Categories
70-742 Dumps

70-742 Real Exam Dumps Questions and answers 51-60

Get Full Version of the Exam
http://www.EnsurePass.com/70-742.html

Question No.51

HOTSPOT

You have a server named Server1 that runs Windows Server 2016. Server1 has the Web Application Proxy role service installed.

You publish an application named App1 by using the Web Application Proxy.

You need to change the URL that users use to connect to App1 when they work remotely. Which command should you run?

To answer, select the appropriate options in the answer area.

image

Correct Answer:

image

Question No.52

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution. Determine whether the solution meets the stated goals.

Your network contains an Active Directory domain named contoso.com. The domain contains a DNS server named Server1. All client computers run Windows 10.

On Server1, you have the following zone configuration.

image

You need to ensure that all of the client computers in the domain perform DNSSEC validation for the fabrikam.com namespace.

Solution: From a Group Policy object (GPO) in the domain, you add a rule to the Name Resolution Policy Table (NRPT).

Does this meet the goal?

  1. Yes

  2. No

Correct Answer: A

Explanation:

The NRPT stores configurations and settings that are used to deploy DNS Security Extensions (DNSSEC), and also stores information related to DirectAccess, a remote access technology.

Note: The Name Resolution Policy Table (NRPT) is a new feature available in Windows Server 2008 R2. The NRPT is a table that contains rules you can configure to specify DNS settings or special behavior for names or namespaces. When performing DNS name resolution, the DNS Client service checks the NRPT before sending a DNS query. If a DNS query or response matches an entry in the NRPT, it is handled according to settings in the policy. Queries and responses that do not match an NRPT entry are processed normally.

References:

https://technet.microsoft.com/en-us/library/ee649207(v=ws.10).aspx

Question No.53

HOTSPOT

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2016.

Server1 has Microsoft System Center 2016 Virtual Machine Manager (VMM) installed. Server2 has IP Address Management (IPAM) installed.

You create a domain user named User1.

You need to integrate IPAM and VMM. VMM must use the account of User1 to manage IPAM. The solution must use the principle of least privilege.

What should you do on each server?

To answer, select the appropriate options in the answer area.

image

Correct Answer:

image

Question No.54

HOTSPOT

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2016.

Server1 has IP Address Management (IPAM) installed. Server2 has the DHCP Server role installed. The IPAM server retrieves data from Server2.

You create a domain user account named User1.

You need to ensure that User1 can use IPAM to manage DHCP. Which command should you run on Server1?

To answer, select the appropriate options in the answer area.

image

Correct Answer:

image

Question No.55

HOTSPOT

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2016.

Server1 has IP Address Management (IPAM) installed. Server2 has the DHCP Server role installed. The IPAM server retrieves data from Server2.

The domain has two users named User1 and User2 and a group named Group1. User1 is the only member of Group1.

Server1 has one IPAM access policy. You edit the access policy as shown in the Policy exhibit. (Click the Exhibit button.)

image

The DHCP scopes are configured as shown in the Scopes exhibit. (Click the Exhibit button.)

image

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

image

Correct Answer:

image

Question No.56

HOTSPOT

Your network contains an Active Directory domain named contoso.com. The domain contains three servers named Server1, Server2, and Server3 that run Windows Server 2016.

Server1 has IP Address Management (IPAM) installed. Server2 and Server3 have the DHCP Server role installed and have several DHCP scopes configured. The IPAM server retrieves data from Server2 and Server3.

A domain user named User1 is a member of the groups shown in the following table.

image

On Server1, you create a security policy for User1. The policy grants the IPAM DHCP Scope Administrator Role with the \Global access scope to the user.

Which actions can User1 perform?

To answer, select the appropriate options in the answer area.

image

Correct Answer:

image

Question No.57

HOTSPOT

Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server1 that runs Windows Server 2016.

Server1 has IP Address Management (IPAM) installed. IPAM uses a Windows Internal Database. You install Microsoft SQL Server on Server1.

You plan to move the IPAM database to SQL Server.

You need to create a SQL Server login for the IPAM service account. For which user should you create the login?

To answer, select the appropriate options in the answer area.

image

Correct Answer:

image

Question No.58

HOTSPOT

Your company has a testing environment that contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2016. Server1 has IP Address Management (IPAM) installed. IPAM has the following configuration.

image

The IPAM Overview page from Server Manager is shown in the IPAM Overview exhibit. (Click the Exhibit button.)

image

The group policy configurations are shown in the GPO exhibit. (Click the Exhibit button.)

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

image

Correct Answer:

image

Question No.59

HOTSPOT

You have a server named Server1 that runs Windows Server 2016. Server1 has the Web Application Proxy role service installed.

You need to publish Microsoft Exchange Server 2013 services through the Web Application Proxy. The solution must use preauthentication whenever possible.

How should you configure the preauthentication method for each service? To answer, select the appropriate options in the answer area.

image

Correct Answer:

image

Question No.60

DRAG DROP

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2016.

You install IP Address Management (IPAM) on Server1.

You need to manually start discovery of servers that IPAM can manage in contoso.com. Which three cmdlets should you run in sequence?

To answer, move the appropriate cmdlets from the list of cmdlets to the answer area and arrange them in the correct order.

image

Correct Answer:

image

Get Full Version of 70-742 Dumps

Categories
70-742 Dumps

70-742 Real Exam Dumps Questions and answers 61-70

Get Full Version of the Exam
http://www.EnsurePass.com/70-742.html

Question No.61

HOTSPOT

Your network contains an Active Directory forest named contoso.com.

Your company has a custom application named ERP1. ERP1 uses an Active Directory Lightweight Directory Services (AD LDS) server named Server1 to authenticate users.

You have a member server named Server2 that runs Windows Server 2016. You install the Active Directory Federation Services (AD FS) server role on Server2 and create an AD FS farm.

You need to configure AD FS to authenticate users from the AD LDS server. Which cmdlets should you run?

To answer, select the appropriate options in the answer area.

image

Correct Answer:

image

Question No.62

HOTSPOT

You have a server named Server1 that runs Windows Server 2016. Server1 has the Web Application Proxy role service installed.

You plan to deploy Remote Desktop Gateway (RD Gateway) services. Clients will connect to the RD Gateway services by using various types of devices including Windows, iOS and Android devices.

