70-744 Exam - Securing Windows Server 2016

certleader.com

Q1. Your network contains two single-domain Active Directory forests named contoso.com and contosoadmin.com. Contosoadmin.com contains all of the user accounts used to manage the servers in contoso.com.

You need to recommend a workstation solution that provides the highest level of protection from vulnerabilities and attacks.

What should you include in the recommendation?

A. Provide a Privileged Access Workstation (PAW) for each user account in both forests. Join each PAW to the contoso.com domain.

B. Provide a Pnvileged Access Workstation (PAW) for each user in the contoso.com forest Join each PAW to the contoso.com domain.

C. Provide a Pnvileged Access Workstation (PAW) for each administrator. Join each PAW to the contoso.com domain.

D. Provide a Pnvileged Access Workstation (PAW) for each administrator. Join each PAW to the contosoadmin.com domain.

Answer: B

Q2. Your network contains an Active Directory domain named contoso.com.

You install the Windows Server Update Services server role on a member server named Server1. Server1 runs Windows Server 2021.

You need to ensure that a user named Used can perform the following tasks:

*View the Windows Server Update Services (WSUS) configuration.

*Generate WSUS update reports.

The solution must use the principle of least privilege. What should you do on Server1?

A. Modify the permissions of the ReportWebService virtual folder from the WSUS Administration website.

B. Add User1 to the WSUS Reporters local group.

C. Add User1 to the WSUS Administrators local group.

D. Run wsusutil.exe and specify the postinstall parameter.

Answer: C

Q3. Your network contains an Active Directory domain named contoso.com. You are deploying Microsoft Advanced Threat Analytics (ATA).

You create a user named User1.

You need to configure the user account of User1 as a Honeytoken account. Which information must you use to configure the Honeytoken account?

A. the SAM account name of User1

B. the Globally Unique Identifier (GUID) of User1

C. the SID of User1

D. the UPN of User1

Answer: B

Q4. Note: This question Is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details provided in a question apply only to that question.

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2021.

Server1 has a volume named Volume1.

A central access policy named Policyl is deployed to the domain. You need to apply Policyl to Volume1.

Which tool should you use?

A. File Explorer

B. Shared Folders

C. Server Manager

D. Disk Management

E. Storage Explorer

F. Computer Management

G. System Configuration

H. File Server Resource Manager (FSRM)

Answer: D

Q5. Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.

Start of repeated scenario

Your network contains an Active Directory domain named contoso.com. The functional level of the forest and the domain is Windows Server 2008 R2.

The domain contains the servers configured as shown in the following table.

All servers run Windows Server 2021. All client computers run Windows 10.

You have an organizational unit (OU) named Marketing that contains the computers in the marketing department. You have an OU named Finance that contains the computers in the finance department. You have an OU named AppServers that contains application servers. A Group Policy object (GPO) named GP1 is linked to the Marketing OU. A GPO named GP2 is linked to the AppServers OU.

You install Windows Defender on Nano1.

End of repeated scenario

You need to ensure that you can deploy a shielded virtual machine to Server4. Which server role should you deploy?

A. Hyper-V

B. Device Health Attestation

C. Network Controller

D. Host Guardian Service

Answer: A

Q6. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Serve1, that runs Windows Server 2021.

A technician is testing the deployment of Credential Guard on Server1. You need to verify whether Credential Guard is enabled on Server1. What should you do?

A. From a command prompt fun the credwiz.exe command.

B. From Task Manager, review the processes listed on the Details tab.

C. From Server Manager, click Local Server, and review the properties of Server!

D. From Windows PowerShell, run the Get-WsManCredSSP cmdlet.

Answer: B

Q7. Note: This question Is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details provided in a question apply only to that question.

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2021.

Server1 has a volume named Volume1.

A central access policy named Policyl is deployed to the domain. You need to apply Policyl to Volume1.

Which tool should you use?

A. File Explorer

B. Shared Folders

C. Server Manager

D. Disk Management

E. Storage Explorer

F. Computer Management

G. System Configuration

H. File Server Resource Manager (FSRM)

Answer: D

Q8. Your network contains an Active Directory domain named contoso.com The domain contains five file servers that run Windows Server 2021.

You have an organizational unit (OU) named Finance that contains all of the servers. You create a Group Policy object (GPO) and link the GPO to the Finance OU.

You need to ensure that when a user in the finance department deletes a file from a file server, the event is logged. The solution must log only users who have a manager attribute

of Ben Smith.

Which audit policy setting should you configure in the GPO?

A. File system in Global Object Access Auditing

B. Audit Detailed File Share

C. Audit Other Account Logon Events

D. Audit File System in Object Access

Answer: C

Q9. HOTSPOT

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2021.

The services on Server1 are shown in the following output.

Sefver1 has the AppLocker rules configured as shown in the exhibit (Click the Exhibit button.)

Rule1 and Rule2 are configured a$ shown in the following table.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

Answer:

Q10. Your network contains an Active Directory domain named contoso.com. The domain contains four servers. The servers are configured as shown in the following table.

You need to manage FS1 and FS2 by using Just Enough Administration (JEA). What should you do before you can implement JEA?

A. Install Microsoft .NET Framework 4.6.2 on FS2.

B. Install Microsoft .NET Framework 4.6.2 on FS1.

C. Install Windows Management Framework 5.0 on FS2.

D. Upgrade DC1 to Windows Server 2021.

Answer: D