70-744 | how many questions of 70-744 braindumps?


Q11. Note: This question Is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details provided in a question apply only to that question.

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2021.

Server1 has a volume named Volume1.

A central access policy named Policyl is deployed to the domain. You need to apply Policyl to Volume1.

Which tool should you use?

A. File Explorer

B. Shared Folders

C. Server Manager

D. Disk Management

E. Storage Explorer

F. Computer Management

G. System Configuration

H. File Server Resource Manager (FSRM)

Answer: D

Q12. Note: This question It part of a series of questions that present the same scenario. Each question In the series contains a unique solution that might meet the stated goats. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to It. As a result, these questions will not appear in the review screen.

Your network contains an Active Directory domain named contoso.com. The domain contains a computer named Computer1 that runs Windows 10. Computer1 connects to a home network and a corporate network.

The corporate network uses the 17216.0.0/24 address space internally. Computerl runs an application named App1 that listens to port 8080.

You need to prevent connections to App1 when Computer1 is connected to the home network.

Solution: From Group Policy Management you create a software restriction policy. Does this meet the goal?

A. Yes

B. No

Answer: A

Q13. Your network contains an Active Directory domain named contoso.com.

You install the Windows Server Update Services server role on a member server named Server1. Server1 runs Windows Server 2021.

You need to ensure that a user named Used can perform the following tasks:

*View the Windows Server Update Services (WSUS) configuration.

*Generate WSUS update reports.

The solution must use the principle of least privilege. What should you do on Server1?

A. Modify the permissions of the ReportWebService virtual folder from the WSUS Administration website.

B. Add User1 to the WSUS Reporters local group.

C. Add User1 to the WSUS Administrators local group.

D. Run wsusutil.exe and specify the postinstall parameter.

Answer: C

Q14. Note: This question is port of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question In the series. Each question is Independent of the other questions In this series. Information and details provided in a question apply only to that question.

Vour network contains an Active Directory domain named contoso.com. The domain

contains a server named Server1 that runs Windows Server 2021 and a Nano Server named Nano1.

Nano1 has two volumes named C and D. You are signed in to Server1.

You need to configure Data Deduplication on Nano1. Which tool should you use?

A. File Explorer

B. Shared Folders

C. Server Manager

D. Disk Management

E. Storage Explorer

F. Computer Management

G. System Configuration

H. File Server Resource Manager (FSRM)

Answer: A

Q15. HOTSPOT

You plan to deploy three encrypted virtual machines that use Secure Boot. The virtual machines will be configured as shown in the following table.

How should you protect each virtual machine? To answer, select the appropriate options in the answer area.

Answer:

Q16. Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.

Start of repeated scenario

Your network contains an Active Directory domain named contoso.com. The functional level of the forest and the domain is Windows Server 2008 R2.

The domain contains the servers configured as shown in the following table.

All servers run Windows Server 2021. All client computers run Windows 10.

You have an organizational unit (OU) named Marketing that contains the computers in the marketing department You have an OU named Finance that contains the computers in the finance department You have an OU named AppServers that contains application servers. A Group Policy object (GPO) named GP1 is linked to the Marketing OU. A GPO named GP2 is linked to the AppServers OU.

You install Windows Defender on Nano1.

End of repeated scenario

You plan to implement BitLocker Drive Encryption (BitLocker) on the operating system volumes of the application servers.

You need to ensure that the BitLocker recovery keys are stored in Active Directory. Which Group Policy setting should you configure?

A. System cryptography; Force strong key protection (or user keys stored on the computer

B. Store Bittocker recovery information in Active Directory Domain Services (Windows Server 2008 and Windows Vista)

C. System cryptography: Use FIPS compliant algorithms for encryption, hashing and signing

D. Choose how BitLocker-protected operating system drives can be recovered

Answer: C

Q17. Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.

Start of repeated scenario

Your network contains an Active Directory domain named contoso.com. The functional level of the forest and the domain is Windows Server 2008 R2.

The domain contains the servers configured as shown in the following table.

All servers run Windows Server 2021. All client computers run Windows 10.

You have an organizational unit (OU) named Marketing that contains the computers in the marketing department You have an OU named Finance that contains the computers in the finance department You have an OU named AppServers that contains application servers. A Group Policy object (GPO) named GP1 is linked to the Marketing OU. A GPO named GP2 is linked to the AppServers OU.

You install Windows Defender on Nano1.

End of repeated scenario

You plan to implement BitLocker Drive Encryption (BitLocker) on the operating system volumes of the application servers.

You need to ensure that the BitLocker recovery keys are stored in Active Directory. Which Group Policy setting should you configure?

A. System cryptography; Force strong key protection (or user keys stored on the computer

B. Store Bittocker recovery information in Active Directory Domain Services (Windows Server 2008 and Windows Vista)

C. System cryptography: Use FIPS compliant algorithms for encryption, hashing and signing

D. Choose how BitLocker-protected operating system drives can be recovered

Answer: C

Q18. Note: This question Is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question In this section, you will NOT be able to return to It. As a result, these questions will not appear In the review screen.

Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2021. All client computers run Windows 10.

The relevant objects in the domain are configured as shown in the following table.

You need to assign User1 the right to restore files and folders on Server1 and Server2.

Solution: You create a Group Policy object (GPO), you link the GPO to the Servers OU, and then you modify the Users Rights Assignment in the GPO.

Does this meet the goat?

A. Yes

B. No

Answer: A

Q19. Your network contains an Active Directory domain named contoso.com. You are deploying Microsoft Advanced Threat Analytics (ATA).

You create a user named User1.

You need to configure the user account of User1 as a Honeytoken account. Which information must you use to configure the Honeytoken account?

A. the SAM account name of User1

B. the Globally Unique Identifier (GUID) of User1

C. the SID of User1

D. the UPN of User1

Answer: B

Q20. Your network contains an Active Directory domain named contoso.com.

You are deploying Microsoft Advanced Threat Analytics (ATA) to the domain.

You install the ATA Center on server named Server1 and the ATA Gateway on a server named Served.

You need to ensure that Server2 can collect NTLM authentication events. What should you configure?

A. the domain controllers to forward Event ID 4776 to Server2

B. the domain controllers to forward Event ID 1000 to Server1

C. Server2 to forward Event ID 1026 to Server1

D. Server1 to forward Event ID 1000 to Server2

Answer: A