Which GPO or GPOs will apply to User1 when the user sig…

Note: This question is part of a series of questions that use the same scenario. For your
convenience, the scenario is repeated in each question. Each question presents a different
goal and answer choices, but the text of the scenario is exactly the same in each question
in this series.
Start of repeated scenario.
Your network contains an Active Directory domain named contoso.com. The domain contains a
single site named Site1. All computers are in Site1. The Group Policy objects (GPOs) for the
domain are configured as shown in the exhibit:

The relevant users and client computer in the domain are configured as shown in the following
table:

End of repeated scenario.
You are evaluating what will occur when you block inheritance on OU4. Which GPO or GPOs will
apply to User1 when the user signs in to Computer1 after block inheritance is configured?

Note: This question is part of a series of questions that use the same scenario. For your
convenience, the scenario is repeated in each question. Each question presents a different
goal and answer choices, but the text of the scenario is exactly the same in each question
in this series.
Start of repeated scenario.
Your network contains an Active Directory domain named contoso.com. The domain contains a
single site named Site1. All computers are in Site1. The Group Policy objects (GPOs) for the
domain are configured as shown in the exhibit:

The relevant users and client computer in the domain are configured as shown in the following
table:

End of repeated scenario.
You are evaluating what will occur when you block inheritance on OU4. Which GPO or GPOs will
apply to User1 when the user signs in to Computer1 after block inheritance is configured?

A.
A1, A5, and A6

B.
A3, A1, A5, and A7

C.
A3 and A7 only

D.
A7 only



Leave a Reply 2

Your email address will not be published. Required fields are marked *


Demi

Demi

QUESTION 56
Your network contains an Active Directory domain named contoso.com.
Domain users use smart cards to sign in to their client computer.
Some users report that it takes a long time to sign in to their computer and that the logon attempt times out, so they must restart the sign in process.
You discover that the issues to checking the certificate revocation list (CRL) of the smart card certificates.
You need to resolve the issue without diminishing the security of the smart card logons.
What should you do?

A. From the properties of the smart card’s certificate template, modify the Request Handling settings.
B. From the properties of the smart card’s certificate template, modify the Issuance Requirements settings.
C. Deactivate certificate revocation checks on the computers.
D. Implement an Online Certification Status Protocol (OCSP) responder.

Answer: D

QUESTION 57
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You deploy a new Active Directory forest.
You need to ensure that you can create a group Managed Service Account (gMSA) for multiple member servers.
Solution: From Windows PowerShell on a domain controller, you run the Set-KdsConfiguration cmdlet.
Does this meet the goal?

A. Yes
B. No

Answer: B

QUESTION 58
Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.
Start of repeated Scenario
You work for a company named Contoso, Ltd.
The network contains an Active Directory forest named contoso.com. A forest trust exists between contoso.com and an Active Directory forest named adatum.com.
The contoso.com forest contains the objects configured as shown in the following table.

Group 1 and Group2 contain only user accounts.
Contoso hires a new remote user named User3. User3 will work from home and will use a computer named Computer3 that runs Windows 10. Computer3 is currently in a workgroup. An administrator named Admin1 is a member of the Domain Admins group in the contoso.com domain.
From Active Directory Users and Computers, you create an organizational unit (OU) named OU1 in the contoso.com domain, and then you create a contact named Contact1 in OU1.
An administrator of the adatum.com domain runs the Set-ADUser cmdlet to configure a user named User1 to have a user logon name of [email protected].
End of repeated scenario
You need to ensure that Admin1 can convert Group1 to a global group.
What should you do?

A. Add Admin1 to the Enterprise Admin group.
B. Remove all the member from Group1.
C. Modify the Security settings of Group1.
D. Convert Group1 to a universal security group.

Answer: B

QUESTION 59
You have an Active Directory Rights Management Services (AD RMS) server named RMS1.
Multiple documents are protected by using RMS1.
RMS1 fails and cannot be recovered.
You install the AD RMS server role on a new server named RMS2.
You restore the AD RMS database from RMS1 to RMS2.
Users report that they fail to open the protected documents and to protect new documents.
You need to ensure that the users can access the protected content.
What should you do?

A. From Active Directory Rights Management, update the Service Connection Point (SCP) for RMS1.
B. From DNS, create an alias (CNAME) record for RMS2.
C. From DNS, modify the service location (SRV) record for RMS1.
D. From RMS2, register a service principal name (SPN) in Active Directory.

Answer: D

QUESTION 60
Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details provided in a question apply only to that question.
Your network contains an Active Directory domain named contoso.com.
You recently deleted 5,000 objects from the Active Directory database.
You need to reduce the amount of disk space used to store the Active Directory database on a domain controller.

A. Dsadd quota
B. Dsmod
C. Active Directory Administrative Center
D. Dsacls
E. Domain
F. Active Directory Users and Computers
G. Ntdsutil
H. Group Policy Management Console

Answer: G