Microsoft 70-744 203q
Microsoft 70-744 203q
Microsoft 70-744 203q
Microsoft 70-744
Total Questions: 203
https://dumpsarena.com
[email protected]
QUESTION NO: 1
The domain contains four global groups named Group1, Group2, Group3, and Group4. A user named User1 is a member of
Group3.
You have an organizational unit (OU) named OU1 that contains computer accounts. A Group Policy object (GPO) named
GPO1 is linked to OU1. OU1 contains a computer account named Computer1.
GPO1 has the User Rights Assignment configured as shown in the following table.
You need to ensure that User1 can access the shares on Computer1. What should you do?
Explanation:
QUESTION NO: 2
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a
unique solution that might meet the stated goals.
Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this sections, you will NOT be able to return to it. As a result, these questions will not appear
in the review screen.
Your network contains an Active Directory forest named contoso.com. All servers run Windows Server 2016. The forest
contains 2,000 client computers that run Windows 10. All client computers are deployed from a customized Windows image.
You need to deploy 10 Privileged Access Workstations (PAWs). The solution must ensure that administrators can access
several client applications used by all users.
Solution: You deploy 10 physical computers and configure them as PAWs. You deploy 10 additional computers and
configure them by using the customized Windows image.
A. Yes
B. No
ANSWER: A
Explanation:
References: https://technet.microsoft.com/en-us/windows-server-docs/security/securing-privileged-access/privileged-access-
workstations
QUESTION NO: 3
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a
unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while
others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in
the review screen.
You need to ensure that you can run Windows Containers on Server1.
Solution: On server1, you install the DockerMsftProvider PowerShell and the Docker package. You restart the server.
A. Yes
B. No
ANSWER: A
Explanation:
References:
https://docs.microsoft.com/en-us/virtualization/windowscontainers/deploy-containers/deploy-containers-on-server
QUESTION NO: 4
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that
runs Windows Server 2016.
You have an organizational unit (OU) named Administration that contains the computer account of Server1.
You create a Group Policy object (GPO) named GPO1. You link GPO1 to the Administration OU.
You need to log an event each time an Active Directory cmdlet is executed successfully from Server1.
A. From Advanced Audit Policy in GPO1, configure auditing for directory service changes.
D. From Advanced Audit Policy in GPO1, configure for other privilege use events.
Explanation:
References: https://www.petri.com/enable-powershell-logging
QUESTION NO: 5
Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1
and Server2 that run Windows Server 2016.
The Microsoft Advanced Threat Analytics (ATA) Center service is installed on Server1.
A. User7
B. User8
C. User1
D. User6
ANSWER: D
References:
https://docs.microsoft.com/en-us/advanced-threat-analytics/install-ata-step1
QUESTION NO: 6
Your network contains an Active Directory domain named contoso.com. The domain contains domain controllers that run
Windows Server 2016.
The Job Title attribute for a domain user named User1 has a value of Sales Manager.
You need to ensure that the security token of User1 has a claim for Job Title.
A. From Active Directory Users and Computers, modify the properties of the User1 account.
B. From a Group Policy object(GPO), configure KDC support for claims, compound authentication, and Kerberos armoring.
D. From Windows PowerShell, run the New-ADClaimTransformPolicy cmdlet and specify the –Name parameter.
ANSWER: C
Explanation:
References: https://www.nyazit.com/how-to-configure-dynamic-access-control-in-windows-server-2012-r2-2/
DRAG DROP
What should you use to encrypt the contents of each volume? To answer, drag the appropriate encryption options to the
correct volumes. Each encryption option may be used once, more than once, or not at all. You may need to drag the split bar
between panes or scroll to view content.
ANSWER:
Explanation:
References: https://www.howtogeek.com/howto/6229/how-to-use-bitlocker-on-drives-without-tpm/
QUESTION NO: 8
After you answer a question in this sections, you will NOT be able to return to it. As a result, these questions will not appear
in the review screen.
Your network contains an Active Directory domain named contoso.com. The domain contains a computer named Computer1
that runs Windows10.
Computer1 has an application named App1.exe that is located in D:\Apps\. App1.exe is configured to accept connections on
TCP port 8080.
You need to ensure that App1.exe can accept connections only when Computer1 is connected to the corporate network.
Solution: You configure an inbound rule that allows the TCP protocol on port 8080, uses a scope of 172.16.0.0/16 for local IP
addresses, and applies to a private profile.
A. Yes
B. No
ANSWER: B
Explanation:
References: https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-
2008/dd448531(v=ws.10)
HOTSPOT
You have 100 computers that run Windows 10 and are members of a workgroup.
Exclude a C:\Sales|Salesdb from malware scans. Configure a full scan to occur daily.
What should you run to meet each requirement? To answer, select the appropriate options in the answer area.
Hot Area:
References: https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-antivirus/configure-
process-opened-file-exclusions-windows-defender-antivirus https://docs.microsoft.com/en-
us/powershell/module/defender/add-mppreference?view=win10-ps https://docs.microsoft.com/en-
us/powershell/module/defender/set-mppreference?view=win10-ps
QUESTION NO: 10
Your network contains an Active Directory domain named contoso.com. The domain contains five file servers that run
Windows Server 2016.
You have an organizational unit (OU) named Finance that contains all of the servers.
You create a Group Policy object (GPO) and link the GPO to the Finance OU.
You need to ensure that when a user in the finance department deletes a file from a file server, the event is logged. The
solution must log only users who have a manager attribute of Ben Smith.
Explanation:
References: https://technet.microsoft.com/en-us/library/cc976403.aspx
QUESTION NO: 11
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that
runs Windows Server 2016.
You need to allow network administrators to use Just Enough Administration (JEA) to change the TCP/IP settings on
Server1. The solution must use the principle of least privilege.
Explanation:
References: https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.core/new-
pssessionconfigurationfile?view=powershell-6
QUESTION NO: 12
You need to configure PowerShell logging to capture dynamic code generation. The solution must minimize the number of
events that are logged.
C. module logging
D. system-wide transcription
ANSWER: C
Explanation:
References:
QUESTION NO: 13
Your network contains an Active Directory domain named contoso.com. The domain contains 100 servers.
You deploy the Local Administrator Password Solution (LAPS) to the network.
You deploy a new server named FinanceServer5, and join FinanceServer5 to the domain.
You need to ensure that the passwords of the local administrators of FinanceServer5 are available to the LAPS
administrators.
C. In the domain, modify the permissions for the computer account of FinanceServer5.
D. In the domain, modify the permissions of the Domain Controllers organizational unit (OU).
ANSWER: A
Explanation:
References: https://gallery.technet.microsoft.com/Step-by-Step-Deploy-Local-7c9ef772
QUESTION NO: 14
You have a virtual machine named FS1 that runs Windows Server 2016.
You need to ensure that each user can store 10 GB of files in \\FS1\Users.
A. From File Explorer, open the properties of volume D, and then modify the Quota settings.
B. Install the File Server Resource Manager role service, and then create a file screen.
C. From File Explorer, open the properties of D:\Users, and then modify the Advanced sharing settings.
D. Install the File Server Resource Manager role service, and then create a quota.
ANSWER: D
References: https://docs.microsoft.com/en-us/windows-server/storage/fsrm/create-quota
QUESTION NO: 15
You need to create a central access rule that will grant permissions to users who have the Department attribute set to
Finance. The users must have access to resources that have the Department property set to Finance.
Which two actions should you perform before you create the central access rule? Each correct answer presents part of the
solution.
Explanation:
References:
https://docs.microsoft.com/en-us/windows-server/identity/solution-guides/deploy-a-central-access-policy--demonstration-
steps-
QUESTION NO: 16
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a
unique solution that might meet the stated goals.
Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this sections, you will NOT be able to return to it. As a result, these questions will not appear
in the review screen.
Your network contains an Active Directory domain named contoso.com. The domain contains multiple Hyper-V hosts.
You need to deploy several critical line-of-business applications to the network to meet the following requirements:
The resources of the applications must be isolated from the physical host.
Each application must be prevented from accessing the resources of the other applications.
A. Yes
B. No
ANSWER: A
Explanation:
References: https://docs.microsoft.com/en-us/virtualization/windowscontainers/about/
QUESTION NO: 17
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a
unique solution that might meet the stated goals.
Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this sections, you will NOT be able to return to it. As a result, these questions will not appear
in the review screen.
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2016. All client
computers run Windows 10.
The relevant objects in the domain are configured as shown in the following table.
You need to assign User1 the right to restore files and folders on Server1 and Server2.
A. Yes
B. No
ANSWER: A
Explanation:
References: https://technet.microsoft.com/en-us/library/cc771990(v=ws.11).aspx
QUESTION NO: 18
You need to manage FS1 and FS2 by using Just Enough Administration (JEA).
Explanation:
References:
https://docs.microsoft.com/en-us/powershell/jea/prerequisites
QUESTION NO: 19
Explanation:
You install the Windows Server Update Services server role on a member server named Server1. Server1 runs Windows
Server 2016.
You need to ensure that a user named User1 can perform the following tasks:
View the Windows Server Update Services (WSUS) configuration. Generate WSUS update reports.
A. Modify the permissions of the ReportWebService virtual folder from the WSUS Administration website.
Explanation:
References: https://technet.microsoft.com/en-us/library/hh852346(v=ws.11).aspx#BKMK_ConfigComputerGroups
QUESTION NO: 21
Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is
repeated in each question. Each question presents a
different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.
Your network contains an Active Directory domain named contoso.com. The functional level of the forest and the domain is
Windows Server 2008 R2.
The domain contains the servers configured as shown in the following table.
All servers run Windows Server 2016. All client computers run Windows 10.
You have an organizational unit (OU) named Marketing that contains the computers in the marketing department. You have
an OU named Finance that contains the computers in the finance department. You have an OU named AppServers that
You need to execute D:\Folder1 on Nano1 from being scanned by Windows Defender.
A. Set-StorageSetting
B. Set-FsrmFileScreenException
C. Set-MpPreference
D. Set-DtcAdvancedSetting
ANSWER: C
Explanation:
References: http://www.thomasmaurer.ch/2016/07/how-to-disable-and-configure-windows-defender-on-windows-server-
2016-using-powershell/
QUESTION NO: 22
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a
unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while
others might not have a correct solution.
After you answer a question in this sections, you will NOT be able to return to it. As a result, these questions will not appear
in the review screen.
You network contains an Active Directory forest named contoso.com. All domain controllers run Windows Server 2016.
Member servers run either Windows Server 2012 R2 or Windows Server 2016. Client computers run either Windows 8.1 or
Windows 10.
You need to ensure that when users access files in shared folders on the network, the files are encrypted when they are
transferred over the network.
Solution: You disable SMB 1.0 on all the computers in the domain, and then you enable the Encrypt data access option on
each file share.
A. Yes
B. No
ANSWER: B
Explanation:
QUESTION NO: 23
A Group Policy object (GPO) named GPO1 is applied to all of the domain controllers. GPO1 has a Globally Unique Identifier
(GUID) of 6AC1786C-016F-11D2-945F00C04fB984F9.
You need to create a new baseline that contains the settings from GPO1.
D. From a command prompt, run the secedit.exe command and specify the /export parameter.
ANSWER: B
Explanation:
References: https://technet.microsoft.com/en-us/library/hh489604.aspx
QUESTION NO: 24
Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be
correct for more than one question in the series. Each question is independent of the other questions in this series.
Information and details provided in a question apply only to that question.
You have a server named Server1 that runs Windows Server 2016.
You need to identify whether ICMP traffic is exempt from IPsec on Server1.
A. Get-NetIPSecRule
B. Get-NetFirewallRule
C. Get-NetFirewallProfile
D. Get-NetFirewallSetting
E. Get-NetFirewallPortFilter
F. Get-NetFirewallAddressFilter
G. Get-NetFirewallSecurityFilter
H. Get-NetFirewallApplicationFilter
ANSWER: D
Explanation:
References: https://docs.microsoft.com/en-us/powershell/module/netsecurity/get-netfirewallsetting?view=win10-ps
You have a Hyper-V host named Server1 that hosts the virtual machines shown in the following table.
You plan to encrypt the operating system drive on the virtual machines.
On which virtual machines can you use a TPM protector for BitLocker Drive Encryption (BitLocker)?
C. VM4 only
Explanation:
QUESTION NO: 26
You have a guarded fabric that consists of the servers shown in the following table.
You need to ensure that you can start the shielded virtual machines on the Hyper-V hosts if the Hyper-V hosts cannot
connect to the HGS.
D. On Server4 and Server5, disable the heartbeat integration service on the shielded virtual machines.
ANSWER: B
Explanation:
References:
https://docs.microsoft.com/en-us/windows-server/security/guarded-fabric-shielded-vm/guarded-fabric-admin-trusted-
attestation-creating-a-security-group
HOTSPOT
You build a model server that contains all the drivers and the software that you want to deploy and secure.
