[PDF] Microsoft 70-744 Study guide and Questions

Views:
 
Category: Education
     
 

Presentation Description

Get complete detail on 70-744 exam guide to crack Windows Server 2016. You can collect all information on 70-744 tutorial, practice test, books, study material, exam questions, and syllabus. Firm your knowledge on Windows Server 2016 and get ready to crack 70-744 certification. Explore all information on 70-744 exam with number of questions, passing percentage and time duration to complete test.

Comments

Presentation Transcript

slide 1:

MICROSOFT 70-744 STUDY GUIDE AND QUESTIONS 70-744 Practice Test and Certification Guide EDUSUM.COM Get complete detail on 70-744 exam guide to crack Windows Server 2016. You can collect all information on 70-744 tutorial practice test books study material exam questions and syllabus. Firm your knowledge on Windows Server 2016 and get ready to crack 70-744 certification. Explore all information on 70-744 exam with number of questions passing percentage and time duration to complete test.

slide 2:

WWW.EDUSUM.COM PDF 1 Introduction to Microsoft Certified Solutions Expert MCSE - Core Infrastructure Exam The Microsoft 70-744 Exam is challenging and thorough preparation is essential for success. This exam study guide is designed to help you prepare for the Securing Windows Server 2016 certification exam. It contains a detailed list of the topics covered on the Professional exam as well as a detailed list of preparation resources. These study guide for the Securing Windows Server 2016 will help guide you through the study process for your certification. 70-744 Securing Windows Server 2016 Exam Summary ● Exam Name: Securing Windows Server 2016 ● Exam Code: 70-744 ● Exam Price: 165 USD ● Duration: 150 mins ● Number of Questions: 40-60 ● Passing Score: 700 / 1000

slide 3:

WWW.EDUSUM.COM PDF 2 ● Reference Books: 20744A: Securing Windows Server 2016 ● Schedule Exam: Pearson VUE ● Sample Questions: Microsoft Securing Windows Server 2016 Sample Questions ● Recommended Practice: Microsoft 70-744 Certification Practice Exam Exam Syllabus: 70-744 Microsoft Certified Solutions Expert MCSE - Core Infrastructure 1. Implement Server Hardening Solutions 25-30 ● Configure disk and file encryption This objective may include but is not limited to: Determine hardware and firmware requirements for secure boot and encryption key functionality deploy BitLocker encryption deploy BitLocker without a Trusted Platform Module TPM deploy BitLocker with a TPM only configure the Network Unlock feature configure BitLocker Group Policy settings enable Bitlocker to use secure boot for platform and BCD integrity validation configure BitLocker on Cluster Shared Volumes CSVs and Storage Area Networks SANs implement BitLocker Recovery Process using self-recovery and recovery password retrieval solutions configure Bitlocker for virtual machines VMs in Hyper-V determine usage scenarios for Encrypting File System EFS configure the EFS recovery agent manage EFS and BitLocker certificates including backup and restore ● Implement malware protection - This objective may include but is not limited to: Implement antimalware solution with Windows Defender integrate Windows Defender with WSUS and Windows Update configure Windows Defender using Group Policy configure Windows Defender scans using Windows PowerShell implement AppLocker rules implement AppLocker rules using Windows PowerShell implement Control Flow Guard implement Code Integrity Device Guard Policies create Code Integrity policy rules create Code Integrity file rules ● Protect credentials - This objective may include but is not limited to: Determine requirements for implementing Credential Guard configure Credential Guard using Group Policy WMI command prompt and Windows PowerShell implement NTLM blocking ● Create security baselines - This objective may include but is not limited to: Install and configure Microsoft Security Compliance Toolkit create view and import security baselines deploy configurations to domain and non-domain joined servers

slide 4:

