It is impossible to pass Microsoft 70-398 exam without any help in the short term. Come to us soon and find the most advanced, correct and guaranteed . You will get a surprising result by our .
Online 70-398 free questions and answers of New Version:
NEW QUESTION 1
You configure Windows Remote Desktop to allow remote connections. You are testing the remote desktop connection.
When users that are not administrators sign in to the Remote Desktop Connection, the following error message displays: “To sign in remotely, you need the right to sign in through Remote Desktop Services.”
You need to ensure that all employees can access resources by using Remote Desktop Connection.
What should you do?
- A. In the local group policy, configure the Remote Desktop Connection Client to prompt for credentials on the client.
- B. Create a Group Policy Object that enables the Windows Firewall to allow inbound Remote Desktop Exceptions.
- C. Ensure that the employee’s device is joined to the domain.
- D. In Computer Management, add the Authenticated Users group to the Remote Users group.
NEW QUESTION 2
A Sales department user overwrites a version of a Word document on their device. You need to configure Azure Active Directory (AD) Connect Health.
Which additional port should you open?
- A. 389
- B. 1433
- C. 3268
- D. 5671
- E. 9350
NEW QUESTION 3
You are a system administrator for a department that has Windows 10 Enterprise computers in a domain configuration.
You deploy an application to all computers in the domain.
You need to use group policy to restrict certain groups from running the application. What should you do?
- A. Set up DirectAccess.
- B. Configure AppLocker.
- C. Disable BitLocker.
- D. Run the User State Management Tool.
Explanation: AppLocker is a feature in Windows Server 2012, Windows Server 2008 R2, Windows 8, and Windows 7 that advances the functionality of the Software Restriction Policies feature. AppLocker contains new capabilities and extensions that reduce administrative overhead and help administrators control how users can access and use files, such as executable files, scripts, Windows Installer files, and DLLs.
AppLocker rules can be applied to security groups. We can use a group policy to apply AppLocker rules to the security groups to prevent them from running the application.
NEW QUESTION 4
You have a computer named Computer1 that runs Windows 10 Enterprise. You plan to install the most recent updates to Computer1.
You need to ensure that you can revert to the current state of Computer1 in the event that the computer becomes unresponsive after the update.
What should you include in your solution?
- A. The Reset this PC option from the Recovery section of the Settings app
- B. The Sync your settings options from the Accounts section of the Settings app
- C. The Backup and Restore (Windows 7) control panel item
- D. The Refresh your PC option from the PC Settings
Explanation: The question states that you need to ensure that you can revert to the current state of Computer1. The question does not specify what exactly the current state is in terms of software configuration but it would be safe to assume that Computer1 has Windows Store Apps installed, desktop applications installed and some previous Windows Updates installed.
The only way to recover the computer to its ‘current’ state is to perform a full backup of the computer before updating it. Then if the computer becomes unresponsive after the update, we can simply restore the backup to return the computer to its state at the time of the backup.
NEW QUESTION 5
You need to configure the phones for the Sales department users.
In the Intune administration portal, which three steps should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Topic 4, Contoso Ltd
You are the system administrator for an insurance company named Contoso, Ltd. The company has an on-premises Active Directory Services (AD DS) domain named contoso.com, and a Microsoft Office 365 environment. You deploy the following operating systems across the enterprise:
You configure removable storage usage auditing for all Dallas devices.
You hire 25 contractors. The contractors must use their own devices to access Microsoft SharePoint Online sites in the company’s Office 365 environment. They must use Windows BitLocker and store a recovery key in Microsoft OneDrive.
User synchronization and authentication
You need to implement synchronization between the on-premises AD DS domain and the Office 365 environment. The solution must use the latest supported Microsoft technologies.
Users must be able to reset their own passwords by using the Microsoft Office 365 portal. When a user resets their Office 365 password, the password for the user’s on-premises AD DS account must also reset.
Users must be able to sign in to Office 365 by using their AD DS credentials.
You must prevent all users in Seattle except Sales users from using any removable devices. Sales users must be able to fully access locally attached tape drives. Sales users must be prevented from writing to removable drives.
You deploy a new application to the devices in Seattle. Sales department users in Seattle run an application that only works on devices that run windows 7.
