Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124
This learning path introduces the tools and features of Windows for authorizing access to Windows clients. Students will learn about methods for how users sign-in to Windows, User Account Control, and account types.
This learning path helps prepare you for Exam MD-100: Windows Client.
Prerequisites:
In this module, you will learn about the differences between authentication and authorization.
Learning objectives:
After completing this lesson, you will be able to:
Prerequisites:
Q1. As the new Desktop Administrator for Northwind Traders, Alan Deyoung is trying to fix some of the security issues left behind by his predecessor. One such practice directed users to sign in to their computers with the Administrator account. Alan discovered that this policy led to malicious users gaining access to server and client computers. What should Alan do to resolve this issue with each device?
Q2. As the Desktop Administrator for Fabrikam, you must set up an account that will be used to sign-in to a Windows 11 PC. This account must be able to synchronize files with OneDrive. What type of account should you create?
Q3. As the Desktop Administrator for World Wide Importers, you want to create a workgroup for the Warehouse department. This workgroup will enable the warehouse staff to share files, network storage, printers, and any connected resource. What’s the maximum number of computers that you can assign to this workgroup?
Q4. As the Desktop Administrator for Trey Research, you were approached by members of the Engineering department regarding a sign-in issue. Each day the engineers access computers, CAD machines, and printers, in the company’s Engineering workgroup. These machines are all running either Windows 10 or Windows 11. Every time they access one of these workgroup resources, they’re prompted to enter their credentials. The engineers have found this continual entering of credentials to be very time consuming and annoying. What Windows tool can you use that will save each engineer’s credentials on each resource so that they’re not prompted each time they access computers in the Engineering workgroup?
Q5. Contoso’s Engineering department typically uses smart cards for user authentication. Each engineer utilizes a smart card reader, which scans the chip on the user’s card to authenticate the user. Which of the following authentication methods is used in conjunction with smart cards?
This module introduces the management of users and groups using Active Directory, and compares the differences between Active Directory Services and Azure Active Directory.
Learning objectives:
After completing this module, you will be able to:
Prerequisites:
Q1. What does AD DS use to perform authentication for computer accounts during the startup process and for user accounts when the user signs in?
Q2. What does AD DS use for locating resources such as domain controllers?
Q3. As the Enterprise Administrator for World Wide Importers, Patti Fernandez deployed AD DS on an Azure virtual machine to enable scalability and availability for an on-premises AD DS. What’s one of the repercussions of deploying AD DS on an Azure virtual machine?
Q4. As the Enterprise Administrator for Contoso, Holly Dickson recently deployed several new Windows 11 computers. George, who was a recipient of one of those new computers, complained to Holly that he was unable to access the local computer or network resources. Which of the following items could be causing the authentication failures that George has been experiencing?
Q5. Wingtip Toys has a hybrid Exchange deployment. Wingtip employs an on-premises AD DS that supports its Exchange Server 2019 deployment. It also has a cloud-based Azure AD environment that supports Exchange Online in its Microsoft 365 tenant. What tool can Wingtip’s Enterprise Administrator use to synchronize these AD DS and Azure AD services together to meet its hybrid identity goals?
This module introduces how User Account Control works and how you can use UAC-related desktop features to reduce security risks.
Learning objectives:
After completing this module, you will be able to:
Prerequisites:
Q1. Which variation of the UAC elevation prompt is displayed to standard users when they attempt to perform an administrative task?
Q2. As the Desktop Administrator for Contoso, you enabled UAC on all the company’s Windows 11 computers to prevent users from installing unauthorized software. However, some of the users are local Administrators on their computers. Which of the following tasks will generate a UAC consent prompt for these users?
Q3. As the Desktop Administrator for Contoso, you enabled UAC on all the company’s Windows 11 computers to prevent users from installing unauthorized software. Which of the following tasks can a standard user perform without receiving a UAC prompt?
Q4. When a permission or password is necessary to complete a task, UAC will notify you with one of three different types of elevation prompts. Which type of elevation prompt will you receive when the item has a valid digital signature that verifies that Microsoft is the publisher of this item?
Q5. As the Desktop Administrator for Fabrikam, you are a local administrator on your Windows 11 computer. When you attempted to install a new application on your computer, you received a UAC prompt that asked for permission to complete the task. You granted the permission, at which time the task was performed by using full administrative rights. What happened next?
This module examines the process of device restrigration and discusses how to register and enroll devices in Active Directory.
Learning objectives:
After completing this module, you will be able to:
Prerequisites:
Q1. As an IT Support professional for Contoso, you’re helping to configure the company’s infrastructure to allow Device Registration. Which of the following prerequisites must you implement before you can enable Device Registration on your devices?
Q2. Fabrikam has enabled Device Registration. After a Fabrikam user enrolls a device, why is the device object created in AD DS?
Q3. Patti Fernandez is a sales rep for Contoso. Contoso has enabled Device Registration, and Patti has enrolled her smartphone through the enrollment process. Patti is out of town on a sales trip. However, by using her smartphone, Patti can still access internal Contoso applications through the Internet. This scenario is made possible because of two services. One of them is the Web Application Proxy. What is the other service that works in conjunction with the Web Application Proxy to provide Internet access to internal company resources for an enrolled device?
Q4. Device Registration works by using the Device Registration Service. When a user registers a device through the enrollment process, the Device Registration Service provisions a certificate for the device. What’s the purpose of this certificate?
Q5. World Wide Importers requires control over the web apps that users can access from their devices. The company has deployed Device Registration. Which of the following tasks will occur after a user registers and enrolls a device?
I hope this MD-100 Configure authorization and authentication Microsoft Quiz Answers would be useful for you to learn something new from this problem. If it helped you then don’t forget to bookmark our site for more Coding Solutions.
This Problem is intended for audiences of all experiences who are interested in learning about Data Science in a business context; there are no prerequisites.
Keep Learning!
More Coding Solutions >>