You need to create a new policy to ensure that only whitelisted files can be loaded to the servers. The policy must be in
enforcement mode.
How should you complete the commands? To answer, select the appropriate options in the answer area.
Hot Area:
ANSWER:
References: https://docs.microsoft.com/en-us/powershell/module/configci/new-cipolicyrule?view=win10-ps
https://docs.microsoft.com/en-us/powershell/module/configci/set-ruleoption?view=win10-ps
QUESTION NO: 28
You have a VHDX file that contains an image of Windows Server 2016.
Which three files should you create? Each correct answer presents part of the solution.
E. an unattended.xml file
ANSWER: CDE
Explanation:
References: https://docs.microsoft.com/en-us/windows-server/security/guarded-fabric-shielded-vm/guarded-fabric-create-a-
shielded-vm-template https://docs.microsoft.com/en-us/windows-server/security/guarded-fabric-shielded-vm/guarded-fabric-
tenant-creates-shielding-data
QUESTION NO: 29
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that
runs Windows Server 2016.
You need to ensure that all access to Share1 uses SMB Encryption.
A. File Explorer
B. Shared Folders
C. Server Manager
D. Disk Management
E. Storage Explorer
F. Computer Management
G. System Configuration
Explanation:
References: https://support.microsoft.com/en-za/help/2696547/how-to-enable-and-disable-smbv1,-smbv2,-and-smbv3-in-
windows-vista,-windows-server-2008,-windows-7,-windowsserver-2008-r2,-windows-8,-and-windows-server-2012
https://blogs.technet.microsoft.com/filecab/2012/05/03/smb-3-security-enhancements-in-windows-server-2012/
QUESTION NO: 30
You have a file server named Server1 that runs Windows Server 2016.
A new policy states that ZIP files must not be stored on Server1.
Explanation:
References: https://docs.microsoft.com/en-us/windows-server/storage/fsrm/create-file-screen
QUESTION NO: 31
You purchase a Microsoft Azure subscription, and you create three Microsoft Operations Management Suite (OMS)
workspaces named Workspace1, Workspace2, and Workspace3.
You need to deploy Microsoft Monitoring Agent to the servers to meet the following requirements:
Security and audit data from the domain controllers and the virtualization hosts must be visible in Workspace2. System
update data from all the servers in all the workgroups must be visible in Workspace3.
A. 6
B. 33
C. 73
D. 91
ANSWER: C
Explanation:
References:
QUESTION NO: 32
The network contains an Active Directory domain named contoso.com. the domain contains 10 servers.
You deploy a new server named Server11 that runs Windows Server 2016. Server11 will host several network applications
and network shares used by the accounting department.
You need to recommend a solution for Server11 that meets the following requirements:
B. AppLocker rules
Explanation:
References: https://support.microsoft.com/en-us/help/942957/security-rules-for-windows-firewall-and-for-ipsec-based-
connections-in
HOTSPOT
You are deploying Microsoft Advanced Threat Analytics (ATA) to the domain. You install the ATA Gateway on a server
named Server1.
To assist in detecting Pass-the-Hash attacks, you plan to configure ATA Gateway to collect events.
You need to configure the query filter for event subscriptions on Server1.
How should you configure the query filter? To answer, select the appropriate options in the answer are.
Hot Area:
Explanation:
References: https://docs.microsoft.com/en-us/advanced-threat-analytics/configure-event-collection
HOTSPOT
The domain contains a server named Server1 that runs Windows Server 2016. The domain contains two users named User1
and User2.
On Server1, you create two files named File1.doc and File2.doc in a folder named C:\Folder1.
The Audit Entry for File1.doc is configured as shown in the File1 exhibit. (Click the File1 tab.)
The Auditing Entry for Global File SACL that applies to Server1 is configured as shown in the SACL exhibit. (Click the SACL
tab.)
Hot Area:
ANSWER:
References:
http://sourcedaddy.com/windows-7/auditing-file-and-folder-access.html
QUESTION NO: 35
Your network contains an Active Directory domain named contoso.com. The domain contains servers that run Windows
Server 2016.
You have an administrative computer named Computer1 that runs Windows10. Computer 1 is configured to require Remote
Credential Guard.
Explanation:
References:
https://docs.microsoft.com/en-us/windows/security/identity-protection/remote-credential-guard#reqs
QUESTION NO: 36
You have a file server named FS1 that runs Windows Server 2016.
A. Debug-FileShare
B. Set-FileShare
C. Set-SmbShare
D. Set-SmbServerConfiguration
E. Set-SmbClientConfiguration
ANSWER: D
Explanation:
QUESTION NO: 37
Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is
repeated in each question. Each question presents a
different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.
Your network contains an Active Directory domain named contoso.com. The functional level of the forest and the domain is
Windows Server 2008 R2.
The domain contains the servers configured as shown in the following table.
All servers run Windows Server 2016. All client computers run Windows 10.
You have an organizational unit (OU) named Marketing that contains the computers in the marketing department. You have
an OU named Finance that contains the computers in the finance department. You have an OU named AppServers that
contains application servers. A Group Policy object (GPO) named GP1 is linked to the Marketing OU. A GPO named GP2 is
linked to the AppServers OU.
You need to ensure that the marketing department computers validate DNS responses from adatum.com.
Which setting should you configure in the Computer Configuration node of GP1?
Explanation:
References: https://technet.microsoft.com/en-us/library/ee649182(v=ws.10).aspx
DRAG DROP
Your network contains an Active Directory domain named contoso.com. The domain functional level is Windows Server
2016. The domain contains a member server named Server1.
You need to enforce the Code Integrity levels on all the Windows Server 2016 servers in the domain.
Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the
answer area and arrange them in the correct order.
ANSWER:
References:
https://blogs.technet.microsoft.com/datacentersecurity/2018/03/10/default-code-integrity-policy-for-windows-server/
HOTSPOT
Your network contains an Active Directory domain named contoso.com. The domain contains a VPN server named VPN1.
What should you do? To answer, select the appropriate options in the answer area.
Hot Area:
Explanation:
References:
https://docs.microsoft.com/en-us/advanced-threat-analytics/vpn-integration-install-step
QUESTION NO: 40
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in
the review screen.
You manage a file server that runs Windows Server 2016. The file server contains the volumes configured as shown in the
following table.
Solution: You run the manage-bde.exe command and specify the –lock parameter.
A. Yes
B. No
ANSWER: B
Explanation:
References:
https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/manage-bde-lock
QUESTION NO: 41
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1.
You plan to create a pilot deployment of Microsoft Advanced Threat Analytics (ATA).
Explanation:
References: https://docs.microsoft.com/en-us/advanced-threat-analytics/deploy-use/install-ata-step1
DRAG DROP
You have two servers named Server1 and Server2 that run Windows Server 2016. The servers are in a workgroup.
You need to create a security template that contains the security settings of Server1 and to apply the template to Server2.
The solution must minimize administrative effort.
Which snap-in should you use for each server? To answer, drag the appropriate snap-ins to the correct servers. Each snap-
in may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view
content.
Explanation:
References: https://www.windows-server-2012-r2.com/security-templates.html
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server5 that
has the Windows Server Update Services server role installed.
You need to configure Windows Server Update Services (WSUS) on Server5 to use SSL.
Which two tools should you use? Each correct answer presents part of the solution.
A. Wsusutil
B. Netsh
D. Server Manager
E. Update Services
ANSWER: AE
Explanation:
References: https://technet.microsoft.com/en-us/library/hh852346(v=ws.11).aspx#bkmk_3.5.ConfigSSL
QUESTION NO: 44
Your network contains an Active Directory domain named contoso.com. The domain contains 1,000 client computers that
run Windows 8.1 and 1,000 client computers that run Windows 10.
You deploy a Windows Server Update Services (WSUS) server. You create a computer group for each organizational unit
(OU) that contains client computers. You configure all of the client computers to receive updates from WSUS.
You discover that all of the client computers appear in the Unassigned Computers computer group in the Update Services
console.
You need to ensure that the client computers are added automatically to the computer group that corresponds to the location
of the computer account in Active Directory.
Which two actions should you perform? Each correct answer presents part of the solution.
A. From Group Policy objects (GPOs), configure the Enable client-side targeting setting.
C. From Active Directory Users and Computers, create a domain local distribution group for each WSUS computer group.
D. From Active Directory Users and Computers, modify the flags attribute of each OU.
ANSWER: AB
Explanation:
References:
QUESTION NO: 45
You have a server named Server1 that runs Windows Server 2016. Server1 contains a folder named Folder1. Folder1 is
shared as Share1.
B. From File and Storage Services in Server Manager, modify the properties of Share1
Explanation:
References:
https://docs.microsoft.com/en-us/windows-server/storage/file-server/smb-security
QUESTION NO: 46
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a
unique solution that might meet the stated goals.
Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this sections, you will NOT be able to return to it. As a result, these questions will not appear
in the review screen.
Your network contains an Active Directory domain named contoso.com. The domain contains multiple Hyper-V hosts.
You need to deploy several critical line-of-business applications to the network to meet the following requirements:
The resources of the applications must be isolated from the physical host.
Each application must be prevented from accessing the resources of the other applications.
The configurations of the applications must be accessible only from the operating system that hosts the application.
Solution: You deploy one Windows container to host all of the applications.
A. Yes
B. No
Explanation:
References: https://docs.microsoft.com/en-us/virtualization/windowscontainers/about/
QUESTION NO: 47
Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be
correct for more than one question in the series. Each question is independent of the other questions in this series.
Information and details provided in a question apply only to that question.
You have a server named Server1 that runs Windows Server 2016.
You need to identify whether any connection security rules are configured on Server1.
A. Get-NetIPSecRule
B. Get-NetFirewallRule
C. Get-NetFirewallProfile
D. Get-NetFirewallSetting
E. Get-NetFirewallPortFilter
F. Get-NetFirewallAddressFilter
G. Get-NetFirewallSecurityFilter
H. Get-NetFirewallApplicationFilter
ANSWER: A
Explanation:
References: https://docs.microsoft.com/en-us/powershell/module/netsecurity/get-netipsecrule?view=win10-ps
QUESTION NO: 48
You have a server named Server1 that runs Windows Server 2016.
You need to view a list of commands that will be available to a user named User1 when User1 establishes a JEA session to
Server1.
A. Get-PSSessionCapability
B. Trace-Command
D. Get-PSSessionConfiguration
ANSWER: A
Explanation:
References:
https://docs.microsoft.com/en-us/powershell/module/Microsoft.PowerShell.Core/get-pssessioncapability?view=powershell-
6&viewFallbackFrom=powershell-5.0.
QUESTION NO: 49
Your network contains an Active Directory forest named contoso.com. The functional level of the forest and the domain is
Windows Server 2012 R2.
You plan to use Local Administrator Password Solution (LAPS) for all member servers. You need to prepare the forest for
LAPS.
Which two actions should you perform? Each correct answer presents part of the solution.
Explanation:
References:
https://blog.thesysadmins.co.uk/deploying-microsoft-laps-part-1.html
HOTSPOT
You have a Hyper-V host named Server1 that runs Windows Server 2016. A new security policy states that all the virtual
machines must be encrypted.
Server1 hosts the virtual machines configured as shown in the following table.
Get-VM | Stop-VM
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Hot Area:
ANSWER:
Explanation:
References:
https://github.com/MicrosoftDocs/windowsserverdocs/blob/master/WindowsServerDocs/virtualization/hyper-v/What-s-new-in-
Hyper-V-on-Windows.md
Your network contains an Active Directory domain named contoso.com. The domain contains two DNS servers that run
Windows Server 2016. The servers host two zones named contoso.com and admin.contoso.com.
You need to ensure that all client computers in the domain validate the zone records when they query the zone.
Explanation:
References: https://nedimmehic.org/2017/04/04/how-to-deploy-and-configure-dns-2016-part5/
QUESTION NO: 52
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a
unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while
others might not have a correct solution.
After you answer a question in this sections, you will NOT be able to return to it. As a result, these questions will not appear
in the review screen.
You manage a file server that runs Windows Server 2016. The file server contains the volumes configured as shown in the
following table.
A. Yes
B. No
Explanation:
References: https://docs.microsoft.com/en-us/powershell/module/bitlocker/lock-bitlocker?view=win10-ps
QUESTION NO: 53
You plan to enable Credential Guard on four servers. Credential Guard secrets will be bound to the TPM.
The servers run Windows Server 2016 and are configured as shown in the following table.
You need to identify which server you must modify to support the planned implementation.
A. Server1
B. Server2
C. Server3
D. Server4
ANSWER: D
Explanation:
References: https://docs.microsoft.com/en-us/windows/access-protection/credential-guard/credential-guard-requirements
HOTSPOT
You have a backup of a Group Policy object (GPO) named GPO1 that has the following settings:
You have a backup of a GPO named GPO2 that has the following settings:
You create a GPO named GP03 that has the following settings:
You import the GPO1 settings into GP03, and then you import the GPO2 settings into GPO3. You need to identify the GPO3
settings after the imports.
What should you identity? To answer, select the appropriate options of the answer area.
Hot Area:
ANSWER:
References: https://searchwindowsserver.techtarget.com/feature/Group-Policy-Management-Console
QUESTION NO: 55
You are implementing Privileged Access Management (PAM) by using a bastion forest named priv.contoso.com.
A. New-RoleGroup
B. New-PamRole
C. New-ADGroup
D. New-PamGroup
ANSWER: D
Explanation:
References: https://docs.microsoft.com/en-us/powershell/identitymanager/mimpam/vlatest/new-pamgroup
Your network contains an Active Directory domain named contoso.com. The domain contains domain controllers that run
Windows Server 2016.
A Group Policy object (GPO) named GPO1 is applied to all of the domain controllers. GPO1 has a Globally Unique Identifier
(GUID) of 6AC1786C-016F-11D2-945F00C04fB984F9.
You need to create a new baseline that contains the settings from GPO1.
Explanation:
References: https://docs.microsoft.com/en-us/powershell/module/grouppolicy/backup-gpo?view=win10-ps
DRAG DROP
Your network contains an Active Directory domain named contoso.com. The domain contains a user named User1 and a
computer named Computer1. Remote Server Administration Tools (RSAT) is installed on Computer1.
Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the
answer area and arrange them in the correct order.
References: https://msdn.microsoft.com/library/cc875821.aspx#EJAA
https://www.serverbrain.org/managing-security-2003/using-the-cipher-command-to-add-data-recovery-agent.html
QUESTION NO: 58
Your network contains an Active Directory forest named contoso.com. You deploy another Active Directory forest named
admin.contoso.com.
You create a trust relationship between the two forests. The trust relationship has the following configurations:
You need to implement Privileged Access Management (PAM) and to specify admin.contoso.com as an administrative
forest. What should you do?
Explanation:
References: https://www.petri.com/windows-server-2016-set-privileged-access-management
QUESTION NO: 59
You have several servers that run Windows Server 2016. All the servers were recently configured to use a new Windows
Server Update Services (WSUS) server named WSUS1. WSUS1 is configured to download updates as shown in the exhibit.
(Click the Exhibit tab.)
You discover that the servers have out-of-date Windows Defender definitions. The servers receive security updates from
WSUS1.
You need to ensure that the servers receive the latest Windows Defender definitions.
D. Create a new Group Policy object (GPO) that contains the Automatic Updates settings
ANSWER: D
Explanation:
References:
https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-antivirus/manage-protection-update-
schedule-windows-defender-antivirus
QUESTION NO: 60
You have a Hyper-V host named Hyper1 that has a virtual machine named FS1. FS1 is a file server that contains sensitive
data.
Prevent data from being extracted from the VHDX file of FS1.
Which two actions should you perform? Each correct answer presents part of the solution.
B. On Hyper1, enable BitLocker Drive Encryption (BitLocker) for the drive that contains the VHDX file for FS1.
E. Enable BitLocker Drive Encryption (BitLocker) for all the volumes on FS1.
ANSWER: DE
Explanation:
References: https://docs.microsoft.com/en-us/windows-server/security/guarded-fabric-shielded-vm/guarded-fabric-and-
shielded-vms
QUESTION NO: 61
Your network contains an Active Directory domain named contoso.com. The domain contains 1,000 client computers that
run Windows 10.
You need to minimize the impact of another successful Pass-the-Hash attack on the domain.
A. Move the computer accounts of the domain controllers to a new organizational unit (OU). Remove the permissions to the
new OU from the Domain Admins group.
C. Remove all the members from the Domain Admins group, and then remove the Domain Admins group from all other
groups.
D. Instruct all administrators to use a restricted Remote Desktop connection when they sign in to a client computer
ANSWER: B
Explanation:
References: https://download.microsoft.com/download/7/7/a/77abc5bd-8320-41af-863c-6ecfb10cb4b9/mitigating%20pass-
the-hash%20(pth)%20attacks%20and%20other%
20credential%20theft%20techniques_english.pdf
HOTSPOT
You plan to implement a guarded fabric in TPM-trusted attestation mode. The fabric will contain a three-node Host Guardian
Service (HGS) cluster and four guarded hosts.
All the hosts will have matching hardware and will run the same workload.
What is the minimum number of times you must run each cmdlet to implement the HGS cluster? To answer, select the
appropriate options in the answer area.
Hot Area:
Explanation:
QUESTION NO: 63
Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be
correct for more than one question in the series. Each question is independent of the other questions in this series.
Information and details provided in a question apply only to that question.
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that
runs Windows Server 2016.
You need to view the classification properties that have been configured on Volume1.
A. File Explorer
B. Shared Folders
C. Server Manager
D. Disk Management
E. Storage Explorer
F. Computer Management
G. System Configuration
Explanation:
References:
https://blog.netwrix.com/2018/05/22/microsoft-file-classification-infrastructure-fci-explained/
QUESTION NO: 64
Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be
correct for more than one question in the series. Each question is independent of the other questions in this series.
Information and details provided in a question apply only to that question.
Your network contains an Active Directory domain named contoso.com. The domain contains a file server named Server1
that runs Windows Server 2016.
A. File Explorer
B. Shared Folders
C. Server Manager
D. Disk Management
E. Storage Explorer
F. Computer Management
G. System Configuration
Explanation:
References:
https://blogs.technet.microsoft.com/canitpro/2015/01/19/step-by-step-creating-a-work-folders-test-lab-deployment-in-
windows-server-2012-r2/ https://technet.microsoft.com/en-us/library/dn265974(v=ws.11).aspx
QUESTION NO: 65
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1.
On Server1, administrators plan to use several scripts that have the .ps1 extension.
You need to ensure that when code is generated from the scripts, an event containing the details of the code is logged in the
Operational log.
Explanation:
References:
https://docs.microsoft.com/en-us/powershell/wmf/whats-new/script-logging
QUESTION NO: 66
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in
the review screen.
Your network contains an Active Directory forest named contoso.com. All servers run Windows Server 2016. The forest
contains 2,000 client computers that run Windows 10. All client computers are deployed from a customized Windows image.
You need to deploy 10 Privileged Access Workstations (PAWs). The solution must ensure that administrators can access
several client applications used by all users.
Solution: You deploy 10 physical computers and configure them as virtualization hosts. You configure the operating system
on each host as a PAW. You create a guest virtual machine by using the customized Windows image.
A. Yes
B. No
ANSWER: B
Explanation:
References:
https://technet.microsoft.com/en-us/windows-server-docs/security/securing-privileged-access/privileged-access-workstations
QUESTION NO: 67
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that
runs Windows Server 2016.
The local administrator credentials of Server1 are managed by using the Local Administrator Password Solution (LAPS).
A. From Windows PowerShell on Server1, run the Get-ADFineGrainedPasswordPolicy cmdlet and specify the –Credential
parameter
B. From Active Directory Users and Computers, open the properties of Server1 and view the value of the ms-Mcs-AdmPwd
attribute
C. From Active Directory Users and Computers, open the properties of Administrator and view the value of the
userPassword attribute
D. From Windows PowerShell on Server1, run the Get-ADUser cmdlet and specify the –Credential parameter
ANSWER: B
Explanation:
References: http://woshub.com/manage-local-administrator-passwords-with-laps/
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a
unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while
others might not have a correct solution.
After you answer a question in this sections, you will NOT be able to return to it. As a result, these questions will not appear
in the review screen.
You manage a file server that runs Windows Server 2016. The file server contains the volumes configured as shown in the
following table.
Solution: You run the manage-bde.exe command and specify the –on parameter.
A. Yes
B. No
ANSWER: A
Explanation:
References: https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/manage-bde-on
QUESTION NO: 69
The network contains a server named Server1. Server1 is in a workgroup. Server1 contains sensitive data and will be
accessed by a domain-joined computer named Computer1.
You need to create connection security rules to encrypt the data sent between Server1 and Computer1.
You need to identify which authentication method to use for the connection security rules. The solution must use the most
secure method possible.
A. Kerberos V5
B. a computer certificate
C. a preshared key
Explanation:
References: https://www.sciencedirect.com/topics/computer-science/connection-security-rule
https://blogs.msdn.microsoft.com/james_morey/2005/06/20/ipsec-and-certificate-authentication/
QUESTION NO: 70
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a
unique solution that might meet the stated goals.
Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this sections, you will NOT be able to return to it. As a result, these questions will not appear
in the review screen.
Your network contains an Active Directory forest named contoso.com. All servers run Windows Server 2016. The forest
contains 2,000 client computers that run Windows 10. All client computers are deployed from a customized Windows image.
You need to deploy 10 Privileged Access Workstations (PAWs). The solution must ensure that administrators can access
several client applications used by all users.
Solution: You deploy 10 physical computers and configure each one as a virtualization host. You deploy the operating
system on each host by using the customized Windows image. On each host, you create a guest virtual machine and
configure the virtual machine as a PAW.
A. Yes
B. No
ANSWER: B
Explanation:
References: https://technet.microsoft.com/en-us/windows-server-docs/security/securing-privileged-access/privileged-access-
workstations
QUESTION NO: 71
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a
unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while
others might not have a correct solution.
After you answer a question in this sections, you will NOT be able to return to it. As a result, these questions will not appear
in the review screen.
You network contains an Active Directory forest named contoso.com. All domain controllers run Windows Server 2016.
Member servers run either Windows Server 2012 R2 or Windows Server 2016. Client computers run either Windows 8.1 or
Windows 10.
A. Yes
B. No
ANSWER: B
Explanation:
HOTSPOT
Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is
repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is
exactly the same in each question in this series.
Your network contains an Active Directory domain named contoso.com. The functional level of the forest and the domain is
Windows Server 2008 R2.
The domain contains the servers configured as shown in the following table.
All servers run Windows Server 2016. All client computers run Windows 10.
You have an organizational unit (OU) named Marketing that contains the computers in the marketing department. You have
an OU named Finance that contains the computers in the finance department. You have an OU named AppServers that
contains application servers. A Group Policy object (GPO) named GP1 is linked to the Marketing OU. A GPO named GP2 is
linked to the AppServers OU.
Which command should you run? To answer, select the appropriate options in the answer area.
ANSWER:
Explanation:
References: https://docs.microsoft.com/en-us/windows-server/get-started/deploy-nano-server
HOTSPOT
Your network contains an Active Directory domain named adatum.com. The domain contains a server named SAerver1 that
runs Windows Server 2016 and a group named Group1. A user named user1 is the only member of Group1.
You create a role capacity file that contains the following content.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Hot Area:
Explanation:
References:
https://blogs.technet.microsoft.com/privatecloud/2014/05/14/just-enough-administration-step-by-step/
https://docs.microsoft.com/en-us/powershell/jea/using-jea https://docs.microsoft.com/en-us/powershell/jea/role-capabilities
QUESTION NO: 74
You are creating a Nano Server image for the deployment of 10 servers.
You need to configure the servers as guarded hosts that use Trusted Platform Module (TPM) attestation.
Which three packages should you include in the Nano Server image? Each correct answer presents part of the solution.
A. Microsoft-NanoServer-SCVMM-Compute-Package
B. Microsoft-NanoServer-SecureStartup-Package
D. Microsoft-NanoServer-ShieldedVM-Package
E. Microsoft-NanoServer-Storage-Package
F. Microsoft-NanoServer-SCVMM- Package
ANSWER: BCD
Explanation:
References: https://docs.microsoft.com/en-us/system-center/vmm/guarded-deploy-host?toc=/windows-server/virtualization/
https://docs.microsoft.com/en-us/windows-server/get-started/deploy-nano-server
QUESTION NO: 75
You need to create a backup of the local Group Policy on Server1 that you can import into a Group Policy object (GPO) in
the domain.
A. lgpo.exe
D. Backup-GPO
ANSWER: A
Explanation:
References:
http://woshub.com/backupimport-local-group-policy-settings/
QUESTION NO: 76
Your network contains an Active Directory domain. All the computers in the domain are configured for the Local
Administrator Password Solution (LAPS). The Group Policy object (GPO) settings for LAPS are configured as shown in the
exhibit. (Click the Exhibit tab.)
A. 30 minutes
B. 3 days
C. 30 days
D. 365 days
ANSWER: C
Explanation:
References:
https://www.reddit.com/r/sysadmin/comments/712049/laps_password_expiration_time_password_age/
HOTSPOT
You have an organizational unit (OU) named Secure that contains all server.
You install Microsoft Security Compliance Manager (SCM) 4.0 on a server named Server1.
You need to export the SCM Print Server Security baseline and to deploy the baseline to a server named Server2.
What should you do? To answer, select the appropriate options in the answer area.
