Question 6 of 398

Your network contains an Active Directory domain that is synced to a Microsoft Azure Active Directory (Azure AD) tenant. All users have been issued with laptop computers as well as desktop computers that run Windows 10 Enterprise. All users have Microsoft 365 E3 licenses.

A user named Mia Hamm informs you that she must perform a BitLocker recovery on her laptop but she does not have her BitLocker recovery key.

You need to ensure that Mia Hamm can perform a BitLocker recovery on her laptop.

What should you do?

    Correct Answer: C

    To perform a BitLocker recovery, Mia Hamm needs to access her BitLocker recovery key, which is stored in Azure Active Directory (Azure AD) as users in the network are synced to Azure AD and have Microsoft 365 E3 licenses. By logging onto her desktop computer and navigating to the Azure AD user account profile page, she can view the recovery key required to unlock her laptop.

Question 7 of 398

Your company has an on-premises network that contains an Active Directory domain. The domain is synced to Microsoft Azure Active Directory (Azure AD). All computers in the domain run Windows 10 Enterprise.

You have a computer named Computer1 that has a folder named Folder1.

You must provide users in group named Group1 with the ability to view the list of files in Folder1. Your solution must ensure that the principle of least privilege is maintained.

What should you do?

    Correct Answer: C

    In Microsoft Windows file systems, permissions can be set to control access to files and folders. To maintain the principle of least privilege, you need to provide users in Group1 with just enough permission to view the list of files in Folder1 without giving them more access than necessary. Among the options, 'List folder permissions' specifically allows users to see the list of files and subfolders within a folder without granting further access like reading or modifying file contents. Therefore, assigning the 'List folder permissions' to Group1 is the correct choice since it fulfills the requirement by providing the minimum necessary permissions.

Question 8 of 398

You have a computer named Computer1 that runs Windows 10.

Computer1 has a folder named C:\Folder1.

You need to meet the following requirements:

✑ Log users that access C:\Folder1.

✑ Log users that modify and delete files in C:\Folder1.

Which two actions should you perform?

    Correct Answer: A, D

    To log users that access and modify or delete files in the folder C:\Folder1, you need to configure auditing settings on the folder itself and set up the appropriate audit policy in the local Group Policy. First, from the properties of C:\Folder1, you should configure the auditing settings which allow for the tracking of access, modifications, and deletions of files within that folder. Second, configuring the 'Audit object access' in the local Group Policy enables the auditing of access to objects, which includes files and folders. Encryption and other audit policies like directory service access or system events do not meet these specific requirements.

Question 9 of 398

Your company has a computer named Computer1 that runs Windows 10. Computer1 is used to provide guests with access to the Internet. Computer1 is a member of a workgroup.

You want to configure Computer1 to use a user account sign in automatically when the the computer is started. The user must not be prompted for a user name and password.

What should you do?

    Correct Answer: C

    To configure a user account to sign in automatically without prompting for a username and password on a Windows 10 computer that is a member of a workgroup, you need to edit the registry. Specifically, add the default user name and password in the HKEY_LOCAL_MACHINE\u200BSOFTWARE\u200BMicrosoft\u200BWindows NT\u200BCurrentVersion\u200BWinlogon subkey. This method allows the computer to automatically log in using the specified credentials when it starts.

Question 10 of 398

SIMULATION -

You have a computer named Computer1 that runs Windows 10.

Computer1 has a folder named C:\Folder1.

You need to meet the following requirements:

✑ Provide a user named Jon Ross with the ability to modify the permissions of C:\Folder1.

✑ Ensure that the principle of least privilege is maintained.

What should you do?

To complete this task, sign in to the required computer or computers.

    Correct Answer:

    To provide Jon Ross with the ability to modify the permissions of C:\Folder1 while ensuring the principle of least privilege is maintained, you should grant him the specific advanced permissions required for this task. Full Control is not needed, as it would grant more permissions than necessary. Here are the steps to follow: 1. In Windows Explorer, right-click the C:\Folder1 folder and select Properties. 2. Go to the Security tab and click Edit. 3. In the Permissions dialog box, add Jon Ross. 4. Click OK, then click Advanced. 5. Select Jon Ross and click Edit. 6. Click 'Show advanced permissions'. 7. Check only the boxes for 'Read permissions' and 'Change permissions'. 8. Click OK three times to close all dialog boxes. This approach provides Jon Ross with the required permissions to modify the folder's permissions without granting unnecessary access, thereby maintaining the principle of least privilege.