Identity with Windows Server 2016

Here you have the best Microsoft 70-742 practice exam questions

  • You have 190 total questions to study from
  • Each page has 5 questions, making a total of 38 pages
  • You can navigate through the pages using the buttons at the bottom
  • This questions were last updated on November 15, 2024
Question 1 of 190

Note: This question is part of a series of questions that use the same scenario. For you convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.

Start of repeated scenario.

You work for a company named Contoso, Ltd.

The network contains an Active Directory forest named contoso.com. A forest trust exists between contoso.com and an Active Directory forest named adatum.com.

The contoso.com forest contains the objects configured as shown in the following table.

Group1 and Group2 contain only user accounts.

Contoso hires a new remote user named User3. User3 will work from home and will use a computer named Computer3 that runs Windows 10. Computer3 is currently in a workgroup.

An administrator named Admin1 is a member of the Domain Admins group in the contoso.com domain.

From Active Directory Users and Computers, you create an organizational unit (OU) named OU1 in the contoso.com domain, and then you create a contact named Contact1 in OU1.

An administrator of the adatum.com domain runs the Set-ADUser cmdlet to configure a user named User1 to have a user logon name of [email protected].

End of repeated scenario.

You need to ensure that User2 can add Group4 as a member of Group5.

What should you modify?

    Correct Answer: D

    To ensure User2 can add Group4 as a member of Group5, you need to modify the Managed By settings of Group5. In Active Directory, the Managed By tab allows you to specify a user or group that can manage the members of a particular group. By setting User2 as the manager of Group5, User2 will gain the necessary permissions to add Group4 to Group5.

Question 2 of 190

Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.

Start of repeated scenario.

You work for a company named Contoso, Ltd.

The network contains an Active Directory forest named contoso.com. A forest trust exists between contoso.com and an Active Directory forest named adatum.com.

The contoso.com forest contains the objects configured as shown in the following table.

Group1 and Group2 contain only user accounts.

Contoso hires a new remote user named User3. User3 will work from home and will use a computer named Computer3 that runs Windows 10. Computer3 is currently in a workgroup.

An administrator named Admin1 is a member of the Domain Admins group in the contoso.com domain.

From Active Directory Users and Computers, you create an organizational unit (OU) named OU1 in the contoso.com domain, and then you create a contact named Contact1 in OU1.

An administrator of the adatum.com domain runs the Set-ADUser cmdlet to configure a user named User1 to have a user logon name of [email protected].

End or repeated scenario.

You need to ensure that Admin1 can add Group2 as a member of Group3.

What should you modify?

    Correct Answer: B

    To permit Admin1 to add Group2 to Group3, the group scope of Group3 must be changed. Currently, Group3 is a universal group. Universal groups can only have universal groups or global groups as members, not domain local groups like Group2. By altering Group3's scope to domain local, it will be permissible to add Group2 as a member.

Question 3 of 190

Your network contains an Active Directory forest named contoso.com

Your company plans to hire 500 temporary employees for a project that will last 90 days.

You create a new user account for each employee. An organizational unit (OU) named Temp contains the user accounts for the employees.

You need to prevent the new users from accessing any of the resources in the domain after 90 days.

What should you do?

    Correct Answer: A

    To prevent the new users from accessing any of the resources in the domain after 90 days, you can use the Get-ADUser cmdlet to retrieve all user accounts in the Temp OU and pipe the output to the Set-ADUser cmdlet to set an expiration date for their accounts. This method ensures that after 90 days, the user accounts are expired and cannot access domain resources.

Question 4 of 190

Your network contains an Active Directory forest. The forest contains two domains named litwarenc.com and contoso.com. The contoso.com domain contains two domains controllers named LON-DC01 and LON-DC02.

The domain controllers are located in a site named London that is associated to a subnet of 192.168.10.0/24

You discover that LON-DC02 is not a global catalog server. You need to configure LON-DC02 as a global catalog server.

What should you do?

    Correct Answer: C

    To configure a domain controller as a global catalog server, you need to modify the NTDS Settings object for that domain controller. In Active Directory Sites and Services, you can locate the domain controller and access its NTDS Settings. From there, you can enable the global catalog checkbox, effectively designating the domain controller as a global catalog server.

Question 5 of 190

Your network contains an Active Directory domain named contoso.com. The domain functional level is Windows Server 2012 R2.

You need to secure several high-privilege user accounts to meet the following requirements:

✑ Prevent authentication by using NTLM.

✑ Use Kerberos to verify authentication requests to any resources.

✑ Prevent the users from signing in to a client computer if the computer is disconnected from the domain.

What should you do?

    Correct Answer: C

    To meet the requirements of preventing authentication by using NTLM, using Kerberos to verify authentication requests, and preventing users from signing in to a client computer if it is disconnected from the domain, you should add the users to the Protected Users group. Members of this group can only use Kerberos for authentication and are restricted from using NTLM, Digest Authentication, or CredSSP. Additionally, they cannot log on if the computer is disconnected from the domain because user credentials cannot be cached locally.