which server should you deploy the feature?
Your network contains an Active Directory domain named contoso.com. The domain contains five
servers. The servers are configured as shown in the following table.
All desktop computers in contoso.com run Windows 8 and are configured to use BitLocker Drive
Encryption (BitLocker) on all local disk drives.
You need to deploy the Network Unlock feature. The solution must minimize the number of features
and server roles installed on the network.
To which server should you deploy the feature?
What should you configure on Server1?
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the File Server
Resource Manager role service installed.
Server1 has a folder named Folder1 that is used by the human resources department.
You need to ensure that an email notification is sent immediately to the human resources manager
when a user copies an audio file or a video file to Folder1.
What should you configure on Server1?
You need to ensure that you can access the contents of the mounted snapshot
You need to provide the members of RODC_Admins with the ability to manage the hardware and the software on R0D
Your network contains an Active Directory domain named contoso.com. The domain contains a
read-only domain controller (RODC) named R0DC1.
You create a global group named RODC_Admins.
You need to provide the members of RODC_Admins with the ability to manage the hardware and
the software on R0DC1. The solution must not provide RODC_Admins with the ability to manage
Active Directory objects.
What should you do?
What should you identify?
HOTSPOT
Your network contains an Active Directory domain named contoso.com. The domain contains 30
user accounts that are used for network administration. The user accounts are members of a domain
global group named Group1.
You identify the security requirements for the 30 user accounts as shown in the following table.
You need to identify which settings must be implemented by using a Password Settings object (PSO)
and which settings must be implemented by modifying the properties of the user accounts.
What should you identify? To answer, configure the appropriate settings in the dialog box in the
answer area.
Which two auditing policies should you configure?
HOTSPOT
Your network contains 25 Web servers that run Windows Server 2012 R2.
You need to configure auditing policies that meet the following requirements:
Generate an event each time a new process is created.
Generate an event each time a user attempts to access a file share.
Which two auditing policies should you configure? To answer, select the appropriate two auditing
policies in the answer area.
Which Cryptography setting of the certificate template should you modify?
HOTSPOT
Your network contains an Active Directory domain named contoso.com.
You need to create a certificate template for the BitLocker Drive Encryption (BitLocker) Network
Unlock feature.
Which Cryptography setting of the certificate template should you modify?
To answer, select the appropriate setting in the answer area.
Which command should you run?
Your network contains an Active Directory domain named contoso.com. The domain contains a
virtual machine named Server1 that runs Windows Server 2012 R2.
Server1 has a dynamically expanding virtual hard disk that is mounted to drive E.
You need to ensure that you can enable BitLocker Drive Encryption (BitLocker) on drive E.
Which command should you run?
What should you configure?
Your network contains an Active Directory domain named contoso.com. The domain contains a file
server named Server1 that runs Windows Server 2012 R2.
You view the effective policy settings of Server1 as shown in the exhibit. (Click the Exhibit button.)
On Server1, you have a folder named C:\Share1 that is shared as Share1. Share1 contains
confidential dat
a. A group named Group1 has full control of the content in Share1.
You need to ensure that an entry is added to the event log whenever a member of Group1 deletes a
file in Share1.
What should you configure?
complete each statement according to the information presented in the exhibit.
HOTSPOT
You have a file server named Server1 that runs Windows Server 2012 R2.
A user named User1 is assigned the modify NTFS permission to a folder named C:\shares and all of
the subfolders of C:\shares.
On Server1, you open File Server Resource Manager as shown in the exhibit. (Click the Exhibit
button.)
To answer, complete each statement according to the information presented in the exhibit. Each
correct selection is worth one point.