You need to publish the RD Gateway services through the Web Application Proxy. Which command should you run?

To answer, select the appropriate options in the answer area.

image

Correct Answer:

image

Question No.63

DRAG DROP

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2016.

Server1 has IP Address Management (IPAM) installed. Server2 has Microsoft System Center 2016 Virtual Machine Manager (VMM) installed.

You need to integrate IPAM and VMM.

Which types of objects should you create on each server?

To answer, drag the appropriate object types to the correct servers. Each object type may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

image

Correct Answer:

image

Question No.64

HOTSPOT

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2016.

You install IP Address Management (IPAM) on Server1. You select the automatic provisioning method, and then you specify a prefix of IPAM1.

You need to configure the environment for automatic IPAM provisioning. Which cmdlet should you run?

To answer, select the appropriate options in the answer area.

image

Correct Answer:

image

Question No.65

HOTSPOT

Your network contains an Active Directory domain named contoso.com. The domain contains four servers named Server1, Server2, Server3, and Server4 that run Windows Server 2016.

Server1 has IP Address Management (IPAM) installed. Server2, Server3, and Server 4 have the DHCP Server role installed. IPAM manages Server2, Server3, and Server4.

A domain user named User1 is a member of the groups shown in the following table.

image

Which actions can User1 perform?

To answer, select the appropriate options in the answer area.

image

Correct Answer:

image

Question No.66

Your network contains an Active Directory domain named contoso.com. Domain users use smart cards to sign in to their client computer.

Some users report that it takes a long time to sign in to their computer and that the logon attempt times out, so they must restart the sign in process.

You discover that the issues to checking the certificate revocation list (CRL) of the smart card certificates.

You need to resolve the issue without diminishing the security of the smart card logons. What should you do?

  1. From the properties of the smart card#39;s certificate template, modify the Request Handling settings.

  2. From the properties of the smart card#39;s certificate template, modify the Issuance Requirements settings.

  3. Deactivate certificate revocation checks on the computers.

  4. Implement an Online Certification Status Protocol (OCSP) responder.

Correct Answer: D

Question No.67

Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details provided in a question apply only to that question.

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2016.

You need to create a snapshot of the Active Directory database on DC1. Which tool should you use?

  1. Dsadd quota

  2. Dsmod

  3. Active Directory Administrative Center

  4. Dsacls

  5. Dsmain

  6. Active Directory Users and Computers

  7. Ntdsutil

  8. Group Policy Management Console

Correct Answer: E

Question No.68

HOTSPOT

Your network contains an Active Directory forest named contoso.com. The forest contains an Active Directory Federation Services (AD FS) farm.

You install Windows Server 2016 on a server named Server2.

You need to configure Server2 as a node in the federation server farm. Which cmdlets should you run?

To answer, select the appropriate options in the answer area.

image

Correct Answer:

image

Question No.69

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a server named Web1 that runs Windows Server 2016.

You need to list all the SSL certificates on Web1 that will expire during the next 60 days. Solution: You run the following command.

image

Does this meet the goal?

  1. Yes

  2. No

Correct Answer: B

Question No.70

The network contains an Active Directory forest named contoso.com.

The forest contains three domain controllers configured as shown in the following table.

image

The company physically relocates Server2 from the Montreal office to the Seattle office.

You discover that both Server1 and Server2 authenticate users who sign in to the client computers in the Montreal office. Only Server3 authenticates users who sign in to the computers in the Seattle office.

You need to ensure that Server2 authenticates the users in the Seattle office during normal network operations.

What should you do?

  1. From Windows PowerShell, run the Set-ADReplicationSite cmdlet.

  2. From Active Directory Users and Computers, modify the Location Property of Server2.

  3. From Network Connections on Server2, modify the Internet Protocol Version 4 (TCP/IPv4) configuration.

  4. From Windows PowerShell, run the Move-ADDirectoryServer cmdlet.

Correct Answer: D

Get Full Version of 70-742 Dumps

Categories
70-742 Dumps

70-742 Real Exam Dumps Questions and answers 71-80

Get Full Version of the Exam
http://www.EnsurePass.com/70-742.html

Question No.71

You have an enterprise certification authority (CA). You create a global security group named Group1.

You need to provide members of Group1 with the ability to issue and manage certificates. The solution must prevent the Group1 members from managing certificates requested by members of the Domain Admins group.

Which two actions should you perform? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

  1. From the CA properties, modify the Policy Module settings.

  2. From the Certificate Templates console, modify the Security settings of the Administrator certificate template.

  3. From the CA properties, modify the security settings.

  4. From the CA properties, modify the Enrollment Agents settings.

  5. From the CA properties, modify the Certificate Managers Settings.

  6. From the Certificate Templates console, modify the Security settings of the User certificate template.

Correct Answer: CE

Question No.72

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You deploy a new Active Directory forest.

You need to ensure that you can create a group Managed Service Account (gMSA) for multiple member servers.

Solution: You configure Kerberos constrained delegation on the computer account of each domain controller.

Does this meet the goal?

  1. Yes

  2. No

Correct Answer: B

Question No.73

HOTSPOT

Your network contains an Active Directory domain named contoso.com.

You have an administrative computer named Computer1 that runs Windows Server 2016. From Computer1, you edit a Group Policy object (GPO) named GPO1 as shown in the exhibit.

image

You receive a new administrative template named Template1. Template1 consists of Template1.adml. Template1 is in English US.

You need to ensure that the settings of Template1 appear under the Administrative Templates node.

To where should you copy the Template1 files?

To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

image

Correct Answer:

image

Question No.74

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a server named Web1 that runs Windows Server 2016.

You need to list all the SSL certificates on Web1 that will expire during the next 60 days. Solution: You run the following command.

Get-ChildItem Cert:\LocalMachine\Trust |? { $_.NotAfter -It (Get-Date).AddDays( 60 ) } Does this meet the goal?

  1. Yes

  2. No

Correct Answer: A

Question No.75

DRAG DROP

You network contains an Active Directory domain named contoso.com. The domain contains an enterprise certification authority (CA).

A user named Admin1 is a member of the Domain Admins group.

You need to ensure that you can archive keys on the CA. The solution must use Admin1 as a key recovery agent.

Which four actions should you perform in sequence?

