Advertisement
jmacc

Operating and Managing a Secure Windows 8 Environment-1

Dec 28th, 2012
2,835
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.62 KB | None | 0 0
  1. You need to recommend a feature to minimize the number of temporary Internet files and cookies retained on client computers that run Windows 8. The solution must ensure that temporary Internet files and cookies from the websites in Favorites are retained.
  2. Which feature should you recommend?
  3.  
  4. --no--Enhanced Protected Mode
  5.  
  6. InPrivate Browsing
  7.  
  8. SmartScreen Filter
  9.  
  10. -----Delete Browsing History
  11. -------------------------------------------------------------------------
  12. You need to recommend a solution to protect the entire contents of the system drive on a client computer that run Windows 8. The solution must ensure that any offline attempts to tamper with the hardware on the computer will prevent the computer from starting.
  13. What should you include in the recommendations?
  14.  
  15. ------BitLocker Drive Encryption (BitLocker) with a Trusted Platform Module (TPM)
  16.  
  17. --------------------------------------------------------------------------
  18. Your network contains an Active Directory domain. The domain contains servers that run Windows Server 2008 R2.
  19. You need to identify which access control and authorization features are available on client computers that run Windows 8 Enterprise.
  20. Which features should you identify? (Choose all that apply.)
  21.  
  22. Kerberos tickets with compound identity
  23.  
  24. ----an enhanced access control list (ACL) editor
  25.  
  26. ---conditional expressions
  27.  
  28. ---user claims
  29.  
  30. ----device claims
  31. -----------------------------------------------------------------------------
  32. You need to identify which rule type is supported by software restriction policies but not supported by AppLocker.
  33. Which rule should you identify?
  34.  
  35. -----Internet zone
  36. ---------------------------------------------------------------------------
  37. Your network contains 40 client computers that run Windows 8 Pro.
  38. Multiple Activation Key (MAK) volume license keys will be used on the computers.
  39. You need to recommend a solution to activate all of the computers without requiring that the computers connect to the Internet. The solution must require the minimum amount of administrative effort.
  40. What should you include in the recommendation?
  41.  
  42. Active Directory-Based Activation
  43. ---no--the Key Management Service (KMS)
  44. ----the Volume Activation Management Tool (VAMT)
  45. ---no-MAK independent activation
  46. ---------------------------------------------------------------------------
  47. You have a client computer that runs Windows 8.
  48. You configure the computer to participate in the Windows Customer Experience Improvement Program (CEIP).
  49. You need to monitor the events generated by CEIP.
  50. Which event log should you monitor?
  51.  
  52. -----Application
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement