What should you include in the recommendation?
Your network contains two single-domain Active Directory forests named contoso.com and contosoadmin.com. Contosoadmin.com contains all of the user accounts used to manage the servers in contoso.com. You need to recommend a workstation solution that provides the highest level of protection from vulnerabilities and attacks. What should you include in the...
Which Group Policy setting should you configure?
Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series....
Which file should you create?
Note: This question is part of a series of questions that use the same scenario. For yourconvenience, the scenario is repeated in each question. Each question presents a different goaland answer choices, but the text of the scenario is exactly the same in each question in this series. Start of...
How should you complete the Windows PowerShell script?
HOTSPOT Your network contains an Active Directory forest named contoso.com. The forest has Microsoft Identity Manager (MIM) 2016 deployed. You implement Privileged Access Management (PAM). You need to request privileged access from a client computer in contoso.com by using PAM. How should you complete the Windows PowerShell script? To answer,...
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...
What should you recommend deploying?
Your network contains an Active Directory domain named contoso.com. The domain contains five servers. All servers run Windows Server 2016. A new security policy states that you must modify the infrastructure to meet the following requirements: * Limit the nghts of administrators. * Minimize the attack surface of the forest...
How should you protect each virtual machine?
HOTSPOT You plan to deploy three encrypted virtual machines that use Secure Boot. The virtual machines will be configured as shown in the following table. How should you protect each virtual machine? To answer, select the appropriate options in the answer area. View AnswerAnswer: Explanation: References: https://cloudbase.it/hyperv-shielded-vms-part-1/ https://www.itprotoday.com/server-virtualization/difference-between-shielded-vm-and-encryptionsupported-vm
Which tool should you use?
Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details provided in a question...
What should you do first?
Your network contains an Active Directory forest named contoso.com. The network is connected to the Internet. You have 100 point-of-sale (POS) devices that run Windows 10. The devices cannot access the Internet. You deploy Microsoft Operations Management Suite (OMS). You need to use OMS to collect and analyze data from...
What should you configure?
Your network contains an Active Directory domain named contoso.com. You are deploying Microsoft Advanced Threat Analytics (ATA) to the domain. You install the ATA Center on server named Server1 and the ATA Gateway on a server named Server2. You need to ensure that Server2 can collect NTLM authentication events. What...