What should you recommend deploying?

Your network contains an Active Directory domain named contoso.com. The domain contains five servers. All servers run Windows Server 2016. A new security policy states that you must modify the infrastructure to meet the following requirements: * Limit the nghts of administrators. * Minimize the attack surface of the forest...

April 28, 2020 No Comments READ MORE +

Which command should you run?

HOTSPOT Your network contains an Active Directory domain named contoso.com. You plan to deploy an application named App1.exe. You need to verify whether Control Flow Guard is enabled for App1.exe. Which command should you run? To answer, select the appropriate options in the answer area. View AnswerAnswer: Explanation: References: https://msdn.microsoft.com/en-us/library/windows/desktop/mt637065(v=vs.85).aspx

April 28, 2020 No Comments READ MORE +

What should you do?

HOTSPOT Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2016. The hardware configuration on Server1 meets the requirements for Credential Guard. You need to enable Credential Guard on Server1. What should you do? To answer, select the appropriate...

April 28, 2020 No Comments READ MORE +

Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...

April 27, 2020 No Comments READ MORE +

What should you do?

Note: This question is part of a series of questions that use the same scenario. For yourconvenience, the scenario is repeated in each question. Each question presents a different goaland answer choices, but the text of the scenario is exactly the same in each question in this series. Start of...

April 27, 2020 No Comments READ MORE +

What should you do?

Your network contains an Active Directory domain named contoso.com. The domain contains four global groups named Group1, Group2, Group3, and Group4. A user named User1 is a member of Group3. You have an organizational unit (OU) named OU1 that contains computer accounts. A Group Policy object (GPO) named GPO1 is...

April 27, 2020 No Comments READ MORE +

How should you protect each virtual machine?

HOTSPOT You plan to deploy three encrypted virtual machines that use Secure Boot. The virtual machines will be configured as shown in the following table. How should you protect each virtual machine? To answer, select the appropriate options in the answer area. View AnswerAnswer: Explanation: References: https://cloudbase.it/hyperv-shielded-vms-part-1/ https://www.itprotoday.com/server-virtualization/difference-between-shielded-vm-and-encryption­supported-vm

April 27, 2020 No Comments READ MORE +

Which tool should you use?

Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details provided in a question...

April 27, 2020 No Comments READ MORE +

How should you configure the CodeIntegrity template?

Your network contains an Active Directory domain named contoso.com. The domain contains a certification authority (CA). You need to implement code integrity policies and sign them by using certificates issued by the CA. You plan to use the same certificate to sign policies on multiple computers. You duplicate the Code...

April 26, 2020 No Comments READ MORE +

Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...

April 26, 2020 No Comments READ MORE +