WWW.EDUSUM.COM PDF 3 2. Secure a Virtualization Infrastructure 5-10 ● Implement a Guarded Fabric solution - This objective may include but is not limited to: Install and configure the Host Guardian Service HGS configure Admin-trusted attestation configure TPM- trusted attestation configure the Key Protection Service using HGS migrate Shielded VMs to other guarded hosts troubleshoot guarded hosts ● Implement Shielded and encryption-supported VMs - This objective may include but is not limited to: Determine requirements and scenarios for implementing Shielded VMs create a shielded VM using only a Hyper-V environment enable and configure vTPM to allow an operating system and data disk encryption within a VM determine requirements and scenarios for implementing encryption-supported VMs troubleshoot Shielded and encryption- supported VMs 3. Secure a Network Infrastructure 10-15 ● Configure Windows Firewall This objective may include but is not limited to: Configure Windows Firewall with Advanced Security configure network location profiles configure and deploy profile rules configure firewall rules for multiple profiles using Group Policy configure connection security rules using Group Policy the GUI management console or Windows PowerShell configure Windows Firewall to allow or deny applications scopes ports and users using Group Policy the GUI management console or Windows PowerShell configure authenticated firewall exceptions import and export settings ● Implement a Software Defined Datacenter Firewall - This objective may include but is not limited to: Determine requirements and scenarios for Datacenter Firewall implementation with Software Defined Networking determine usage scenarios for Datacenter Firewall policies and network security groups Configure Datacenter Firewall Access Control Lists ● Secure network traffic - This objective may include but is not limited to: Configure IPsec transport and tunnel modes configure IPsec authentication options configure connection security rules implement isolation zones implement domain isolation implement server isolation zones determine SMB 3.1.1 protocol security scenarios and implementations enable SMB encryption on SMB Shares configure SMB signing via Group Policy disable SMB 1.0 secure DNS traffic using DNSSEC and DNS policies install and configure Microsoft Message Analyzer MMA to analyze network traffic 4. Manage Privileged Identities 25-30

slide 5:

WWW.EDUSUM.COM PDF 4 ● Implement Just-In-Time JIT Administration - This objective may include but is not limited to: Create a new administrative bastion forest in an existing Active Directory environment using Microsoft Identity Manager MIM configure trusts between production and bastion forests create shadow principals in bastion forest configure the MIM Web portal request privileged access using the MIM Web portal determine requirements and usage scenarios for Privileged Access Management PAM solutions create and Implement MIM policies implement Just-in-Time administration principals using time-based policies request privileged access using Windows PowerShell ● Implement Just-Enough-Administration JEA - This objective may include but is not limited to: Enable a JEA solution on Windows Server 2016 create and configure session configuration files create and configure role capability files create a JEA endpoint connect to a JEA endpoint on a server for administration view logs download WMF 5.1 to a Windows Server 2008 R2 configure a JEA endpoint on a server using Desired State Configuration DSC ● Implement Privileged Access Workstations PAWs and User Rights Assignments - This objective may include but is not limited to: Implement a PAWS solution configure User Rights Assignment group policies configure security options settings in Group Policy enable and configure Remote Credential Guard for remote desktop access Implement an Enhanced Security Administrative Environment ESAE administrative forest design approach Determine usage scenarios and requirements for implementing ESAE forest design architecture to create a dedicated administrative forest ● Implement Local Administrator Password Solution LAPS - This objective may include but is not limited to: Install and configure the LAPS tool secure local administrator passwords using LAPS manage password parameters and properties using LAPS 5. Implement Threat Detection Solutions 15-20 ● Configure advanced audit policies - This objective may include but is not limited to: Determine the differences and usage scenarios for using local audit policies and advanced auditing policies implement auditing using Group Policy and AuditPol.exe implement auditing using Windows PowerShell create expression-based audit policies configure the Audit PNP Activity policy configure the Audit Group Membership policy enable and configure Module Script Block and Transcription logging in Windows PowerShell ● Install and configure Microsoft Advanced Threat Analytics ATA

slide 6:

WWW.EDUSUM.COM PDF 5 - This objective may include but is not limited to: Determine usage scenarios for ATA determine deployment requirements for ATA install and configure ATA Gateway on a dedicated server install and configure ATA Lightweight Gateway directly on a domain controller configure alerts in ATA Center when suspicious activity is detected review and edit suspicious activities on the attack time line ● Determine threat detection solutions using Operations Management Suite OMS - This objective may include but is not limited to: Determine usage and deployment scenarios for OMS determine security and auditing functions available for use determine Log Analytics usage scenarios 6. Implement Workload-Specific Security 5-10 ● Secure application development and server workload infrastructure - This objective may include but is not limited to: Determine usage scenarios supported server workloads and requirements for deployments determine usage scenarios and requirements for Windows Server and Hyper-V containers install and configure containers ● Implement a secure file services infrastructure and Dynamic Access Control DAC - This objective may include but is not limited to: Install the File Server Resource Manager FSRM role service configure quotas configure file screens configure storage reports configure file management tasks configure File Classification Infrastructure FCI using FSRM implement work folders configure file access auditing configure user and device claim types implement policy changes and staging perform access-denied remediation create and configure Central Access rules and policies create and configure resource properties and lists Microsoft 70-744 Certification Sample Questions and Answers To make you familiar with Securing Windows Server 2016 70-744 certification exam structure we have prepared this sample question set. We suggest you to try our Sample Questions for MCSE Core Infrastructure 70-744 Certification to test your understanding of Microsoft 70-744process with real Microsoft certification exam environment. 70-744 Securing Windows Server 2016 Sample Questions:-

slide 7:

WWW.EDUSUM.COM PDF 6 01. You are building a guarded fabric.You need to configure Admin-trusted attestation. Which cmdlet should you use a Add-HgsAttestationHostGroup b Add-HgsAttestationTpmHost c Add-HgsAttestationCIPolicy d Add-HgsAttestationTpmPolicy 02. You are the administrator of an Active Directory Domain Services AD DS domain. All server computers run Windows Server 2016. Some malicious software infects a specific network subnet. The malicious software performs DNS queries to the domains DNS servers in an attempt to spread itself to other hosts. You need to prevent the infected subnet from performing DNS queries to the domains DNS servers. Your actions must not disrupt the DNS service in the rest of the subnets in the domain. What technology should you configure a Domain Name System Security Extensions DNSSEC on the DNS servers b DNS-based Authentication of Named Entities DANE on the DNS servers c DNS policies on the DNS servers d IP Address Management IPAM in the domain 03. This question relates to Windows Firewall and related technologies. These rules use IPsec to secure traffic while it crosses the network. You use these rules to specify that connections between two computers must be authenticated or encrypted. What is the name for these rules a Firewall Rules b Connection Security Rules c TCP Rules d DHP Rules 04. Your network contains an Active Directory domain named contoso.com. You create a Microsoft Operations Management Suite OMS workspace. You need to connect several computers directly to the workspace. Which two pieces of information do you require a the ID of the workspace b the name of the workspace c the URL of the workspace d the key of the workspace 05. Your network contains an Active Directory domain named contoso.com. You are deploying Microsoft Advanced Threat Analytics ATA. You create a user named User1. You need to configure the user account of User1 as a Honeytoken account. Which information must you use to configure the Honeytoken account a the SAM account name of User1 b the Globally Unique Identifier GUID of User1

slide 8:

WWW.EDUSUM.COM PDF 7 c the SID of User1 d the UPN of User1 06. The New-CI Policy cmdlet creates a Code Integrity policy as an .xml file. If you do NOT supply either driver files or rules what will happen a The cmdlet performs a system scan b An exception/warning is shown because either one is required c Nothing d The cmdlet searches the Code Integrity Audit log for drivers 07. ______ enables easier management for BitLocker enabled desktops and servers in a domain environment by providing automatic unlock of operating system volumes at system reboot when connected to a wired corporate network. This feature requires the client hardware to have a DHCP driver implemented in its UEFI firmware. a Credential Guard b JEA c EFS recovery agent d Network Unlock 08. Windows PowerShell is a task-based command-line shell and scripting language designed especially for system administration. Windows Defender comes with a number of different Defender-specific cmdlets that you can run through PowerShell to automate common tasks. Which Cmdlet would you run first if you wanted to perform an offline scan a Set-MpPreference -DisablePrivacyMode true b Set-MpPreference -DisableRestorePoint true c Start-MpScan d Start-MpWDOScan 09. You are the administrator for your company. Your company is planning to deploy shielded virtual machines VMs to an external cloud platform that uses a guarded fabric with Trusted Platform Module TPM-attestation. You are implementing an on-premises guarded host on a server that will run Windows Server 2016. You are evaluating the following two installation options for the guarded host server: - Nano Server - Desktop Experience You need to identify any requirements that can only be met by using the Desktop Experience installation option for the on-premises guarded host. Which capability can only be met by the Desktop Experience installation option a Create new shielded VMs on premises and move the VMs to a guarded fabric. b Manage the server remotely by using PowerShell. c Implement measured boot sequence and code integrity policies.

slide 9:

WWW.EDUSUM.COM PDF 8 d Manage guarded hosts by using System Center Virtual Machine Manager SCVMM 2016. 10. A shielding data file also called a provisioning data file or PDK file is an encrypted file that a tenant or VM owner creates to protect important VM configuration information. A fabric administrator uses the shielding data file when creating a shielded VM but is unable to view or use the information contained in the file. Which information can be stored in the shielding data file a Administrator credentials b All of these c A Key Protector d Unattend.xml Answers:- Answer 1:- a Answer 2:- c Answer 3:- b Answer 4:- a d Answer 5:- c Answer 6:- a Answer 7:- d Answer 8:- d Answer 9:- a Answer 10:- b

authorStream Live Help