Hot Area:
Explanation:
References: http://www.techrepublic.com/blog/it-security/use-ms-security-compliance-manager-to-secure-your-windows-
environment/ https://technet.microsoft.com/en-us/library/hh489604.aspx
QUESTION NO: 78
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that
runs Windows Server 2016.
A. Config.json
B. Web.config
D. Mongod.cfg
ANSWER: D
Explanation:
References: https://docs.microsoft.com/en-us/advanced-threat-analytics/ata-database-management
QUESTION NO: 79
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a
unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while
others might not have a correct solution.
After you answer a question in this sections, you will NOT be able to return to it. As a result, these questions will not appear
in the review screen.
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that
runs Windows Server 2016.
A. Yes
B. No
ANSWER: B
Explanation:
References: https://www.rootusers.com/implement-ntlm-blocking-in-windows-server-2016/
HOTSPOT
Your network contains two Active Directory forests named adatum.com and priv.adatum.com.
You deploy Microsoft Identity Manager (MIM) 2016 to the priv.adatum.com domain, and you implement Privileged Access
Management (PAM).
You create a PAM role named Group1 as shown in the following exhibit.
Hot Area:
ANSWER:
References:https://tlktechidentitythoughts.wordpress.com/2016/09/07/mim-2016-setting-up-privileged-access-management-
pam-in-an-existing-domain-using-the-built-inpam-tool/
QUESTION NO: 81
Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be
correct for more than one question in the series. Each question is independent of the other questions in this series.
Information and details provided in a question apply only to that question.
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that
runs Windows Server 2016.
A. File Explorer
B. Shared Folders
C. Server Manager
D. Disk Management
E. Storage Explorer
F. Computer Management
G. System Configuration
Explanation:
QUESTION NO: 82
Your network contains an internal network and a perimeter network. The internal network contains an Active Directory forest
named contoso.com.
You deploy five servers to the perimeter network. All of the servers run Windows Server 2016 and are the members of a
workgroup.
You need to apply a security baseline named Perimeter.inf to the servers in the perimeter network. What should you use to
apply Perimeter.inf?
C. System Configuration
D. Server Manager
ANSWER: A
Explanation:
References:
https://4sysops.com/archives/security-compliance-manager-deploy-baselines/#deploy-a-baseline-to-a-workgroup-server
QUESTION NO: 83
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that
runs Windows Server 2016.
A. From Control Panel, open Credential Manager, and review the list of Windows Credentials.
D. From Server Manager, click Local Server, and review the properties of Server1.
ANSWER: B
Explanation:
Reference: https://docs.microsoft.com/en-us/windows/security/identity-protection/credential-guard/credential-guard-manage
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a
unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while
others might not have a correct solution.
After you answer a question in this sections, you will NOT be able to return to it. As a result, these questions will not appear
in the review screen.
You need to ensure that you can run Windows Containers on Server1.
Solution: On Server1, you enable the Containers feature, and then you restart the server.
A. Yes
B. No
ANSWER: B
Explanation:
References: https://docs.microsoft.com/en-us/virtualization/windowscontainers/deploy-containers/deploy-containers-on-
server
QUESTION NO: 85
Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be
correct for more than one question in the series. Each question is independent of the other questions in this series.
Information and details provided in a question apply only to that question.
You have a server named Server1 that runs Windows Server 2016.
You need to identify the default action for the inbound traffic when Server1 connects to the domain.
A. Get-NetIPSecRule
B. Get-NetFirewallRule
C. Get-NetFirewallProfile
D. Get-NetFirewallSetting
E. Get-NetFirewallPortFilter
F. Get-NetFirewallAddressFilter
G. Get-NetFirewallSecurityFilter
H. Get-NetFirewallApplicationFilter
ANSWER: C
References: https://docs.microsoft.com/en-us/powershell/module/netsecurity/get-netfirewallprofile?view=win10-ps
QUESTION NO: 86
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a
unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while
others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in
the review screen.
Your network contains an Active Directory domain named contoso.com. The domain contains multiple Hyper-V hosts.
You need to deploy several critical line-of-business applications to the network to meet the following requirements:
The resources of the applications must be isolated from the physical host.
Each application must be prevented from accessing the resources of the other applications.
The configurations of the applications must be accessible only from the operating system that hosts the application.
Solution: You deploy one Hyper-V container to host all of the applications.
A. Yes
B. No
ANSWER: B
Explanation:
References:
https://docs.microsoft.com/en-us/virtualization/windowscontainers/about/
QUESTION NO: 87
A database administrator named DBA1 suspects that her user account was compromised.
Which three events can you identify by using ATA? Each correct answer presents a complete solution.
Explanation:
References: https://github.com/MicrosoftDocs/ATADocs/blob/master/ATADocs/suspicious-activity-guide.md
QUESTION NO: 88
Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2016.
The domain contains a server named Server1 that has Microsoft Security Compliance Manager (SCM) 4.0 installed.
E. From a command prompt, run the secedit.exe command and specify the/import parameter.
Explanation:
References: https://anytecho.wordpress.com/2015/05/22/importing-group-policies-using-powershell-almost/
QUESTION NO: 89
Contoso has multiple Hyper-V hosts that run Windows Server 2016.
You need to configure Datacenter Firewall to control the traffic to virtual machines.
A. Set-Acl
B. Grant-VMConnectAccess
C. New-NetworkControllerAccessControlList
D. New-NetFirewallRule
ANSWER: C
Explanation:
References: https://docs.microsoft.com/en-us/windows-server/networking/sdn/manage/configure-datacenter-firewall-acls
https://docs.microsoft.com/en-us/powershell/module/networkcontroller/new-networkcontrolleraccesscontrollist?view=win10-
ps
QUESTION NO: 90
Your network contains an Active Directory domain named contoso.com. The domain contains 1,000 client computers that
run Windows 10.
A security audit reveals that the network recently experienced a Pass-the-Hash attack. The attack was initiated from a client
computer and accessed Active Directory objects restricted to the members of the Domain Admins group.
You need to minimize the impact of another successful Pass-the-Hash attack on the domain.
B. Move the computer accounts of all the client computers to a new organizational unit (OU). Remove the permissions to the
new OU from the Domain Admins group.
C. Instruct all administrators to use a local Administrators account when they sign in to a client computer.
D. Move the computer accounts of the domain controllers to a new organizational unit (OU). Remove the permissions to the
new OU from the Domain Admins group.
Explanation:
References: https://en.wikipedia.org/wiki/Pass_the_hash#Mitigations
DRAG DROP
Your network contains an Active Directory domain. The domain contains a server named Server1.
Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the
answer area and arrange them in the correct order.
ANSWER:
References:
https://docs.microsoft.com/en-us/advanced-threat-analytics/install-ata-step1
QUESTION NO: 92
Your network contains an Active Directory domain named contoso.com. The domain contains several shielded virtual
machines.
You deploy a new server named Server1 that runs Windows Server 2016.
You need to ensure that you can host shielded virtual machines on Server1.
Explanation:
References: https://docs.microsoft.com/en-us/windows-server/security/guarded-fabric-shielded-vm/guarded-fabric-guarded-
host-prerequisites
QUESTION NO: 93
Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this sections, you will NOT be able to return to it. As a result, these questions will not appear
in the review screen.
Your network contains an Active Directory domain named contoso.com. The domain contains multiple Hyper-V hosts.
You need to deploy several critical line-of-business applications to the network to meet the following requirements:
The resources of the applications must be isolated from the physical host.
Each application must be prevented from accessing the resources of the other applications.
The configurations of the applications must be accessible only from the operating system that hosts the application.
A. Yes
B. No
ANSWER: A
Explanation:
References:
https://docs.microsoft.com/en-us/virtualization/windowscontainers/about/
HOTSPOT
You plan to create a virtual machine template disk for shielded virtual machines.
You need to create the virtual machine disk that you will use to generate the template.
How should you configure the disk? To answer, select the appropriate options in the answer area.
Hot Area:
Explanation:
References:
https://docs.microsoft.com/en-us/windows-server/virtualization/guarded-fabric-shielded-vm/guarded-fabric-configuration-
scenarios-for-shielded-vms-overview https://docs.microsoft.com/en-us/system-center/dpm/what-s-new-in-dpm-
2016?view=sc-dpm-1801
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that
runs Windows Server 2016.
Server1 has the AppLocker rules configured as shown in the exhibit. (Click the Exhibit button.)
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Hot Area:
Explanation:
HOTSPOT
Your network contains two Active Directory forests named contoso.com and adatum.com. Contoso.com contains a Hyper-V
host named Server1. Server1 is a member of a group named HyperHosts. Adatum.com contains a server named Server2,
that is configured for Admin-trusted attestation. Server1 and Server2 run Windows Server 2016.
Which component should you install and which cmdlet should you run on Server1? To answer, select the appropriate options
in the answer area.
Hot Area:
Explanation:
References: https://blogs.technet.microsoft.com/datacentersecurity/2016/03/16/windows-server-2016-and-host-guardian-
service-for-shielded-vms/ https://docs.microsoft.com/en-us/windows-server/security/guarded-fabric-shielded-vm/guarded-
fabric-guarded-host-prerequisites
QUESTION NO: 97
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a
unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while
others might not have a correct solution.
You need to ensure that you can run Windows Containers on Server1.
Solution: On Server1, you enable the Containers feature, and then you install the PowerShell for Docker module. You restart
the server.
A. Yes
B. No
ANSWER: A
Explanation:
References: https://docs.microsoft.com/en-us/virtualization/windowscontainers/deploy-containers/deploy-containers-on-
server
QUESTION NO: 98
The domain contains two global groups named Group1 and Group2. A user named User1 is a member of Group1.
You have an organizational unit (OU) named OU1 that contains the computer accounts of computers that contain sensitive
data. A Group Policy object (GPO) named GPO1 is linked to OU1. OU1 contains a computer account named Computer1.
GPO1 has the User Rights Assignment configured as shown in the following table.
Explanation:
This policy setting supercedes the Allow Log on locally policy setting if an account is subject to both policies.
Therefore, adding User1 to Group2 will let User1 to inherit both policy, and then prevent User1 to sign in to Computer1.
References:
https://technet.microsoft.com/en-us/library/cc957048.aspx
QUESTION NO: 99
You have 100 point-of-sale (POS) devices that run Windows 10. The devices cannot access the Internet.
You need to use OMS to collect and analyze data from the POS devices.
D. Install the Simple Network Management Protocol (SNMP) feature on the devices.
E. Add the Microsoft NDIS Capture service to the network adapter of the devices.
ANSWER: B
Explanation:
References: https://blogs.technet.microsoft.com/msoms/2016/03/17/oms-log-analytics-forwarder/
HOTSPOT
Your network contains two Active Directory forests named contoso.com and adatum.com. Contoso.com contains a Hyper-V
host named Server1. Server1 is a member of a group named HyperHosts. Adatum.com contains a server named Server2.
Server1 and Server2 run Windows Server 2016.
Which component should you install and which cmdlet should you run on Server1? To answer, select the appropriate options
in the answer area.
ANSWER:
Explanation:
References: https://blogs.technet.microsoft.com/datacentersecurity/2016/03/16/windows-server-2016-and-host-guardian-
service-for-shielded-vms/
HOTSPOT
Each Hyper-V host has eight virtual machines that run a distributed web application named App1.
You plan to implement a Software Load Balancing (SLB) solution for client access to App1.
You need to install the required components on the Hyper-V hosts and the new servers for the planned implementation.
Which components should you install? To answer, select the appropriate options in the answer area.
Hot Area:
ANSWER:
References: https://blogs.technet.microsoft.com/tip_of_the_day/2016/06/28/tip-of-the-day-demystifying-software-
definednetworking-terms-the-components/ https://technet.microsoft.com/en-us/library/mt632286.aspx
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a
unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while
others might not have a correct solution.
After you answer a question in this sections, you will NOT be able to return to it. As a result, these questions will not appear
in the review screen.
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that
runs Windows Server 2016.
A. Yes
Explanation:
References: https://www.rootusers.com/implement-ntlm-blocking-in-windows-server-2016/
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a
unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while
others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in
the review screen.
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2016. All client
computers run Windows 10.
The relevant objects in the domain are configured as shown in the following table.
You need to assign User1 the right to restore files and folders on Server1 and Server2.
Solution: You add User1 to the Backup Operators group on Server1 and Server2.
A. Yes
B. No
ANSWER: A
Explanation:
References:
https://technet.microsoft.com/en-us/library/cc771990(v=ws.11).aspx
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a
unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while
others might not have a correct solution.
Your network contain an Active Directory domain named contoso.com. The domain contains a computer named Computer1
that runs Windows 10. Computer1 connects to a home network and a corporate network.
You need to prevent connections to App1 when Computer1 is connected to the home network.
Solution: From Windows Firewall with Advanced Security, you create an inbound rule.
A. Yes
B. No
ANSWER: A
Explanation:
References:
https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-
2008/dd421709(v=ws.10)#what-is-an-inbound-rule
HOTSPOT
Your network contains an Active Directory domain. The domain contains the computers shown in the following table.
