What should you recommend deploying?
Your network contains an Active Directory domain named contoso.com. The domain contains five servers. All servers run Windows Server 2016. A new security policy states that you must modify the infrastructure to meet the following requirements: * Limit the nghts of administrators. * Minimize the attack surface of the forest...
Which command should you run?
HOTSPOT Your network contains an Active Directory domain named contoso.com. You plan to deploy an application named App1.exe. You need to verify whether Control Flow Guard is enabled for App1.exe. Which command should you run? To answer, select the appropriate options in the answer area. View AnswerAnswer: Explanation: References: https://msdn.microsoft.com/en-us/library/windows/desktop/mt637065(v=vs.85).aspx
What should you do?
HOTSPOT Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2016. The hardware configuration on Server1 meets the requirements for Credential Guard. You need to enable Credential Guard on Server1. What should you do? To answer, select the appropriate...
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...
What should you do?
Note: This question is part of a series of questions that use the same scenario. For yourconvenience, the scenario is repeated in each question. Each question presents a different goaland answer choices, but the text of the scenario is exactly the same in each question in this series. Start of...
What should you do?
Your network contains an Active Directory domain named contoso.com. The domain contains four global groups named Group1, Group2, Group3, and Group4. A user named User1 is a member of Group3. You have an organizational unit (OU) named OU1 that contains computer accounts. A Group Policy object (GPO) named GPO1 is...
How should you protect each virtual machine?
HOTSPOT You plan to deploy three encrypted virtual machines that use Secure Boot. The virtual machines will be configured as shown in the following table. How should you protect each virtual machine? To answer, select the appropriate options in the answer area. View AnswerAnswer: Explanation: References: https://cloudbase.it/hyperv-shielded-vms-part-1/ https://www.itprotoday.com/server-virtualization/difference-between-shielded-vm-and-encryptionsupported-vm
Which tool should you use?
Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details provided in a question...
How should you configure the CodeIntegrity template?
Your network contains an Active Directory domain named contoso.com. The domain contains a certification authority (CA). You need to implement code integrity policies and sign them by using certificates issued by the CA. You plan to use the same certificate to sign policies on multiple computers. You duplicate the Code...
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...