To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

image

Correct Answer:

image

Question No.76

You network contains an Active Directory domain named contoso.com. The domain contains an Active Directory Federation Services (AD FS) server named ADFS1, a Web Application Proxy server named WAP1, and a web server named Web1.

You need to publish a website on Web1 by using the Web Application Proxy. Users will authenticate by using OAuth2 preauthentication.

What should you do first?

  1. On Web1, add site bindings.

  2. On Web1, add handler mappings.

  3. On ADFS1, enable an endpoint.

  4. On ADFS1, add a claims provider trust.

Correct Answer: D

Question No.77

HOTSPOT

Your network contains an Active Directory domain named contoso.com.

You need to view a list of all the domain user accounts that are enabled. But whose users have not signed in during the last 30 days.

Which command should you run?

To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

image

Correct Answer:

image

Question No.78

Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details provided in a question apply only to that question.

Your network contains an Active Directory domain named contoso.com. The domain functional level is Windows Server 2012 R2.

Your company hires a new security administrator to manage sensitive user data. You create a user account named Security1 for the security administrator.

You need to ensure that the password for Security1 has at least 12 characters and is modified every 10 days. The solution must apply to Security1 only.

Which tool should you use?

  1. Dsadd quota

  2. Dsmod

  3. Active Directory Administrative Center

  4. Dsacls

  5. Dsmain

  6. Active Directory Users and Computers

  7. Ntdsutil

  8. Group Policy Management Console

Correct Answer: F

Question No.79

Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details provided in a question apply only to that question.

Your network contains an Active Directory domain named contoso.com. You recently deleted 5,000 objects from the Active Directory database.

You need to reduce the amount of disk space used to store the Active Directory database on a domain controller.

  1. Dsadd quota

  2. Dsmod

  3. Active Directory Administrative Center

  4. Dsacls

  5. Domain

  6. Active Directory Users and Computers

  7. Ntdsutil

  8. Group Policy Management Console

Correct Answer: G

Question No.80

Your network contains an Active Directory domain named contoso.com. The domain contains a user named User1 and an organizational unit (OU) named OU1.

You create a Group Policy object (GPO) named GPO1. You need to ensure that User1 can link GPO1 to OU1. What should you do?

  1. Modify the security setting of User1.

  2. Add User1 to the Group Policy Creator Owner group.

  3. Modify the security setting of OU1.

  4. Modify the security setting of GPO1.

Correct Answer: C

Get Full Version of 70-742 Dumps

Categories
70-742 Dumps

70-742 Real Exam Dumps Questions and answers 31-40

Get Full Version of the Exam
http://www.EnsurePass.com/70-742.html

Question No.31

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2016. The computer account for Server1 is in organizational unit (OU) named OU1.

You create a Group Policy object (GPO) named GPO1 and link GPO1 to OU1.

You need to add a domain user named User1 to the local Administrators group on Server1.

Solution: From the Computer Configuration node of GPO1, you configure the Local Users and Groups preference.

Does this meet the goal?

  1. Yes

  2. No

Correct Answer: A

Question No.32

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2016. The computer account for Server1 is in organizational unit (OU) named OU1.

You create a Group Policy object (GPO) named GPO1 and link GPO1 to OU1.

You need to add a domain user named User1 to the local Administrators group on Server1.

Solution: From the Computer Configuration node of GPO1, you configure the Account Policies settings.

Does this meet the goal?

  1. Yes

  2. No

Correct Answer: B

Question No.33

DRAG DROP

Your company has multiple offices.

The network contains an Active Directory domain named contoso.com. An Active Directory site exists for each office. All of the sites connect to each other by using DEFAULTIPSITELINK.

The company plans to open a new office. The new office will have a domain controller and 100 client computers.

You install Windows Server 2016 on a member server in the new office. The new server will become a domain controller.

You need to deploy the domain controller to the new office. The solution must ensure that the client computers in the new office will authenticate by using the local domain controller.

Which three actions should you perform next in sequence?

To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

image

Correct Answer:

image

Question No.34

HOTSPOT

Your network contains an Active Directory domain named contoso.com. Some user accounts in the domain have the P.O. Box attribute set.

You plan to remove the value of the P.O. Box attribute for all of the users by using Ldifde. You have a user named User1 who is located in the Users container.

How should you configure the LDIF file to remove the value of the P.O. Box attribute for User1? To answer, select the appropriate options in the answer area.

image

Correct Answer:

image

Question No.35

Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.

Start of repeated scenario.

Your network contains an Active Directory domain named contoso.com. The domain contains a single site named Site1. All computers are in Site1.

The Group Policy objects (GPOs) for the domain are configured as shown in the exhibit. (Click the Exhibit button.)

image

The relevant users and client computer in the domain are configured as shown in the following table.

image

End of repeated scenario.

You are evaluating what will occur when you disable the Group Policy link for A6.

Which GPOs will apply to User2 when the user signs in to Computer1 after the link for A6 is disabled?

  1. A1 and A5 only

  2. A3, A1, and A5 only

  3. A3, A1, A5, and A4 only

  4. A3, A1, A5, and A7

Correct Answer: C

Question No.36

Your network contains an enterprise root certification authority (CA) named CA1.

Multiple computers on the network successfully enroll for certificates that will expire in one year. The certificates are based on a template named Secure_Computer. The template uses schema version 2.

You need to ensure that new certificates based on Secure_Computer are valid for three years. What should you do?

  1. Modify the Validity period for the certificate template.

  2. Instruct users to request certificates by running the certreq.exe command.

  3. Instruct users to request certificates by using the Certificates console.

  4. Modify the Validity period for the root CA certificate.

Correct Answer: A

Question No.37

Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series.

Information and details provided in a question apply only to that question.

Your network contains an Active Directory domain named contoso.com. The domain contains 5,000 user accounts.

You have a Group Policy object (GPO) named DomainPolicy that is linked to the domain and a GPO named DCPolicy that is linked to the Domain Controllers organizational unit (OU).

You need to force users to change their account password at least every 30 days. What should you do?

  1. From the Computer Configuration node of DCPolicy, modify Security Settings.

  2. From the Computer Configuration node of DomainPolicy, modify Security Settings.

  3. From the Computer Configuration node of DomainPolicy, modify Administrative Templates.

  4. From the User Configuration node of DCPolicy, modify Security Settings.

  5. From the User Configuration node of DomainPolicy, modify Folder Redirection.

  6. From user Configuration node of DomainPolicy, modify Administrative Templates.

  7. From Preferences in the User Configuration node of DomainPolicy, modify Windows Settings.

  8. From Preferences in the Computer Configuration node of DomainPolicy, modify Windows Settings.

Correct Answer: B

Question No.38

You have a server named Server1 that runs Windows Server 2016. You need to configure Server1 as a Web Application Proxy.

Which server role or role service should you install on Server1?

  1. Remote Access

  2. Active Directory Federation Services

  3. Web Server (IIS)

  4. DirectAccess and VPN (RAS)

  5. Network Policy and Access Services

Correct Answer: A

Question No.39

Your network contains an Active Directory domain named contoso.com. The domain contains a Group Policy object (GPO) named GPO1.

You configure the Internet Settings preference in GPO1 as shown in the exhibit. (Click the Exhibit button.)

image

A user reports that the homepage of Internet Explorer is not set to http://www.contoso.com. You confirm that the other settings in GPO1 are applied.

You need to configure GPO1 to set the Internet Explorer homepage. What should you do?

  1. Edit the GPO1 preference and press F5.

  2. Modify Security Settings for GPO1.

  3. Modify WMI Filtering for GPO1.

  4. Modify the GPO1 preference to use item-level targeting.

Correct Answer: A

Explanation:

The red dotted line under the homepage URL means that setting is disabled. Pressing F5 enables all settings.

Question No.40

Your company recently deployed a new child domain to an Active Directory forest.

You discover that a user modified the Default Domain Policy to configure several Windows components in the child domain.

A company policy states that the Default Domain Policy must be used only to configure domain- wide security settings.

You create a new Group Policy object (GPO) and configure the settings for the Windows components in the new GPO.

You need to restore the Default Domain Policy to the default settings from when the domain was first installed.

What should you do?

  1. From Group Policy Management, click Starter GPOs, and then click Manage Backups.

  2. From a command prompt, run the dcgpofix.exe command.

  3. From Windows PowerShell, run the Copy-GPO cmdlet.

  4. Run ntdsutil.exe to perform a metadata cleanup and a semantic database analysis.

Correct Answer: B

Get Full Version of 70-742 Dumps

Categories
70-742 Dumps

70-742 Real Exam Dumps Questions and answers 41-50

Get Full Version of the Exam
http://www.EnsurePass.com/70-742.html

Question No.41

HOTSPOT

Note: This question is part of a series of questions that use the same scenario. For you convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.

Start of repeated scenario.

You work for a company named Contoso, Ltd.

The network contains an Active Directory forest named contoso.com. A forest trust exists between contoso.com and an Active Directory forest named adatum.com.

The contoso.com forest contains the objects configured as shown in the following table.

image

Group1 and Group2 contain only user accounts.

Contoso hires a new remote user named User3. User3 will work from home and will use a computer named Computer3 that runs Windows 10. Computer3 is currently in a workgroup.

An administrator named Admin1 is a member of the Domain Admins group in the contoso.com domain.

From Active Directory Users and Computers, you create an organizational unit (OU) named OU1 in the contoso.com domain, and then you create a contact named Contact1 in OU1.

An administrator of the adatum.com domain runs the Set-ADUser cmdlet to configure a user named User1 to have a user logon name of User1@litwareinc.com.

End or repeated scenario.

You need to join Computer3 to the contoso.com domain by using offline domain join. Which command should you use in the contoso.com domain and on Computer3?

To answer, select the appropriate options in the answer area.

image

Correct Answer:

image

Question No.42

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You network contains an Active Directory forest named contoso.com. The forest contains an Active Directory Rights Management Services (AD RMS) deployment.

Your company establishes a partnership with another company named Fabrikam, Inc. The network of Fabrikam contains an Active Directory forest named fabrikam.com and an AD RMS deployment.

You need to ensure that the users in contoso.com can access rights protected documents sent by the users in fabrikam.com.

Solution: From AD RMS in contoso.com, you configure fabrikam.com as a trusted user domain. Does this meet the goal?

  1. Yes

  2. No

Correct Answer: B

Explanation:

Contoso would need to be the Trusted User Domain.

Question No.43

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

Your network contains an Active Directory forest named contoso.com. The forest contains a member server named Server1 that runs Windows Server 2016. All domain controllers run Windows Server 2012 R2.

Contoso.com has the following configuration. PS C:\gt; (Get-ADForest).ForestMode Windows2008R2Forest

PS C:\gt; (Get-ADDomain).DomainMode Windows2008R2Domain

PS C:\gt;

You plan to deploy an Active Directory Federation Services (AD FS) farm on Server1 and to

configure device registration.

You need to configure Active Directory to support the planned deployment. Solution: You run adprep.exe from the Windows Server 2016 installation media. Does this meet the goal?

  1. Yes

  2. No

Correct Answer: A

Explanation:

Device Registration requires Windows Server 2012 R2 forest schema.

Question No.44

HOTSPOT

You have a server named Server1 that runs Windows Server 2016. Server1 has the Web Application Proxy role service installed.

You are publishing an application named App1 that will use Integrated Windows authentication as shown in the following graphic.

image

Use the drop-down menus to select the answer area choice that completes each statement based on the information presented in the graphic.

image

Correct Answer:

image

Question No.45

Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.

Start of repeated scenario.

You work for a company named Contoso, Ltd.

The network contains an Active Directory forest named contoso.com. A forest trust exists between contoso.com and an Active Directory forest named adatum.com.

The contoso.com forest contains the objects configured as shown in the following table.

image

Group1 and Group2 contain only user accounts.

Contoso hires a new remote user named User3. User3 will work from home and will use a computer named Computer3 that runs Windows 10. Computer3 is currently in a workgroup.

An administrator named Admin1 is a member of the Domain Admins group in the contoso.com domain.

From Active Directory Users and Computers, you create an organizational unit (OU) named OU1 in the contoso.com domain, and then you create a contact named Contact1 in OU1.

An administrator of the adatum.com domain runs the Set-ADUser cmdlet to configure a user named User1 to have a user logon name of User1@litwareinc.com.