Server1 is a file server that has two shared folders named Share1 and Share2. Share1 has encryption enabled. Share2 has
encryption disabled. Domain users have read access to both shares.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Hot Area:
Explanation:
References: https://docs.microsoft.com/en-us/powershell/module/smbshare/set-smbserverconfiguration?view=win10-ps
https://docs.microsoft.com/en-us/windows-server/storage/file-server/smb-security
HOTSPOT
Your data center contains 10 Hyper-V hosts that host 100 virtual machines.
You plan to secure access to the virtual machines by using the Datacenter Firewall service.
You have four servers available for the Datacenter Firewall service. The servers are configured as shown in the following
table.
Which server role should you deploy? To answer, select the appropriate options in the answer area.
Hot Area:
ANSWER:
Explanation:
https://docs.microsoft.com/en-us/windows-server/networking/sdn/plan/installation-and-preparation-requirements-for-
deploying-network-controller
https://docs.microsoft.com/en-us/windows-server/networking/sdn/technologies/network-controller/install-the-network-
controller-server-role-using-server-manager
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a
unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while
others might not have a correct solution.
After you answer a question in this sections, you will NOT be able to return to it. As a result, these questions will not appear
in the review screen.
You manage a file server that runs Windows Server 2016. The file server contains the volumes configured as shown in the
following table.
A. Yes
B. No
ANSWER: A
Explanation:
References: https://docs.microsoft.com/en-us/powershell/module/bitlocker/enable-bitlocker?view=win10-ps
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a
unique solution that might meet the stated goals.
Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this sections, you will NOT be able to return to it. As a result, these questions will not appear
in the review screen.
You need to deploy 10 Privileged Access Workstations (PAWs). The solution must ensure that administrators can access
several client applications used by all users.
Solution: You deploy one physical computer and configure it as Hyper-V host that runs Windows Server 2016. You create 10
virtual machines and configure each one as a
PAW.
A. Yes
B. No
ANSWER: B
Explanation:
References: https://technet.microsoft.com/en-us/windows-server-docs/security/securing-privileged-access/privileged-access-
workstations
Your network contains an Active Directory forest named Corp. The forest functional level is Windows Server 2016.
You deploy a new forest named Priv and set the forest functional level to Windows Server 2016.
Explanation:
References: https://www.petri.com/windows-server-2016-set-privileged-access-management
Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1
and Server2. The domain has Dynamic Access Control enabled.
Which two audit policies should you enable on Server1? Each correct answer presents part of the solution.
Explanation:
References:
https://docs.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-detailed-file-share
https://docs.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-file-share
Your network contains an Active Directory domain named contoso.com. The domain contains 10 computers that are in an
organizational unit (OU) named OU1.
You deploy the Local Administrator Password Solution (LAPS) client to the computers. You link a Group Policy object (GPO)
named GPO1 to OU1, and you configure the LAPS password policy settings in GPO1.
You need to ensure that the administrator passwords on the computers in OU1 are managed by using LAPS.
Which two actions should you perform? Each correct answer presents part of the solution.
D. Restart the domain controller that hosts the PDC emulator role.
Explanation:
References: https://www.techrepublic.com/article/pro-tip-securing-windows-local-administrator-password-with-laps/
Your network contains an internal network and a perimeter network. The internal network contains an Active Directory forest
named contoso.com.
You deploy five servers to the perimeter network. All of the servers run Windows Server 2016 and are the members of a
workgroup.
You need to apply a security baseline named Perimeter.inf to the servers in the perimeter network.
A. System Configuration
C. Security Templates
Explanation:
You have several Hyper-V that have older hardware and Trusted Platform Modules (TPMs) version 1.2.
You discover that the Hyper-V hosts cannot start shielded virtual machines.
You need to configure HGS to ensure that the older Hyper-V hosts can host shielded virtual machines.
Explanation:
References: https://blogs.technet.microsoft.com/datacentersecurity/2016/03/16/windows-server-2016-and-host-guardian-
service-for-shielded-vms/ https://docs.microsoft.com/en-us/powershell/module/hgsserver/set-hgsserver?view=win10-ps
A. Add-HgsAttestationHostGroup
B. Add-HgsAttestationTpmPolicy
C. Add-HgsAttestationTpmHost
D. Add-HgsAttestationCIPolicy
ANSWER: A
Explanation:
References: https://docs.microsoft.com/en-us/windows-server/virtualization/guarded-fabric-shielded-vm/guarded-fabric-add-
host-information-for-admin-trusted-attestation
HOTSPOT
Your network contains an Active Directory domain named contoso.com. The domain contains multiple servers that run
multiple applications. Domain user accounts are used to authenticate access requests to the servers.
You plan to prevent NTLM from being used to authenticate to the servers.
You start to audit NTLM authentication events for the domain. You need to view all of the NTLM authentication events and to
identify which applications authenticate by using NTLM.
On which computers should you review the event logs and which logs should you review? To answer, select the appropriate
options in the answer area.
Hot Area:
ANSWER:
References:
https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-
audit-ntlm-authentication-in-this-domain https://www.itprotoday.com/windows-78/access-denied-identifying-logon-attempts-
use-disabled-accounts
DRAG DROP
Your network contains an Active Directory domain named contoso.com. The domain contains several Hyper-V hosts.
You deploy a server named Server22 to a workgroup. Server22 runs Windows Server 2016.
You need to configure Server22 as the primary Host Guardian Service server.
Which three cmdlets should you run in sequence? To answer move the appropriate cmdlets from the list of cmdlets to the
answer area and arrange them in the correct order.
References: https://docs.microsoft.com/en-us/windows-server/virtualization/guarded-fabric-shielded-vm/guarded-fabric-
setting-up-the-host-guardian-service-hgs
Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1
and Server2 that run Windows Server 2016.
The Microsoft Advanced Threat Analytics (ATA) Center service is installed on Server1.
A. User8
B. User5
C. User7
D. User3
ANSWER: D
Explanation:
References:
https://docs.microsoft.com/en-us/advanced-threat-analytics/install-ata-step1
HOTSPOT
You plan to deploy three encrypted virtual machines that use Secure Boot. The virtual machines will be configured as shown
in the following table.
How should you protect each virtual machine? To answer, select the appropriate options in the answer area.
ANSWER:
Explanation:
References:
https://cloudbase.it/hyperv-shielded-vms-part-1/
https://www.itprotoday.com/server-virtualization/difference-between-shielded-vm-and-encryption-supported-vm
Your network contains an Active Directory domain named contoso.com. The domain contains multiple servers that run either
Windows Server 2012 or Windows Server 2012 R2.
You plan to implement Just Enough Administration (JEA) to manage all of the servers.
What should you install on each server to ensure that the servers can be managed by using JEA?
Explanation:
References: https://docs.microsoft.com/en-us/powershell/scripting/learn/remoting/jea/prerequisites?view=powershell-6
Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is
repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is
exactly the same in each question in this series.
The network contains an Active Directory domain named contoso.com. The domain contains the servers configured as
shown in the following table.
All servers run Windows Server 2016. All client computers run Windows 10 and are domain members. All laptops are
protected by using BitLocker Drive Encryption (BitLocker).
All computers receive updates from Server1. You create an update rule named Update1.
You need to ensure that you can encrypt the operating system drive of VM1 by using BitLocker.
B. Configure TPM platform validation profile for native UEFI firmware configurations
Explanation:
References: https://www.dell.com/support/article/za/en/zadhs1/sln171842/using-the-group-policy-editor-to-enable-bitlocker-
authentication-in-the-pre-boot-environment-for-windows-7-88-1-10?lang=en
HOTSPOT
Your network contains an Active Directory domain named adatum.com. The domain contains a file server named Server1
that runs Windows Server 2016.
You have an organizational unit (OU) named OU1 that contains Server1.
You create a Group Policy object (GPO) named GPO1 and link GPO1 to OU1.
A user named User1 is a member of group named Group1. The properties of User1 are shown in the User1 exhibit. (Click
the Exhibit button.)
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Hot Area:
ANSWER:
References: http://sourcedaddy.com/windows-7/auditing-file-and-folder-access.html
Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is
repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is
exactly the same in each question in this series.
The network contains an Active Directory domain named contoso.com. The domain contains the servers configured as
shown in the following table.
All servers run Windows Server 2016. All client computers run Windows 10 and are domain members. All laptops are
protected by using BitLocker Drive Encryption (BitLocker).
You have an organizational unit (OU) named OU1 that contains the computer accounts of application servers. An OU named
OU2 contains the computer accounts of the computers in the marketing department. A Group Policy object (GPO) named
GP1 is linked to OU1. A GPO named GP2 is linked to OU2.
In which event log will PowerShell code that is generated dynamically appear?
B. Windows Logs/Security
D. Windows Logs/Application
ANSWER: C
Explanation:
References: https://docs.microsoft.com/en-us/powershell/scripting/wmf/whats-new/script-logging?view=powershell-7
Your network contains an Active Directory Domain named contoso.com. The domain contains 10 servers that run Windows
Server 2016 and 800 client computers that run Windows 10.
Users must be locked out from their computer if they enter an incorrect password twice.
Users must only be able to unlock a locked account by using a one-time password that is sent to their mobile phone.
You deploy all the components of Microsoft Identity Manager (MIM) 2016.
Which three actions should you perform before you deploy the MIM add-ins and extensions? Each correct answer presents
part of the solution.
A. Deploy a Multi-Factor Authentication provider and copy the required certificates to the MIM server.
D. Deploy a Multi-Factor Authentication provider and copy the required certificates to the client computers.
E. From the MIM Portal, configure the Password Reset AuthN Workflow.
Explanation:
References: https://docs.microsoft.com/en-us/microsoft-identity-manager/working-with-self-service-password-reset
You need to configure Windows Defender to perform a full scan every day at 21:00.
Explanation:
References:
https://docs.microsoft.com/en-us/powershell/module/defender/set-mppreference?view=win10-ps
Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is
repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is
exactly the same in each question in this series.
The network contains an Active Directory domain named contoso.com. The domain contains the servers configured as
shown in the following table.
All servers run Windows Server 2016. All client computers run Windows 10 and are domain members. All laptops are
protected by using BitLocker Drive Encryption (BitLocker).
All computers receive updates from Server1. You create an update rule named Update1.
You need to create a Role Capability file on Server3. Which file should you create?
A. File1.ini
B. File1.ps1
C. File1.xml
D. File1.psrc
ANSWER: D
Explanation:
References: https://docs.microsoft.com/en-us/powershell/scripting/learn/remoting/jea/role-capabilities?view=powershell-7
You have a server named Server1 that runs Windows Server 2016.
C:\Folder1\File1.exe C:\Folder2\File2.bat
C:\Folder2\File3.com
B. File2.bat only
D. File1.exe only
F. File3.com only
ANSWER: E
Explanation:
References:
https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-
exclusions-windows-defender-antivirus
Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is
repeated in each question. Each question presents a
different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.
Your network contains an Active Directory domain named contoso.com. The functional level of the forest and the domain is
Windows Server 2008 R2.
The domain contains the servers configured as shown in the following table.
All servers run Windows Server 2016. All client computers run Windows 10.
You have an organizational unit (OU) named Marketing that contains the computers in the marketing department. You have
an OU named Finance that contains the computers in the finance department. You have an OU named AppServers that
You need to ensure that you can deploy a shielded virtual machine to Server4.
A. Hyper-V
C. Network Controller
Explanation:
References: https://blogs.technet.microsoft.com/datacentersecurity/2016/03/16/windows-server-2016-and-host-guardian-
service-for-shielded-vms/
HOTSPOT
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that
runs Windows Server 2016.
Server1 has the AppLocker rules configured as shown in the exhibit. (Click the Exhibit button.) Exhibit:
Which changes will allow User1 to run D:\Folder1\Program.exe and D:\Folder2\App2.exe? To answer select the appropriate
options in the answer area.
Hot Area:
ANSWER:
Explanation:
HOTSPOT
You are implementing Privileged Access Management (PAM) for an Active Directory forest named contoso.com.
You install a bastion forest named adatum.com, and you establish a trust between the forests.
You need to create a group in contoso.com that will be used by Microsoft Identity Manager to create groups in adatum.com.
How should you configure the group? To answer, select the appropriate options in the answer area.
Hot Area:
ANSWER:
References: https://docs.microsoft.com/en-us/microsoft-identity-manager/pam/planning-bastion-environment
DRAG DROP
You need to ensure that a non-administrator user can perform the following actions:
How should you complete the role configuration file? To answer, select the appropriate options in the answer area.
ANSWER:
References:
https://docs.microsoft.com/en-us/powershell/jea/role-capabilities
HOTSPOT
Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is
repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is
exactly the same in each question in this series.
The network contains an Active Directory domain named contoso.com. The domain contains the servers configured as
shown in the following table.
