(70-744) Securing Windows Server 2016
(70-744) Securing Windows Server 2016
(70-744) Securing Windows Server 2016
QUESTION 1
Your network contains an Active Directory domain named contoso.com.
The domain contains a file server named Server1 that runs Windows Server 2016.
Server1 has a volume named Volume1.
Dynamic Access Control is configured. A resource property named Property1 was created in the domain.
You need to ensure that Property1 is set to a value of Big for all of the files in Volume1 that are larger
than 10 MB.
Which tool should you use?
A. File Explorer
B. Shared Folders
C. Server Manager
D. Disk Management
E. Storage Explorer
F. Computer Management
G. System Configuration
H. File Server Resource Manager (FSRM)
Answer: H
Explanation:
In FSRM, "Large Files" creates a list of files conforming to a specified file spec that are a specified size or
larger.
QUESTION 2
Your network contains an Active Directory forest named contoso.com.
All servers run Windows Server 2016. The forest contains 2,000 client computers that run Windows 10.
All client computers are deployed (rom a customized Windows image.
You need to deploy 10 Privileged Access Workstations (PAWs).
The solution must ensure that administrators can access several client applications used by all users.
Solution: You deploy 10 physical computers and configure each wie as a virtualization host.
You deploy the operating system on each host by using the customized Windows image.
On each host you create a guest virtual machine and configure the virtual machine as a PAW.
Does this meet the goal?
A. Yes
B. No
Answer: B
QUESTION 3
Your network contains an Active Directory forest named contoso.com.
The forest functional level is Windows Server 2012.
All servers run Windows Server 2016. You create a new bastion forest named admin.contoso.com.
The forest functional level of admin.contoso.com is Windows Server 2012 R2.
You need to implement a Privileged Access Management (PAM) solution.
Which two actions should you perform? Each correct answer presents part of the solution.
Answer: B, C
QUESTION 4
Note: This question is part of a series of questions that use the same or similar answer choices. An answer
choice may be correct for more than one question in the series. Each question is Independent of the other
questions in this series. Information and details provided in a question apply only to that question.
A. File Explorer
B. Shared Folders
C. Server Manager
D. Disk Management
E. Storage Explorer
F. Computer Management
G. System Configuration
H. File Server Resource Manager (FSRM)
Answer: H
QUESTION 5
Your network contains an Active Directory domain named contoso.com.
The domain contains four servers.
The servers are configured as shown in the following table.
You need to manage FS1 and FS2 by using Just Enough Administration (JEA).
What should you do before you can implement JEA?
Answer: C
Explanation:
JEA is incorporated into Windows Server 2016 and Windows 10, and is also incorporated into Windows
Management Framework 5.0, which you can download and install on computers running Windows Server 2012
R2.
QUESTION 6
Your network contains an Active Directory domain named contoso.com.
You are deploying Microsoft Advanced Threat Analytics (ATA).
You create a user named User1.
You need to configure the user account of User1 as a Honeytoken account.
Which information must you use to configure the Honeytoken account?
Answer: C
Explanation:
To configure a Honeytoken user you will need the SID of the user account, not the user name.
https://docs.microsoft.com/en-us/advanced-threat-analytics/deploy-use/working-with-detection-settings
QUESTION 7
Note: This question is part of a series of questions that use the same scenario. For your convenience, the
scenario b repeated in each question. Each question presents a different goal and answer choices, but the
text of the scenario is exactly the same in each question in this series.
Your network contains an Active Directory domain named contoso.com. The functional level of the forest
and the domain is Windows Server 2008 R2.
The domain contains the servers configured as shown m the following table.
All servers run Windows Server 2016. All client computers run Windows 10.
You have an organizational unit (OU) named Marketing that contains the computers in the marketing
department.
You have an OU named Finance that contains the computers in the finance department.
You need to disable SMB 1.0 on Server2. What should you do?
Answer: D
Explanation:
https://blogs.technet.microsoft.com/filecab/2016/09/16/stop-using-smb1/
QUESTION 8
Your network contains an Active Directory domain named contoso.com.
All domain controllers run Windows Server 2016.
The domain contains a server named Server1 that has Microsoft Security Compliance Manager (SCM)
4.0 installed.
You export the baseline shown in the following exhibit.
Answer: A
Explanation:
Server2 is a non-domain joined computer using the GPO pack feature.
Source: https://technet.microsoft.com/en-us/solutionaccelerators/cc835245.aspx
LGPO.exe replaces the no-longer-maintained Local GPO tool that shipped with the Security Compliance
Manager (SCM).
https://biogs.technet.microsoft.com/secgui de/2016/01/21/lgpo-exe-local-group-policy-object-utility-v1-0/
QUESTION 9
Hotspot Question
You plan to deploy three encrypted virtual machines that use Secure Boot. The virtual machines will be
configured as shown in the following table.
How should you protect each virtual machine? To answer, select the appropriate options in the answer
area.
Answer:
QUESTION 10
Hotspot Question
Your network contains an Active Directory domain named contoso.com.
The domain contains a server named Server1 that runs Windows Server 2016.
The services on Server1 are shown in the following output.
Server1 has the AppLocker rules configured as shown in the exhibit (Click the Exhibit button.)
Answer: