Wednesday 27 December 2017

Microsoft 70-768 Question Answer

You have a laptop that has a high resolution display. The Change the size of text, apps, and other items setting is set to 175%. You install a desktop application name App1.
When you start App1, the visual elements are misaligned, and the application interface does not appear as expected. You need to ensure that App1 is displayed properly without affecting how other applications are displayed. What should you do?

A. Create an AppX package for App1.
B. Configure an AppLocker rule for App1.
C. Modify the Compatibility settings of App1.
D. Run App1 as an administrator.

Answer: A


You have a laptop named Computer1 that runs Windows 10. Computer1 connects to a wireless network named WiFi1 and a wireless network named WiFi2. Wifi1 has poor signal and the connection drops frequently. Wifi2 is available only during certain times of the day.
Wifi2 has a stronger signal that is more reliable than Wifi1.
You need to configure Computer1 to use WiFi2 whenever possible.
Wifi1 should be used when WiFi2 is unavailable.
Which three settings should you configure? Each answer presents part of the solution.

A. From the properties of WiFi2, select Connect even if the network is not broadcasting its name (SSID)
B. From the properties of WiFi1, select Connect automatically when this network is in range.
C. From the properties of WiFi1, select Enable WLAN connection settings.
D. From the properties of WiFi2, select Connect automatically when this network is in range.
E. From the properties of WiFi1, select Look for other wireless networks while connected to this network.
F. From the properties of WiFi2, select Look for other wireless networks while connected to this network.

Answer: CDF

Wednesday 6 September 2017

Microsoft 70-768 Question Answer

You have a computer named Computer1.
A user named User1 is a member of two groups named Group1 and Group2.
You have a file named Doc1.docx that is located in E:\Data.
The file permissions for E:\Data\Doc1.docx are configured as shown in the exhibit. (Click the Exhibit button.)


You need to provide User1 with Write access to Doc1.docx.
What should you do?

A. Grant User1 Full control access to folder E:\Data.
B. Remove User1 from Group2 and instruct the user to sign out, and then sign back in.
C. Grant User1 Full control access to the E:\Data\Doc1.docx file, disable inheritance for the file, and then convert the inherited permissions to explicit permissions for the file.
D. Grant User1 Write access to folder E.

Answer: D

Tuesday 20 June 2017

How To Mitigate Most Microsoft Critical Vulnerabilities With A Single System Change


Businesses can mitigate most of Microsoft's critical vulnerabilities by simply eliminating users' administrative rights. According to an Avecto report, "Microsoft's 530 vulnerabilities were reported in 2016 with 36% (189) with a critical severity rating." Of these critical vulnerabilities, 94% were mitigated by the removal of administrator rights. "

According to James Maude, Senior Security Engineer, Avecto, for this report, Avecto classified a vulnerability as one that could mitigate by removing administrator rights if the phrase "Clients / users whose accounts are configured to have fewer user rights in the System could be less affected than users operating with administrative user rights "or" If the current user is connected with administrative user rights, an attacker could take control of an affected system "appeared in the executive summary of the bulletin for that vulnerability.

Knowing the nature of these critical vulnerabilities, arguments for and against the removal of administrator rights, and the simplest method for disabling large-scale administrative privileges can also mitigate most of Microsoft's serious vulnerabilities.

Microsoft Critical Vulnerabilities

Most of Microsoft's critical vulnerabilities in this investigation were holes in remote code execution on Microsoft products like the OS, the browser, or Microsoft Office. These flaws allow attackers to launch code silently when the user opens infected content, visits an infected site or, in some cases, only connects to the same network as the attacker, explains Maude.

"A phishing attack taking advantage of the vulnerability CVE-2016-3313, which Microsoft patched MS16-099 would be a good example," says Maude. This attack used an infected Microsoft Word document to initiate the execution of the invisible code.

Because the attack emanates from Microsoft Word, it runs in the user context. "If the user has administrator rights, the attacker can abuse these privileges by manipulating the security settings, infecting system files or throwing a pass to the hash attack to move laterally on the network," explains Maude.

In one step the hash attack, assuming an incorrect use of authentication protocols, the attacker can steal the static hash which represents a username and password and use it instead of clear text credentials. It is easier to simply steal the hash than to attempt brute-force password attacks, which may fail due to IP blocking policies that attempt high volumes of different passwords per minute. An attacker uses the hash to log on to systems and servers, allowing them to move sideways within the network while avoiding detection.