End or repeated scenario.

You need to ensure that Admin1 can add Group2 as a member of Group3. What should you modify?

  1. Modify the Security settings of Group3.

  2. Modify the group scope of Group3.

  3. Modify the group type of Group3.

  4. Set Admin1 as the manager of Group3.

Correct Answer: B

Question No.46

Your network contains an Active Directory domain named contoso.com.

You have an organizational unit (OU) named TestOU that contains test computers.

You need to enable a technician named Tech1 to create Group Policy objects (GPOs) and to link

the GPOs to TestOU. The solution must use the principle of least privilege.

Which two actions should you perform? Each correct answer presents part of the solution.

  1. Add Tech1 to the Group Policy Creator Owners group.

  2. From Group Policy Management, modify the Delegation settings of the TestOU OU.

  3. Add Tech1 to the Protected Users group.

  4. From Group Policy Management, modify the Delegation settings of the contoso.com container.

  5. Create a new universal security group and add Tech1 to the group.

Correct Answer: AB

Question No.47

Your network contains an Active Directory forest named contoso.com

Your company plans to hire 500 temporary employees for a project that will last 90 days.

You create a new user account for each employee. An organizational unit (OU) named Temp contains the user accounts for the employees.

You need to prevent the new users from accessing any of the resources in the domain after 90 days.

What should you do?

  1. Run the Get-ADUser cmdlet and pipe the output to the Set-ADUser cmdlet.

  2. Create a group that contains all of the users in the Temp OU. Create a Password Setting object (PSO) for the new group.

  3. Create a Group Policy object (GPO) and link the GPO to the Temp OU. Modify the Password Policy settings of the GPO.

  4. Run the GET-ADOrganizationalUnit cmdlet and pipe the output to the Set-Date cmdlet.

Correct Answer: A

Question No.48

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You network contains an Active Directory forest named contoso.com. The forest contains an Active Directory Rights Management Services (AD RMS) deployment.

Your company establishes a partnership with another company named Fabrikam, Inc. The network of Fabrikam contains an Active Directory forest named fabrikam.com and an AD RMS deployment.

You need to ensure that the users in contoso.com can access rights protected documents sent by the users in fabrikam.com.

Solution: From AD RMS in fabrikam.com, you configure contoso.com as a trusted publisher domain.

Does this meet the goal?

  1. Yes

  2. No

Correct Answer: B

Explanation:

Contoso needs to trust Fabrikam.

Question No.49

DRAG DROP

You network contains an Active Directory forest. The forest contains an Active Directory Federation Services (AD FS) deployment.

The AD FS deployment contains the following:

An AD FS server named server1.contoso.com that runs Windows Server 2016 A Web Application Proxy used to publish AD FS

A LIPN that uses the contoso.com suffix A namespace named adfs.contoso.com

You create a Microsoft Office 365 tenant named contoso.onmicrosoft.com. You use Microsoft Azure Active Directory Connect (AD Connect) to synchronize all of the users and the UPNs from the contoso.com forest to Office 365.

You need to configure federation between Office 365 and the on-premises deployment of Active Directory.

Which three commands should you run in sequence from Server1?

To answer, move the appropriate commands from the list of commands to the answer area and arrange them in the correct order.

image

Correct Answer:

image

Question No.50

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2016.

Server1 has IP Address Management (IPAM) installed. IPAM is configured to use the Group Policy based provisioning method. The prefix for the IPAM Group Policy objects (GPOs) is IP.

From Group Policy Management, you manually rename the IPAM GPOs to have a prefix of IPAM. You need to modify the GPO prefix used by IPAM.

What should you do?

  1. Click Configure server discovery in Server Manager.

  2. Run the Set-IpamConfiguration cmdlet.

  3. Run the Invoke-IpamGpoProvisioning cmdlet.

  4. Click Provision the IPAM server in Server Manager.

Correct Answer: B

Explanation:

The Set-IpamConfiguration cmdlet modifies the configuration for the computer that runs the IPAM server.

The -GpoPrefixlt;Stringgt; parameter specifies the unique Group Policy object (GPO) prefix name that IPAM uses to create the group policy objects. Use this parameter only when the value of the ProvisioningMethod parameter is set to Automatic.

References:

https://technet.microsoft.com/en-us/library/jj590816.aspx

Get Full Version of 70-742 Dumps

Categories
70-742 Dumps

70-742 Real Exam Dumps Questions and answers 1-10

Get Full Version of the Exam
http://www.EnsurePass.com/70-742.html

Question No.1

Your network contains an Active Directory forest named contoso.com. The forest contains three domains named contoso.com, corp.contoso.com, and ext.contoso.com. The forest contains three Active Directory sites named Site1, Site2, and Site3.

You have the three administrators as described in the following table.

image

You create a Group Policy object (GPO) named GPO1. Which administrator or administrators can link GPO1 to Site2?

  1. Admin1 and Admin2 only

  2. Admin1, Admin2, and Admin3

  3. Admin3 only

  4. Admin1 and Admin3 only

Correct Answer: D

Explanation:

https://technet.microsoft.com/en-us/library/cc732979(v=ws.11).aspx

Question No.2

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You network contains an Active Directory forest named contoso.com. The forest contains an Active Directory Rights Management Services (AD RMS) deployment.

Your company establishes a partnership with another company named Fabrikam, Inc. The network of Fabrikam contains an Active Directory forest named fabrikam.com and an AD RMS deployment.

You need to ensure that the users in contoso.com can access rights protected documents sent by the users in fabrikam.com.

Solution: From AD RMS in contoso.com, you configure fabrikam.com as a trusted publisher domain.

Does this meet the goal?

  1. Yes

  2. No

Correct Answer: A

Question No.3

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

Your network contains an Active Directory forest named contoso.com. The forest contains a member server named Server1 that runs Windows Server 2016. All domain controllers run Windows Server 2012 R2.

Contoso.com has the following configuration. PS C:\gt; (Get-ADForest).ForestMode Windows2008R2Forest

PS C:\gt; (Get-ADDomain).DomainMode Windows2008R2Domain

PS C:\gt;

You plan to deploy an Active Directory Federation Services (AD FS) farm on Server1 and to configure device registration.

You need to configure Active Directory to support the planned deployment. Solution: You upgrade a domain controller to Windows Server 2016.

