Exam Ref 70-697 Configuring Windows Devices: Manage Identity
- 11/19/2015
Answers
This section contains the solutions to the thought experiments and answers to the objective review questions in this chapter.
Objective 1.1: Thought experiment
- Office 365
- Most likely using the cloud, with options that enable the user to sync that data even when they aren’t online
- Billing; Global; Password; Service; User Management
Objective 1.1: Review
Correct answer: A
- Correct: Options to restrict the use of Microsoft accounts for a group of users in a domain are in the Group Policy Management Editor window. Expand Computer Configuration/ Policies/ Windows Settings/ Security Settings/ Local Policies/ Security Options.
- Incorrect: The User Rights Assignment node doesn’t provide options for restricting Microsoft accounts.
- Incorrect: To restrict a group of users in an Active Directory domain, you need to access Group Policy, not Local Group Policy.
- Incorrect: To restrict a group of users in an Active Directory domain, you need to access Group Policy, not Local Group Policy. Also, User Rights doesn’t offer the options you need.
Correct answer: B
- Incorrect: Users can do this from their local computers.
- Correct: This is the correct answer; from their local computers, in the Settings app, from the Accounts page.
- Incorrect: You can’t connect a Microsoft account using Group Policy.
- Incorrect: This is achieved in the Settings app, but not from the Personalization page.
Correct answer: D
- Incorrect: Active Directory synchronization is one of the things you can manage in the Office 365 Admin Center, but others are correct here.
- Incorrect: Valid, expired, and assigned licenses are some of the things you can manage in the Office 365 Admin Center, but others are correct here.
- Incorrect: User passwords, including resetting, is one of the things you can manage in the Office 365 Admin Center, but others are correct here.
- Correct: All of the above can be configured in the Office 365 Admin Center.
- Incorrect: All the answers are correct, not just B and C.
Correct answer: E
- Incorrect: DISM is only one of the correct options listed.
- Incorrect: Windows PowerShell is only one of the correct options listed.
- Incorrect: Configuration Manager is only one of the correct options listed.
- Incorrect: Windows Intune is only one of the correct options listed.
- Correct: All of the above
- Incorrect: “Only C and D” isn’t correct because A and B are correct also.
Correct answer: B
- Incorrect: Special Group Polices are required.
- Correct: Allow All Trusted Apps To Install is the required Group Policy setting that must be enabled.
- Incorrect: Allow Development Of Windows Store Apps isn’t the correct Group Policy setting to enable.
- Incorrect: You should not block Microsoft accounts; you need to enable the Group Policy setting listed for answer B.
Correct answer: B
- Incorrect: You cannot make sideloaded apps mandatory and force their installation on clients by applying the applicable settings in Windows Intune.
- Correct: This statement is false.
Correct answer: A
- Correct: You deep link apps to make Windows Store apps available through the company portal.
- Incorrect: You do not use deep linking to force the installation of apps on Windows 10 computers.
- Incorrect: You don’t use deep linking to add LOB apps to the Windows Store. It’s used to make Windows Store apps available through the company portal.
- Incorrect: “None of the above” isn’t correct. A is correct.
Objective 1.2: Thought experiment
- Yes. AC CS in Windows Server 2012 requires an existing PKI infrastructure.
- Client certificates are stored in the Personal certificate store for the applicable user account on the client computer.
- Trusted root certificates are stored in the Trusted Root Certification Authorities store on the client computer.
- Certmgr.msc can be used to open the Certmgr window.
Objective 1.2: Review
Correct answers: A and B
- Correct: Backup-CARoleService is the correct command for backing up the CA database.
- Correct: Restore-CARoleService is the correct command for restoring the CA database.
- Incorrect: This isn’t a valid Windows PowerShell command.
- Incorrect: This isn’t a valid Windows PowerShell command.
Correct answers: B and C
- Incorrect: A physical smart card can be removed.
- Correct: The solution here requires a compatible TPM chip and a virtual smart card.
- Correct: The solution here requires a compatible TPM chip and a virtual smart card.
- Incorrect: A biometric fingerprint reader doesn’t offer private keys for security.
- Incorrect: BitLocker Drive Encryption is used to protect data on the drive and isn’t for authentication purposes.
Correct answer: C
- Incorrect: If you’ve joined the homegroup, you are connected to the network.
- Incorrect: BitLocker Drive Encryption isn’t required to join a homegroup.
- Correct: The time is configured incorrectly on the second computer.
- Incorrect: If you have joined the homegroup, you are running a compatible version of Windows.
Correct answers: A and B
- Correct: A workgroup uses a distributed method for sharing data.
- Correct: A homegroup uses a distributed method for sharing data.
- Incorrect: A domain uses a centralized method of sharing and managing data and uses AD DS for authentication and user access.
- Incorrect: Although a workgroup is a distributed sharing method, a domain isn’t.
Correct answer: D
- Incorrect: A VPN enables users to access your local network when they are away from the office. VPNs might use PPTP or L2TP to secure the connection.
- Incorrect: Remote Desktop Services enables users to access session-based desktops, virtual machine-based desktops, or applications from both within a network and from the Internet.
- Incorrect: App-V enables the application to run in a virtualized environment without having to install or configure it on the local machine.
- Correct: Secure Channel is a Security Support Provider (SSP), and the TLS/SSL protocol uses a client/server model that’s based on certificate authentication. It does require a PKI infrastructure.
Correct answer: A
- Correct: You need to first configure the policy Account Lockout Threshold to state how many times a user can try to authenticate before additional measures are taken.
- Incorrect: The policy Reset Account Counter After is optional.
- Incorrect: These policies are available in both workgroups and domains.
- Incorrect: The Group Security Policy console is the appropriate place to create these policies.
Correct answer: C
- Incorrect: Credential Manager can store Windows Store passwords as well as local ones.
- Incorrect: Credential Manager can store Windows Store passwords as well as those input for local resources.
- Correct: Credential Manager can store Windows Store passwords as well as passwords for local resources.
- Incorrect: Credential Manager can store both Windows Store passwords and local user passwords.
Correct answer: B
- Incorrect: A Microsoft account can be used in a domain if it isn’t restricted through Group Policy.
- Correct: Enable the user to associate their own Microsoft account to achieve this.
- Incorrect: Workplace Join enables users to connect to your domain with their own personal devices.
- Incorrect: If you add Web Application Proxy, users can join your enterprise from any Internet-enabled location by using a device you’ve allowed using Workplace Join.