What should you request?

###BeginCaseStudy###
Case Study: 3
A)
Datum Corporation
Scenario:
You are an enterprise desktop support technician for A. Datum Corporation.
Active Directory Configuration
The company has three offices. The offices are configured as shown in the following table.

The network contains a single Active Directory domain named adatum.com. Two Group
Policy objects (GPOs) are configured as shown in the following table.

The relevant servers in the main office are configured as shown in the following table.

Wireless Network
A wireless network is implemented in the main office. The wireless network is configured to
use WPA2-Enterprise security.
Client Configuration
All client computers run Windows 7 Enterprise and are configured to use DHCP. Windows
Firewall is disabled on all client computers. All computers in the research department have
Windows XP Mode and Windows Virtual PC installed. You deploy a custom Windows XP
Mode image to the research department computers. An application named App1 is installed
in the image.
Each research department computer has the following hardware:
• 4 GB of RAM
• Intel Core i7 processor
• 500 -GB hard disk drive
Corporate Security Policy
The corporate security policy includes the following requirements:
• Users without domain accounts must be denied access to internal servers.
• All connections to the company’s wireless access points must be encrypted.
• Only employees can be configured to have user accounts in the Active Directory
domain.
• The hard disk drives on all portable computers must be encrypted by using Windows
BitLocker Drive Encryption (BitLocker).
###EndCaseStudy###

The help desk reports that several client computers in branch office 1 are missing security updates.
You need to identify which security updates are missing. What should you request?

###BeginCaseStudy###
Case Study: 3
A)
Datum Corporation
Scenario:
You are an enterprise desktop support technician for A. Datum Corporation.
Active Directory Configuration
The company has three offices. The offices are configured as shown in the following table.

The network contains a single Active Directory domain named adatum.com. Two Group
Policy objects (GPOs) are configured as shown in the following table.

The relevant servers in the main office are configured as shown in the following table.

Wireless Network
A wireless network is implemented in the main office. The wireless network is configured to
use WPA2-Enterprise security.
Client Configuration
All client computers run Windows 7 Enterprise and are configured to use DHCP. Windows
Firewall is disabled on all client computers. All computers in the research department have
Windows XP Mode and Windows Virtual PC installed. You deploy a custom Windows XP
Mode image to the research department computers. An application named App1 is installed
in the image.
Each research department computer has the following hardware:
• 4 GB of RAM
• Intel Core i7 processor
• 500 -GB hard disk drive
Corporate Security Policy
The corporate security policy includes the following requirements:
• Users without domain accounts must be denied access to internal servers.
• All connections to the company’s wireless access points must be encrypted.
• Only employees can be configured to have user accounts in the Active Directory
domain.
• The hard disk drives on all portable computers must be encrypted by using Windows
BitLocker Drive Encryption (BitLocker).
###EndCaseStudy###

The help desk reports that several client computers in branch office 1 are missing security updates.
You need to identify which security updates are missing. What should you request?

A.
that a WSUS administrator generates a Computer Report from WSUS1

B.
that a domain administrator runs the Microsoft Baseline Security Analyzer (MBSA)

C.
that a desktop support technician run a Windows Defender scan on each computer

D.
that a desktop support technician generate a System Configuration report for each computer

Explanation:

Microsoft Baseline Security Analyzer (MBSA): to detect common security miss-configurations and
missing security updates on your computer systems.



Leave a Reply 0

Your email address will not be published. Required fields are marked *