Microsoft Passit4sure 70-744 v2020-03-18 by Eva 124q
Microsoft Passit4sure 70-744 v2020-03-18 by Eva 124q
Microsoft Passit4sure 70-744 v2020-03-18 by Eva 124q
Number: 70-744
Passing Score: 800
Time Limit: 120 min
File Version: 1
70-744
E6E3AB02065076CC5F9A13BC334734DE
Exam A
QUESTION 1
Note: This question is part of a series of questions that present the same scenario. Each question in the
series contains a unique solution that might meet the stated goals. Some question sets might have more
than one correct solution, while others might not have a correct solution.
After you answer a question in this sections, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
Your network contains an Active Directory forest named contoso.com. All servers run Windows Server
2016. The forest contains 2,000 client computers that run Windows 10. All client computers are deployed
from a customized Windows image.
You need to deploy 10 Privileged Access Workstations (PAWs). The solution must ensure that
administrators can access several client applications used by all users.
Solution: You deploy 10 physical computers and configure each one as a virtualization host. You deploy the
operating system on each host by using the customized Windows image. On each host, you create a guest
virtual machine and configure the virtual machine as a PAW.
A. Yes
B. No
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
References:
https://technet.microsoft.com/en-us/windows-server-docs/security/securing-privileged-access/privileged-
access-workstations
QUESTION 2
Note: This question is part of a series of questions that present the same scenario. Each question in the
series contains a unique solution that might meet the stated goals. Some question sets might have more
than one correct solution, while others might not have a correct solution.
After you answer a question in this sections, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
Your network contains an Active Directory forest named contoso.com. All servers run Windows Server
2016. The forest contains 2,000 client computers that run Windows 10. All client computers are deployed
from a customized Windows image.
You need to deploy 10 Privileged Access Workstations (PAWs). The solution must ensure that
administrators can access several client applications used by all users.
Solution: You deploy one physical computer and configure it as Hyper-V host that runs Windows Server
2016. You create 10 virtual machines and configure each one as a PAW.
A. Yes
B. No
Correct Answer: B
Section: (none)
Explanation
E6E3AB02065076CC5F9A13BC334734DE
Explanation/Reference:
Explanation:
References:
https://technet.microsoft.com/en-us/windows-server-docs/security/securing-privileged-access/privileged-
access-workstations
QUESTION 3
Note: This question is part of a series of questions that present the same scenario. Each question in the
series contains a unique solution that might meet the stated goals. Some question sets might have more
than one correct solution, while others might not have a correct solution.
After you answer a question in this sections, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
Your network contain an Active Directory domain named contoso.com. The domain contains a computer
named Computer1 that runs Windows 10. Computer1 connects to a home network and a corporate
network.
You need to prevent connections to App1 when Computer1 is connected to the home network.
A. Yes
B. No
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
References:
https://technet.microsoft.com/en-us/library/dd759068(v=ws.11).aspx
QUESTION 4
Note: This question is part of a series of questions that present the same scenario. Each question in the
series contains a unique solution that might meet the stated goals. Some question sets might have more
than one correct solution, while others might not have a correct solution.
After you answer a question in this sections, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
Your network contain an Active Directory domain named contoso.com. The domain contains a computer
named Computer1 that runs Windows 10. Computer1 connects to a home network and a corporate
network.
You need to prevent connections to App1 when Computer1 is connected to the home network.
Solution: From Group Policy Management, you create software restriction policy.
E6E3AB02065076CC5F9A13BC334734DE
A. Yes
B. No
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
References:
https://technet.microsoft.com/en-us/library/hh831534(v=ws.11).aspx
QUESTION 5
Note: This question is part of a series of questions that present the same scenario. Each question in the
series contains a unique solution that might meet the stated goals. Some question sets might have more
than one correct solution, while others might not have a correct solution.
After you answer a question in this sections, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server
2016. All client computers run Windows 10.
The relevant objects in the domain are configured as shown in the following table.
You need to assign User1 the right to restore files and folders on Server1 and Server2.
Solution: You create a Group Policy object (GPO), you link the GPO to the Servers OU, and then you
modify the Users Rights Assignment in the GPO.
A. Yes
B. No
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
References:
https://technet.microsoft.com/en-us/library/cc771990(v=ws.11).aspx
QUESTION 6
Note: This question is part of a series of questions that present the same scenario. Each question in the
series contains a unique solution that might meet the stated goals. Some question sets might have more
than one correct solution, while others might not have a correct solution.
After you answer a question in this sections, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server
E6E3AB02065076CC5F9A13BC334734DE
2016. All client computers run Windows 10.
The relevant objects in the domain are configured as shown in the following table.
You need to assign User1 the right to restore files and folders on Server1 and Server2.
A. Yes
B. No
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
References:
https://technet.microsoft.com/en-us/library/cc771990(v=ws.11).aspx
QUESTION 7
Note: This question is part of a series of questions that present the same scenario. Each question in the
series contains a unique solution that might meet the stated goals. Some question sets might have more
than one correct solution, while others might not have a correct solution.
After you answer a question in this sections, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server
2016. All client computers run Windows 10.
The relevant objects in the domain are configured as shown in the following table.
You need to assign User1 the right to restore files and folders on Server1 and Server2.
Solution: You create a Group Policy object (GPO), link it to the Operations Users OU, and modify the Users
Rights Assignment in the GPO.
A. Yes
B. No
Correct Answer: B
E6E3AB02065076CC5F9A13BC334734DE
Section: (none)
Explanation
Explanation/Reference:
Explanation:
References:
https://technet.microsoft.com/en-us/library/cc771990(v=ws.11).aspx
QUESTION 8
Note: This question is part of a series of questions that present the same scenario. Each question in the
series contains a unique solution that might meet the stated goals. Some question sets might have more
than one correct solution, while others might not have a correct solution.
After you answer a question in this sections, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
Your network contains an Active Directory domain named contoso.com. The domain contains multiple
Hyper-V hosts.
You need to deploy several critical line-of-business applications to the network to meet the following
requirements:
The resources of the applications must be isolated from the physical host.
Each application must be prevented from accessing the resources of the other applications.
The configurations of the applications must be accessible only from the operating system that hosts the
application.
A. Yes
B. No
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
References:
https://docs.microsoft.com/en-us/virtualization/windowscontainers/about/
QUESTION 9
Note: This question is part of a series of questions that present the same scenario. Each question in the
series contains a unique solution that might meet the stated goals. Some question sets might have more
than one correct solution, while others might not have a correct solution.
After you answer a question in this sections, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
Your network contains an Active Directory domain named contoso.com. The domain contains multiple
Hyper-V hosts.
You need to deploy several critical line-of-business applications to the network to meet the following
requirements:
The resources of the applications must be isolated from the physical host.
Each application must be prevented from accessing the resources of the other applications.
The configurations of the applications must be accessible only from the operating system that hosts the
application.
E6E3AB02065076CC5F9A13BC334734DE
Does this meet the goal?
A. Yes
B. No
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
References:
https://docs.microsoft.com/en-us/virtualization/windowscontainers/about/
QUESTION 10
Your network contains an Active Directory forest named contoso.com. The forest functional level is
Windows Server 2012. All servers run Windows Server 2016.
You create a new bastion forest named admin.contoso.com. The forest functional level of
admin.contoso.com is Windows Server 2012 R2.
Which two actions should you perform? Each correct answer presents part of the solution.
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
Explanation:
References:
https://docs.microsoft.com/en-us/microsoft-identity-manager/pam/hardware-software-requirements
https://docs.microsoft.com/en-us/microsoft-identity-manager/pam/planning-bastion-environment
QUESTION 11
Your network contains an Active Directory domain named contoso.com. The domain contains two servers
named Server1 and Server2 that run Windows Server 2016.
You configure Server1 as a Just Enough Administration (JEA) endpoint. You configure the required JEA
rights for a user named User1.
You need to tell User1 how to manage Active Directory objects from Server2.
E6E3AB02065076CC5F9A13BC334734DE
C. From Windows PowerShell, run the Enter-PSSession cmdlet.
D. Install the management consoles for Active Directory, and then launch Active Directory Users and
Computers.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
References:
https://blogs.technet.microsoft.com/privatecloud/2014/05/14/just-enough-administration-step-by-step/
QUESTION 12
Your network contains an Active Directory domain named contoso.com. The domain contains 100 servers.
You deploy the Local Administrator Password Solution (LAPS) to the network.
You deploy a new server named FinanceServer5, and join FinanceServer5 to the domain.
You need to ensure that the passwords of the local administrators of FinanceServer5 are available to the
LAPS administrators.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
References:
https://gallery.technet.microsoft.com/Step-by-Step-Deploy-Local-7c9ef772
QUESTION 13
Your network contains an Active Directory domain named contoso.com. The domain contains four servers.
The servers are configured as shown in the following table.
You need to manage FS1 and FS2 by using Just Enough Administration (JEA).
E6E3AB02065076CC5F9A13BC334734DE
C. Install Windows Management Framework 5.0 on FS2.
D. Upgrade DC1 to Windows Server 2016.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
References:
https://blogs.technet.microsoft.com/privatecloud/2014/05/14/just-enough-administration-step-by-step/
QUESTION 14
Your network contains an Active Directory domain named contoso.com. The domain contains five servers.
All servers run Windows Server 2016.
A new security policy states that you must modify the infrastructure to meet the following requirements:
Limit the rights of administrators.
Minimize the attack surface of the forest.
Support Multi-Factor authentication for administrators.
