###BeginCaseStudy###
Case Study: 3
A)
Datum Corporation
Scenario:
You are an enterprise desktop support technician for A. Datum Corporation.
Active Directory Configuration
The company has three offices. The offices are configured as shown in the following table.
The network contains a single Active Directory domain named adatum.com. Two Group
Policy objects (GPOs) are configured as shown in the following table.
The relevant servers in the main office are configured as shown in the following table.
Wireless Network
A wireless network is implemented in the main office. The wireless network is configured to
use WPA2-Enterprise security.
Client Configuration
All client computers run Windows 7 Enterprise and are configured to use DHCP. Windows
Firewall is disabled on all client computers. All computers in the research department have
Windows XP Mode and Windows Virtual PC installed. You deploy a custom Windows XP
Mode image to the research department computers. An application named App1 is installed
in the image.
Each research department computer has the following hardware:
• 4 GB of RAM
• Intel Core i7 processor
• 500 -GB hard disk drive
Corporate Security Policy
The corporate security policy includes the following requirements:
• Users without domain accounts must be denied access to internal servers.
• All connections to the company’s wireless access points must be encrypted.
• Only employees can be configured to have user accounts in the Active Directory
domain.
• The hard disk drives on all portable computers must be encrypted by using Windows
BitLocker Drive Encryption (BitLocker).
###EndCaseStudy###
The motherboard on a portable computer fails. The data on the computer’s hard disk drive cannot
be recovered. You need to recommend a solution to ensure that the data on hard disks can be
recovered if the motherboard on other portable computers fails Which two configurations should
you recommend? (Each correct answer presents part of the solution. Choose two.)
A.
Disable BitLocker on all portable computers.
B.
Convert the hard disks on all portable computers to dynamic disks.
C.
Export and securely store the computer certificates on all portable computers.
D.
Configure the BitLocker settings on all portable computers by using Group Policy.
A is against corporate security policy. Answers C/D