[Free] 2019(Nov) EnsurePass Microsoft 70-742 Dumps with VCE and PDF 81-90

Get Full Version of the Exam
http://www.EnsurePass.com/70-742.html

Question No.81

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a server named Web1 that runs Windows Server 2016.

You need to list all the SSL certificates on Web1 that will expire during the next 60 days. Solution: You run the following command.

image

Does this meet the goal?

  1. Yes

  2. No

Correct Answer: B

Question No.82

Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server1 and a domain controller named DC1. Both servers run Windows Server 2016. Server1 is used to perform administrative tasks, including managing Group Polices.

After maintenance is performed on DC1, you open a Group Policy object (GPO) from Server1 as shown in the exhibit.

image

You need to be able to view all of the Administrative Templates settings in GPO1. What should you do?

  1. From File Explorer, copy the administrative templates from

    \\contoso.com\SYSVOL\contoso.com\Policies to the PolicyDefinitions folder on Server1.

  2. From File Explorer, delete

    \\contoso.com\SYSVOL\contoso.com\Policies\PolicyDefinitions.

  3. From File Explorer, delete the PolicyDefinitions folder from Server1.

  4. From Group Policy Management, configure WMI Filtering for GPO1.

Correct Answer: B

Question No.83

Your network contains an Active Directory domain named contoso.com. The domain contains five domain controllers.

You have a branch office that has a local support technician named Tech1. Tech1 installs

Windows Server 2016 on a server named RODC1 in a workgroup.

You need Tech1 to deploy RODC1 as a read-only domain controller (RODC) in the contoso.com domain.

Which three actions should you perform? Each correct answer presents part of the solution.

  1. Instruct Tech1 to run the Active Directory Domain Services Configuration Wizard.

  2. Create an RODC computer account by using Active Administrative Center.

  3. Instruct Tech1 to run dcpromo.exe on RODC1.

  4. Instruct Tech1 to install the Active Directory Domain Services server role on RODC1.

  5. Modify the permissions of the Domain Controllers organizational unit (OU).

Correct Answer: ACD

Question No.84

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have acorrect solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You deploy a new Active Directory forest.

You need to ensure that you can create a group Managed Service Account (gMSA) for multiple member servers.

Solution: You configure Kerberos constrained delegation on the computer account of each member server.

Does this meet the goal?

  1. Yes

  2. No

Correct Answer: B

Question No.85

Your network contains an Active Directory domain named contoso.com. The domain contains an enterprise certification authority (CA) named CA1.

You duplicate the Computer certificate template, and you name the template Cont_Computers.

You need to ensure that all of the certificates issued based on Cont_Computers have a key size of 4,096 bits.

What should you do?

  1. From the properties of CA1, modify the Security settings.

  2. From the properties of CA1, modify the Request Handling settings.

  3. From the properties of the Computer template, modify the Key Attestation settings.

  4. From the properties of Cont_Computers, modify the Cryptography settings.

Correct Answer: C

Question No.86

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You deploy a new Active Directory forest.

You need to ensure that you can create a group Managed Service Account (gMSA) for multiple member servers.

Solution: From Windows PowerShell on a domain controller, you run the Set- KdsConfiguration cmdlet.

Does this meet the goal?

  1. Yes

  2. No

Correct Answer: B

Question No.87

You network contains an active Directory domain. The domain contains 20 domain controllers.

You discover that some Group Policy objects (PROs) are not being applied by all the domain controllers.

You need to verify whether GPOs replicate successfully to all the domain controllers. What should you do?

  1. Set BurFlags in the registry, and then restart the File Replication Service (FRS). Run dcdiag.exe for each domain controller.

  2. Set BurFlags in the registry, and then restart the File Replication Service (FRS). View the Directory Service event log.

  3. From Group Policy Management, view the Status tab for the domain.

  4. Run repadmin.exe for each GPO.

Correct Answer: D

Question No.88

Your network contains an Active Directory domain named contoso.com. The domain contains a web application that uses Kerberos authentication.

You change the domain name of the web application.

You need to ensure that the service principal name (SPN) for the application is registered.

Which tool should you use?

  1. Rdspnf

  2. Active Directory Users and Computers

  3. Dnscmd

  4. Ldifde

Correct Answer: B

Question No.89

Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.

Start of repeated Scenario

You work for a company named Contoso, Ltd.

The network contains an Active Directory forest named contoso.com. A forest trust exists between contoso.com and an Active Directory forest named adatum.com.

The contoso.com forest contains the objects configured as shown in the following table.

image

Group 1 and Group2 contain only user accounts.

Contoso hires a new remote user named User3. User3 will work from home and will use a computer named Computer3 that runs Windows 10. Computer3 is currently in a workgroup.

An administrator named Admin1 is a member of the Domain Admins group in the contoso.com domain.

From Active Directory Users and Computers, you create an organizational unit (OU) named OU1 in the contoso.com domain, and then you create a contact named Contact1 in OU1.

An administrator of the adatum.com domain runs the Set-ADUser cmdlet to configure a user named User1 to have a user logon name of user1@litwareinc.com.

End of repeated scenario

You need to ensure that Admin1 can convert Group1 to a global group. What should you do?

  1. Add Admin1 to the Enterprise Admin group.

  2. Remove all the member from Group1.

  3. Modify the Security settings of Group1.

  4. Convert Group1 to a universal security group.

Correct Answer: B

Question No.90

Your network contains an Active Directory forest. The forest functional level is Windows Server 2016.

You have a failover cluster named Cluster1. Cluster1 has two nodes named Server1 and Server2. All the optional features in Active Directory are enabled.

A junior administrator accidentally deletes the computer object named Cluster1. You discover that Cluster1 is offline.

You need to restore the operation of Cluster1 in the least amount of time possible. What should you do?

  1. Run the Enable-ADAccount cmdlet from Windows PowerShell.

  2. Perform an authoritative restore by running ntdutil.exe.

  3. Perform a tombstone reanimation by running ldp.exe.

  4. Recover a deleted object from the Active Directory Recycle Bin.

Correct Answer: D

Get Full Version of the Exam
70-742 Dumps
70-742 VCE and PDF

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.