You need to recommend a solution that meets the new security policy requirements.
A. an administrative forest
B. domain isolation
C. an administrative domain in contoso.com
D. the Local Administrator Password Solution (LAPS)
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
References:
https://docs.microsoft.com/en-us/windows-server/identity/securing-privileged-access/securing-privileged-
access-reference-material#ESAE_BM
QUESTION 15
Your network contains two single-domain Active Directory forests named contoso.com and
contosoadmin.com. Contosoadmin.com contains all of the user accounts used to manage the servers in
contoso.com.
You need to recommend a workstation solution that provides the highest level of protection from
vulnerabilities and attacks.
A. Provide a Privileged Access Workstation (PAW) for each user account in both forests. Join each PAW
to the contoso.com domain.
B. Provide a Privileged Access Workstation (PAW) for each user in the contoso.com forest. Join each
PAW to the contoso.com domain.
C. Provide a Privileged Access Workstation (PAW) for each administrator. Join each PAW to the
contoso.com domain.
D. Provide a Privileged Access Workstation (PAW) for each administrator. Join each PAW to the
contosoadmin.com domain.
E6E3AB02065076CC5F9A13BC334734DE
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
References:
https://docs.microsoft.com/en-us/windows-server/identity/securing-privileged-access/privileged-access-
workstations
QUESTION 16
Your network contains an Active Directory domain named contoso.com. All domain controllers run
Windows Server 2016.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
E6E3AB02065076CC5F9A13BC334734DE
References:
https://anytecho.wordpress.com/2015/05/22/importing-group-policies-using-powershell-almost/
QUESTION 17
Your network contains an Active Directory domain named contoso.com. The domain contains a server
named Server1 that runs Windows Server 2016.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
References: https://yungchou.wordpress.com/2016/10/10/credential-guard-made-easy-in-windows-10-
version-1607/
QUESTION 18
Your network contains an Active Directory domain named contoso.com. The domain contains a server
named Server5 that has the Windows Server Update Services server role installed.
You need to configure Windows Server Update Services (WSUS) on Server5 to use SSL.
Which two tools should you use? Each correct answer presents part of the solution.
A. Wsusutil
B. Netsh
C. Internet Information Services (IIS) Manager
D. Server Manager
E. Update Services
Correct Answer: AE
Section: (none)
Explanation
Explanation/Reference:
Explanation:
References:
https://technet.microsoft.com/en-us/library/hh852346(v=ws.11).aspx#bkmk_3.5.ConfigSSL
QUESTION 19
Your network contains an Active Directory domain named contoso.com. The domain contains 1,000 client
computers that run Windows 8.1 and 1,000 client computers that run Windows 10.
E6E3AB02065076CC5F9A13BC334734DE
You deploy a Windows Server Update Services (WSUS) server. You create a computer group for each
organizational unit (OU) that contains client computers. You configure all of the client computers to receive
updates from WSUS.
You discover that all of the client computers appear in the Unassigned Computers computer group in the
Update Services console.
You need to ensure that the client computers are added automatically to the computer group that
corresponds to the location of the computer account in Active Directory.
Which two actions should you perform? Each correct answer presents part of the solution.
A. From Group Policy objects (GPOs), configure the Enable client-side targeting setting.
B. From the Update Services console, configure the Computers option.
C. From Active Directory Users and Computers, create a domain local distribution group for each WSUS
computer group.
D. From Active Directory Users and Computers, modify the flags attribute of each OU.
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
Explanation:
References:
https://technet.microsoft.com/en-us/library/dd252762.aspx
https://technet.microsoft.com/en-us/library/cc720433(v=ws.10).aspx
QUESTION 20
Note: This question is part of a series of questions that use the same or similar answer choices. An answer
choice may be correct for more than one question in the series. Each question is independent of the other
questions in this series. Information and details provided in a question apply only to that question.
Your network contains an Active Directory domain named contoso.com. The domain contains a server
named Server1 that runs Windows Server 2016.
A. File Explorer
B. Shared Folders
C. Server Manager
D. Disk Management
E. Storage Explorer
F. Computer Management
G. System Configuration
H. File Server Resource Manager (FSRM)
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
E6E3AB02065076CC5F9A13BC334734DE
References:
https://docs.microsoft.com/en-us/windows-server/identity/solution-guides/deploy-a-central-access-policy--
demonstration-steps-#BKMK_1.4
QUESTION 21
Note: This question is part of a series of questions that use the same or similar answer choices. An answer
choice may be correct for more than one question in the series. Each question is independent of the other
questions in this series. Information and details provided in a question apply only to that question.
Your network contains an Active Directory domain named contoso.com. The domain contains a server
named Server1 that runs Windows Server 2016.
A. File Explorer
B. Shared Folders
C. Server Manager
D. Disk Management
E. Storage Explorer
F. Computer Management
G. System Configuration
H. File Server Resource Manager (FSRM)
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
References:
https://msdn.microsoft.com/en-us/library/dd163562.aspx
QUESTION 22
Note: This question is part of a series of questions that use the same or similar answer choices. An answer
choice may be correct for more than one question in the series. Each question is independent of the other
questions in this series. Information and details provided in a question apply only to that question.
Your network contains an Active Directory domain named contoso.com. The domain contains a server
named Server1 that runs Windows Server 2016.
You need to ensure that all access to Share1 uses SMB Encryption.
A. File Explorer
B. Shared Folders
C. Server Manager
D. Disk Management
E. Storage Explorer
F. Computer Management
E6E3AB02065076CC5F9A13BC334734DE
G. System Configuration
H. File Server Resource Manager (FSRM)
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
References:
https://support.microsoft.com/en-za/help/2696547/how-to-enable-and-disable-smbv1,-smbv2,-and-smbv3-
in-windows-vista,-windows-server-2008,-windows-7,-windows-server-2008-r2,-windows-8,-and-windows-
server-2012
https://blogs.technet.microsoft.com/filecab/2012/05/03/smb-3-security-enhancements-in-windows-server-
2012/
QUESTION 23
Note: This question is part of a series of questions that use the same or similar answer choices. An answer
choice may be correct for more than one question in the series. Each question is independent of the other
questions in this series. Information and details provided in a question apply only to that question.
Your network contains an Active Directory domain named contoso.com. The domain contains a server
named Server1 that runs Windows Server 2016.
Dynamic Access Control is configured. A resource property named Property1 was created in the domain.
You need to ensure that Property1 is set to a value of Big for all of the files in Volume1 that are larger than
10 MB.
A. File Explorer
B. Shared Folders
C. Server Manager
D. Disk Management
E. Storage Explorer
F. Computer Management
G. System Configuration
H. File Server Resource Manager (FSRM)
Correct Answer: H
Section: (none)
Explanation
Explanation/Reference:
Explanation:
References:
https://technet.microsoft.com/en-us/library/cc732431(v=ws.11).aspx
QUESTION 24
Note: This question is part of a series of questions that use the same scenario. For your convenience, the
scenario is repeated in each question. Each question presents a different goal and answer choices, but the
text of the scenario is exactly the same in each question in this series.
Your network contains an Active Directory domain named contoso.com. The functional level of the forest
and the domain is Windows Server 2008 R2.
E6E3AB02065076CC5F9A13BC334734DE
The domain contains the servers configured as shown in the following table.
All servers run Windows Server 2016. All client computers run Windows 10.
You have an organizational unit (OU) named Marketing that contains the computers in the marketing
department. You have an OU named Finance that contains the computers in the finance department. You
have an OU named AppServers that contains application servers. A Group Policy object (GPO) named
GP1 is linked to the Marketing OU. A GPO named GP2 is linked to the AppServers OU.
You need to execute D:\Folder1 on Nano1 from being scanned by Windows Defender.
A. Set-StorageSetting
B. Set-FsrmFileScreenException
C. Set-MpPreference
D. Set-DtcAdvancedSetting
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
References:
http://www.thomasmaurer.ch/2016/07/how-to-disable-and-configure-windows-defender-on-windows-server-
2016-using-powershell/
QUESTION 25
Note: This question is part of a series of questions that use the same scenario. For your convenience, the
scenario is repeated in each question. Each question presents a different goal and answer choices, but the
text of the scenario is exactly the same in each question in this series.
Your network contains an Active Directory domain named contoso.com. The functional level of the forest
and the domain is Windows Server 2008 R2.
The domain contains the servers configured as shown in the following table.
E6E3AB02065076CC5F9A13BC334734DE
All servers run Windows Server 2016. All client computers run Windows 10.
You have an organizational unit (OU) named Marketing that contains the computers in the marketing
department. You have an OU named Finance that contains the computers in the finance department. You
have an OU named AppServers that contains application servers. A Group Policy object (GPO) named
GP1 is linked to the Marketing OU. A GPO named GP2 is linked to the AppServers OU.
Which setting should you configure in the Computer Configuration node of GP1?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
References:
https://technet.microsoft.com/en-us/library/ee649182(v=ws.10).aspx
QUESTION 26
Note: This question is part of a series of questions that use the same scenario. For your convenience, the
scenario is repeated in each question. Each question presents a different goal and answer choices, but the
text of the scenario is exactly the same in each question in this series.
Your network contains an Active Directory domain named contoso.com. The functional level of the forest
and the domain is Windows Server 2008 R2.
The domain contains the servers configured as shown in the following table.
All servers run Windows Server 2016. All client computers run Windows 10.