All servers run Windows Server 2016. All client computers run Windows 10 and are domain members. All laptops are
protected by using BitLocker Drive Encryption (BitLocker).
You have an organizational unit (OU) named OU1 that contains the computer accounts of application servers. An OU named
OU2 contains the computer accounts of the computers in the marketing department. A Group Policy object (GPO) named
GP1 is linked to OU1. A GPO named GP2 is linked to OU2.
All computers receive updates from Server1. You create an update rule named Update1.
What should you use on Server5? To answer, select the appropriate options in the answer area.
Hot Area:
ANSWER:
Explanation:
References:
https://docs.microsoft.com/en-us/windows/security/information-protection/windows-information-protection/create-and-verify-
an-efs-dra-certificate https://www.rootusers.com/configure-efs-recovery-agent/
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1.
A. On Server1, install the Host Guardian Hyper-V Support feature and a computer certificate from a trusted certification
authority (CA).
B. On Server1, install the Device Health Attestation server role and a computer certificate from a trusted certification
authority (CA).
C. Install the Host Guardian Hyper-V Support feature on Server1 and add Server1 to a domain security group.
D. Install the Device Health Attestation server role on Server1 and add Server1 to a domain security group.
ANSWER: C
Explanation:
References: https://docs.microsoft.com/en-us/windows-server/security/guarded-fabric-shielded-vm/guarded-fabric-guarded-
host-prerequisites https://docs.microsoft.com/en-us/windows-server/security/guarded-fabric-shielded-vm/guarded-fabric-
admin-trusted-attestation-creating-a-security-group
Your network contains an Active Directory domain named contoso.com. The domain contains an organizational unit (OU)
named OU1.
OU1 contains a server named Server1. The properties of Server1 are shown in the Server1 exhibit. (Click the Server1 tab.)
You need to ensure that the password of the local Administrator of Server1 is managed by using Local Administrator
Password Solution (LAPS).
A. Reset-AdmPwdPassword
B. Set-AdmPwdComputerSelfPermission
D. Set-AdmPwdResetPasswordPermission
ANSWER: C
Explanation:
References:
http://techgenix.com/deploying-laps/
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a
unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while
others might not have a correct solution.
After you answer a question in this sections, you will NOT be able to return to it. As a result, these questions will not appear
in the review screen.
Your network contains an Active Directory domain named contoso.com. The domain contains a computer named Computer1
that runs Windows10.
Computer1 has an application named App1.exe that is located in D:\Apps\. App1.exe is configured to accept connections on
TCP port 8080.
You need to ensure that App1.exe can accept connections only when Computer1 is connected to the corporate network.
Solution: You run the New-NetFirewallRule -DisplayName "Rule1" -Direction Inbound -LocalPort 8080 -Protocol TCP -Action
Allow -Profile Domain command.
A. Yes
B. No
ANSWER: B
Explanation:
HOTSPOT
You need to request privileged access from a client computer in contoso.com by using PAM.
Hot Area:
ANSWER:
Explanation:
References:
https://technet.microsoft.com/en-us/library/mt604089.aspx https://technet.microsoft.com/en-us/library/mt604084.aspx
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that
runs Windows Server 2016.
B. From Task Manager, review the processes listed on the Details tab.
C. From Server Manager, click Local Server, and review the properties of Server1.
F. From Control Panel, open Credential Manager, and review the list of Windows Credentials.
ANSWER: B
Explanation:
References: https://yungchou.wordpress.com/2016/10/10/credential-guard-made-easy-in-windows-10-version-1607/
Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be
correct for more than one question in the series. Each question is independent of the other questions in this series.
Information and details provided in a question apply only to that question.
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that
runs Windows Server 2016.
Dynamic Access Control is configured. A resource property named Property1 was created in the domain.
You need to ensure that Property1 is set to a value of Big for all of the files in Volume1 that are larger than 10 MB.
A. File Explorer
B. Shared Folders
C. Server Manager
D. Disk Management
E. Storage Explorer
F. Computer Management
G. System Configuration
Explanation:
References: https://technet.microsoft.com/en-us/library/cc732431(v=ws.11).aspx
HOTSPOT
You run the Windows PowerShell commands as shown in the following exhibit.
Use the drop-down menus to select the answer choice that completes each statement based on the information presented in
the graphic.
Hot Area:
ANSWER:
Explanation:
References: https://blogs.technet.microsoft.com/datacentersecurity/2016/03/16/windows-server-2016-and-host-guardian-
service-for-shielded-vms/ https://docs.microsoft.com/en-us/windows-server/security/guarded-fabric-shielded-vm/guarded-
fabric-troubleshoot-hgs
Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this sections, you will NOT be able to return to it. As a result, these questions will not appear
in the review screen.
Your network contain an Active Directory domain named contoso.com. The domain contains a computer named Computer1
that runs Windows 10. Computer1 connects to a home network and a corporate network.
You need to prevent connections to App1 when Computer1 is connected to the home network.
Solution: From Windows Firewall in the Control Panel, you add an application and allow the application to communicate
through the firewall on a Private network.
A. Yes
B. No
ANSWER: B
Explanation:
References: http://www.online-tech-tips.com/windows-10/adjust-windows-10-firewall-settings/
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a
unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while
others might not have a correct solution.
After you answer a question in this sections, you will NOT be able to return to it. As a result, these questions will not appear
in the review screen.
Your network contains an Active Directory domain named contoso.com. The domain contains a computer named Computer1
that runs Windows10.
Computer1 has an application named App1.exe that is located in D:\Apps\. App1.exe is configured to accept connections on
TCP port 8080.
You need to ensure that App1.exe can accept connections only when Computer1 is connected to the corporate network.
Solution: You run the New-NetFirewallRule –DisplayName "Rule1" –Direction Inbound –Program "D:\Apps\App1.exe" –
Action Allow -Profile Domain command.
A. Yes
Explanation:
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a
unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while
others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in
the review screen.
Your network contains an Active Directory domain named contoso.com. All client computers run Windows 10.
You plan to deploy a Remote Desktop connection solution for the client computers.
You have four available servers in the domain that can be configured as Remote Desktop servers. The servers are
configured as shown in the following table.
Solution: You deploy the Remote Desktop connection solution by using Server1.
A. Yes
B. No
ANSWER: B
Explanation:
References:
https://docs.microsoft.com/en-us/windows/security/identity-protection/remote-credential-guard
All DNS servers host an Active Directory-integrated zone for the domain that is DNSSEC-signed. All the DNS servers have a
trust anchor installed for a DNS zone named fabrikam.com.
For all the computers in the domain, you configure a name resolution policy that enforces DNSSEC validation for the
contoso.com and fabrikam.com DNS namespaces.
A. On a domain-joined computer, run Resolve-DnsName to query a DNS server that hosts the fabrikam.com zone for a DNS
record in the fabrikam.com zone.
B. On a domain-joined computer, run Resolve-DnsName to query a domain controller for a DNS record in the fabrikam.com
zone.
Explanation:
References:
Your network contains an Active Directory domain named contoso.com. The domain contains a member server named
Server5 that runs Windows Server 2016.
Which two actions should you perform? Each correct answer presents part of the solution.
Explanation:
References:
https://docs.microsoft.com/en-us/powershell/jea/session-configurations https://docs.microsoft.com/en-us/powershell/jea/role-
capabilities
HOTSPOT
Your network contains two Active Directory forests named contoso.com and adatum.com. Contoso.com contains a Hyper-V
host named Server1. Server1 is a member of a group named HyperHosts. Adatum.com contains a server named Server2.
Server1 and Server2 run Windows Server 2016.
You plan to deploy shielded virtual machines to Server1 and to configure Admin-trusted attestation on Server2.
Which component should you install and which cmdlet should you run on Server2? To answer, select the appropriate options
in the answer area.
Hot Area:
Explanation:
References: https://blogs.technet.microsoft.com/datacentersecurity/2016/03/16/windows-server-2016-and-host-guardian-
service-for-shielded-vms/
https://docs.microsoft.com/en-us/windows-server/virtualization/guarded-fabric-shielded-vm/guarded-fabric-admin-trusted-
attestation-creating-a-security-group
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1.
When will JEA limit the tasks that can be performed on Server1?
A. when you run winrs.exe and specify Server1 as the remote endpoint
B. when you run psexec.exe and specify \\Server1 as the remote system
Explanation:
References:
https://www.red-gate.com/simple-talk/sysadmin/powershell/powershell-just-enough-administration/
Your network contains two Active Directory forests named corp.contoso.com and priv.contoso.com. Both forests have only a
single domain. The priv.contoso.com domain contains a server named Server1 that runs Windows Server 2016.
You plan to deploy MIM-based Privileged Access Management (PAM) between the two forests.
You need to configure the trust relationship between the forests to support the PAM deployment.
Which three settings should you configure for the trust? Each correct answer presents part of the solution.
A. quarantine to no
B. enablesidhistory to yes
C. transitive to no
D. enablepimtrust to yes
E. foresttransitive to no
ANSWER: ABD
Explanation:
References:
https://docs.microsoft.com/en-us/microsoft-identity-manager/pam/step-5-establish-trust-between-priv-corp-forests
Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is
repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is
exactly the same in each question in this series.
All servers run Windows Server 2016. All client computers run Windows 10 and are domain members. All laptops are
protected by using BitLocker Drive Encryption (BitLocker).
You have an organizational unit (OU) named OU1 that contains the computer accounts of application servers. An OU named
OU2 contains the computer accounts of the computers in the marketing department. A Group Policy object (GPO) named
GP1 is linked to OU1. A GPO named GP2 is linked to OU2.
All computers receive updates from Server1. You create an update rule named Update1.
You need to ensure that you can view Windows PowerShell code that was generated dynamically and executed on the
computers in OU1.
D. Object Access/Audit Other Object Access Events from the advanced audit policy
ANSWER: B
Explanation:
References:
https://docs.microsoft.com/en-us/powershell/wmf/whats-new/script-logging
You have several virtual machines that run in a hosted data center on Hyper-V hosts.
You plan to use the Shielding Data File Wizard to create a data file that will include password information and an RDP file.
The file will be used to create new shielded virtual machines in the fabric of the hosting provider.
What do you require from the hosting provider to complete the wizard?
A. an XML file that contains the names of all the Hyper-V hosts in the fabric.
B. an XML file that contains virtual machine configuration data from the Hyper-V hosts
Explanation:
References:
https://docs.microsoft.com/en-us/windows-server/security/guarded-fabric-shielded-vm/guarded-fabric-tenant-creates-
shielding-data
DRAG DROP
You have two servers named Server1 and Server2 that run Windows Server 2016 and are in a workgroup. Server1 is used
as a reference computer to configure the security baseline for the other computers in the workgroup.
You need to apply the Group Policy computer settings of Server1 to Server2.
Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the
answer area and arrange them in the correct order.
ANSWER:
References:
https://blogs.technet.microsoft.com/secguide/2016/01/21/lgpo-exe-local-group-policy-object-utility-v1-0/
Your network contains an Active Directory forest named contoso.com. The forest functional level is Windows Server 2012.
All servers run Windows Server 2016.
You create a new bastion forest named admin.contoso.com. The forest functional level of admin.contoso.com is Windows
Server 2012 R2.
Which two actions should you perform? Each correct answer presents part of the solution.
Explanation:
References: https://docs.microsoft.com/en-us/microsoft-identity-manager/pam/hardware-software-requirements
https://docs.microsoft.com/en-us/microsoft-identity-manager/pam/planning-bastion-environment
Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1
and Server2 that run Windows Server 2016.
You configure Server1 as a Just Enough Administration (JEA) endpoint. You configure the required JEA rights for a user
named User1.
You need to tell User1 how to manage Active Directory objects from Server2.
D. Install the management consoles for Active Directory, and then launch Active Directory Users and Computers.
ANSWER: C
Explanation:
References: https://blogs.technet.microsoft.com/privatecloud/2014/05/14/just-enough-administration-step-by-step/
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a
unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while
others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in
the review screen.
Your network contains an Active Directory domain named contoso.com. All client computers run Windows 10.
You plan to deploy a Remote Desktop connection solution for the client computers.
You have four available servers in the domain that can be configured as Remote Desktop servers. The servers are
configured as shown in the following table.
You need to ensure that all Remote Desktop connections can be protected by using Remote Credential Guard.
Solution: You deploy the Remote Desktop connection solution by using Server3.
A. Yes
B. No
Explanation:
References:
https://docs.microsoft.com/en-us/windows/security/identity-protection/remote-credential-guard
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a
unique solution that might meet the stated goals.
Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this sections, you will NOT be able to return to it. As a result, these questions will not appear
in the review screen.
Your network contain an Active Directory domain named contoso.com. The domain contains a computer named Computer1
that runs Windows 10. Computer1 connects to a home network and a corporate network.
You need to prevent connections to App1 when Computer1 is connected to the home network.