Does this meet the goal?

  1. Yes

  2. No

Correct Answer: B

Explanation:

Device Registration requires Windows Server 2012 R2 forest schema.

Question No.4

Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details provided in a question apply only to that question.

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named Server1.

You recently restored a backup of the Active Directory database from Server1 to an alternate Location.

The restore operation does not interrupt the Active Directory services on Server1.

You need to make the Active Directory data in the backup accessible by using Lightweight Directory Access Protocol (LDAP).

Which tool should you use?

  1. Dsadd quota

  2. Dsmod

  3. Active Directory Administrative Center

  4. Dsacls

  5. Dsamain

  6. Active Directory Users and Computers

  7. Ntdsutil

  8. Group Policy Management Console

Correct Answer: E

Question No.5

Your network contains an Active Directory forest named contoso.com. The forest contains a member server named Server1 that runs Windows Server 2016. Server1 is located in the perimeter network.

You install the Active Directory Federation Services server role on Server1. You create an Active Directory Federation Services (AD FS) farm by using a certificate that has a subject name of sts.contoso.com.

You need to enable certificate authentication from the Internet on Server1.

Which two inbound TCP ports should you open on the firewall? Each correct answer presents part of the solution.

A.

389

B.

443

C.

3389

D.

8531

E.

49443

Correct Answer: BE

Question No.6

Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details provided in a question apply only to that question.

Your network contains an Active Directory forest named contoso.com. The forest functional level is Windows Server 2012 R2.

You need to ensure that a domain administrator can recover a deleted Active Directory object quickly.

Which tool should you use?

  1. Dsadd quota

  2. Dsmod

  3. Active Directory Administrative Center

  4. Dsacls

  5. Dsamain

  6. Active Directory Users and Computers

  7. Ntdsutil

  8. Group Policy Management Console

Correct Answer: C

Question No.7

Your network contains an Active Directory forest named contoso.com. The forest contains several domains.

An administrator named Admin01 installs Windows Server 2016 on a server named Server1 and then joins Server1 to the contoso.com domain.

Admin01 plans to configure Server1 as an enterprise root certification authority (CA).

You need to ensure that Admin01 can configure Server1 as an enterprise CA. The solution must use the principle of least privilege.

To which group should you add Admin01?

  1. Server Operators in the contoso.com domain

  2. Cert Publishers on Server1

  3. Enterprise Key Admins in the contoso.com domain

  4. Enterprise Admins in the contoso.com domain.

Correct Answer: D

Question No.8

Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series.

Information and details provided in a question apply only to that question.

Your network contains an Active Directory domain named contoso.com. The domain contains 5,000 user accounts.

You have a Group Policy object (GPO) named DomainPolicy that is linked to the domain and a GPO named DCPolicy that is linked to the Domain Controllers organizational unit (OU).

You need to configure the Documents folder of every user to be stored on a server named FileServer1.

What should you do?

  1. From the Computer Configuration node of DCPolicy, modify Security Settings.

  2. From the Computer Configuration node of DomainPolicy, modify Security Settings.

  3. From the Computer Configuration node of DomainPolicy, modify Administrative Templates.

  4. From the User Configuration node of DCPolicy, modify Security Settings.

  5. From the User Configuration node of DomainPolicy, modify Folder Redirection.

  6. From user Configuration node of DomainPolicy, modify Administrative Templates.

  7. From Preferences in the User Configuration node of DomainPolicy, modify Windows Settings.

  8. From Preferences in the Computer Configuration node of DomainPolicy, modify Windows Settings.

Correct Answer: E

Question No.9

You deploy a new enterprise certification authority (CA) named CA1. You plan to issue certificates based on the User certificate template.

You need to ensure that the issued certificates are valid for two years and support autoenrollment.

What should you do first?

  1. Run the certutil.exe command and specify the resubmit parameter.

  2. Duplicate the User certificate template.

  3. Add a new certificate template for CA1 to issue.

  4. Modify the Request Handling settings for the CA.

Correct Answer: B

Question No.10

Your network contains an Active Directory forest named contoso.com.

A partner company has a forest named fabrikam.com. Each forest contains one domain.

You need to provide access for a group named Research in fabrikam.com to resources in contoso.com. The solution must use the principle of least privilege.

What should you do?

  1. Create an external trust from fabrikam.com to contoso.com. Enable Active Directory split permissions in fabrikam.com.

  2. Create an external trust from contoso.com to fabrikam.com. Enable Active Directory split permissions in contoso.com.

  3. Create a one-way forest trust from contoso.com to fabrikam.com that uses selective authentication.

  4. Create a one-way forest trust from fabrikam.com to contoso.com that uses selective authentication.

Correct Answer: C

Get Full Version of 70-742 Dumps

Categories
70-742 Dumps

70-742 Real Exam Dumps Questions and answers 11-20

Get Full Version of the Exam
http://www.EnsurePass.com/70-742.html

Question No.11

HOTSPOT

Your network contains an Active Directory forest. The forest contains one domain named contoso.com. The domain contains two domain controllers named DC1 and DC2. DC1 holds all of the operations master roles.

During normal network operations, you run the following commands on DC2:

Move-ADDirectoryServerOperationMasterRole -Identity quot;DC2quot; -OperationMasterRole PDCEmulator

Move-ADDirectoryServerOperationMasterRole -Identity quot;DC2quot; -OperationMasterRole RIDMaster DC1 fails.

You remove DC1 from the network, and then you run the following command:

Move-ADDirectoryServerOperationMasterRole -Identity quot;DC2quot; -OperationMasterRole SchemaMaster

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

image

Correct Answer:

image

Question No.12

Your network contains an Active Directory forest. The forest contains two domains named litwarenc.com and contoso.com. The contoso.com domain contains two domains controllers named LON-DC01 and LON-DC02. The domain controllers are located in a site named London that is associated to a subnet of 192.168.10.0/24

You discover that LON-DC02 is not a global catalog server. You need to configure LON-DC02 as a global catalog server. What should you do?