E6E3AB02065076CC5F9A13BC334734DE
You have an organizational unit (OU) named Marketing that contains the computers in the marketing
department. You have an OU named Finance that contains the computers in the finance department. You
have an OU named AppServers that contains application servers. A Group Policy object (GPO) named
GP1 is linked to the Marketing OU. A GPO named GP2 is linked to the AppServers OU.
You need to ensure that you can deploy a shielded virtual machine to Server4.
A. Hyper-V
B. Device Health Attestation
C. Network Controller
D. Host Guardian Service
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
References:
https://blogs.technet.microsoft.com/datacentersecurity/2016/03/16/windows-server-2016-and-host-
guardian-service-for-shielded-vms/
QUESTION 27
Note: This question is part of a series of questions that use the same scenario. For your convenience, the
scenario is repeated in each question. Each question presents a different goal and answer choices, but the
text of the scenario is exactly the same in each question in this series.
Your network contains an Active Directory domain named contoso.com. The functional level of the forest
and the domain is Windows Server 2008 R2.
The domain contains the servers configured as shown in the following table.
All servers run Windows Server 2016. All client computers run Windows 10.
You have an organizational unit (OU) named Marketing that contains the computers in the marketing
department. You have an OU named Finance that contains the computers in the finance department. You
have an OU named AppServers that contains application servers. A Group Policy object (GPO) named
GP1 is linked to the Marketing OU. A GPO named GP2 is linked to the AppServers OU.
You plan to implement BitLocker Drive Encryption (BitLocker) on the operating system volumes of the
application servers.
E6E3AB02065076CC5F9A13BC334734DE
You need to ensure that the BitLocker recovery keys are stored in Active Directory.
A. System cryptography: Force strong key protection for user keys stored on the computer
B. Store BitLocker recovery information in Active Directory Domain Services (Windows Server 2008 and
Windows Vista)
C. System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing.
D. Choose how BitLocker-protected operating system drives can be recovered.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
References:
https://technet.microsoft.com/en-us/library/jj679890(v=ws.11).aspx#BKMK_rec3
QUESTION 28
Your network contains an Active Directory domain named contoso.com.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 29
Your network contains an Active Directory domain named contoso.com.
Which two pieces of information do you require? Each correct answer presents part of the solution.
Correct Answer: AD
Section: (none)
Explanation
E6E3AB02065076CC5F9A13BC334734DE
Explanation/Reference:
Explanation:
References:
https://docs.microsoft.com/en-us/azure/log-analytics/log-analytics-windows-agents
QUESTION 30
Your network contains an Active Directory domain named contoso.com. The domain contains five file
servers that run Windows Server 2016.
You have an organizational unit (OU) named Finance that contains all of the servers.
You create a Group Policy object (GPO) and link the GPO to the Finance OU.
You need to ensure that when a user in the finance department deletes a file from a file server, the event is
logged. The solution must log only users who have a manager attribute of Ben Smith.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
References:
https://technet.microsoft.com/en-us/library/cc976403.aspx
QUESTION 31
Your network contains an Active Directory domain named contoso.com. The domain contains a server
named Server1 that runs Windows Server 2016.
You have an organizational unit (OU) named Administration that contains the computer account of Server1.
You create a Group Policy object (GPO) named GPO1. You link GPO1 to the Administration OU.
You need to log an event each time an Active Directory cmdlet is executed successfully from Server1.
A. From Advanced Audit Policy in GPO1, configure auditing for directory service changes.
B. Run the(Get-Module ActiveDirectory).LogPipelineExecutionDetails = $falsecommand.
C. Run the(Get-Module ActiveDirectory).LogPipelineExecutionDetails = $truecommand.
D. From Advanced Audit Policy in GPO1, configure for other privilege use events.
E. From Administrative Templates in GPO1, configure an Event Logging policy.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
E6E3AB02065076CC5F9A13BC334734DE
Explanation:
References:
https://www.petri.com/enable-powershell-logging
QUESTION 32
Your network contains an Active Directory forest named contoso.com.
You have 100 point-of-sale (POS) devices that run Windows 10. The devices cannot access the Internet.
You need to use OMS to collect and analyze data from the POS devices.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
References:
https://blogs.technet.microsoft.com/msoms/2016/03/17/oms-log-analytics-forwarder/
QUESTION 33
Your network contains an Active Directory forest named contoso.com. The forest functional level is
Windows Server 2012. The forest contains a single domain. The domain contains multiple Hyper-V hosts.
What should you do before you initialize the Host Guardian Service on Server22?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
References:
https://docs.microsoft.com/en-us/windows-server/virtualization/guarded-fabric-shielded-vm/guarded-fabric-
E6E3AB02065076CC5F9A13BC334734DE
prepare-for-hgs#prerequisites-for-the-host-guardian-service
QUESTION 34
Note: This question is part of a series of questions that present the same scenario. Each question
in the series contains a unique solution that might meet the stated goals. Some question sets
might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this sections, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You network contains an Active Directory forest named contoso.com. All domain controllers run Windows
Server 2016. Member servers run either Windows Server 2012 R2 or Windows Server 2016. Client
computers run either Windows 8.1 or Windows 10.
You need to ensure that when users access files in shared folders on the network, the files are encrypted
when they are transferred over the network.
Solution: You disable SMB 1.0 on all the computers in the domain, and then you enable the Encrypt data
access option on each file share.
A. Yes
B. No
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 35
Note: This question is part of a series of questions that present the same scenario. Each question
in the series contains a unique solution that might meet the stated goals. Some question sets
might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this sections, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You network contains an Active Directory forest named contoso.com. All domain controllers run Windows
Server 2016. Member servers run either Windows Server 2012 R2 or Windows Server 2016. Client
computers run either Windows 8.1 or Windows 10.
You need to ensure that when users access files in shared folders on the network, the files are encrypted
when they are transferred over the network.
A. Yes
B. No
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 36
E6E3AB02065076CC5F9A13BC334734DE
Note: This question is part of a series of questions that present the same scenario. Each question
in the series contains a unique solution that might meet the stated goals. Some question sets
might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this sections, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You need to ensure that you can run Windows Containers on Server1.
Solution: On Server1, you enable the Containers feature, and then you install the PowerShell for Docker
module. You restart the server.
A. Yes
B. No
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
References: https://docs.microsoft.com/en-us/virtualization/windowscontainers/deploy-containers/deploy-
containers-on-server
QUESTION 37
Note: This question is part of a series of questions that present the same scenario. Each question
in the series contains a unique solution that might meet the stated goals. Some question sets
might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this sections, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You deploy Windows Server 2016 to a server named Server1.
You need to ensure that you can run Windows Containers on Server1.
Solution: On Server1, you enable the Containers feature, and then you install the Hyper-V server role. You
restart the server.
A. Yes
B. No
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
References: https://docs.microsoft.com/en-us/virtualization/windowscontainers/deploy-containers/deploy-
containers-on-server
QUESTION 38
Note: This question is part of a series of questions that present the same scenario. Each question
in the series contains a unique solution that might meet the stated goals. Some question sets
might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this sections, you will NOT be able to return to it. As a result, these
E6E3AB02065076CC5F9A13BC334734DE
questions will not appear in the review screen.
You need to ensure that you can run Windows Containers on Server1.
Solution: On Server1, you enable the Containers feature, and then you restart the server.
A. Yes
B. No
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
References: https://docs.microsoft.com/en-us/virtualization/windowscontainers/deploy-containers/deploy-
containers-on-server
QUESTION 39
Note: This question is part of a series of questions that present the same scenario. Each question
in the series contains a unique solution that might meet the stated goals. Some question sets
might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this sections, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
Your network contains an Active Directory domain named contoso.com. The domain contains a server
named Server1 that runs Windows Server 2016.
A. Yes
B. No
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
References: https://www.rootusers.com/implement-ntlm-blocking-in-windows-server-2016/
QUESTION 40
Note: This question is part of a series of questions that use the same or similar answer choices. An
answer choice may be correct for more than one question in the series. Each question is
independent of the other questions in this series. Information and details provided in a question
apply only to that question.
Your network contains an Active Directory domain named contoso.com. The domain contains a file server
named Server1 that runs Windows Server 2016.
E6E3AB02065076CC5F9A13BC334734DE
You need to limit each user to using 100 MB of data in their respective subfolder. The solution must enable
the users to be notified when they use 80 percent of the available space in the subfolder.
A. File Explorer
B. Shared Folders
C. Server Manager
D. Disk Management
E. Storage Explorer
F. Computer Management
G. System Configuration
H. File Server Resource Manager (FSRM)
Correct Answer: H
Section: (none)
Explanation
Explanation/Reference:
References: https://4sysops.com/archives/file-server-resource-manager-fsrm-part-3-quota-management/
QUESTION 41
You are creating a Nano Server image for the deployment of 10 servers.
You need to configure the servers as guarded hosts that use Trusted Platform Module (TPM) attestation.
Which three packages should you include in the Nano Server image? Each correct answer presents part of
the solution.
A. Microsoft-NanoServer-SCVMM-Compute-Package
B. Microsoft-NanoServer-SecureStartup-Package
C. Microsoft-NanoServer-Compute-Package
D. Microsoft-NanoServer-ShieldedVM-Package
E. Microsoft-NanoServer-Storage-Package
F. Microsoft-NanoServer-SCVMM- Package
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/system-center/vmm/guarded-deploy-host?toc=/windows-server/
virtualization/
https://docs.microsoft.com/en-us/windows-server/get-started/deploy-nano-server
QUESTION 42
Your network contains an Active Directory domain named contoso.com. The domain contains several
shielded virtual machines.
