You need to recommend a solution for Server11 that meet…
Your company has an accounting department.
The network contains an Active Directory domain named contoso.com. The domain contains 10 servers.
You deploy a new server named Server11 that runs Windows Server 2016.
Server11 will host several network applications and network shares used by the accounting department.
You need to recommend a solution for Server11 that meets the following requirements:
-Protects Server11 from address spoofing and session hijacking
-Allows only the computers in We accounting department to connect to Server11
What should you recommend implementing?
Which cmdlet should you use?
You have a server named Server1 that runs Windows Server 2016.
You need to identity whether any connection security rules are configured on Server1.
Which cmdlet should you use?
Which cmdlet should you use?
You have a server named Server1 that runs Windows Server 2016.
You need to identify whether ICMP traffic is exempt from IPsec on Server1.
Which cmdlet should you use?
Which cmdlet should you use?
You have a server named Server1 that runs Windows Server 2016.
You need to identify whether IPsec tunnel authorization is configured on Server1.
Which cmdlet should you use?
Which cmdlet should you use?
You have a server named Server1 that runs Windows Server 2016.
You need to view all of the inbound rules on Server1.
Which cmdlet should you use?
What should you configure?
Your network contains an Active Directory domain named contoso.com.
You are deploying Microsoft Advanced Threat Analytics (ATA) to the domain.
You install the ATA Center on server named Server1 and the on a server named Server2.
You need to ensure that Server2 can collect NTLM authentication events.
What should you configure?
What should you do first?
which cmdlet should you run on Server1?
Your network contains two Active Directory forests named contoso.com and adatum.com.
Contoso.com contains a Hyper-V host named Server1.
Server1 is the member of a group named HyperHosts.
Adatum.com contains a server named Server2 that is configured for Admin-trusted attestation.
Server1 and Server2 run Windows Server 2016.
Contoso.com trusts adatum.com.
You plan to deploy shielded virtual machines to Server1. Which component should you install and which cmdlet
should you run on Server1?
How should you protect each virtual machine?
What should you recommend?
Your network contains several Windows container hosts..
You plan to deploy three custom .NET applications.
You need to recommend a deployment solution for the applications.
Each application must:
-be accessible by using a different IP address.
-have access to a unique file system.
-start as quickly as possible.
What should you recommend? Choose Two.