You deploy a new display driver to all devices in Dallas.
Backup and Recovery
You create system images for all devices that run Windows 7. You must create a new system image each time you update these devices. You schedule file versioning for these devices to occur at 09:00 and 17:00 each day on Monday through Friday.
All devices that run Windows 10 must back up the C:\CompanyDoes folder to a network drive.
You must configure all devices that run Windows 8.1 to use a recovery drive.
You must review and take action on any alerts for Active Directory Federation Services (AD FS) applications. You must create detailed views of AD FS log on patterns. You must minimize the number of open firewall ports.
You must monitor audit events for all devices used by the Marketing user group.
User1 makes frequent changes to a Microsoft Excel workbook each day. Today at 12:00, User1 overwrites the existing document on a device that runs Windows 7.
Users in Seattle report a variety of computer issues. You must use the quickest method to revert the devices to a working state. Users in Dallas also report issues. You must correct the issues that are interfering with existing applications or files.
NEW QUESTION 6
A company has an Office 365 E3 subscription. You deploy Enterprise Mobility + Security, Active Directory Federation Services (AD FS), and Microsoft Identity Manager.
You need to implement additional security when users remotely connect to corporate resources.
What should you implement?
- A. System Center Configuration Manager
- B. Microsoft Intune
- C. Azure Rights Management Service
- D. Azure Multi-Factor Authentication
NEW QUESTION 7
A company deploys Outlook to all users that have iOS and Android devices. The company uses Microsoft Intune to manage mobile devices. You enforce a conditional access policy that requires users to enroll devices in Intune before they can access Exchange ActiveSync data.
Some Android and iOS users access Exchange ActiveSync data by using unmanaged email applications.
You need to ensure that users Exchange ActiveSync data only from Outlook. What should you do?
- A. Create an Exchange access rul
- B. Select Outlook family and Outlook for Android and iOS as the model.
- C. In Intune, create a new compliance policy that forces email accounts to be managed by Intune.
- D. Create a security group for all users that are not using Outlook as the email application
- E. Configure Exchange Online conditional access policy to exempt members of the group.
- F. Configure a custom Open Mobile Alliance Uniform Resource Identifier setting and deploy the setting to all users.
NEW QUESTION 8
You are a network administrator for a company that has an Office 365 E3 subscription. You purchase Enterprise Mobility Suite licenses. You implement synchronization by using a federated identity model.
Passwords for Sales team users often expire while they are travelling. When this happens, the users are not able to log on to the virtual private network (VPN) to perform their duties. Users must be able to reset their own passwords.
You need to enable password write-back. Which application should you configure?
- A. Web Application Proxy
- B. Active Directory Federation Services (AD FS)
- C. Microsoft Online Services Sign-in Assistant
- D. Directory Synchronization (DirSync)
- E. Azure Active Directory Connect
NEW QUESTION 9
You have a computer that runs Windows 10 Enterprise that contains the following folders:
You have a local user named User1. User1 has read and execute permission to Folder1. You need to ensure that User1 can perform the following tasks:
The solution must use the principle of least privilege.
Which permissions should you assign to User1 on each folder? To answer, drag the appropriate permissions to the correct folders. Each permission may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
Explanation: Advanced permissions are detailed permissions that are grouped together to create the standard permissions. The permissions in this question are standard permissions.
Folder2: To create new files in a folder, you need Write permission to the folder. The ‘Write’ standard permission includes the ‘Create files / write data’ advanced permission.
Folder3: To edit existing files in a folder, you need Modify permission.
Folder5: To change the permissions of files in a folder, you need the ‘Change Permissions’ advanced permission. The Change Permission advanced permission is in the ‘Full Control’ standard permission group. Therefore, the answer for Folder5 is Full Control.
NEW QUESTION 10
Your organization is deploying new Windows 10 devices. You create a new organizational unit that contains all Windows 10 devices.
You are preparing a new security policy for Windows 10 devices. Your organization requires audits on the use of removable storage devices on personal devices.
You need to enable audits of removable storage.
Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
NEW QUESTION 11
A company plans to actively manage mobile devices.