You deploy a new server named Server1 that runs Windows Server 2016.
You need to ensure that you can host shielded virtual machines on Server1.
E6E3AB02065076CC5F9A13BC334734DE
A. Host Guardian Hyper-V Support
B. the Windows Biometric Framework (WBF)
C. VM Shielding Tools for Fabric Management
D. BitLocker Network Unlock
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
References: https://docs.microsoft.com/en-us/windows-server/security/guarded-fabric-shielded-vm/
guarded-fabric-guarded-host-prerequisites
QUESTION 43
Note: This question is part of a series of questions that use the same scenario. For your
convenience, the scenario is repeated in each question. Each question presents a different goal
and answer choices, but the text of the scenario is exactly the same in each question in this series.
The network contains an Active Directory domain named contoso.com. The domain contains the servers
configured as shown in the following table.
All servers run Windows Server 2016. All client computers run Windows 10 and are domain members. All
laptops are protected by using BitLocker Drive Encryption (BitLocker).
You have an organizational unit (OU) named OU1 that contains the computer accounts of application
servers. An OU named OU2 contains the computer accounts of the computers in the marketing
department. A Group Policy object (GPO) named GP1 is linked to OU1. A GPO named GP2 is linked to
OU2.
All computers receive updates from Server1. You create an update rule named Update1.
In which event log will PowerShell code that is generated dynamically appear?
E6E3AB02065076CC5F9A13BC334734DE
C. Applications and Services Logs/Microsoft/Windows/PowerShell/Operational
D. Windows Logs/Application
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/powershell/scripting/wmf/whats-new/script-logging?view=powershell-7
QUESTION 44
Note: This question is part of a series of questions that use the same scenario. For your
convenience, the scenario is repeated in each question. Each question presents a different goal
and answer choices, but the text of the scenario is exactly the same in each question in this series.
The network contains an Active Directory domain named contoso.com. The domain contains the servers
configured as shown in the following table.
All servers run Windows Server 2016. All client computers run Windows 10 and are domain members. All
laptops are protected by using BitLocker Drive Encryption (BitLocker).
You have an organizational unit (OU) named OU1 that contains the computer accounts of application
servers. An OU named OU2 contains the computer accounts of the computers in the marketing
department. A Group Policy object (GPO) named GP1 is linked to OU1. A GPO named GP2 is linked to
OU2.
All computers receive updates from Server1. You create an update rule named Update1.
You need to create a Role Capability file on Server3. Which file should you create?
A. File1.ini
B. File1.ps1
C. File1.xml
D. File1.psrc
Correct Answer: D
Section: (none)
E6E3AB02065076CC5F9A13BC334734DE
Explanation
Explanation/Reference:
References: https://docs.microsoft.com/en-us/powershell/scripting/learn/remoting/jea/role-capabilities?
view=powershell-7
QUESTION 45
Note: This question is part of a series of questions that use the same scenario. For your
convenience, the scenario is repeated in each question. Each question presents a different goal
and answer choices, but the text of the scenario is exactly the same in each question in this series.
The network contains an Active Directory domain named contoso.com. The domain contains the servers
configured as shown in the following table.
All servers run Windows Server 2016. All client computers run Windows 10 and are domain members. All
laptops are protected by using BitLocker Drive Encryption (BitLocker).
You have an organizational unit (OU) named OU1 that contains the computer accounts of application
servers. An OU named OU2 contains the computer accounts of the computers in the marketing
department. A Group Policy object (GPO) named GP1 is linked to OU1. A GPO named GP2 is linked to
OU2.
You need to implement BitLocker Network Unlock for all of the laptops. Which server role should you
deploy to the network?
Correct Answer: C
Section: (none)
Explanation
E6E3AB02065076CC5F9A13BC334734DE
Explanation/Reference:
References: https://docs.microsoft.com/en-us/windows/device-security/bitlocker/bitlocker-how-to-enable-
network-unlock
QUESTION 46
Your network contains an Active Directory domain named contoso.com. The domain contains a certification
authority (CA).
You need to implement code integrity policies and sign them by using certificates issued by the CA.
You plan to use the same certificate to sign policies on multiple computers.
You duplicate the Code Signing certificate template and name the new template CodeIntegrity.
A. Enable the Allow private key to be exported setting and modify the Key Usage extension.
B. Disable the Allow private key to be exported setting and modify the Application Policies extension.
C. Disable the Allow private key to be exported setting and disable the Basic Constraints extension.
D. Enable the Allow private key to be exported setting and enable the Basic Constraints extension
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
References: https://blogs.technet.microsoft.com/ukplatforms/2017/05/04/create-code-integrity-signing-
certificate/
QUESTION 47
Your network contains an Active Directory domain named contoso.com. The domain contains 100 servers.
You deploy the Local Administrator Password Solution (LAPS) to the network.
You discover that the members of a group named FinanceAdministartors can view the password of the
local Administrator accounts on the servers in an organizational unit (OU) named FinanceServers.
You need to prevent the FinanceAdministartors members from viewing the local administrators ‘passwords
on the servers in FinanceServers. Which permission should you remove from FinanceAdministartors?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
References: https://4sysops.com/archives/set-up-microsoft-laps-local-administrator-password-solution-in-
active-directory/
QUESTION 48
Your network contains an Active Directory Domain named contoso.com. The domain contains 10 servers
that run Windows Server 2016 and 800 client computers that run Windows 10.
Users must be locked out from their computer if they enter an incorrect password twice.
E6E3AB02065076CC5F9A13BC334734DE
Users must only be able to unlock a locked account by using a one-time password that is sent to their
mobile phone.
You deploy all the components of Microsoft Identity Manager (MIM) 2016.
Which three actions should you perform before you deploy the MIM add-ins and extensions? Each correct
answer presents part of the solution.
A. Deploy a Multi-Factor Authentication provider and copy the required certificates to the MIM server.
B. From a Group Policy object (GPO), configure Public Key Policies.
C. From the MIM Portal, configure the Owner Approval Workflow.
D. Deploy a Multi-Factor Authentication provider and copy the required certificates to the client computers.
E. From the MIM Portal, configure the Password Reset AuthN Workflow.
F. From a Group Policy object (GPO), configure Security Settings.
Explanation/Reference:
References: https://docs.microsoft.com/en-us/microsoft-identity-manager/working-with-self-service-
password-reset
QUESTION 49
You have a file server named FS1 that runs Windows Server 2016.
You need to verify which computers access FS1 by using SMB 1.0.
A. Debug-FileShare
B. Set-FileShare
C. Set-SmbShare
D. Set-SmbServerConfiguration
E. Set-SmbClientConfiguration
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 50
Your network contains an Active Directory domain named contoso.com. The domain contains domain
controllers that run Windows Server 2016.
A Group Policy object (GPO) named GPO1 is applied to all of the domain controllers. GPO1 has a Globally
Unique Identifier (GUID) of 6AC1786C-016F-11D2-945F-00C04fB984F9.
You need to create a new baseline that contains the settings from GPO1.
E6E3AB02065076CC5F9A13BC334734DE
C. From Microsoft Security Compliance Manager, associate a baseline.
D. From Windows PowerShell, run the Save-NetGPO cmdlet.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Reference:
https://technet.microsoft.com/en-us/library/hh489604.aspx
QUESTION 51
You plan to enable Credential Guard on four servers. Credential Guard secrets will be bound to the TPM.
The servers run Windows Server 2016 and are configured as shown in the following table.
You need to identify which server you must modify to support the planned implementation.
A. Server1
B. Server2
C. Server3
D. Server4
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
References: https://docs.microsoft.com/en-us/windows/access-protection/credential-guard/credential-
guard-requirements
QUESTION 52
Your network contains an Active Directory domain named contoso.com. The domain contains two servers
named Server1 and Server2. The domain has Dynamic Access Control enabled.
You need to audit all access to the contents of Folder1 from Server2. The solution must minimize the
number of event log entries.
Which two audit policies should you enable on Server1? Each correct answer presents part of the solution.
E6E3AB02065076CC5F9A13BC334734DE
B. Object Access – Audit Detailed File Share
C. Object Access – Audit Other Object Access Events
D. Object Access – Audit File System
E. Object Access – Audit File Share
Correct Answer: BE
Section: (none)
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-detailed-file-share
https://docs.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-file-share
QUESTION 53
You implement Just Enough Administration (JEA) on several file servers that run Windows Server 2016.
The Role Capability file from a server named Server5 contains the following code.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/powershell/scripting/learn/remoting/jea/role-capabilities?view=powershell-
7
https://technet.microsoft.com/en-us/itpro/powershell/windows/smbshare/set-smbshare
QUESTION 54
Note: This question is part of a series of questions that present the same scenario. Each question
in the series contains a unique solution that might meet the stated goals. Some question sets
might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this sections, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
Your network contains an Active Directory domain named contoso.com. The domain contains a computer
named Computer1 that runs Windows10.
E6E3AB02065076CC5F9A13BC334734DE
Computer1 has an application named App1.exe that is located in D:\Apps\. App1.exe is configured to
accept connections on TCP port 8080.
You need to ensure that App1.exe can accept connections only when Computer1 is connected to the
corporate network.
A. Yes
B. No
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 55
Note: This question is part of a series of questions that present the same scenario. Each question
in the series contains a unique solution that might meet the stated goals. Some question sets
might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this sections, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
Your network contains an Active Directory domain named contoso.com. The domain contains a computer
named Computer1 that runs Windows10.
Computer1 has an application named App1.exe that is located in D:\Apps\. App1.exe is configured to
accept connections on TCP port 8080.
You need to ensure that App1.exe can accept connections only when Computer1 is connected to the
corporate network.
A. Yes
B. No
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
E6E3AB02065076CC5F9A13BC334734DE
QUESTION 56
Note: This question is part of a series of questions that present the same scenario. Each question
in the series contains a unique solution that might meet the stated goals. Some question sets
might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this sections, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
Your network contains an Active Directory domain named contoso.com. The domain contains a server
named Server1 that runs Windows Server 2016.
A. Yes
B. No
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
References: https://www.rootusers.com/implement-ntlm-blocking-in-windows-server-2016/
E6E3AB02065076CC5F9A13BC334734DE
QUESTION 57
Note: This question is part of a series of questions that present the same scenario. Each question
in the series contains a unique solution that might meet the stated goals. Some question sets
might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this sections, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You manage a file server that runs Windows Server 2016. The file server contains the volumes configured
as shown in the following table.
A. Yes
B. No
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
References: https://docs.microsoft.com/en-us/powershell/module/bitlocker/lock-bitlocker?view=win10-ps
QUESTION 58
Note: This question is part of a series of questions that present the same scenario. Each question
in the series contains a unique solution that might meet the stated goals. Some question sets
might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this sections, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You manage a file server that runs Windows Server 2016. The file server contains the volumes configured
as shown in the following table.
E6E3AB02065076CC5F9A13BC334734DE
You need to encrypt DevFiles by using BitLocker Drive Encryption (BitLocker).
Solution: You run the manage-bde.exe command and specify the –on parameter.
A. Yes
B. No
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
References: https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/
manage-bde-on
QUESTION 59
You have a guarded fabric and a Host Guardian Service server named HGS1.
You deploy a Hyper-V host named Hyper1, and configure Hyper1 as part of the guarded fabric.
You need to ensure that you can run the virtual machine on Hyper1.
A. On HGS1, run the Export-HgsKeyProtectionState cmdlet, and then run the Import-HgsGuardian
cmdlet.
B. On Hyper1, run the Invoke-WebRequest cmdlet, and then run the Import-HgsGuardian cmdlet.
C. On the virtual machine, retrieve the metadata of the guarded fabric, and then import the metadata.
D. On Hyper1, run the Export-HgsKeyProtectionState cmdlet, and then run the Import-HgsGuardian
cmdlet.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
References: https://blogs.technet.microsoft.com/datacentersecurity/2016/06/06/step-by-step-creating-
shielded-vms-without-vmm/
QUESTION 60
You are building a guarded fabric.
A. Add-HgsAttestationHostGroup
B. Add-HgsAttestationTpmPolicy
C. Add-HgsAttestationTpmHost
D. Add-HgsAttestationCIPolicy
Correct Answer: A
Section: (none)
Explanation
E6E3AB02065076CC5F9A13BC334734DE
Explanation/Reference:
References: https://docs.microsoft.com/en-us/windows-server/virtualization/guarded-fabric-shielded-vm/
guarded-fabric-add-host-information-for-admin-trusted-attestation
QUESTION 61
Your network contains an Active Directory domain named contoso.com. The domain contains a server
named Server1 that runs Windows Server 2016.
You need to allow network administrators to use Just Enough Administration (JEA) to change the TCP/IP
settings on Server1. The solution must use the principle of least privilege.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
References: https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.core/new-
pssessionconfigurationfile?view=powershell-6
QUESTION 62
Your network contains an Active Directory domain named contoso.com.
You download Microsoft Security Compliance Toolkit 1.0 and all the security baselines.
You need to deploy one of the security baselines to all the computers in an organizational unit (OU) named
OU1.
A. Run 1gpo.exe and specify the /g parameter. From Policy Analyzer, click Add.
B. From Group Policy Management, create and link a Group Policy object (GPO). Select the GPO and run
the Import Settings Wizard.
C. From Group Policy Management, click Group Policy Objects, and then click Manage Backups…
D. From Group Policy Management, create and link a Group Policy object (GPO). Run 1gpo.exe and
specify the /g parameter.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/deployment/distribute-certificates-to-client-
computers-by-using-group-policy
QUESTION 63
You have a virtual machine named FS1 that runs Windows Server 2016.
E6E3AB02065076CC5F9A13BC334734DE
FS1 has the shared folders shown in the following table.
You need to ensure that each user can store 10 GB of files in \\FS1\Users.
A. From File Explorer, open the properties of volume D, and then modify the Quota settings.
B. Install the File Server Resource Manager role service, and then create a file screen.
C. From File Explorer, open the properties of D:\Users, and then modify the Advanced sharing settings.
D. Install the File Server Resource Manager role service, and then create a quota.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
References: https://docs.microsoft.com/en-us/windows-server/storage/fsrm/create-quota
QUESTION 64
Your network contains an Active Directory domain named contoso.com. The domain contains domain
controllers that run Windows Server 2016.
The Job Title attribute for a domain user named User1 has a value of Sales Manager.
You need to ensure that the security token of User1 has a claim for Job Title.
A. From Active Directory Users and Computers, modify the properties of the User1 account.
B. From a Group Policy object(GPO), configure KDC support for claims, compound authentication, and
Kerberos armoring.
C. From Active Directory Administrative Center, add a claim type.
D. From Windows PowerShell, run the New-ADClaimTransformPolicy cmdlet and specify the –Name
parameter.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
References: https://www.nyazit.com/how-to-configure-dynamic-access-control-in-windows-server-2012-r2-
E6E3AB02065076CC5F9A13BC334734DE
2/
QUESTION 65
You have a file server named Server1 that runs Windows Server 2016.
A new policy states that ZIP files must not be stored on Server1.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
References: https://docs.microsoft.com/en-us/windows-server/storage/fsrm/create-file-screen
QUESTION 66
Your network contains an Active Directory domain.
A database administrator named DBA1 suspects that her user account was compromised.
Which three events can you identify by using ATA? Each correct answer presents a complete solution.
E6E3AB02065076CC5F9A13BC334734DE
Explanation/Reference:
References: https://github.com/MicrosoftDocs/ATADocs/blob/master/ATADocs/suspicious-activity-
guide.md
QUESTION 67
Your network has an internal network and a perimeter network. Only the servers on the perimeter network
can access the Internet. You create a Microsoft Operations Management Suite (OMS) instance in Microsoft
Azure.
You deploy Microsoft Monitoring Agent to all the servers on both the networks.
You discover that only the servers on the perimeter network report to OMS.
A. Install a Web Application Proxy on the perimeter network and install an OMS Gateway on the internal
network. Publish the OMS Gateway from the Web Application Proxy.
B. Install a Web Application Proxy and an OMS Gateway on the perimeter network. Publish the OMS
Gateway from the Web Application Proxy.
C. Configure the network firewalls to allow the internal servers to access the IP addresses of the Azure
OMS instance by using TCP port 443.
D. On the internal servers, run the Add-AzureRmUsageConnect cmdlet and specify the –AdminUri
parameter.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
References: https://docs.microsoft.com/en-us/azure/log-analytics/log-analytics-oms-gateway
QUESTION 68
Note: This question is part of a series of questions that use the same or similar answer choices. An
answer choice may be correct for more than one question in the series. Each question is
independent of the other questions in this series. Information and details provided in a question
apply only to that question.
You have a server named Server1 that runs Windows Server 2016.
You need to identify the default action for the inbound traffic when Server1 connects to the domain.
A. Get-NetIPSecRule
B. Get-NetFirewallRule
C. Get-NetFirewallProfile
D. Get-NetFirewallSetting
E. Get-NetFirewallPortFilter
F. Get-NetFirewallAddressFilter
G. Get-NetFirewallSecurityFilter
H. Get-NetFirewallApplicationFilter
Correct Answer: C
Section: (none)
Explanation
E6E3AB02065076CC5F9A13BC334734DE
Explanation/Reference:
References: https://docs.microsoft.com/en-us/powershell/module/netsecurity/get-netfirewallprofile?
view=win10-ps
QUESTION 69
Note: This question is part of a series of questions that use the same or similar answer choices. An
answer choice may be correct for more than one question in the series. Each question is
independent of the other questions in this series. Information and details provided in a question
apply only to that question.
You have a server named Server1 that runs Windows Server 2016.
A. Get-NetIPSecRule
B. Get-NetFirewallRule
C. Get-NetFirewallProfile
D. Get-NetFirewallSetting
E. Get-NetFirewallPortFilter
F. Get-NetFirewallAddressFilter
G. Get-NetFirewallSecurityFilter
H. Get-NetFirewallApplicationFilter
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
References: https://docs.microsoft.com/en-us/powershell/module/netsecurity/get-netfirewallrule?
view=win10-ps
QUESTION 70
Note: This question is part of a series of questions that use the same or similar answer choices. An
answer choice may be correct for more than one question in the series. Each question is
independent of the other questions in this series. Information and details provided in a question
apply only to that question.
You have a server named Server1 that runs Windows Server 2016.
You need to identify whether any connection security rules are configured on Server1.
A. Get-NetIPSecRule
B. Get-NetFirewallRule
C. Get-NetFirewallProfile
D. Get-NetFirewallSetting
E. Get-NetFirewallPortFilter
F. Get-NetFirewallAddressFilter
G. Get-NetFirewallSecurityFilter
H. Get-NetFirewallApplicationFilter
Correct Answer: A
Section: (none)
Explanation
E6E3AB02065076CC5F9A13BC334734DE
Explanation/Reference:
References: https://docs.microsoft.com/en-us/powershell/module/netsecurity/get-netipsecrule?view=win10-
ps
QUESTION 71
Your network contains an Active Directory domain named contoso.com. The domain contains two DNS
servers that run Windows Server 2016. The servers host two zones named contoso.com and
admin.contoso.com.
You need to ensure that all client computers in the domain validate the zone records when they query the
zone.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
References: https://nedimmehic.org/2017/04/04/how-to-deploy-and-configure-dns-2016-part5/
QUESTION 72
Your company has an accounting department.
The network contains an Active Directory domain named contoso.com. the domain contains 10 servers.
You deploy a new server named Server11 that runs Windows Server 2016. Server11 will host several
network applications and network shares used by the accounting department.
You need to recommend a solution for Server11 that meets the following requirements:
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
References: https://support.microsoft.com/en-us/help/942957/security-rules-for-windows-firewall-and-for-
ipsec-based-connections-in
QUESTION 73
Note: This question is part of a series of questions that present the same scenario. Each question
E6E3AB02065076CC5F9A13BC334734DE
in the series contains a unique solution that might meet the stated goals. Some question sets
might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server
2016. All client computers run Windows 10.
The relevant objects in the domain are configured as shown in the following table.
You need to assign User1 the right to restore files and folders on Server1 and Server2.
Solution: You add User1 to the Backup Operators group on Server1 and Server2.
A. Yes
B. No
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
References:
https://technet.microsoft.com/en-us/library/cc771990(v=ws.11).aspx
QUESTION 74
Note: This question is part of a series of questions that present the same scenario. Each question
in the series contains a unique solution that might meet the stated goals. Some question sets
might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
Your network contains an Active Directory forest named contoso.com. All servers run Windows Server
2016. The forest contains 2,000 client computers that run Windows 10. All client computers are deployed
from a customized Windows image.
You need to deploy 10 Privileged Access Workstations (PAWs). The solution must ensure that
administrators can access several client applications used by all users.
Solution: You deploy 10 physical computers and configure them as virtualization hosts. You configure the
operating system on each host as a PAW. You create a guest virtual machine by using the customized
Windows image.
A. Yes
B. No
Correct Answer: B
E6E3AB02065076CC5F9A13BC334734DE
Section: (none)
Explanation
Explanation/Reference:
References:
https://technet.microsoft.com/en-us/windows-server-docs/security/securing-privileged-access/privileged-
access-workstations
QUESTION 75
Note: This question is part of a series of questions that present the same scenario. Each question
in the series contains a unique solution that might meet the stated goals. Some question sets
might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
Your network contains an Active Directory domain named contoso.com. The domain contains a computer
named Computer1 that runs Windows10.
Computer1 has an application named App1.exe that is located in D:\Apps\. App1.exe is configured to
accept connections on TCP port 8080.
You need to ensure that App1.exe can accept connections only when Computer1 is connected to the
corporate network.
Solution: You configure an inbound rule that allows the TCP protocol on port 8080 and applies to all
profiles.
A. Yes
B. No
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 76
Note: This question is part of a series of questions that present the same scenario. Each question
in the series contains a unique solution that might meet the stated goals. Some question sets
might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
Your network contain an Active Directory domain named contoso.com. The domain contains a computer
named Computer1 that runs Windows 10. Computer1 connects to a home network and a corporate
network.
You need to prevent connections to App1 when Computer1 is connected to the home network.
Solution: From Windows Firewall with Advanced Security, you create an inbound rule.
E6E3AB02065076CC5F9A13BC334734DE
Does this meet the goal?
A. Yes
B. No
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/
dd421709(v=ws.10)#what-is-an-inbound-rule
QUESTION 77
You have a Hyper-V host named Hyper1 that has a virtual machine named FS1. FS1 is a file server that
contains sensitive data.
Which two actions should you perform? Each correct answer presents part of the solution.
Correct Answer: DE
Section: (none)
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows-server/security/guarded-fabric-shielded-vm/guarded-fabric-and-
shielded-vms
QUESTION 78
You deploy the Host Guardian Service (HGS).
You have several Hyper-V that have older hardware and Trusted Platform Modules (TPMs) version 1.2.
You discover that the Hyper-V hosts cannot start shielded virtual machines.
You need to configure HGS to ensure that the older Hyper-V hosts can host shielded virtual machines.
E6E3AB02065076CC5F9A13BC334734DE
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
References:
https://blogs.technet.microsoft.com/datacentersecurity/2016/03/16/windows-server-2016-and-host-
guardian-service-for-shielded-vms/
https://docs.microsoft.com/en-us/powershell/module/hgsserver/set-hgsserver?view=win10-ps
QUESTION 79
You enable and configure PowerShell Script Block Logging.
You need to view which script blocks were executed by using Windows PowerShell scripts.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/powershell/wmf/5.0/audit_script
QUESTION 80
Your network contains an Active Directory domain named contoso.com. The domain contains two servers
named Server1 and Server2 that run Windows Server 2016.
The Microsoft Advanced Threat Analytics (ATA) Center service is installed on Server1.
E6E3AB02065076CC5F9A13BC334734DE
A. User8
B. User5
C. User7
D. User3
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/advanced-threat-analytics/install-ata-step1
QUESTION 81
Your network contains an Active Directory forest named Corp. The forest functional level is Windows
Server 2016.
You deploy a new forest named Priv and set the forest functional level to Windows Server 2016.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
References:
https://www.petri.com/windows-server-2016-set-privileged-access-management
QUESTION 82
Your network contains several secured subnets that are disconnected from the Internet.
One of the secured subnets contains a server named Server1 that runs Windows Server 2016.
You implement Log Analytics in Microsoft Operations Management Suite (OMS) for the servers that
connect to the Internet.
You need to ensure that Log Analytics can collect logs from Server1.
Which two actions should you perform? Each correct answer presents part of the solution.
Correct Answer: AE
Section: (none)
Explanation
E6E3AB02065076CC5F9A13BC334734DE
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/azure/log-analytics/log-analytics-oms-gateway
QUESTION 83
Your network contains an Active Directory forest named contoso.com. You deploy another Active Directory
forest named admin.contoso.com.
You create a trust relationship between the two forests. The trust relationship has the following
configurations:
You need to implement Privileged Access Management (PAM) and to specify admin.contoso.com as an
administrative forest. What should you do?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
References:
https://www.petri.com/windows-server-2016-set-privileged-access-management
QUESTION 84
Your network contains an internal network and a perimeter network. The internal network contains an
Active Directory forest named contoso.com.
You deploy five servers to the perimeter network. All of the servers run Windows Server 2016 and are the
members of a workgroup.
You need to apply a security baseline named Perimeter.inf to the servers in the perimeter network.
What should you use to apply Perimeter.inf?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
References:
https://4sysops.com/archives/security-compliance-manager-deploy-baselines/#deploy-a-baseline-to-a-
workgroup-server
QUESTION 85
You have a Hyper-V host named Server1 that runs Windows Server 2016.
Server1 has a generation 2 virtual machine named VM1 that runs Windows 10.
E6E3AB02065076CC5F9A13BC334734DE
You need to ensure that you can turn on BitLocker Drive Encryption (BitLocker) for drive C on VM1.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows-server/virtualization/hyper-v/learn-more/generation-2-virtual-
machine-security-settings-for-hyper-v
QUESTION 86
You have a server named Server1 that runs Windows Server 2016.
C:\Folder1\File1.exe
C:\Folder2\File2.bat
C:\Folder2\File3.com
E6E3AB02065076CC5F9A13BC334734DE
A. File1.exe and File3.com only
B. File2.bat only
C. File1.exe, File2.bat, and File3.com
D. File1.exe only
E. File2.bat and File3.com only
F. File3.com only
Correct Answer: E
Section: (none)
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-antivirus/configure-
extension-file-exclusions-windows-defender-antivirus
QUESTION 87
You have a Host Guardian Service (HGS) and a guarded host.
You have a VHDX file that contains an image of Windows Server 2016.
Which three files should you create? Each correct answer presents part of the solution.
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows-server/security/guarded-fabric-shielded-vm/guarded-fabric-
create-a-shielded-vm-template
https://docs.microsoft.com/en-us/windows-server/security/guarded-fabric-shielded-vm/guarded-fabric-
tenant-creates-shielding-data
QUESTION 88
Note: This question is part of a series of questions that present the same scenario. Each question
in the series contains a unique solution that might meet the stated goals. Some question sets
might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You need to ensure that you can run Windows Containers on Server1.
Solution: On server1, you install the DockerMsftProvider PowerShell and the Docker package. You restart
the server.
E6E3AB02065076CC5F9A13BC334734DE
Does this meet the goal?
A. Yes
B. No
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/virtualization/windowscontainers/deploy-containers/deploy-containers-on-
server
QUESTION 89
Note: This question is part of a series of questions that present the same scenario. Each question
in the series contains a unique solution that might meet the stated goals. Some question sets
might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
Your network contains an Active Directory domain named contoso.com. All client computers run Windows
10.
You plan to deploy a Remote Desktop connection solution for the client computers.
You have four available servers in the domain that can be configured as Remote Desktop servers. The
servers are configured as shown in the following table.
You need to ensure that all Remote Desktop connections can be protected by using Remote Credential
Guard.
Solution: You deploy the Remote Desktop connection solution by using Server4.
A. Yes
B. No
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows/security/identity-protection/remote-credential-guard
QUESTION 90
Note: This question is part of a series of questions that present the same scenario. Each question
in the series contains a unique solution that might meet the stated goals. Some question sets
might have more than one correct solution, while others might not have a correct solution.
