PrepAway - Latest Free Exam Questions & Answers

Category: 70-744

Exam 70-744: Securing Windows Server 2016

Which of the following will Mark use to accomplish the task?

Mark work as a System Administrator for TechMart Inc. The company has a Windows-based network.
Mark wants to allow the remote travel agents to be able to access the corporate network so that they are
free to check email and post appointments that are booked for the particular day. Mark has decided to
permit the travel agents to use their home computers but he is required to be assured that the information is
not compromised by anyone because the security of client information is on the top priority for him. Which
of the following will Mark use to accomplish the task?

Which of the following actions will Mark take to preven…

Mark works as a Security Officer for TechMart Inc. The company has a Windows-based network. He
has bees assigned a project for ensuring the safety of the customer’s money and information, not to
mention the company’s reputation. The company has gone through a security audit to ensure that it is in
compliance with industry regulations and standards. Mark understands the request and has to do his due
diligence for providing any information the regulators require as they are targeting potential security holes.
In this situation, his major concern is the physical security of his company’s system. He has a concern that
people are authenticated to the servers in the data center. Which of the following actions will Mark take to
prevent normal users from logging onto the systems?

Which of the following authentication methods should Ma…

Mark works as a Network Administrator for NetTech Inc. The company has a Windows Server 2008
domain-based network. The network has a Windows Server 2008 member server that works as a Routing
and Remote Access Server (RRAS). Mark implements Network Access Protection (NAP) for the network.
Mark wants to configure Point-to-Point Protocol (PPP) authentication on the RRAS server. Which of the
following authentication methods should Mark use to accomplish this task?


Page 4 of 8« First...23456...Last »