You need to create a list of all jailbroken devices after they are enrolled. What should you use?
- A. Azure Active Directory
- B. System Center 2012 R2 Configuration Manager SP1
- C. Intune
- D. Azure Active Directory Domain Services
- E. Azure Active Directory Device Registration Service
NEW QUESTION 12
You have a computer that runs Windows 10 Enterprise that has a local group policy as shown in the following graphic.
Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
NOTE: Each correct selection is worth one point.
Explanation: Windows Updates will be downloaded from Windows Server Update Services only. This is determined by the “Specify Intranet Microsoft Update Service Location” setting and the “Do not connect to any Windows Update Internet locations” setting both being ‘Enabled’.
In the “Specify Intranet Microsoft Update Service Location” setting, you can specify the name of the Windows Server Updates Services server.
If a user is logged into the computer and an update requires a restart, the computer will restart when the user signs out. This is determined by the “No auto-restart with logged on users for schedule automatic updates” setting being enabled. This group policy setting creates a registry key named NoAutoRebootWithLoggedOnUsers and sets the value of the key to 1 (enabled).
With this setting enabled, you should be aware that the computer should be restarted at the earliest opportunity in order to complete the installation of the Windows Updates.
NEW QUESTION 13
A Sales department user overwrites a version of a Word document on their device.
You need to view the events that you monitored for Marketing users. Which log file should you view?
- A. StatusAgent Log
- B. System Event Log
- C. Security Event Log
- D. PolicyAgent Log
- E. Application Event Log
NEW QUESTION 14
A company has an Office 365 subscription. The company upgrades all devices to Windows
10. You configure all devices to synchronize folders with the user’s OneDrive for Business account.
A user presses the Shift and Delete keys to delete a file located in a synchronized folder on a local device. The user needs to immediately recover the file.
The user attempts to recover the file. For each recovery location, what is the outcome of the file recovery operation? To answer, select the appropriate option from each list in the answer area.
NOTE: Each correct selection is worth one point.
NEW QUESTION 15
You need to configure the required security measures for the sales department mobile devices.
What should you do? To answer, select the appropriate action from each list in the answer area. Each correct answer is worth one point.
NEW QUESTION 16
You manage 50 computers that run Windows 10 Enterprise. You have a Microsoft Azure RemoteApp deployment. The deployment consists of a hybrid collection named Collection1.
All computers have the Hyper-V feature installed and have a virtual machine that runs Windows 7.
You plan to install applications named App1 and App2 and make them available to all users. App1 is a 32-bit application. App2 is a 64-bit application.
You need to identify the installation method for each application. The solution needs to minimize the number of installations.
Which deployment method should you identify for each application? To answer, drag the appropriate deployment methods to the correct applications. Each deployment method may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
NOTE: Each correct selection is worth one point.
Explanation: Azure RemoteApp supports streaming 32-bit or 64-bit Windows-based applications. Therefore, we can minimize the number of installations by installing the applications on Azure and making them available as Azure RemoteApps. This would mean one installation for App1 and one installation for App2.
NEW QUESTION 17
You need to configure email access for the Engineering department users.
What should you do? To answer, select the appropriate action from each list in the answer area.
NEW QUESTION 18
A company has an Active Directory Domain Services (AD DS) domain named global.fabrikam.com, and an on-premises Microsoft Exchange Server 2010 server. The company has an Office 365 E3 subscription. You have not assigned any licenses to users. You deploy Enterprise Mobility Suite (EMS). All client devices run Windows 7 and Office 2010.
You must protect emails that contain sensitive information from unauthorized access. You need to ensure that users can easily protect sensitive emails as messages are sent. Which three actions should you perform? Each correct answer presents part of the
- A. Configure Exchange Online.
- B. Configure Office 365 message encryption.
- C. Upgrade client devices to Office 365 Pro Plus.
- D. Assign an EMS license to each user.
- E. Deploy theRights Management Service client.
- F. Assign an Office 365 E3 license to each user.
Thanks for reading the newest 70-398 exam dumps! We recommend you to try the PREMIUM Certleader 70-398 dumps in VCE and PDF here: https://www.certleader.com/70-398-dumps.html (74 Q&As Dumps)