You have a computer named Computer1 that runs Windows 10. Computer1 has a folder named C:Folder1. You need to meet the following requirements: ✑ Log users that access C:Folder1. ✑ Log users that modify and delete files in C:Folder1. Which two actions should you perform? A. From the properties of C:Folder1, configure the Auditing settings. B. From the properties of C:Folder1, select the Encryption contents to secure data option. C. From the Audit Policy in the local Group Policy, configure Audit directory service access. D. From the Audit Policy in the local Group Policy, you configure Audit object access. E. From the Audit Policy in the local Group Policy, you configure Audit system events. Suggested Answer: AD Files and folders are objects and are audited through object access. Reference: https://www.netwrix.com/how_to_detect_who_changed_file_or_folder_owner.html This question is in MD-100: Windows 10 Exam For getting Microsoft 365 Certified: Endpoint Administrator Associate Certificate Disclaimers: The website is not related to, affiliated with, endorsed or authorized by Microsoft. The website does not contain actual questions and answers from Microsoft's Certification Exams. Trademarks, certification & product names are used for reference only and belong to Microsoft.
Please login or Register to submit your answer