exam questions

Exam MD-100 All Questions

View all questions & answers for the MD-100 exam

Exam MD-100 topic 1 question 8 discussion

Actual exam question from Microsoft's MD-100
Question #: 8
Topic #: 1
[All MD-100 Questions]

You have a computer named Computer1 that runs Windows 10.
Computer1 has a folder named C:\Folder1.
You need to meet the following requirements:
✑ Log users that access C:\Folder1.
✑ Log users that modify and delete files in C:\Folder1.
Which two actions should you perform?

  • A. From the properties of C:\Folder1, configure the Auditing settings.
  • B. From the properties of C:\Folder1, select the Encryption contents to secure data option.
  • C. From the Audit Policy in the local Group Policy, configure Audit directory service access.
  • D. From the Audit Policy in the local Group Policy, you configure Audit object access.
  • E. From the Audit Policy in the local Group Policy, you configure Audit system events.
Show Suggested Answer Hide Answer
Suggested Answer: AD 🗳️
Files and folders are objects and are audited through object access.
Reference:
https://www.netwrix.com/how_to_detect_who_changed_file_or_folder_owner.html

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Buruguduystunstugudunstuy
2 years, 2 months ago
Selected Answer: AD
The two actions you should perform are: A. From the properties of C:\Folder1, configure the Auditing settings. D. From the Audit Policy in the local Group Policy, configure Audit object access. Explanation: A. Configuring the Auditing settings on the C:\Folder1 folder will allow you to log users that access, modify and delete files in the folder. To configure auditing, you need to go to the Properties of the folder, then to the Security tab, click on Advanced, go to the Auditing tab, and configure the desired audit settings. D. Configuring the Audit object access policy in the local Group Policy will enable logging of events related to accessing and modifying objects, such as files and folders, on the computer. To configure this policy, open the Local Group Policy Editor, go to Computer Configuration > Windows Settings > Security Settings > Local Policies > Audit Policy, and enable the Audit object access policy.
upvoted 2 times
Buruguduystunstugudunstuy
2 years, 2 months ago
B, C, and E are not relevant to the requirements in this scenario. The Encryption contents to secure data option in the properties of the folder are not related to logging user activities, and configuring Audit directory service access and Audit system events policies do not provide the desired logging for file and folder access and modifications.
upvoted 1 times
...
...
mrjeet
2 years, 3 months ago
This was on 1/27/23 test! Know this!
upvoted 3 times
...
Liver111
3 years, 4 months ago
correct A D
upvoted 1 times
...
meknoroydi
3 years, 5 months ago
Correct! YouTube - MCITP 70-640: Windows File Auditing for a walkthrough
upvoted 4 times
...
RoGr
3 years, 6 months ago
Seems OK
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago