option
Questions
ayuda
daypo
search.php

Simulado 31-60

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
Simulado 31-60

Description:
Simulado 31-60

Creation Date: 2021/06/01

Category: Others

Number of questions: 30

Rating:(2)
Share the Test:
Nuevo ComentarioNuevo Comentario
New Comment
NO RECORDS
Content:

Case Study This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However, there may be additional case studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions included on this exam in the time provided. To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might contain exhibits and other resources that provide more information about the scenario that is described in the case study. Each question is independent of the other questions in this case study. At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to the next section of the exam. After you begin a new section, you cannot return to this section. To start the case study To display the first question in this case study, click the Next button. Use the buttons in the left pane to explore the content of the case study before you answer the questions. Clicking these buttons displays information such as business requirements, existing environment, and problem statements. When you are ready to answer a question, click the Question button to return to the question. Overview Contoso, Ltd. is a consulting company that has a main office in Montreal and two branch offices in Seattle and New York. Contoso has IT, human resources (HR), and finance departments. Contoso recently opened a new branch office in San Diego. All the users in the San Diego office work from home. Existing environment Contoso uses Microsoft 365. The on-premises network contains an Active Directory domain named contoso.com. The domain is synced to Microsoft Azure Active Directory (Azure AD). All computers run Windows 10 Enterprise. You have four computers named Computer1, Computer2, Computer3, and ComputerA. ComputerA is in a workgroup on an isolated network segment and runs the Long Term Servicing Channel version of Windows 10. ComputerA connects to a manufacturing system and is business critical. All the other computers are joined to the domain and run the Semi-Annual Channel version of Windows 10. In the domain, you create four groups named Group1, Group2, Group3, and Group4. Computer2 has the local Group Policy settings shown in the following table. -------------------------------------------------------------------------- Policy .| Security Setting .| -------------------------------------------------------------------------- Access this computer from the network .| Group1 .| -------------------------------------------------------------------------- Deny access to this computer from the network .| Group2 .| -------------------------------------------------------------------------- Allow log on through Remote Desktop Services .| Group3 .| -------------------------------------------------------------------------- Deny log on through Remote Desktop Services .| Group4 .| -------------------------------------------------------------------------- The computers are updated by using Windows Update for Business. The domain has the users shown in the following table. -------------------------------------------------------------------------- Name .| Member of .| -------------------------------------------------------------------------- User1 .| Domain Admins, Domain Users .| -------------------------------------------------------------------------- User2 .| Administrators, Domain Users .| -------------------------------------------------------------------------- User3 .| Account Operators, Domain Users .| -------------------------------------------------------------------------- User4 .| Domain Users .| -------------------------------------------------------------------------- User5 .| Domain Users, Guests .| -------------------------------------------------------------------------- User6 .| Group2, Group3, Domain Users .| -------------------------------------------------------------------------- Computer1 has the local users shown in the following table. -------------------------------------------------------------------------- Name .| Member of .| -------------------------------------------------------------------------- User11 .| Administrators .| -------------------------------------------------------------------------- User12 .| Guests .| -------------------------------------------------------------------------- User13 .| Account Operators, Domain Users .| -------------------------------------------------------------------------- Requirements Planned Changes Contoso plans to purchase computers preinstalled with Windows 10 Pro for all the San Diego office users. Technical requirements Contoso identifies the following technical requirements: The computers in the San Diego office must be upgraded automatically to Windows 10 Enterprise and must be joined to Azure AD the first time a user starts each new computer. End users must not be required to accept the End User License Agreement (EULA). Helpdesk users must be able to troubleshoot Group Policy object (GPO) processing on the Windows 10 computers. The helpdesk users must be able to identify which Group Policies are applied to the computers. Users in the HR department must be able to view the list of files in a folder named D:\Reports on Computer3. ComputerA must be configured to have an Encrypting File System (EFS) recovery agent. Quality update installations must be deferred as long as possible on ComputerA. Users in the IT department must use dynamic lock on their primary device. User6 must be able to connect to Computer2 by using Remote Desktop. The principle of least privilege must be used whenever possible. Administrative effort must be minimized whenever possible. Kiosk (assigned access) must be configured on Computer1. You need to meet the technical requirements for the helpdesk users. What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. The local Administrators group on the Windows 10 computers. The Domain Computrers group in the domain group. The Event Log Readers group in the domain group. The local Event Log Readers group on the Windows 10 computers. The Group Policy Creators Owners group in the domain group. The local Power Users group on the Windows 10 computers. Get-GPOReport. GPResult. GPUpdate. Group Policy Object Editor.

