Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...

January 1, 2019 No Comments READ MORE +

What should you do?

Your network contains an Active Directory forest named contoso.com. A partner company has a forest named fabrikam.com. Each forest contains one domain. You need to provide access for a group named Research in fabrikam.com to resources in contoso.com. The solution must use the principle of least privilege. What should you...

January 1, 2019 No Comments READ MORE +

Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...

December 31, 2018 No Comments READ MORE +

What should you do?

Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details provided in a question...

December 30, 2018 No Comments READ MORE +

Which command should you run?

HOTSPOT You have a server named Server1 that runs Windows Server 2016. Server1 has the Web Application Proxy role service installed. You plan to deploy Remote Desktop Gateway (RD Gateway) services. Clients will connect to the RD Gateway services by using various types of devices including Windows, iOS and Android...

December 28, 2018 No Comments READ MORE +

Which GPOs will apply to User2 when the user signs in to Computer1 after the link for A6 is disabled?

Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series....

December 27, 2018 No Comments READ MORE +

Which five GPOs will apply to User1 in sequence when the user signs in to Computer1 after the link is enforced?

DRAG DROP Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in...

December 26, 2018 No Comments READ MORE +

What should you do?

Your network contains an Active Directory domain named contoso.com. The domain contains a Group Policy object (GPO) named GPO1. You configure the Internet Settings preference in GPO1 as shown in the exhibit. (Click the Exhibit button.) A user reports that the homepage of Internet Explorer is not set to http://www.contoso.com....

December 25, 2018 No Comments READ MORE +

What should you do first?

You network contains an Active Directory domain named contoso.com. The domain contains an enterprise certification authority (CA) named CA1. You have a test environment that is isolated physically from the corporate network and the Internet. You deploy a web server to the test environment. On CA1, you duplicate the Web...

December 25, 2018 No Comments READ MORE +

What should you do?

You have users that access web applications by using HTTPS. The web applications are located on the servers in your perimeter network. The servers use certificates obtained from an enterprise root certification authority (CA). The certificates are generated by using a custom template named WebApps. The certificate revocation list (CRL)...

December 25, 2018 No Comments READ MORE +