  1. From Active Directory Sites and Services, modify the properties of the 192.168.10.0/24 IP subnet.

  2. From Windows PowerShell, run the Set-NetNatGlobal cmdlet.

  3. From Active Directory Sites and Services, modify the NTDS Settings object of LON-DC02.

  4. From Windows PowerShell, run the Enable-ADOptionalFeature cmdlet.

Correct Answer: C

Question No.13

You network contains an Active Directory domain named contoso.com. The domain contains 1,000 desktop computers and 500 laptops. An organizational unit (OU) named OU1 contains the computer accounts for the desktop computers and the laptops.

You create a Windows PowerShell script named Script1.ps1 that removes temporary files and cookies. You create a Group Policy object (GPO) named GPO1 and link GPO1 to OU1.

You need to run the script once weekly only on the laptops. What should you do?

  1. In GPO1, create a File preference that uses item-level targeting.

  2. In GPO1, create a Scheduled Tasks preference that uses item-level targeting.

  3. In GPO1, configure the File System security policy. Attach a WMI filter to GPO1.

  4. In GPO1, add Script1.ps1 as a startup script. Attach a WMI filter to GPO1.

Correct Answer: B

Question No.14

Your network contains an Active Directory forest named contoso.com.

You have an Active Directory Federation Services (AD FS) farm. The farm contains a server named Server1 that runs Windows Server 2012 R2.

You add a server named Server2 to the farm. Server2 runs Windows Server 2016. You remove Server1 from the farm.

You need to ensure that you can use role separation to manage the farm. Which cmdlet should you run?

  1. Set-AdfsFarmInformation

  2. Update-AdfsRelyingPartyTrust

  3. Set-AdfsProperties

  4. Invoke-AdfsFarmBehaviorLevelRaise

Correct Answer: D

Question No.15

Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.

Start of repeated scenario.

Your network contains an Active Directory domain named contoso.com. The domain contains a single site named Site1. All computers are in Site1.

The Group Policy objects (GPOs) for the domain are configured as shown in the exhibit. (Click the Exhibit button.)

image

The relevant users and client computer in the domain are configured as shown in the following table.

image

End of repeated scenario.

You are evaluating what will occur when you block inheritance on OU4.

Which GPO or GPOs will apply to User1 when the user signs in to Computer1 after block inheritance is configured?

  1. A1, A5, and A6

  2. A3, A1, A5, and A7

  3. A3 and A7 only

  4. A7 only

Correct Answer: D

Question No.16

Note: This question is part of a series of questions that use the same scenario. For you convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.

Start of repeated scenario.

You work for a company named Contoso, Ltd.

The network contains an Active Directory forest named contoso.com. A forest trust exists between contoso.com and an Active Directory forest named adatum.com.

The contoso.com forest contains the objects configured as shown in the following table.

image

Group1 and Group2 contain only user accounts.

Contoso hires a new remote user named User3. User3 will work from home and will use a computer named Computer3 that runs Windows 10. Computer3 is currently in a workgroup.

An administrator named Admin1 is a member of the Domain Admins group in the contoso.com domain.

From Active Directory Users and Computers, you create an organizational unit (OU) named OU1 in the contoso.com domain, and then you create a contact named Contact1 in OU1.

An administrator of the adatum.com domain runs the Set-ADUser cmdlet to configure a user named User1 to have a user logon name of User1@litwareinc.com.

End of repeated scenario.

You need to ensure that User2 can add Group4 as a member of Group5. What should you modify?

  1. the group scope of Group5

  2. the Managed By settings of Group4

  3. the group scope of Group4

  4. the Managed By settings of Group5

Correct Answer: D

Question No.17

Your network contains an Active Directory domain named contoso.com. The domain functional level is Windows Server 2012 R2.

You need to secure several high-privilege user accounts to meet the following requirements: What should you do?

  1. Create a universal security group for the user accounts and modify the Security settings of the group.

  2. Add the users to the Windows Authorization Access Group group.

  3. Add the user to the Protected Users group.

  4. Create a separate organizational unit (OU) for the user accounts and modify the Security settings of the OU.

Correct Answer: C

Question No.18

DRAG DROP

Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.

Start of repeated scenario.

Your network contains an Active Directory domain named contoso.com. The domain contains a single site named Site1. All computers are in Site1.

The Group Policy objects (GPOs) for the domain are configured as shown in the exhibit. (Click the Exhibit button.)

image

The relevant users and client computer in the domain are configured as shown in the following table.

image

End of repeated scenario.

You plan to enforce the GPO link for A6.

Which five GPOs will apply to User1 in sequence when the user signs in to Computer1 after the link is enforced?

To answer, move the appropriate GPOs from the list of GPOs to the answer area and arrange them in the correct order.

image

Correct Answer:

image

Question No.19

Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details provided in a question apply only to that question.

Your network contains an Active Directory domain named contoso.com.

You need to limit the number of Active Directory Domain Services (AD DS) objects that a user can create in the domain.

Which tool should you use?

  1. Dsadd quota

  2. Dsmod

  3. Active Directory Administrative Center

  4. Dsacls

  5. Dsamain

  6. Active Directory Users and Computers

  7. Ntdsutil

  8. Group Policy Management Console

Correct Answer: A

Question No.20

Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The domain contains a server named Server1.

An administrator named Admin01 plans to configure Server1 as a standalone certification authority (CA).

You need to identify to which group Admin01 must be a member to configure Server1 as a standalone CA. The solution must use the principle of least privilege.

To which group should you add Admin01?

  1. Administrators on Server1.

  2. Domain Admins in contoso.com

  3. Cert Publishers on Server1

  4. Key Admins in contoso.com

Correct Answer: A

Get Full Version of 70-742 Dumps

Categories
70-742 Dumps

70-742 Real Exam Dumps Questions and answers 21-30

Get Full Version of the Exam
http://www.EnsurePass.com/70-742.html

Question No.21

You have users that access web applications by using HTTPS. The web applications are located on the servers in your perimeter network. The servers use certificates obtained from an enterprise root certification authority (CA). The certificates are generated by using a custom template named WebApps. The certificate revocation list (CRL) is published to Active Directory.

When users attempt to access the web applications from the Internet, the users report that they receive a revocation warning message in their web browser. The users do not receive the message when they access the web applications from the intranet.

You need to ensure that the warning message is not generated when the users attempt to access the web applications from the Internet.

What should you do?

  1. Install the Certificate Enrollment Web Service role service on a server in the perimeter network.

  2. Modify the WebApps certificate template, and then issue the certificates used by the web application servers.

  3. Install the Web Application Proxy role service on a server in the perimeter network. Create a publishing point for the CA.

  4. Modify the CRL distribution point, and then reissue the certificates used by the web application servers.

Correct Answer: C

Question No.22

HOTSPOT

You have a server named Server1 that runs Windows Server 2016. Server1 has the Windows Application Proxy role service installed.

You need to publish Microsoft Exchange ActiveSync services by using the Publish New Application Wizard. The ActiveSync services must use preauthentication.

How should you configure Server1?

To answer, select the appropriate options in the answer area.

image

Correct Answer:

image

Question No.23

Your network contains an Active Directory domain named contoso.com.

You have an organizational unit (OU) named OU1 that contains the computer accounts of two servers and the user account of a user named User1. A Group Policy object (GPO) named GPO1 is linked to OU1.

You have an application named App1 that installs by using an application installer named App1.exe.

You need to publish App1 to OU1 by using Group Policy. What should you do?

  1. Create a Config.zap file and add a file to the File System node to the Computer Configuration node of GPO1.

  2. Create a Config.xml file and add a software installation package to the User Configuration node of GPO1.

  3. Create a Config.zap file and add a software installation package to the User Configuration node of GPO1.

  4. Create a Config.xml file and add a software installation package to the Computer Configuration node of GPO1.

Correct Answer: C

Question No.24

DRAG DROP

Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.

Start of repeated scenario.

Your network contains an Active Directory domain named contoso.com. The domain contains a single site named Site1. All computers are in Site1.

The Group Policy objects (GPOs) for the domain are configured as shown in the exhibit. (Click the Exhibit button.)

image

The relevant users and client computer in the domain are configured as shown in the following table.

image

End of repeated scenario.

Which five GPOs will apply to User1 in sequence when the user signs in to Computer1?

To answer, move the appropriate GPOs from the list to the answer area and arrange them in the correct order.

image

Correct Answer:

image

Question No.25

Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series.

Information and details provided in a question apply only to that question.

Your network contains an Active Directory domain named contoso.com. The domain contains 5,000 user accounts.

You have a Group Policy object (GPO) named DomainPolicy that is linked to the domain and a GPO named DCPolicy that is linked to the Domain Controllers organizational unit (OU).

You need to use the application control policy settings to prevent several applications from running on the network.

What should you do?

  1. From the Computer Configuration node of DCPolicy, modify Security Settings.

  2. From the Computer Configuration node of DomainPolicy, modify Security Settings.

  3. From the Computer Configuration node of DomainPolicy, modify Administrative Templates.

  4. From the User Configuration node of DCPolicy, modify Security Settings.

  5. From the User Configuration node of DomainPolicy, modify Folder Redirection.

  6. From user Configuration node of DomainPolicy, modify Administrative Templates.

  7. From Preferences in the User Configuration node of DomainPolicy, modify Windows Settings.

  8. From Preferences in the Computer Configuration node of DomainPolicy, modify Windows Settings.

Correct Answer: B

Question No.26

Your network contains an Active Directory domain named contoso.com.

You open Group Policy Management as shown in the exhibit. (Click the Exhibit button.)

image

You discover that some of the settings configured in the A1 Group Policy object (GPO) fail to apply to the users in the OU1 organizational unit (OU).

You need to ensure that all of the settings in A1 apply to the users in OU1. What should you do?

  1. Enable loopback policy processing in A1.

  2. Block inheritance on OU1.

  3. Modify the policy processing order for OU1.

  4. Modify the GPO Status of A1.

Correct Answer: C

Question No.27

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

Your network contains an Active Directory forest named contoso.com. The forest contains a member server named Server1 that runs Windows Server 2016. All domain controllers run Windows Server 2012 R2.

Contoso.com has the following configuration. PS C:\gt; (Get-ADForest).ForestMode Windows2008R2Forest

PS C:\gt; (Get-ADDomain).DomainMode Windows2008R2Domain

PS C:\gt;

You plan to deploy an Active Directory Federation Services (AD FS) farm on Server1 and to configure device registration.

You need to configure Active Directory to support the planned deployment. Solution: You raise the domain functional level to Windows Server 2012 R2. Does this meet the goal?

  1. Yes

  2. No

Correct Answer: B

Explanation:

Device Registration requires Windows Server 2012 R2 forest schema (not just domain schema).

Question No.28

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2016. The computer account for Server1 is in organizational unit (OU) named OU1.

You create a Group Policy object (GPO) named GPO1 and link GPO1 to OU1.

You need to add a domain user named User1 to the local Administrators group on Server1. Solution: From a domain controller, you run the Set-AdComputer cmdlet.

Does this meet the goal?

  1. Yes

  2. No

Correct Answer: B

Question No.29

Your network contains an Active Directory domain named contoso.com.

You have a Group Policy object (GPO) named GPO1. GPO1 is linked to an organizational unit (OU) named OU1.

GPO1 contains several corporate desktop restrictions that apply to all computers. You plan to deploy a printer to the computers in OU1.

You need to ensure that any user who signs in to a computer that runs Windows 10 in OU1 receives the new printer. All of the computers in OU1 must continue to apply the corporate desktop restrictions from GPO1.

What should you configure?

  1. a user preference and a WMI filter on GPO1.

  2. a computer preference that uses item-level targeting

  3. a computer preference and WMI filter on GPO1

  4. a user preference that uses item-level targeting

Correct Answer: D

Question No.30

You network contains an Active Directory domain named contoso.com. The domain contains an enterprise certification authority (CA) named CA1.

You have a test environment that is isolated physically from the corporate network and the Internet.

You deploy a web server to the test environment. On CA1, you duplicate the Web Server template, and you name the template Web_Cert_Test.

For the web server, you need to request a certificate that does not contain the revocation information of CA1.

What should you do first?

  1. From the properties of CA1, allow certificates to be published to the file system.

  2. From the properties of CA1, select Restrict enrollment agents, and then add Web_Cert_Test to the restricted enrollment agent.

  3. From the properties of Web_Cert_Test, assign the Enroll permission to the guest account.

  4. From the properties of Web_Cert_Test, set the Compatibility setting of CA1 to Windows Server 2016.

Correct Answer: D

Get Full Version of 70-742 Dumps