Case Study This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However, there may be additional case studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions included on this exam in the time provided. To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might contain exhibits and other resources that provide more information about the scenario that is described in the case study. Each question is independent of the other questions in this case study. At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to the next section of the exam. After you begin a new section, you cannot return to this section. To start the case study To display the first question in this case study, click the Next button. Use the buttons in the left pane to explore the content of the case study before you answer the questions. Clicking these buttons displays information such as business requirements, existing environment, and problem statements. When you are ready to answer a question, click the Question button to return to the question. Overview Contoso, Ltd. is a consulting company that has a main office in Montreal and two branch offices in Seattle and New York. Contoso has IT, human resources (HR), and finance departments. Contoso recently opened a new branch office in San Diego. All the users in the San Diego office work from home. Existing environment Contoso uses Microsoft 365. The on-premises network contains an Active Directory domain named contoso.com. The domain is synced to Microsoft Azure Active Directory (Azure AD). All computers run Windows 10 Enterprise. You have four computers named Computer1, Computer2, Computer3, and ComputerA. ComputerA is in a workgroup on an isolated network segment and runs the Long Term Servicing Channel version of Windows 10. ComputerA connects to a manufacturing system and is business critical. All the other computers are joined to the domain and run the Semi-Annual Channel version of Windows 10. In the domain, you create four groups named Group1, Group2, Group3, and Group4. Computer2 has the local Group Policy settings shown in the following table. --------------------------------------------------------------------------------------------------- Policy .| Security Setting --------------------------------------------------------------------------------------------------- Access this computer from the network .| Group1 --------------------------------------------------------------------------------------------------- Deny access to this computer from the network .| Group2 --------------------------------------------------------------------------------------------------- Allow log on through Remote Desktop Services .| Group3 --------------------------------------------------------------------------------------------------- Deny log on through Remote Desktop Services .| Group4 --------------------------------------------------------------------------------------------------- Computer1 has the local users shown in the following table. ---------------------------------------------------------------------------- Name .| Member of ---------------------------------------------------------------------------- User11 .| Administrators ---------------------------------------------------------------------------- User12 .| Users ---------------------------------------------------------------------------- User13 .| Guests ---------------------------------------------------------------------------- Requirements Planned Changes Contoso plans to purchase computers preinstalled with Windows 10 Pro for all the San Diego office users. Technical requirements Contoso identifies the following technical requirements: The computers in the San Diego office must be upgraded automatically to Windows 10 Enterprise and must be joined to Azure AD the first time a user starts each new computer. End users must not be required to accept the End User License Agreement (EULA). Helpdesk users must be able to troubleshoot Group Policy object (GPO) processing on the Windows 10 computers. The helpdesk users must be able to identify which Group Policies are applied to the computers. Users in the HR department must be able to view the list of files in a folder named D:\Reports on Computer3. ComputerA must be configured to have an Encrypting File System (EFS) recovery agent. Quality update installations must be deferred as long as possible on ComputerA. Users in the IT department must use dynamic lock on their primary device. User6 must be able to connect to Computer2 by using Remote Desktop. The principle of least privilege must be used whenever possible. Administrative effort must be minimized whenever possible. Kiosk (assigned access) must be configured on Computer1. You need to meet the technical requirements for the HR department users. Which permissions should you assign to the HR department users for the D:\Reports folder? To answer, select the appropriate permissions in the answer area. NOTE: Each correct selection is worth one point.

Case Study This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However, there may be additional case studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions included on this exam in the time provided. To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might contain exhibits and other resources that provide more information about the scenario that is described in the case study. Each question is independent of the other questions in this case study. At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to the next section of the exam. After you begin a new section, you cannot return to this section. To start the case study To display the first question in this case study, click the Next button. Use the buttons in the left pane to explore the content of the case study before you answer the questions. Clicking these buttons displays information such as business requirements, existing environment, and problem statements. When you are ready to answer a question, click the Question button to return to the question. Overview Contoso, Ltd. is a consulting company that has a main office in Montreal and two branch offices in Seattle and New York. Contoso has IT, human resources (HR), and finance departments. Contoso recently opened a new branch office in San Diego. All the users in the San Diego office work from home. Existing environment Contoso uses Microsoft 365. The on-premises network contains an Active Directory domain named contoso.com. The domain is synced to Microsoft Azure Active Directory (Azure AD). All computers run Windows 10 Enterprise. You have four computers named Computer1, Computer2, Computer3, and ComputerA. ComputerA is in a workgroup on an isolated network segment and runs the Long Term Servicing Channel version of Windows 10. ComputerA connects to a manufacturing system and is business critical. All the other computers are joined to the domain and run the Semi-Annual Channel version of Windows 10. In the domain, you create four groups named Group1, Group2, Group3, and Group4. Computer2 has the local Group Policy settings shown in the following table. --------------------------------------------------------------------------------------------------- Policy .| Security Setting --------------------------------------------------------------------------------------------------- Access this computer from the network .| Group1 --------------------------------------------------------------------------------------------------- Deny access to this computer from the network .| Group2 --------------------------------------------------------------------------------------------------- Allow log on through Remote Desktop Services .| Group3 --------------------------------------------------------------------------------------------------- Deny log on through Remote Desktop Services .| Group4 --------------------------------------------------------------------------------------------------- The computers are updated by using Windows Update for Business. The domain has the users shown in the following table. -------------------------------------------------------------------------- Name .| Member of .| -------------------------------------------------------------------------- User1 .| Domain Admins, Domain Users .| -------------------------------------------------------------------------- User2 .| Administrators, Domain Users .| -------------------------------------------------------------------------- User3 .| Account Operators, Domain Users .| -------------------------------------------------------------------------- User4 .| Domain Users .| -------------------------------------------------------------------------- User5 .| Domain Users, Guests .| -------------------------------------------------------------------------- User6 .| Group2, Group3, Domain Users .| -------------------------------------------------------------------------- Computer1 has the local users shown in the following table. -------------------------------------------------------------------------- Name .| Member of .| -------------------------------------------------------------------------- User11 .| Administrators .| -------------------------------------------------------------------------- User12 .| Guests .| -------------------------------------------------------------------------- User13 .| Account Operators, Domain Users .| -------------------------------------------------------------------------- Requirements Planned Changes Contoso plans to purchase computers preinstalled with Windows 10 Pro for all the San Diego office users. Technical requirements Contoso identifies the following technical requirements: The computers in the San Diego office must be upgraded automatically to Windows 10 Enterprise and must be joined to Azure AD the first time a user starts each new computer. End users must not be required to accept the End User License Agreement (EULA). Helpdesk users must be able to troubleshoot Group Policy object (GPO) processing on the Windows 10 computers. The helpdesk users must be able to identify which Group Policies are applied to the computers. Users in the HR department must be able to view the list of files in a folder named D:\Reports on Computer3. ComputerA must be configured to have an Encrypting File System (EFS) recovery agent. Quality update installations must be deferred as long as possible on ComputerA. Users in the IT department must use dynamic lock on their primary device. User6 must be able to connect to Computer2 by using Remote Desktop. The principle of least privilege must be used whenever possible. Administrative effort must be minimized whenever possible. Kiosk (assigned access) must be configured on Computer1. You need to meet the technical requirements for EFS on ComputerA. What should you do?. Run certutil.exe, and then add a certificate to the local computer certificate store. Run cipher.exe, and then add a certificate to the local computer certificate store. Run cipher.exe, and then add a certificate to the local Group Policy. Run certutil.exe, and then add a certificate to the local Group Policy.

Your network contains an Active Directory forest. The forest contains a root domain named contoso.com and a child domain named corp.contoso.com. You have a computer named Computer1 that runs Windows 10. Computer1 is joined to the corp.contoso.com domain. Computer1 contains a folder named Folder1. In the Security settings of Folder1, Everyone is assigned the Full control permissions. On Computer1, you share Folder1 as Share1 and assign the Read permissions for Share1 to the Users group. For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. Statements All the local users on Computerl have Read access to \ ',Computer1 Sharel. All the users in the corp.contoso.com domain have Read access to \\Computerl',Sharel. All the users in the contoso.com domain have Read access to 'A Computer l',Sharel .

You have a computer named Computer1 that runs Windows 10. Computer1 is in a workgroup. Computer1 contains the folders shown in the following table. -------------------------------------------------------------------------------------- Name .| Volume .| File system | Permission .| -------------------------------------------------------------------------------------- Folder1 .| C .| NTFS Full control to Everyone .| -------------------------------------------------------------------------------------- Folder2 .| C .| NTFS Full control to Everyone .| -------------------------------------------------------------------------------------- Folder3 .| D .| NTFS Full control to Everyone .| -------------------------------------------------------------------------------------- On Computer1, you create the users shown in the following table. --------------------------------------------------------------- Name .| Member of --------------------------------------------------------------- User1 .| Users --------------------------------------------------------------- User2 .| Backup Operators, Users --------------------------------------------------------------- User3 .| Cryptographic Operators, Users --------------------------------------------------------------- User4 .| Administrators, Users --------------------------------------------------------------- User1 encrypts a file named File1.txt that is in a folder named C:\Folder1. What is the effect of the configuration? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. User1 only. User1 and User2 only. User1, User2, and User3 only. User1, User2, User3, and User4. ***************************. User1 only. User1 and User2 only. User1, User2, and User3 only. User1, User2, User3, and User4.

You have a computer named Computer1 that runs Windows 10 and is joined to an Active Directory domain named adatum.com. A user named Admin1 signs in to Computer1 and runs the whoami command as shown in the following exhibit. *************************************************************************************** Command Prompt c:\Users\adminl>whoami /user /groups /priv USER INFORMATION ---------------- User Name SID ============== =========================================== adatum\adminl 5-1-5-21-4534338-1127018997-2609994386-4602 GROUP INFORMATION ----------------- Group Name Type ======================== ================= Everyone Well-known group BUILTIN\Users Alias BUILTIN\Administrators Alias NT AUTHORITY\INTERACTIVE Well-known group CONSOLE LOGON Well-known group NT AUTHORITY\Authenticated Users Well-known group NT AUTHORITY\This Organization Well-known group LOCAL Well-known group ADATUM\Domain Admins Group Authentication authority asserted identy Well-known group ADATUM\Denied RODC Password Replication Group Alias Mandatory Label\Medium Mandatory Level Label PRIVELEGES INFORMATION ---------------------- Privilege Name Description =============== =============== SeShutdownPrivilege Shut down the system SeChangeNotifyPrivilege Bypass traverse checking SeUndockPrivilege Remove computer from docking statio SeIncreaseWorkingSetPrivilege Increase a process working set SeTimeZonePrivilege Change the time zone C:\Users\admin1> *************************************************************************************** Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic. NOTE: Each correct selection is worth one point. Adminl will be prompted for credentials. Adminl will be prompted for consent. Adminl will be denied access. Device Manager will open without a prompt. ***************************. Admin1 will be prompted for credentials. Admin1 will be prompted for consent. Admin1 will be denied access. the command prompt will open without a prompt.

You have a computer named Computer1 that runs Windows 10. You need to configure User Account Control (UAC) to prompt administrators for their credentials. Which settings should you modify?. Administrators Properties in Local Users and Groups. User Account Control Settings in Control Panel. Security Options in Local Group Policy Editor. User Rights Assignment in Local Group Policy Editor.

You have several computers that run Windows 10. The computers are in a workgroup. You need to prevent users from using Microsoft Store apps on their computer. What are two possible ways to achieve the goal? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point. From Security Settings in the local Group Policy, configure Security Options. From Administrative Templates in the local Group Policy, configure the Store settings. From Security Settings in the local Group Policy, configure Software Restriction Policies. From Security Settings in the local Group Policy, configure Application Control Policies.

You have a computer named Computer1 that runs Windows 10. You need to prevent standard users from changing the wireless network settings on Computer1. The solution must allow administrators to modify the wireless network settings. What should you use?. Windows Configuration Designer. MSConfig. Local Group Policy Editor. an MMC console that has the Group Policy Object Editor snap-in.

You have three computers that run Windows 10 as shown in the following table. --------------------------------------------------------------------- Name TPM .| version .| Operating system --------------------------------------------------------------------- Computerl .| None .| Windows 10 Enterprise --------------------------------------------------------------------- Computer2 .| 2.0 .| Windows 10 Pro --------------------------------------------------------------------- Computer3 .| 1.2 .| Windows 10 Enterprise --------------------------------------------------------------------- All the computers have C and D volumes. The Require additional authentication at startup Group Policy settings is disabled on all the computers. Which volumes can you encrypt by using BitLocker Drive Encryption (BitLocker)? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. Computer1 only. Computer2 only. Computer3 only. Computer1 and Computer3 only. Computer2 and Computer3 only. Computer1, Computer2 and Computer3.

Your network contains an Active Directory domain named contoso.com. The domain contains a computer named Computer1 that runs Windows 10. On Computer1, you create an NTFS folder and assign Full control permissions to Everyone. You share the folder as Share1 and assign the permissions shown in the following table. *********** TABELA *********** When accessing Share1, which two actions can be performed by User1 but not by User2? Each correct answer presents part of the solution. Delete a file created by another user. Set the permissions for a file. Rename a file created by another user. Take ownership of file. Copy a file created by another user to a subfolder.

You have a computer that runs Windows 10. The computer contains a folder named C:\ISOs that is shared as ISOs. You run several commands on the computer as shown in the following exhibit. *********************************************************************** Administrator: Windows PowerShell PS C:\> Get-SYSShareAccess -Name ISOs Name ScopeName Account Name AccessControlType AccessRight ---- --------- ------------- ----------------- ----------------- ISOs * DESKTOP-AOTN8Q4\User1 Allow Full ISOs * DESKTOP-AOTN8Q4\User2 Allow Read ISOs * DESKTOP-AOTN8Q4\User3 Allow Read PS C:\> Get-Item Isos I Get-ACL I Select -ExpandProperty Access FileSystemRights : FullControl AccessControlType : Allow IdentityReference : NT AUTRORITY\SYSTEM IsInherited : False InheritanceFlags : Containerinherit, ObjectInherit PropagationFlags : None FileSystemRights : FullControl AccessControlType : Allow IdentityReference : BUILTIN\Administrators IsInherited : False InheritanceFlags : Containerinherit, ObjectInherit PropagationFlags : None FileSystemRights : ReadAndExecute, Synchronize AccessControlType : Allow IdentityReference : BUILTIN\Users IsInherited : False InheritanceFlags : Containerinherit, ObjectInherit PropagationFlags : None FileSystemRights : FullControl AccessControlType : Allow IdentityReference : DESKTOP-AOTN8Q4\User2 IsInherited : False InheritanceFlags : Containerinherit, ObjectInherit PropagationFlags : None *********************************************************************** Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic. NOTE: Each correct selection is worth one point. None of the users. Only User1. Only User2. Only User3. Only User 1 and User2. Only User1 and User3. Only User2 and User3. User1. User2, and User3.

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. A user named User1 has a computer named Computer1 that runs Windows 10. Computer1 is joined to an Azure Active Directory (Azure AD) tenant named contoso.com. User1 joins Computer1 to contoso.com by using user1@contoso.com. Computer1 contains a folder named Folder1. Folder1 is in drive C and is shared as Share1. Share1 has the permission shown in the following table. -------------------------------------------------------------------------- Group .| Share permission -------------------------------------------------------------------------- Everyone .| Full control -------------------------------------------------------------------------- AzureAD\user1@contoso.com .| Owner -------------------------------------------------------------------------- A user named User2 has a computer named Computer2 that runs Windows 10. User2 joins Computer2 to contoso.com by using user2@contoso.com. User2 attempts to access Share1 and receives the following error message: “The username or password is incorrect.” You need to ensure that User2 can connect to Share1. Solution: In Azure AD, you create a group named Group1 that contains User1 and User2. You grant Group1 Change access to Share1. Does this meet the goal?. Yes. No.

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. A user named User1 has a computer named Computer1 that runs Windows 10. Computer1 is joined to an Azure Active Directory (Azure AD) tenant named contoso.com. User1 joins Computer1 to contoso.com by using user1@contoso.com. Computer1 contains a folder named Folder1. Folder1 is in drive C and is shared as Share1. Share1 has the permission shown in the following table. -------------------------------------------------------------------------- Group .| Share permission -------------------------------------------------------------------------- Everyone .| Full control -------------------------------------------------------------------------- AzureAD\user1@contoso.com .| Owner -------------------------------------------------------------------------- A user named User2 has a computer named Computer2 that runs Windows 10. User2 joins Computer2 to contoso.com by using user2@contoso.com. User2 attempts to access Share1 and receives the following error message: “The username or password is incorrect.” You need to ensure that User2 can connect to Share1. Solution: You create a local user account on Computer1 and instruct User2 to use the local account to connect to Share1. Does this meet the goal?. Yes. No.

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. A user named User1 has a computer named Computer1 that runs Windows 10. Computer1 is joined to an Azure Active Directory (Azure AD) tenant named contoso.com. User1 joins Computer1 to contoso.com by using user1@contoso.com. Computer1 contains a folder named Folder1. Folder1 is in drive C and is shared as Share1. Share1 has the permission shown in the following table. -------------------------------------------------------------------------- Group .| Share permission -------------------------------------------------------------------------- Everyone .| Full control -------------------------------------------------------------------------- AzureAD\user1@contoso.com .| Owner -------------------------------------------------------------------------- A user named User2 has a computer named Computer2 that runs Windows 10. User2 joins Computer2 to contoso.com by using user2@contoso.com. User2 attempts to access Share1 and receives the following error message: “The username or password is incorrect.” You need to ensure that User2 can connect to Share1. Solution: In Azure AD, you create a group named Group1 that contains User1 and User2. You grant Group1 Modify access to Folder1. Does this meet the goal?. Yes. No.

You have a computer named Computer1 that runs Windows 10. Computer1 contains a folder named Folder1. You need to log any users who take ownership of the files in Folder1. Which two actions should you perform? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point. Modify the folder attributes of Folder1. Modify the Advanced Security Settings for Folder1. From a Group Policy object (GPO), configure the Audit Sensitive Privilege Use setting. From a Group Policy object (GPO), configure the Audit File System setting. Install the Remote Server Administration Tools (RSAT).

Your network contains an Active Directory domain. The domain contains the users shown in the following table. ------------------------------------------ Name .| Member of ------------------------------------------ User1 .| Group1 ------------------------------------------ User2 .| Group 1, Group2 ------------------------------------------ User3 .| Group2 ------------------------------------------ The domain contains a computer named Computer1 that runs Windows 10. Computer1 contains a folder named Folder1 that has the following permissions: User2: Deny Write Group1: Allow Read Group2: Allow Modify Folder1 is shared as Share1$. Share1$ has the following configurations: Everyone: Allow Full control Access-based enumeration: Enabled For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. User1 can list files in \\Computer1\Share1$. User2 can list files in \\Computer1\Share1$. If User3 connects to \\Computer1 from File Explorer, Share1$ will be visible.

You are a network administrator at your company. The company uses an application that checks for network connectivity to a server by sending a ping request to the IPv6 address of the server. If the server replies, the application loads. A user cannot open the application. You manually send the ping request from the computer of the user and the server does not reply. You send the ping request from your computer and the server replies. You need to ensure that the ping request works from the user’s computer. Which Windows Defender firewall rule is a possible cause of the issue?. File and Printer Sharing (NB-Datagram-In). File and Printer Sharing (Echo Request ICMPv6-Out). File and Printer Sharing (NB-Datagram-Out). File and Printer Sharing (Echo Request ICMPv6-In).

Use the drop-down menus to select the answer choice that completes each statement based on the information presented on the graphic. a Group Policy object (GPO). Microsoft Intune. the Internet Explorer Administration (IEAK). *************************. enrolled in Microsoft Intune. managed by using Microsoft System Center Configuration Manager. joined to an on-premises Active Directory domain.

You have a computer named Computer5 that runs Windows 10 that is used to share documents in a workgroup. You create three users named User-a, User-b, User-c by using Computer Management. The users plan to access Computer5 from the network only. You have a folder named Data. The Advanced Security Settings for the Data folder are shown in the Security exhibit. (Click the Security tab). User-a can modify files in the Data share. User-b can delete files in the Data share. User-c can read files in the Data share.

You have a computer that runs Windows 10 and contains the folders shown in the following table. ----------------------------------------------------------- Name .| Path ----------------------------------------------------------- FolderA .| C:\FolderA ----------------------------------------------------------- FolderB .| C:\FolderA\FolderB ----------------------------------------------------------- FolderC .| C:\FolderA\FolderB\FolderC ----------------------------------------------------------- You create the groups shown in the following table. --------------------------------------------- Name .| Members --------------------------------------------- Group1 .| User 1 , User2 --------------------------------------------- Group2 .| User2, User3 --------------------------------------------- Group3 .| User 1 , User3 --------------------------------------------- On FolderA, you disable permission inheritance and select the option to remove all inherited permissions. To each folder, you assign the NTFS permissions shown in the following table. ----------------------------------------------------------- Folder .| Permission ----------------------------------------------------------- FolderA .| Modify to Groupl Read to Group2 ----------------------------------------------------------- FolderB .| Write to Group2 ----------------------------------------------------------- FolderC .| Read to Group3 ----------------------------------------------------------- For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. User1 can read and write all files in FolderC. User2 can delete all files in FolderB. User3 can delete all files in FolderC.

Your network contains an Active Directory domain. The domain contains a computer named Computer1 that runs Windows 10. You need to view the settings to Computer1 by Group Policy objects (GPOs) in the domain and local Group Policies. Which command should you run?. gpresult. secedit. gpupdate. gpfixup.

Your network contains an Active Directory domain. The domain contains computers that run Windows 10. You need to provide a user with the ability to remotely create and modify shares on the computers. The solution must use the principle of least privilege. To which group should you add the user?. Power Users. Remote Management Users. Administrators. Network Configuration Operators.

You have a computer named Computer1 that runs Windows 10 Current branch. Computer1 belongs to a workgroup. You run the following commands on Computer1. New-LocalUser –Name User1 –NoPassword Add-LocalGroupMember Users –Member User1 What is the effect of the configurations?. User1 is prevented from signing in until the user is assigned additional user rights. User1 appears on the sign-in screen and can sign in without a password. User1 is prevented from signing in until an administrator manually sets a password for the user. User1 appears on the sign-in screen and must set a new password on the first sign-in attempt.

You have a computer that runs Windows 10 and is joined to Azure Active Directory (Azure AD). You attempt to open Control Panel and receive the error message shown on the following exhibit. *********** FIGURA *********** You need to be able to access Control Panel. What should you modify?. the PowerShell execution policy. the local Group Policy. the Settings app. a Group Policy preference.

Your domain contains a computer named Computer1 that runs Windows 10. Computer1 does not have a TPM. You need to be able to encrypt the C drive by using Bitlocker Drive Encryption (BitLocker). The solution must ensure that the recovery key is stored in Active Directory. Which two Group Policy settings should you configure? To answer, select the appropriate settings in the answer area. NOTE: Each correct selection is worth one point.

You have a public computer named Computer1 that runs Windows 10/ Computer1 contains a folder named Folder1. You need to provide a user named User1 with the ability to modify the permissions of Folder1. The solution must use the principle of least privilege. Which NTFS permission should you assign to User1?. Full control. Modify. Write. Read & execute.

You have 10 computers that run Windows 10 and have BitLocker Drive Encryption (BitLocker) enabled. You plan to update the firmware of the computers. You need to ensure that you are not prompted for the BitLocker recovery key on the next restart. The drive must be protected by BitLocker on subsequent restarts. Which cmdlet should you run?. Unlock-BitLocker. Disable-BitLocker. Add-BitLockerKeyProtector. Suspend-BitLocker.

You have a computer named Computer1 that runs Windows 10. You are troubleshooting Group Policy objects (GPOs) on Computer1. You run gpresult /user user1 /v and receive the output shown in the following exhibit. ********************************************************************** USER SETTINGS -------------- Last time Group Policy was applied: 11/11/2018 at 8 20 07 AM Group Policy was applied from: N/A Group Policy slow link threshold: 500 kbps Domain Name: COMPUTER1 Domain Type: <Local Computer> Applied Group Policy Objects ------------------------------ ILocal Group Policy\user1 Local Group Policy The user is a part of the following security groups ---------------------------------------------------- High Mandatory Level Everyone Local account and member of Administrators group BUILTIN\Administrators BUILTIN\Users Performance Log Users NT AUTHORITY\INTERACTIVE CONSOLE LOGON NT AUTHORITYNAuthenticated Users This Organization Local account LOCAL Cloud Account Authentication ********************************************************************** Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic. NOTE: Each correct selection is worth one point. One local GPO is. One domain GPO and one local GPO are. Two local GPOs are. Two domain GPOs are. ****************************. open the Local Group Policy Editor console. open the Group Policy Management console. add the Group Policy Object Editor snap-in to a console.

You have a computer named Computer1 that runs Windows 10. Computer1 is in a workgroup. Computer1 contains the local users shown in the following table. ---------------------------- Name .| Member of ---------------------------- User1 .| Group1, Group2 ---------------------------- User2 .| Group1 ---------------------------- You create a folder named Folder1 that has the permissions shown in the following table. ----------------------------------------------------------------------------------------------------------- Principal .| Access .| Inherited from .| Applies to ----------------------------------------------------------------------------------------------------------- Group2 .| Deny Write .| None .| This folder, subfolders, and files ----------------------------------------------------------------------------------------------------------- Groupl .| Allow Full control .| None .| This folder, subfolders, and files ----------------------------------------------------------------------------------------------------------- Administrators .| Allow Full control .| None .| This folder, subfolders, and files ----------------------------------------------------------------------------------------------------------- You create a file named File1.txt in Folder1 and allow Group2 Full control permissions to File1.txt. For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. User1 can create a new file in Folder1. User1 can save changes to File1.txt. User2 can view the content of File1.txt.

Report abuse