Solution: From Group Policy Management, you create software restriction policy.
A. Yes
B. No
ANSWER: B
Explanation:
References: https://technet.microsoft.com/en-us/library/hh831534(v=ws.11).aspx
HOTSPOT
You have a file server named Server1 that runs Windows Server 2016.
You need to log all the Windows PowerShell activities that relate to creating and managing storage on Server1.
How should you complete the command? To answer, select the appropriate options in the answer area.
ANSWER:
Explanation:
References:
https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_eventlogs?view=powershell-5.1
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a
unique solution that might meet the stated goals.
Some question sets might have more than one correct solution, while others might not have a correct solution.
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2016. All client
computers run Windows 10.
The relevant objects in the domain are configured as shown in the following table.
You need to assign User1 the right to restore files and folders on Server1 and Server2.
Solution: You create a Group Policy object (GPO), you link the GPO to the Servers OU, and then you modify the Users
Rights Assignment in the GPO.
A. Yes
B. No
ANSWER: B
Explanation:
References: https://technet.microsoft.com/en-us/library/cc771990(v=ws.11).aspx
You have a guarded fabric and a Host Guardian Service server named HGS1.
You deploy a Hyper-V host named Hyper1, and configure Hyper1 as part of the guarded fabric.
You need to ensure that you can run the virtual machine on Hyper1.
A. On HGS1, run the Export-HgsKeyProtectionState cmdlet, and then run the Import-HgsGuardian cmdlet.
B. On Hyper1, run the Invoke-WebRequest cmdlet, and then run the Import-HgsGuardian cmdlet.
C. On the virtual machine, retrieve the metadata of the guarded fabric, and then import the metadata.
D. On Hyper1, run the Export-HgsKeyProtectionState cmdlet, and then run the Import-HgsGuardian cmdlet.
ANSWER: B
Explanation:
Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be
correct for more than one question in the series. Each question is independent of the other questions in this series.
Information and details provided in a question apply only to that question.
You have a server named Server1 that runs Windows Server 2016.
A. Get-NetIPSecRule
B. Get-NetFirewallRule
C. Get-NetFirewallProfile
D. Get-NetFirewallSetting
E. Get-NetFirewallPortFilter
F. Get-NetFirewallAddressFilter
G. Get-NetFirewallSecurityFilter
H. Get-NetFirewallApplicationFilter
ANSWER: B
Explanation:
References: https://docs.microsoft.com/en-us/powershell/module/netsecurity/get-netfirewallrule?view=win10-ps
You implement Log Analytics in Microsoft Operations Management Suite (OMS) on all servers that run Windows Server
2016.
You need to generate a daily report that identifies which servers restarted during the last 24 hours.
You have a Hyper-V host named Server1 that runs Windows Server 2016.
Server1 hosts the virtual machines configured as shown in the following table.
You plan to implement BitLocker Drive Encryption (BitLocker) on the virtual machines.
Which virtual machines can have their volumes protected by using BitLocker? To answer, select the appropriate options in
the answer area.
Hot Area:
References: https://docs.microsoft.com/en-us/windows-server/virtualization/hyper-v/deploy/upgrade-virtual-machine-version-
in-hyper-v-on-windows-or-windows-server http://www.shulerent.com/2012/09/04/locking-down-a-virtual-machine-with-
bitlocker/
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a
unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while
others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in
the review screen.
Your network contains an Active Directory domain named contoso.com. The domain contains a computer named Computer1
that runs Windows10.
Computer1 has an application named App1.exe that is located in D:\Apps\. App1.exe is configured to accept connections on
TCP port 8080.
Solution: You configure an inbound rule that allows the TCP protocol on port 8080 and applies to all profiles.
A. Yes
B. No
ANSWER: B
Explanation:
Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be
correct for more than one question in the series.
Each question is independent of the other questions in this series. Information and details provided in a question apply only
to that question.
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that
runs Windows Server 2016 and a Nano Server named Nano1.
A. File Explorer
B. Shared Folders
C. Server Manager
D. Disk Management
E. Storage Explorer
F. Computer Management
G. System Configuration
Explanation:
References: https://technet.microsoft.com/en-us/library/hh831434(v=ws.11).aspx
You need to implement code integrity policies and sign them by using certificates issued by the CA.
You plan to use the same certificate to sign policies on multiple computers.
You duplicate the Code Signing certificate template and name the new template CodeIntegrity.
A. Enable the Allow private key to be exported setting and modify the Key Usage extension.
B. Disable the Allow private key to be exported setting and modify the Application Policies extension.
C. Disable the Allow private key to be exported setting and disable the Basic Constraints extension.
D. Enable the Allow private key to be exported setting and enable the Basic Constraints extension
ANSWER: D
Explanation:
References: https://blogs.technet.microsoft.com/ukplatforms/2017/05/04/create-code-integrity-signing-certificate/
Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is
repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is
exactly the same in each question in this series.
The network contains an Active Directory domain named contoso.com. The domain contains the servers configured as
shown in the following table.
All servers run Windows Server 2016. All client computers run Windows 10 and are domain members. All laptops are
protected by using BitLocker Drive Encryption (BitLocker).
You need to implement BitLocker Network Unlock for all of the laptops. Which server role should you deploy to the network?
D. Network Controller
ANSWER: C
Explanation:
References: https://docs.microsoft.com/en-us/windows/device-security/bitlocker/bitlocker-how-to-enable-network-unlock
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a
unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while
others might not have a correct solution.
After you answer a question in this sections, you will NOT be able to return to it. As a result, these questions will not appear
in the review screen.
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that
runs Windows Server 2016.
A. Yes
B. No
ANSWER: B
Explanation:
References: https://www.rootusers.com/implement-ntlm-blocking-in-windows-server-2016/
You have an organizational unit (OU) named Administration that contains the computer account of Server1.
You create a Group Policy object (GPO) named GPO1. You link GPO1 to the Administration OU.
You need to log an event each time an Active Directory cmdlet is executed successfully from Server1.
A. From Advanced Audit Policy in GPO1, configure auditing for directory service changes.
C. From Advanced Audit Policy in GPO1, configure auditing for other privilege use events.
Explanation:
References:
https://www.petri.com/enable-powershell-logging
Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be
correct for more than one question in the series. Each question is independent of the other questions in this series.
Information and details provided in a question apply only to that question.
Your network contains an Active Directory domain named contoso.com. The domain contains a file server named Server1
that runs Windows Server 2016.
You need to limit each user to using 100 MB of data in their respective subfolder. The solution must enable the users to be
notified when they use 80 percent of the available space in the subfolder.
A. File Explorer
B. Shared Folders
C. Server Manager
D. Disk Management
E. Storage Explorer
F. Computer Management
Explanation:
References: https://4sysops.com/archives/file-server-resource-manager-fsrm-part-3-quota-management/
You have a Hyper-V host named Server1 that runs Windows Server 2016.
Server1 has a generation 2 virtual machine named VM1 that runs Windows 10.
You need to ensure that you can turn on BitLocker Drive Encryption (BitLocker) for drive C on VM1.
B. From Server1, configure the Enforce drive encryption type on fixed data drives Group Policy setting.
Explanation:
References:
https://docs.microsoft.com/en-us/windows-server/virtualization/hyper-v/learn-more/generation-2-virtual-machine-security-
settings-for-hyper-v
Your network contains an Active Directory domain named contoso.com. The domain contains four servers. The servers are
configured as shown in the following table.
You need to manage FS1 and FS2 by using Just Enough Administration (JEA).
Explanation:
References: https://blogs.technet.microsoft.com/privatecloud/2014/05/14/just-enough-administration-step-by-step/
You are deploying Microsoft Advanced Threat Analytics (ATA) to the domain.
You install the ATA Center on server named Server1 and the ATA Gateway on a server named Server2.
You need to ensure that Server2 can collect NTLM authentication events.
Explanation:
References: http://winrook.blogspot.co.za/2015/12/configuring-windows-event-forwarding.html
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a
unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while
others might not have a correct solution.
After you answer a question in this sections, you will NOT be able to return to it. As a result, these questions will not appear
in the review screen. You deploy Windows Server 2016 to a server named Server1.
You need to ensure that you can run Windows Containers on Server1.
Solution: On Server1, you enable the Containers feature, and then you install the Hyper-V server role. You restart the server.
A. Yes
B. No
Explanation:
References: https://docs.microsoft.com/en-us/virtualization/windowscontainers/deploy-containers/deploy-containers-on-
server
You have a Hyper-V host named Server1 that runs Windows Server 2016.
Server1 has a generation 2 virtual machine named VM1 that runs Windows 10.
You need to ensure that you can turn on BitLocker Drive Encryption (BitLocker) for drive C on VM1.
A. From VM1, configure the require additional authentication at startup Group Policy setting.
D. From VM1, configure the Enforce drive encryption type on fixed data drives Group Policy setting.
ANSWER: A
Explanation:
Reference: https://www.dell.com/support/article/za/en/zadhs1/sln171842/using-the-group-policy-editor-to-enable-bitlocker-
authentication-in-the-pre-boot-environment-forwindows-7-8-8-1-10?lang=en
Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is
repeated in each question. Each question presents a
different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.
Your network contains an Active Directory domain named contoso.com. The functional level of the forest and the domain is
Windows Server 2008 R2.
The domain contains the servers configured as shown in the following table.
You have an organizational unit (OU) named Marketing that contains the computers in the marketing department. You have
an OU named Finance that contains the computers in the finance department. You have an OU named AppServers that
contains application servers. A Group Policy object (GPO) named GP1 is linked to the Marketing OU. A GPO named GP2 is
linked to the AppServers OU.
B. From the properties of each network adapter on Server2, modify the bindings.
Explanation:
References: https://support.microsoft.com/en-za/help/2696547/how-to-enable-and-disable-smbv1,-smbv2,-and-smbv3-in-
windows-vista,-windows-server-2008,-windows-7,-windowsserver-2008-r2,-windows-8,-and-windows-server-2012
You deploy a server named Server1 that runs Windows Server 2016. Server1 is in a workgroup.
You need to collect the logs from Server1 by using Log Analytics in Microsoft Operations Management Suite (OMS).
Explanation:
References: https://docs.microsoft.com/en-us/azure/log-analytics/log-analytics-windows-agents
HOTSPOT
The hardware configuration on Server1 meets the requirements for Credential Guard.
What should you do? To answer, select the appropriate options in the answer area.
Hot Area:
ANSWER:
Explanation:
https://docs.microsoft.com/en-us/windows/access-protection/credential-guard/credential-guard-manage#hardware-
readiness-tool
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a
unique solution that might meet the stated goals.
Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this sections, you will NOT be able to return to it. As a result, these questions will not appear
in the review screen.
Your network contain an Active Directory domain named contoso.com. The domain contains a computer named Computer1
that runs Windows 10. Computer1 connects to a home network and a corporate network.
You need to prevent connections to App1 when Computer1 is connected to the home network.
A. Yes
B. No
ANSWER: B
Explanation:
References: https://technet.microsoft.com/en-us/library/dd759068(v=ws.11).aspx
Your network contains an Active Directory domain named contoso.com. The domain contains 100 servers.
You deploy the Local Administrator Password Solution (LAPS) to the network.
You discover that the members of a group named FinanceAdministartors can view the password of the local Administrator
accounts on the servers in an organizational unit (OU) named FinanceServers.
You need to prevent the FinanceAdministartors members from viewing the local administrators ‘passwords on the servers in
FinanceServers. Which permission should you remove from FinanceAdministartors?
C. read permissions
Explanation:
References: https://4sysops.com/archives/set-up-microsoft-laps-local-administrator-password-solution-in-active-directory/
Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be
correct for more than one question in the series. Each question is independent of the other questions in this series.
Information and details provided in a question apply only to that question.
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that
runs Windows Server 2016.
A. File Explorer
B. Shared Folders
C. Server Manager
D. Disk Management
E. Storage Explorer
F. Computer Management
G. System Configuration
Explanation:
References: https://docs.microsoft.com/en-us/windows-server/identity/solution-guides/deploy-a-central-access-policy--
demonstration-steps-#BKMK_1.4
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a
unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while
others might not have a correct solution.
Your network contains an Active Directory domain named contoso.com. All client computers run Windows 10.
You plan to deploy a Remote Desktop connection solution for the client computers.
You have four available servers in the domain that can be configured as Remote Desktop servers. The servers are
configured as shown in the following table.
You need to ensure that all Remote Desktop connections can be protected by using Remote Credential Guard.
Solution: You deploy the Remote Desktop connection solution by using Server2.
A. Yes
B. No
ANSWER: B
Explanation:
References:
https://docs.microsoft.com/en-us/windows/security/identity-protection/remote-credential-guard
Your network contains an Active Directory domain named contoso.com. The domain contains five servers. All servers run
Windows Server 2016.
A new security policy states that you must modify the infrastructure to meet the following requirements: Limit the rights of
administrators.
