Download Securing Windows Server 2016.70-744.PracticeTest.2019-04-28.84q.vcex

Vendor: Microsoft
Exam Code: 70-744
Exam Name: Securing Windows Server 2016
Date: Apr 28, 2019
File Size: 1 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Purchase
Coupon: EXAM_HUB

Discount: 20%

Demo Questions

Question 1
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. 
After you answer a question in this sections, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. 
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2016. All client computers run Windows 10. 
The relevant objects in the domain are configured as shown in the following table. 
  
You need to assign User1 the right to restore files and folders on Server1 and Server2. 
Solution: You add User1 to the Backup Operators group in contoso.com.
Does this meet the goal?
  1. Yes
  2. No
Correct answer: A
Explanation:
References:https://technet.microsoft.com/en-us/library/cc771990(v=ws.11).aspx
References:
https://technet.microsoft.com/en-us/library/cc771990(v=ws.11).aspx
Question 2
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. 
After you answer a question in this sections, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. 
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2016. All client computers run Windows 10. 
The relevant objects in the domain are configured as shown in the following table. 
  
You need to assign User1 the right to restore files and folders on Server1 and Server2. 
Solution: You create a Group Policy object (GPO), link it to the Operations Users OU, and modify the Users Rights Assignment in the GPO.
Does this meet the goal?
  1. Yes
  2. No
Correct answer: B
Explanation:
References:https://technet.microsoft.com/en-us/library/cc771990(v=ws.11).aspx
References:
https://technet.microsoft.com/en-us/library/cc771990(v=ws.11).aspx
Question 3
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. 
After you answer a question in this sections, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. 
Your network contains an Active Directory domain named contoso.com. The domain contains multiple Hyper-V hosts. 
You need to deploy several critical line-of-business applications to the network to meet the following requirements:
  • The resources of the applications must be isolated from the physical host. 
  • Each application must be prevented from accessing the resources of the other applications. 
  • The configurations of the applications must be accessible only from the operating system that hosts the application. 
Solution: You deploy a separate Windows container for each application.
Does this meet the goal?
  1. Yes
  2. No
Correct answer: A
Explanation:
References:https://docs.microsoft.com/en-us/virtualization/windowscontainers/about/
References:
https://docs.microsoft.com/en-us/virtualization/windowscontainers/about/
Question 4
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. 
After you answer a question in this sections, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. 
Your network contains an Active Directory domain named contoso.com. The domain contains multiple Hyper-V hosts. 
You need to deploy several critical line-of-business applications to the network to meet the following requirements:
  • The resources of the applications must be isolated from the physical host. 
  • Each application must be prevented from accessing the resources of the other applications. 
  • The configurations of the applications must be accessible only from the operating system that hosts the application. 
Solution: You deploy a separate Hyper-V container for each application.
Does this meet the goal? 
  1. Yes
  2. No
Correct answer: A
Explanation:
References:https://docs.microsoft.com/en-us/virtualization/windowscontainers/about/
References:
https://docs.microsoft.com/en-us/virtualization/windowscontainers/about/
Question 5
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. 
After you answer a question in this sections, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. 
Your network contains an Active Directory domain named contoso.com. The domain contains multiple Hyper-V hosts. 
You need to deploy several critical line-of-business applications to the network to meet the following requirements:
  • The resources of the applications must be isolated from the physical host. 
  • Each application must be prevented from accessing the resources of the other applications. 
  • The configurations of the applications must be accessible only from the operating system that hosts the application. 
Solution: You deploy one Windows container to host all of the applications.
Does this meet the goal?
  1. Yes
  2. No
Correct answer: B
Explanation:
Referenceshttps://docs.microsoft.com/en-us/virtualization/windowscontainers/about/
References
https://docs.microsoft.com/en-us/virtualization/windowscontainers/about/
Question 6
Your network contains an Active Directory domain named contoso.com. The domain contains 1,000 client computers that run Windows 10. 
A security audit reveals that the network recently experienced a Pass-the-Hash attack. The attack was initiated from a client computer and accessed Active Directory objects restricted to the members of the Domain Admins group. 
You need to minimize the impact of another successful Pass-the-Hash attack on the domain. 
What should you recommend?
  1. Instruct all users to sign in to a client computer by using a Microsoft account.
  2. Move the computer accounts of all the client computers to a new organizational unit (OU). Remove the permissions to the new OU from the Domain Admins group.
  3. Instruct all administrators to use a local Administrators account when they sign in to a client computer.
  4. Move the computer accounts of the domain controllers to a new organizational unit (OU). Remove the permissions to the new OU from the Domain Admins group.
Correct answer: C
Explanation:
References:https://en.wikipedia.org/wiki/Pass_the_hash#Mitigations
References:
https://en.wikipedia.org/wiki/Pass_the_hash#Mitigations
Question 7
Your network contains an Active Directory forest named contoso.com. The forest functional level is Windows Server 2012. All servers run Windows Server 2016. 
You create a new bastion forest named admin.contoso.com. The forest functional level of admin.contoso.com is Windows Server 2012 R2. 
You need to implement a Privileged Access Management (PAM) solution. 
Which two actions should you perform? Each correct answer presents part of the solution.
  1. Raise the forest functional level of admin.contoso.com.
  2. Deploy Microsoft Identify Management (MIM) 2016 to admin.contoso.com. 
  3. Configure contoso.com to trust admin.contoso.com.
  4. Deploy Microsoft Identity Management (MIM) 2016 to contoso.com.
  5. Raise the forest functional level of contoso.com.
  6. Configure admin.contoso.com to trustcontoso.com.
Correct answer: BC
Explanation:
References:https://docs.microsoft.com/en-us/microsoft-identity-manager/pam/hardware-software-requirementshttps://docs.microsoft.com/en-us/microsoft-identity-manager/pam/planning-bastion-environment
References:
https://docs.microsoft.com/en-us/microsoft-identity-manager/pam/hardware-software-requirements
https://docs.microsoft.com/en-us/microsoft-identity-manager/pam/planning-bastion-environment
Question 8
Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2016. 
Server1 is configured as a domain controller. 
You configure Server1 as a Just Enough Administration (JEA) endpoint. You configure the required JEA rights for a user named User1. 
You need to tell User1 how to manage Active Directory objects from Server2. 
What should you tell User1 to do first on Server2?
  1. From a command prompt, runntdsutil.exe.
  2. From Windows PowerShell, run the Import-Module cmdlet.
  3. From Windows PowerShell, run the Enter-PSSession cmdlet.
  4. Install the management consoles for Active Directory, and then launch Active Directory Users and Computers.
Correct answer: C
Explanation:
References:https://blogs.technet.microsoft.com/privatecloud/2014/05/14/just-enough-administration-step-by-step/
References:
https://blogs.technet.microsoft.com/privatecloud/2014/05/14/just-enough-administration-step-by-step/
Question 9
Your network contains an Active Directory domain named contoso.com. The domain contains 100 servers. 
You deploy the Local Administrator Password Solution (LAPS) to the network. 
You deploy a new server named FinanceServer5, and join FinanceServer5 to the domain. 
You need to ensure that the passwords of the local administrators of FinanceServer5 are available to the LAPS administrators. 
What should you do?
  1. On FinanceServer5, register AdmPwd.dll.
  2. On FinanceServer5, install the LAPS Windows PowerShell module.
  3. In the domain, modify the permissions for the computer account of FinanceServer5.
  4. In the domain, modify the permissions of the Domain Controllers organizational unit (OU).
Correct answer: A
Explanation:
References:https://gallery.technet.microsoft.com/Step-by-Step-Deploy-Local-7c9ef772
References:
https://gallery.technet.microsoft.com/Step-by-Step-Deploy-Local-7c9ef772
Question 10
Your network contains an Active Directory domain named contoso.com. The domain contains four servers. The servers are configured as shown in the following table. 
  
You need to manage FS1 and FS2 by using Just Enough Administration (JEA). 
What should you do before you can implement JEA?
  1. Install Microsoft.NET Framework 4.6.2 on FS2.
  2. Install Microsoft.NET Framework 4.6.2 on FS1.
  3. Install Windows Management Framework 5.0 on FS2.
  4. Upgrade DC1 to Windows Server 2016.
Correct answer: C
Explanation:
References:https://blogs.technet.microsoft.com/privatecloud/2014/05/14/just-enough-administration-step-by-step/
References:
https://blogs.technet.microsoft.com/privatecloud/2014/05/14/just-enough-administration-step-by-step/
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!