bit version of Windows 10 Enterprise.

On a test computer named Computer_Test1, you pin several company-specific applications in a group named Contoso Apps, and then you export the start menu layout to a file named contoso.xml.

You install Client Hyper-V on a computer named Computer6.

You identity the following requirements.

• Install the Hyper V feature on a computer named Computer1.

• Use virtual smart card authentication on a computer named Computer2.

• Enable Secure Boot on a computer named Computer3.

• Connect a computer named Computer4 to a projector by using Miracast.

• Ensure that a user named User 1 can use keyboard shortcuts by pressing one key at a time.

• Ensure that you can share the clipboard between Computer6 and the virtual machines running on Computer6.

• Add the Contoso Apps group to the Start menu of a computer named Computer7.

End of repeated scenario.

You need to meet the requirement of User1.

Which Ease of Access setting should you configure?

36. HOTSPOT

You have a computer named Computer1 that runs Windows 10.

You run the Get-VMHost | fl* cmdlet on Computer1, and you receive the following output:

Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the output.

37. HOTSPOT

Your network contains a single Active Directory domain named contoso.com.

In contoso.com, you create an organizational unit (OU) named OU1.

You need to use a provisioning package to perform the following:

How should you configure the provisioning package? To answer, select the appropriate options in the answer area.

38. You have a computer named Computer1.

You obtain a new driver for a device installed on Computer1. The driver package is stored in C:Drivers and includes the following files:

You need to install the driver on Computer1 by using File Explorer.

Which file should you use to initiate the installation?

39. You have four computers configured as shown in the following table:

You need to deploy Windows 10 Enterprise. The deployment must support Miracast, BitLocker Drive Encryption (BitLocker), and Windows Hello with facial recognition.

On which computer should you install Windows 10?

40. Your network contains a single Active Directory domain that has a Key Management Service (KMS) host.

You deploy Windows 10 to several laptops.

You need to ensure that Windows 10 is activated on the laptops immediately.

Which command should you run?


 

 

Updated MCSE: Mobility Certification 70-703 Study Guide Online
Updated Microsoft Windows Server 2016 70-741 Exam Questions On September

Add a Comment

Your email address will not be published. Required fields are marked *