You need to recommend a solution that meets the new security policy requirements.
A. an administrative forest
B. domain isolation
Explanation:
References: https://docs.microsoft.com/en-us/windows-server/identity/securing-privileged-access/securing-privileged-
access-reference-material#ESAE_BM
Your network contains an Active Directory forest named contoso.com. The forest functional level is Windows Server 2012.
The forest contains 20 member servers that are configured as file servers. All domain controllers run Windows Server 2016.
You need to use the Enhanced Security Administrative Environment (ESAE) approach for the administration of the resources
in contoso.com.
Which two actions should you perform? Each correct answer presents part of the solution.
Explanation:
References: https://docs.microsoft.com/en-us/windows-server/identity/securing-privileged-access/securing-privileged-
access-reference-material#esae-administrative-forest-designapproach
Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is
repeated in each question. Each question presents a
different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.
Your network contains an Active Directory domain named contoso.com. The functional level of the forest and the domain is
Windows Server 2008 R2.
The domain contains the servers configured as shown in the following table.
You have an organizational unit (OU) named Marketing that contains the computers in the marketing department. You have
an OU named Finance that contains the computers in the finance department. You have an OU named AppServers that
contains application servers. A Group Policy object (GPO) named GP1 is linked to the Marketing OU. A GPO named GP2 is
linked to the AppServers OU.
You plan to implement BitLocker Drive Encryption (BitLocker) on the operating system volumes of the application servers.
You need to ensure that the BitLocker recovery keys are stored in Active Directory.
A. System cryptography: Force strong key protection for user keys stored on the computer
B. Store BitLocker recovery information in Active Directory Domain Services (Windows Server 2008 and Windows Vista)
C. System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing.
Explanation:
References: https://technet.microsoft.com/en-us/library/jj679890(v=ws.11).aspx#BKMK_rec3
You need to ensure that you can apply the Code Integrity policy to Hyper-V hosts.
A. Add-SignerRule
B. Add-HgsAttestationTpmHost
D. ConvertFrom-CIPolicy
ANSWER: B
Explanation:
References: https://docs.microsoft.com/en-us/windows-server/security/guarded-fabric-shielded-vm/guarded-fabric-tpm-
trusted-attestation-capturing-hardware#create-and-apply-a-codeintegrity-policy
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a
unique solution that might meet the stated goals.
Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this sections, you will NOT be able to return to it. As a result, these questions will not appear
in the review screen.
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2016. All client
computers run Windows 10.
The relevant objects in the domain are configured as shown in the following table.
You need to assign User1 the right to restore files and folders on Server1 and Server2.
Solution: You create a Group Policy object (GPO), link it to the Operations Users OU, and modify the Users Rights
Assignment in the GPO.
A. Yes
B. No
ANSWER: B
Explanation:
References: https://technet.microsoft.com/en-us/library/cc771990(v=ws.11).aspx
Your network contains an Active Directory forest named contoso.com. The forest functional level is Windows Server 2012.
The forest contains a single domain. The domain contains multiple Hyper-V hosts.
What should you do before you initialize the Host Guardian Service on Server22?
B. Obtain a certificate.
Explanation:
References: https://docs.microsoft.com/en-us/windows-server/virtualization/guarded-fabric-shielded-vm/guarded-fabric-
prepare-for-hgs#prerequisites-for-the-host-guardian-service
Your network contains an Active Directory domain named contoso.com. The domain contains a file server named FS1 that
runs Windows Server 2016. FS1 has a share named SecureFolder.
You need to track all users who access the contents of SecureFolder.
Which two actions should you perform? Each correct answer presents part of the solution.
A. From the Default Domain Controller Group Policy object (GPO), enable Audit object access.
D. Create a Group Policy object (GPO) and enable Audit object access.
ANSWER: BD
Explanation:
References:
https://www.rootusers.com/configure-file-access-auditing-in-windows-server-2016/
You download Microsoft Security Compliance Toolkit 1.0 and all the security baselines.
A. Run 1gpo.exe and specify the /g parameter. From Policy Analyzer, click Add.
B. From Group Policy Management, create and link a Group Policy object (GPO). Select the GPO and run the Import
Settings Wizard.
C. From Group Policy Management, click Group Policy Objects, and then click Manage Backups…
D. From Group Policy Management, create and link a Group Policy object (GPO). Run 1gpo.exe and specify the /g
parameter.
ANSWER: B
Explanation:
https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/deployment/distribute-certificates-to-client-computers-by-
using-group-policy
You implement Just Enough Administration (JEA) on several file servers that run Windows Server 2016. The Role Capability
file from a server named Server5 contains the following code.
Explanation:
References:
https://docs.microsoft.com/en-us/powershell/scripting/learn/remoting/jea/role-capabilities?view=powershell-7
https://technet.microsoft.com/en-us/itpro/powershell/windows/smbshare/set-smbshare
HOTSPOT
The domain contains the computers configured as shown in the following table.
Server1 has a share named Share1 that has the following configurations.
Server1, Computer1, and Computer2 have the connection security rules configured as shown in the exhibit. (Click the Exhibit
button.) Exhibit:
Hot Area:
ANSWER:
Explanation:
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a
unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while
others might not have a correct solution.
Your network contains an Active Directory domain named contoso.com. All client computers run Windows 10.
You plan to deploy a Remote Desktop connection solution for the client computers.
You have four available servers in the domain that can be configured as Remote Desktop servers. The servers are
configured as shown in the following table.
You need to ensure that all Remote Desktop connections can be protected by using Remote Credential Guard.
Solution: You deploy the Remote Desktop connection solution by using Server4.
A. Yes
B. No
ANSWER: B
Explanation:
References:
https://docs.microsoft.com/en-us/windows/security/identity-protection/remote-credential-guard
HOTSPOT
You need to recommend a deployment solution for the applications. Each application must:
What should you recommend? To answer, select the appropriate options in the answer area.
Hot Area:
Explanation:
References: https://docs.microsoft.com/en-us/dotnet/standard/modernize-with-azure-and-containers/modernize-existing-
apps-to-cloud-optimized/deploy-existing-net-apps-as-windowscontainers
https://blogs.msdn.microsoft.com/msgulfcommunity/2015/06/20/what-is-windows-server-containers-and-hyper-v-containers/
Your network contains an Active Directory forest named contoso.com. The forest contains three domains. All domain
controllers run Windows Server 2016.
You deploy a second Active Directory forest named admin.contoso.com. The forest contains a domain member server
named Server1. Server1 has Microsoft Identity Manager (MIM) 2016 deployed.
You need to implement Privileged Access Management (PAM) and to use admin.contoso.com as an administrative forest.
Explanation:
References: https://docs.microsoft.com/en-us/microsoft-identity-manager/pam/configuring-mim-environment-for-pam
https://docs.microsoft.com/en-us/microsoft-identity-manager/pam/step-5-establish-trust-between-priv-corp-forests
HOTSPOT
Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is
repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is
exactly the same in each question in this series.
Your network contains an Active Directory domain named contoso.com. The functional level of the forest and the domain is
Windows Server 2008 R2.
The domain contains the servers configured as shown in the following table.
All servers run Windows Server 2016. All client computers run Windows 10.
You have an organizational unit (OU) named Marketing that contains the computers in the marketing department. You have
an OU named Finance that contains the computers in the finance department. You have an OU named AppServers that
contains application servers. A Group Policy object (GPO) named GP1 is linked to the Marketing OU. A GPO named GP2 is
linked to the AppServers OU.
You need to ensure that you can implement the Local Administrator Password Solution (LAPS) for the finance department
computers.
Hot Area:
ANSWER:
Explanation:
References: https://learn-powershell.net/2016/10/08/setting-up-local-administrator-password-solution-laps/
Explanation:
References: https://docs.microsoft.com/en-us/azure/log-analytics/log-analytics-windows-agents
HOTSPOT
You need to verify whether Control Flow Guard is enabled for App1.exe.
Which command should you run? To answer, select the appropriate options in the answer area.
Hot Area:
ANSWER:
Explanation:
References: https://msdn.microsoft.com/en-us/library/windows/desktop/mt637065(v=vs.85).aspx
You need to recommend a workstation solution that provides the highest level of protection from vulnerabilities and attacks.
A. Provide a Privileged Access Workstation (PAW) for each user account in both forests. Join each PAW to the contoso.com
domain.
B. Provide a Privileged Access Workstation (PAW) for each user in the contoso.com forest. Join each PAW to the
contoso.com domain.
C. Provide a Privileged Access Workstation (PAW) for each administrator. Join each PAW to the contoso.com domain.
D. Provide a Privileged Access Workstation (PAW) for each administrator. Join each PAW to the contosoadmin.com domain.
ANSWER: D
Explanation:
References: https://docs.microsoft.com/en-us/windows-server/identity/securing-privileged-access/privileged-access-
workstations
Your network has an internal network and a perimeter network. Only the servers on the perimeter network can access the
Internet. You create a Microsoft Operations Management Suite (OMS) instance in Microsoft Azure.
You deploy Microsoft Monitoring Agent to all the servers on both the networks.
You discover that only the servers on the perimeter network report to OMS.
A. Install a Web Application Proxy on the perimeter network and install an OMS Gateway on the internal network. Publish the
OMS Gateway from the Web Application Proxy.
B. Install a Web Application Proxy and an OMS Gateway on the perimeter network. Publish the OMS Gateway from the Web
Application Proxy.
C. Configure the network firewalls to allow the internal servers to access the IP addresses of the Azure OMS instance by
using TCP port 443.
D. On the internal servers, run the Add-AzureRmUsageConnect cmdlet and specify the –AdminUri parameter.
ANSWER: A
Explanation:
References: https://docs.microsoft.com/en-us/azure/log-analytics/log-analytics-oms-gateway
You have a client computer named Computer1 that runs Windows 10 Enterprise.
You enable Device Guard on Computer1, and you create a code integrity policy.
What should you do? To answer select the appropriate options in the answer area.
Hot Area:
ANSWER:
References:
https://blogs.technet.microsoft.com/ukplatforms/2017/04/04/getting-started-with-windows-10-device-guard-part-1-of-2/#audit-
policies
Your network contains an Active Directory domain named contoso.com. The domain contains 100 servers.
You deploy the Local Administrator Password Solution (LAPS) to the network.
You need to view the password of the local administrator of a server named Server5.
A. Computer Management
C. Server Manager
Explanation:
References: https://blogs.technet.microsoft.com/askpfeplat/2015/12/28/local-administrator-password-solution-
lapsimplementation-hints-and-security-nerd-commentaryincludingminithreat-model/
You need to view which script blocks were executed by using Windows PowerShell scripts.
Explanation:
References: https://docs.microsoft.com/en-us/powershell/wmf/5.0/audit_script
Your network contains several secured subnets that are disconnected from the Internet.
One of the secured subnets contains a server named Server1 that runs Windows Server 2016.
You implement Log Analytics in Microsoft Operations Management Suite (OMS) for the servers that connect to the Internet.
You need to ensure that Log Analytics can collect logs from Server1.
Which two actions should you perform? Each correct answer presents part of the solution.
D. Install the OMS Log Analytics Forwarder on a server that has Internet connectivity.
Explanation:
References: https://docs.microsoft.com/en-us/azure/log-analytics/log-analytics-oms-gateway
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a
unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while
others might not have a correct solution.
After you answer a question in this sections, you will NOT be able to return to it. As a result, these questions will not appear
in the review screen.
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that
runs Windows Server 2016.
A. Yes
B. No
ANSWER: A
Explanation:
References: https://www.rootusers.com/implement-ntlm-blocking-in-windows-server-2016/
Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is
repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is
exactly the same in each question in this series.
The network contains an Active Directory domain named contoso.com. The domain contains the servers configured as
shown in the following table.
All servers run Windows Server 2016. All client computers run Windows 10 and are domain members. All laptops are
protected by using BitLocker Drive Encryption (BitLocker).
You have an organizational unit (OU) named OU1 that contains the computer accounts of application servers. An OU named
OU2 contains the computer accounts of the computers in the marketing department. A Group Policy object (GPO) named
GP1 is linked to OU1. A GPO named GP2 is linked to OU2.
All computers receive updates from Server1. You create an update rule named Update1.
You need to ensure that AppLocker rules will apply to the marketing department computers. What should you do?
B. In GP2, configure the Startup type for the Application Identity service.
C. In GP2, configure the Startup type for the Application Management service.
Explanation:
References: https://docs.microsoft.com/en-us/windows/device-security/applocker/configure-the-application-identity-service
HOTSPOT
You have Hyper-V hosts that each has a Software Defined Networking (SDN) deployment. The network uses a virtual subnet
of 192.168.0.0/24.
You create an access control list (ACL) and apply the ACL to the virtual subnets shown in the following table.
Use the drop-down menus to select the answer choice that completes each statement based on the information presented in
the table.
Hot Area:
ANSWER:
Explanation:
References: