How should you configure the permissions?

HOTSPOT
You have a computer named Computer1 that has a shared folder named Share1. Share1 has the permissions
configured as shown in the following table:

You need to ensure that User1 can change files in Share1. User1 must be prevented from deleting files created
by other users.
How should you configure the permissions? To answer, select the appropriate options In the answer area.
Each correct selection is worth one point.
Hot Area:

HOTSPOT
You have a computer named Computer1 that has a shared folder named Share1. Share1 has the permissions
configured as shown in the following table:

You need to ensure that User1 can change files in Share1. User1 must be prevented from deleting files created
by other users.
How should you configure the permissions? To answer, select the appropriate options In the answer area.
Each correct selection is worth one point.
Hot Area:

Answer:



Leave a Reply 3

Your email address will not be published. Required fields are marked *


Daney

Daney

More new 70-698 Questions and Answers:

QUESTION
Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.
Your network contains a single Active Directory domain named adatum.com.
The network contains five servers configured as shown in the following table.

All of the servers run Windows Server 2012 R2.
Test_Server has a shared folder named ShareA. Only local users have permissions to ShareA. The network contains a mainframe computer that is administered by using the Telnet protocol. The domain contains four client computers configured as shown in the following table.

All of the client computers run the 64-bit version of Windows.
User3 frequently accesses ShareA.
Remote Desktop is enabled on Computer4.
Your company identifies the following requirements:
– Ensure that you can test unsigned device drivers on Computer1
– Enable Credential Guard on Computer2.
– Run commands and cmdlets remotely on computer2.
– Configure User Account control (UAC) on Computer3 to prompt administrators for credentials when elevated privileges are required.
– Ensure that User1 can view and interact with a desktop session of User3.
– Ensure that User2 can use Telnet to manage the mainframe.
– Ensure that User4 can use Remote Desktop to access Computer4 remotely.
You need to meet the requirement of User4.
What should you do?

A. Install a Universal Windows Platform (UWP) application.
B. Modify the settings of a firewall rule.
C. Install a Windows feature.
D. Modify the membership of a local group.

Answer: B
Explanation:

QUESTION
You have a Key Management Service (KMS) host and an administrative workstation named Computer1.
From Computer1, you need to validate the activation status on a computer named Computer2.
What should you run?

A. Get-RDLicenseConfiguration computer2
B. slmgr.vbs computcr2 /dlv
C. winrs.exe -r:Computer2 netdom.exe
D. ospp.vbs /tokact:computer2

Answer: B
Explanation:

QUESTION
You have two computers named Computer1 and Computer2 that run Windows 10. On Computer1, you create a provisioning package named Package1.
You plan to apply the provisioning package to Computer2.
Which file must be applied to Computer2?

A. Package1.icdproj.xml
B. Customizations.xml
C. Package1.ppkg
D. Package1.cat

Answer: C
Explanation:

QUESTION
You have a computer named Computer1 that has the Hyper V feature enabled.
You have two virtual machines named VM1 and VM2 hosted on Computer1.
VM1 can communicate with VM2 and Compute1.
VM1 tails to connect to the Internet- Computer1 can connect to the Internet.
You need to ensure that VM1 can connect to the Internet.
What should you do?

A. On Computer 1, modify the network settings.
B. Enable port mirroring on VM1.
C. Create an external virtual switch and configure VM1 to use the switch.
D. On VM1, select Enable virtual LAN identification.

Answer: C

Sam

Sam

Agree with answer. User1 should have Read and Write NTFS permissions.