2017 May New 70-697 Exam Dumps with PDF and VCE Updated in www.Braindump2go.com Today!100% Real Exam Questions! 100% Exam Pass Guaranteed!
1.|2017 Version New 70-697 Exam Dumps (PDF & VCE) 199Q&As Download:
http://www.braindump2go.com/70-697.html
2.|2017 Version New 70-697 Exam Questions & Answers Download:
https://youtu.be/sxMZeP3e-nY
QUESTION 188
You administer Windows 10 Enterprise client computers in your company network.
A computer that is used by non-administrator users has a directory named C:\Folder1.
A shared collection of Microsoft Excel files is stored in the C:\Folder1 directory, with non-administrator users being granted modify permissions to the directory.
You discover that some files have been incorrectly modified by a user.
You need to determine which users are making changes to the files in the directory.
Which two actions should you perform? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
A. Set localpolicy: Computer Configuration\Windows Settings\Security Settings\Local Policies\Audit Policy \Audit object access to Failure.
B. From the Auditing Entry for Folder1, set the Principal to Everyone, and then set the Type to Failure for the Modify permission.
C. From the Auditing Entry for Folder1, set the Principal to Guests, and then set the Type to Success for the Modify permission.
D. Set local policy: Computer Configuration\Windows Settings\Security Settings\Local Policies\Audit Policy \Audit object access to Success.
E. From the Aauditing Entry for Folder1, set the Principal to Guests, and then set the Type to Failure for the Modify permission.
F. From the Auditing Entry for Folder, set the Principal to Everyone, and then set the Type to Success for the Modify permission.
Answer: DF
QUESTION 189
You provide IT support for a small startup company.
The company wants users to have Read and Write permissions to the company’s shared folder.
The network consists of a workgroup that uses Windows 10 Enterprise computers.
You add each user to a group named NetworkUsers.
You need to grant permissions to the share.
You have the following requirements:
– All users must have Read and Write access to existing files.
– Any new files must allow the creator to modify the new file’s permissions.
Which two actions should you take? Each correct answer presents part of the solution.
A. Grant Modify permissions to the NetworkUsers group on the shared folder.
B. Grant Full Control permissions to the Domain Admins group on the shared folder.
C. Grant List and Execute permissions to the NetworkUsers group on the shared folder.
D. Grant Full Control permissions to the Creator Owner group on the shared folder.
Answer: AD
QUESTION 190
You are the desktop administrator for a small company.
The company modifies its policy for retaining company financial documents from six months to three years.
You currently use File History, retaining files for six months and saving copies of files every 20 minutes.
You need to adjust your current backup solution to accommodate the policy change.
What should you do?
A. Set the KeepSaved Versions option in File History to Forever.
B. Set the backup solution to Recovery model.
C. Set the Save Copies of Files frequency to Daily.
D. Set the File History log file setting to Archive the log when full, do not overwrite events.
Answer: A
QUESTION 191
You have a computer that runs Windows 10 and has BitLocker Drive Encryption (BitLocker) configured.
You need to change the BitLocker PIN for the drive.
What should you run?
A. the bitsadmin.exe command
B. the Enable-BitLocker cmdlet
C. the Add-BitLockerKeyProtector cmdlet
D. the Set-PcsvDeviceUserPassword cmdlet
Answer: C
QUESTION 192
You have a Microsoft Intune subscription.
You create two compliance policies named Comp1 and Comp2.
You create a configuration policy named ConfigPol1.
The settings in each policy do not conflict with other policies.
Comp1 has low security settings. Comp2 has medium security settings.
ConfigPol1 has high security settings.
You have a device named Device1. Device1 is a member of groups that have Comp1, Comp2 and ConfigPol1 applied.
You need to identify which policies with be enforced on Device1.
What should you identify?
A. Comp1 only
B. Comp2 only
C. Comp1, Comp2 and ConfigPol1
D. Comp1 and Comp2 only
E. Comp1 and ConfigPol1 only
F. ConfigPol1 only
G. Comp2 andConfigPol1 only
Answer: C
QUESTION 193
Your network contains an Active Directory domain named contoso.com. All client computers run Windows 10 Enterprise and Microsoft Office 2013. All of the computers are joined to the domain. Your company purchases a subscription to Office 365. An administrator creates an Office 365 account for each user and deploys a federated solution for Office 365.
You need to prevent the users from being prompted for a user account and a password each time they access services from Office 365.
Which account should you instruct the users to use when they sign in to their computer?
A. a Microsoft account
B. a local user account
C. an Office 365 account
D. a contoso.com account
Answer: D
QUESTION 194
You have a computer named Client1. Client 1 is joined to an Active Directory domain.
You need to join Client1 to an Azure Active Directory (Azure AD) tenant.
What should you do first?
A. From User Accounts in Control Panel, configure the Manage User Accounts settings.
B. From Computer Management, modify the membership for the Network Configuration Operators group.
C. From the System in the Settings app, click Disconnect from organization.
D. From the Local Group Policy Editor, modify the Add workstations to domain policy.
Answer: C
QUESTION 195
You administer Windows 10 Enterprise.
Your network includes an Active Directory domain and a standalone server in a perimeter network that runs Windows Server 2008 R2.
Your company purchases five new tablets that run Windows 8. The tablets will be used to access domain resources and shared folders located on the standalone server.
You need to implement single sign-on (SSO) authentication for tablet users.
You also need to ensure that you can audit personnel access to the shared folder.
Which two actions should you perform? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
A. Create a new Microsoft account for each user.
B. Ensure that the local account for each user on the stand-alone server uses the same password as the corresponding Microsoft account.
C. Join the tablets to a domain.
D. Join the tablets to the same workgroup as the stand-alone server.
E. Enable a guest account on the stand-alone server.
F. On the stand-alone server, create user accounts that have the same logon names and passwords as the user domain accounts.
Answer: CF
QUESTION 196
You support Windows 10 Enterprise computers.
Your company protects all laptops by using the BitLocker Network Unlock feature.
Some employees work from home.
You need to ensure that employees can log on to their laptops when they work from home.
What should you do?
A. Have users run theManage-bde.exe -unlock command before they disconnect from the company network.
B. Ensure that the Trusted Platform Module (TPM) chips in the laptops are version 1.2 or greater.
C. Enable BitLocker To Go.
D. Provide employees with their BitLocker PINs.
Answer: D
QUESTION 197
You administer Windows 10 Enterprise tablets that are members of an Active Directory domain.
You want to create an archived copy of My Documents folders that are stored on the tablets.
You create a standard domain user account to run a backup task.
You need to grant the backup task user account access to the folders.
What should you do?
A. Add the backup task account to the Remote Management Users group on a domain controller.
B. Add the backup task account to the Backup Operators group on every tablet.
C. Add the backup task account to the Backup Operators group on a domain controller.
D. Set the backup task account as NTFS owner on all the folders.
Answer: B
QUESTION 198
You are an IT professional for a bank. All of the user’s files on the external drives are encrypted by using EFS.
You replace a user’s computer with a new Windows 10 Enterprise computer.
The user needs to connect her external hard drive to the new computer.
You have the original computer’s certificate and key.
You need to import the certificate and key onto the new computer.
Into which certificate store should you import the certificate and key?
A. Untrusted Certificates
B. Trusted Root Certification Authorities
C. Personal
D. Trusted Publishers
Answer: C
!!!RECOMMEND!!!
1.|2017 Version New 70-696 Exam Dumps (PDF & VCE) 199Q&As Download:
http://www.braindump2go.com/70-697.html
2.|2017 Version New 70-697 Study Guide Video:
https://youtu.be/sxMZeP3e-nY