E6E3AB02065076CC5F9A13BC334734DE
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
Your network contains an Active Directory domain named contoso.com. All client computers run Windows
10.
You plan to deploy a Remote Desktop connection solution for the client computers.
You have four available servers in the domain that can be configured as Remote Desktop servers. The
servers are configured as shown in the following table.
You need to ensure that all Remote Desktop connections can be protected by using Remote Credential
Guard.
Solution: You deploy the Remote Desktop connection solution by using Server1.
A. Yes
B. No
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows/security/identity-protection/remote-credential-guard
QUESTION 91
Your network contains an Active Directory domain named contoso.com. The domain contains a server
named Server1.
You implement the Host Guardian Service (HGS) configured for admin-trusted attestation.
A. On Server1, install the Host Guardian Hyper-V Support feature and a computer certificate from a
trusted certification authority (CA).
B. On Server1, install the Device Health Attestation server role and a computer certificate from a trusted
certification authority (CA).
C. Install the Host Guardian Hyper-V Support feature on Server1 and add Server1 to a domain security
group.
D. Install the Device Health Attestation server role on Server1 and add Server1 to a domain security group.
Correct Answer: C
Section: (none)
E6E3AB02065076CC5F9A13BC334734DE
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows-server/security/guarded-fabric-shielded-vm/guarded-fabric-
guarded-host-prerequisites
https://docs.microsoft.com/en-us/windows-server/security/guarded-fabric-shielded-vm/guarded-fabric-
admin-trusted-attestation-creating-a-security-group
QUESTION 92
You have a guarded fabric that consists of the servers shown in the following table.
You need to ensure that you can start the shielded virtual machines on the Hyper-V hosts if the Hyper-V
hosts cannot connect to the HGS.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows-server/security/guarded-fabric-shielded-vm/guarded-fabric-
admin-trusted-attestation-creating-a-security-group
QUESTION 93
Your network contains an Active Directory domain named contoso.com. The domain contains servers that
run Windows Server 2016.
You have an administrative computer named Computer1 that runs Windows10. Computer 1 is configured
to require Remote Credential Guard.
E6E3AB02065076CC5F9A13BC334734DE
C. Sign in to Computer1 as Contoso\ServerAdmin1.
D. Turn on virtualization based security.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows/security/identity-protection/remote-credential-guard#reqs
QUESTION 94
Your network contains an Active Directory forest named contoso.com. The functional level of the forest and
the domain is Windows Server 2012 R2.
You plan to use Local Administrator Password Solution (LAPS) for all member servers.
You need to prepare the forest for LAPS.
Which two actions should you perform? Each correct answer presents part of the solution.
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
References:
https://blog.thesysadmins.co.uk/deploying-microsoft-laps-part-1.html
QUESTION 95
Your network contains an Active Directory domain named contoso.com. The domain contains domain
controllers that run Windows Server 2016.
A Group Policy object (GPO) named GPO1 is applied to all of the domain controllers. GPO1 has a Globally
Unique Identifier (GUID) of 6AC1786C-016F-11D2-945F-00C04fB984F9.
You need to create a new baseline that contains the settings from GPO1.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/powershell/module/grouppolicy/backup-gpo?view=win10-ps
E6E3AB02065076CC5F9A13BC334734DE
QUESTION 96
Your network contains an Active Directory domain named contoso.com. The domain contains a server
named Server1 that runs Windows Server 2016.
A. From Control Panel, open Credential Manager, and review the list of Windows Credentials.
B. From System Information, review System Summary.
C. From a command prompt, run the tsecimp.exe command.
D. From Server Manager, click Local Server, and review the properties of Server1.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Reference: https://docs.microsoft.com/en-us/windows/security/identity-protection/credential-guard/
credential-guard-manage
QUESTION 97
You have a Hyper-V host named Server1 that runs Windows Server 2016.
Server1 has a generation 2 virtual machine named VM1 that runs Windows 10.
You need to ensure that you can turn on BitLocker Drive Encryption (BitLocker) for drive C on VM1.
A. From VM1, configure the require additional authentication at startup Group Policy setting.
B. From the settings of VM1, enable Secure Boot.
C. From Server1, install the BitLocker feature.
D. From VM1, configure the Enforce drive encryption type on fixed data drives Group Policy setting.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.dell.com/support/article/za/en/zadhs1/sln171842/using-the-group-policy-editor-to-
enable-bitlocker-authentication-in-the-pre-boot-environment-for-windows-7-8-8-1-10?lang=en
QUESTION 98
Your network contains an internal network and a perimeter network. The internal network contains an
Active Directory forest named contoso.com.
You deploy five servers to the perimeter network. All of the servers run Windows Server 2016 and are the
members of a workgroup.
You need to apply a security baseline named Perimeter.inf to the servers in the perimeter network.
A. System Configuration
B. Microsoft Security Compliance manager (SCM) 4.0
C. Security Templates
D. Local Computer Policy
E6E3AB02065076CC5F9A13BC334734DE
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 99
Note: This question is part of a series of questions that present the same scenario. Each question
in the series contains a unique solution that might meet the stated goals. Some question sets
might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You manage a file server that runs Windows Server 2016. The file server contains the volumes configured
as shown in the following table.
Solution: You run the manage-bde.exe command and specify the –lock parameter.
A. Yes
B. No
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/manage-bde-lock
QUESTION 100
You have several servers that run Windows Server 2016. All the servers were recently configured to use a
new Windows Server Update Services (WSUS) server named WSUS1. WSUS1 is configured to download
updates as shown in the exhibit. (Click the Exhibit tab.)
E6E3AB02065076CC5F9A13BC334734DE
You discover that the servers have out-of-date Windows Defender definitions. The servers receive security
updates from WSUS1.
You need to ensure that the servers receive the latest Windows Defender definitions.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-antivirus/manage-
protection-update-schedule-windows-defender-antivirus
QUESTION 101
You have a server named Server1.
E6E3AB02065076CC5F9A13BC334734DE
You need to configure Windows Defender to perform a full scan every day at 21:00.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/powershell/module/defender/set-mppreference?view=win10-ps
QUESTION 102
You have a server named Server1 that runs Windows Server 2016. Server1 contains a folder named
Folder1. Folder1 is shared as Share1.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows-server/storage/file-server/smb-security
QUESTION 103
Your network contains an Active Directory domain named contoso.com. The domain contains 1,000 client
computers that run Windows 10.
A security audit reveals that the network recently experienced a Pass-the-Hash attack. The attack was
initiated from a client computer and accessed Active Directory objects restricted to the members of the
Domain Admins group.
You need to minimize the impact of another successful Pass-the-Hash attack on the domain.
A. Move the computer accounts of the domain controllers to a new organizational unit (OU). Remove the
permissions to the new OU from the Domain Admins group.
B. Configure the Domain Admins groups as a restricted group.
C. Remove all the members from the Domain Admins group, and then remove the Domain Admins group
from all other groups.
D. Instruct all administrators to use a restricted Remote Desktop connection when they sign in to a client
computer
E6E3AB02065076CC5F9A13BC334734DE
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
References:
https://download.microsoft.com/download/7/7/a/77abc5bd-8320-41af-863c-6ecfb10cb4b9/mitigating%
20pass-the-hash%20(pth)%20attacks%20and%20other%20credential%20theft%20techniques_english.pdf
QUESTION 104
Your network contains an Active Directory domain named contoso.com. The domain contains an
organizational unit (OU) named OU1.
OU1 contains a server named Server1. The properties of Server1 are shown in the Server1 exhibit. (Click
the Server1 tab.)
You create a Group Policy object (GPO) linked to OU1. You configure the GPO as shown in the LAPS
exhibit. (Click the LAPS tab.)
E6E3AB02065076CC5F9A13BC334734DE
You need to ensure that the password of the local Administrator of Server1 is managed by using Local
Administrator Password Solution (LAPS).
A. Reset-AdmPwdPassword
B. Set-AdmPwdComputerSelfPermission
C. Update-AdmPwdADschema
D. Set-AdmPwdResetPasswordPermission
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
References:
http://techgenix.com/deploying-laps/
QUESTION 105
Your network contains an Active Directory domain named contoso.com.
The network contains a server named Server1. Server1 is in a workgroup. Server1 contains sensitive data
and will be accessed by a domain-joined computer named Computer1.
You need to create connection security rules to encrypt the data sent between Server1 and Computer1.
You need to identify which authentication method to use for the connection security rules. The solution
must use the most secure method possible.
A. Kerberos V5
B. a computer certificate
C. a preshared key
D. NTLMv2
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
References:
https://www.sciencedirect.com/topics/computer-science/connection-security-rule
https://blogs.msdn.microsoft.com/james_morey/2005/06/20/ipsec-and-certificate-authentication/
E6E3AB02065076CC5F9A13BC334734DE
QUESTION 106
Note: This question is part of a series of questions that use the same or similar answer choices. An
answer choice may be correct for more than one question in the series. Each question is
independent of the other questions in this series. Information and details provided in a question
apply only to that question.
Your network contains an Active Directory domain named contoso.com. The domain contains a server
named Server1 that runs Windows Server 2016.
You need to view the classification properties that have been configured on Volume1.
A. File Explorer
B. Shared Folders
C. Server Manager
D. Disk Management
E. Storage Explorer
F. Computer Management
G. System Configuration
H. File Server Resource Manager (FSRM)
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
References:
https://blog.netwrix.com/2018/05/22/microsoft-file-classification-infrastructure-fci-explained/
QUESTION 107
Your network contains an Active Directory domain named contoso.com. The domain contains a server
named Server1.
On Server1, administrators plan to use several scripts that have the .ps1 extension.
You need to ensure that when code is generated from the scripts, an event containing the details of the
code is logged in the Operational log.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/powershell/wmf/whats-new/script-logging
QUESTION 108
E6E3AB02065076CC5F9A13BC334734DE
Your network contains an Active Directory domain named contoso.com. The domain contains a server
named Server1 that runs Windows Server 2016.
The local administrator credentials of Server1 are managed by using the Local Administrator Password
Solution (LAPS).
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
References:
http://woshub.com/manage-local-administrator-passwords-with-laps/
QUESTION 109
Your network contains an Active Directory domain named contoso.com. The domain contains 100 servers.
You deploy the Local Administrator Password Solution (LAPS) to the network.
You need to view the password of the local administrator of a server named Server5.
A. Computer Management
B. Accounts from the Settings app
C. Server Manager
D. Active Directory Users and Computers
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
References:
https://blogs.technet.microsoft.com/askpfeplat/2015/12/28/local-administrator-password-solution-
lapsimplementation-hints-and-security-nerd-commentaryincludingmini-threat-model/
QUESTION 110
Your network contains an Active Directory domain named contoso.com. The domain contains multiple
servers that run either Windows Server 2012 or Windows Server 2012 R2.
You plan to implement Just Enough Administration (JEA) to manage all of the servers.
What should you install on each server to ensure that the servers can be managed by using JEA?
E6E3AB02065076CC5F9A13BC334734DE
B. Management Odata Internet Information Services (IIS) Extension
C. Windows Management Framework 5.1
D. Microsoft .NET Framework 3.5 Service Pack 1 (SP1)
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/powershell/scripting/learn/remoting/jea/prerequisites?view=powershell-6
QUESTION 111
Your network contains an Active Directory domain named contoso.com.
The domain contains two global groups named Group1 and Group2. A user named User1 is a member of
Group1.
You have an organizational unit (OU) named OU1 that contains the computer accounts of computers that
contain sensitive data. A Group Policy object (GPO) named GPO1 is linked to OU1. OU1 contains a
computer account named Computer1.
GPO1 has the User Rights Assignment configured as shown in the following table.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
“Deny log on locally”
Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\User Rights Assignment
Determines which users are prevented from logging on at the computer.
This policy setting supercedes the Allow Log on locally policy setting if an account is subject to both
policies.
Therefore, adding User1 to Group2 will let User1 to inherit both policy, and then prevent User1 to sign in to
Computer1.
References:
https://technet.microsoft.com/en-us/library/cc957048.aspx
QUESTION 112
Your network contains an Active Directory domain.
E6E3AB02065076CC5F9A13BC334734DE
You need to create a central access rule that will grant permissions to users who have the Department
attribute set to Finance. The users must have access to resources that have the Department property set
to Finance.
Which two actions should you perform before you create the central access rule? Each correct answer
presents part of the solution.
Correct Answer: CE
Section: (none)
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows-server/identity/solution-guides/deploy-a-central-access-policy--
demonstration-steps-
QUESTION 113
Your network contains an Active Directory domain.
You need to ensure that you can apply the Code Integrity policy to Hyper-V hosts.
A. Add-SignerRule
B. Add-HgsAttestationTpmHost
C. Set-HVCIOptions
D. ConvertFrom-CIPolicy
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows-server/security/guarded-fabric-shielded-vm/guarded-fabric-tpm-
trusted-attestation-capturing-hardware#create-and-apply-a-code-integrity-policy
QUESTION 114
You have a Hyper-V host named Server1 that hosts the virtual machines shown in the following table.
E6E3AB02065076CC5F9A13BC334734DE
You plan to encrypt the operating system drive on the virtual machines.
On which virtual machines can you use a TPM protector for BitLocker Drive Encryption (BitLocker)?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Virtual TPM is only available in Generation 2 VMs.
QUESTION 115
Your network contains an Active Directory domain named contoso.com. The domain contains a server
named Server1.
When will JEA limit the tasks that can be performed on Server1?
A. when you run winrs.exe and specify Server1 as the remote endpoint
B. when you run psexec.exe and specify \\Server1 as the remote system
C. when you run Enter-PSSession and specify Server1 and the –ComputeName parameter
D. when establishing a Remote Desktop connection to Server1
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
References:
https://www.red-gate.com/simple-talk/sysadmin/powershell/powershell-just-enough-administration/
QUESTION 116
Your network contains an Active Directory forest named contoso.com. The forest functional level is
Windows Server 2012. The forest contains 20 member servers that are configured as file servers. All
domain controllers run Windows Server 2016.
You need to use the Enhanced Security Administrative Environment (ESAE) approach for the
administration of the resources in contoso.com.
Which two actions should you perform? Each correct answer presents part of the solution.
E6E3AB02065076CC5F9A13BC334734DE
A. Configure contoso.com to trust contosoadmin.com.
B. From the properties of the trust, enable selective authentication.
C. Configure contosoadmin.com to trust contoso.com.
D. From the properties of the trust, enable forest-wide authentication.
E. Configure a two-way trust between both forests.
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows-server/identity/securing-privileged-access/securing-privileged-
access-reference-material#esae-administrative-forest-design-approach
QUESTION 117
Your network contains an Active Directory domain. All the computers in the domain are configured for the
Local Administrator Password Solution (LAPS). The Group Policy object (GPO) settings for LAPS are
configured as shown in the exhibit. (Click the Exhibit tab.)
You provide a technician with the local administrator password for a computer named Computer1.
A. 30 minutes
B. 3 days
C. 30 days
D. 365 days
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
References:
https://www.reddit.com/r/sysadmin/comments/712049/laps_password_expiration_time_password_age/
QUESTION 118
Your network contains an Active Directory domain named contoso.com. The domain contains a file server
named FS1 that runs Windows Server 2016. FS1 has a share named SecureFolder.
E6E3AB02065076CC5F9A13BC334734DE
You need to track all users who access the contents of SecureFolder.
Which two actions should you perform? Each correct answer presents part of the solution.
A. From the Default Domain Controller Group Policy object (GPO), enable Audit object access.
B. From File Explorer, modify the Advanced security settings of SecureFolder.
C. From File Explorer, modify the Advanced sharing settings of SecureFolder.
D. Create a Group Policy object (GPO) and enable Audit object access.
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
References:
https://www.rootusers.com/configure-file-access-auditing-in-windows-server-2016/
QUESTION 119
Note: This question is part of a series of questions that present the same scenario. Each question
in the series contains a unique solution that might meet the stated goals. Some question sets
might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
Your network contains an Active Directory domain named contoso.com. All client computers run Windows
10.
You plan to deploy a Remote Desktop connection solution for the client computers.
You have four available servers in the domain that can be configured as Remote Desktop servers. The
servers are configured as shown in the following table.
You need to ensure that all Remote Desktop connections can be protected by using Remote Credential
Guard.
Solution: You deploy the Remote Desktop connection solution by using Server2.
A. Yes
B. No
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows/security/identity-protection/remote-credential-guard
E6E3AB02065076CC5F9A13BC334734DE
QUESTION 120
Your network contains an Active Directory domain named contoso.com. The domain contains a server
named Server1 that runs Windows Server 2016.
A. Config.json
B. Web.config
C. Config.xml
D. Mongod.cfg
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/advanced-threat-analytics/ata-database-management
QUESTION 121
You have the servers configured as shown in the following table.
You purchase a Microsoft Azure subscription, and you create three Microsoft Operations Management
Suite (OMS) workspaces named Workspace1, Workspace2, and Workspace3.
You need to deploy Microsoft Monitoring Agent to the servers to meet the following requirements:
A. 6
B. 33
C. 73
D. 91
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/azure/azure-monitor/platform/log-analytics-agent
E6E3AB02065076CC5F9A13BC334734DE
QUESTION 122
Your network contains an Active Directory forest that contains 20 domain controllers. All the domain
controllers run as virtual machines on Hyper-V hosts.
A corporate security policy prohibits the installation of software on the domain controllers.
You deploy Advanced Threat Analytics (ATA) and the ATA Gateway.
You need to collect data from the domain controllers by using ATA.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
To enhance detection capabilities, ATA needs the following Windows events: 4776, 4732, 4733, 4728,
4729, 4756, 4757, 7045. These can either be read automatically by the ATA Lightweight Gateway or it can
be forwarded to the ATA Gateway by configuring Windows Event Forwarding.
References:
https://docs.microsoft.com/en-us/advanced-threat-analytics/configure-event-collection
QUESTION 123
You configure a server named Server1 to report to a Microsoft Azure Log Analytics workspace named
Workspace1.
You run queries in Workspace1, and no events are returned from Server1.
You need to ensure that events from Server1 are sent to Workspace1.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/services-hub/health/mma-setup
QUESTION 124
You have a server named Server1 that runs Windows Server 2016.
E6E3AB02065076CC5F9A13BC334734DE
You need to start a new container from the image. The solution must prevent the processes that run in the
container from being accessible to Server1.
Which parameter should you specify when you run the docker run command?
A. --expose
B. --runtime
C. --entrypoint
D. --isolation
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/virtualization/windowscontainers/manage-containers/hyperv-container
https://docs.docker.com/engine/reference/commandline/run/
E6E3AB02065076CC5F9A13BC334734DE