Arguments against removal of administrator rights

Having administrator rights allows individual users to update software immediately, adding new capabilities and maintaining current software so they can continue to work productively. "Many applications, basic system configurations and application upgrades require administrative rights to ensure proper operation," says Joseph Carson, chief scientific officer at Thycotic.

When companies that already allow the widespread use of management rights seek to eliminate those rights, it leads to major business disruptions and unhappy, unproductive employees, according to Carson. "Sometimes companies sacrifice security for the ease of use of the business and happy employees," says Carson.

Against those arguments

Software upgrades and new software installations fall under the authority of IT and security. Updates or changes must go through change management and pass the security tests and to make sure the changes do not break other applications where there are dependencies.

User-initiated software installations may also contain malware, including malicious programs that penetrate critical vulnerabilities from Microsoft. "Malware exploits administrator rights to change registry settings, install and run programs, and insert them into memory. Most malware are ineffective without these capabilities," said Daniel J. Desko, Senior Manager, Advisor Services. IT risks of Schneider Downs.

The removal of administrator rights is also a layer of protection against phishing attacks on users. "When we perform penetration testing, we often drop malware through phishing, which ultimately gives us a backdoor and a launch point

Thursday 4 May 2017

Microsoft Just Invested Millions In A Startup Based On A Key Google Technology


Bonsai, an artificial intelligence company based in Berkeley, California, has just announced a new investment of $ 7.6 million, co-led by Microsoft Ventures and New Enterprise Associates (NEA).

On the surface, this seems quite normal: Microsoft launched a new fund in December 2016 to invest in AI companies, going hand in hand with the corporate approach of titan technology in the incorporation of artificial intelligence in all its products and services. In fact, just today, Microsoft also announced an investment in Agolo, another AI start. In addition, Mark Hammond, CEO of Bonsai, is former Microsoft.

What is remarkable is that Bonsai technology, aimed at helping companies in manufacturing, retailing, logistics and other similar physical markets incorporate artificial intelligence, is based on TensorFlow - a very popular tool created in Google To help build so-called machine learning systems, and an alternative to Microsoft's own CNTK.

To Hammond's mind, it should not be a big surprise. Under CEO Satya Nadella, Microsoft has been dedicated to supporting any technology that developers want to use; Hammond says Bonsai's bet on TensorFlow "is not a barrier to them." In fact, Hammond says, Bonsai and Microsoft share a vision of making AI more accessible to programmers.

"The barrier to them is the goal," he says. "Microsoft's vision and messaging match our surprisingly well."

Now, along with the new capital, Bonsai is announcing an early access program for developers to test their technology so they can evaluate for themselves the extent to which the company is their target.
The great winter of AI

Hammond began his career seriously at Microsoft, working on Windows 95 and the first version of Internet Explorer. It was there that his interest in AI was first provoked.

But there were not many opportunities to pursue that interest - it was fair during the "AI winter," a period when AI hype had outpaced results, so a failed technology industry stopped funding research in the field.

"It was a terrible time to do anything at AI, since it was the center of the AI winter," he says.

After Microsoft, it rebounded across the country for a while, taking jobs at Yale and a handful of startups and research labs. At one point, he returned to Microsoft for a two-year evangelistic development.

It was in 2014, while working as a researcher, that he realized that the winter AI was coming to an end. Enthusiasm for AI was coming back, and so was money. He took the opportunity, quit his job, and started Bonsai along with Keen Browne, a friend of his days at Microsoft.

It turned out to be a prescient remark, as artificial intelligence is definitely having its moment in the sun once again, with Microsoft, Facebook, Google, Amazon, and many more big companies making big bets on technology as a key to their business models . To date, Bonsai has raised $ 13.6 million.

"It was a kind of gamble that was going down the pipeline," says Hammond. "It was part engineering serendipity, and part luck."
Learning

Hammond acknowledges that companies like Amazon, Google and Microsoft are doing a good job making artificial intelligence technologies available to developers. But he says his approaches are rather limited, whether he has to have the resources of a Fortune 500 company to customize the code, or he has to use his pre-packaged but rigid and inflexible services around such things as image recognition .

"If you're Google, Facebook, Amazon, that's fine, you're fine," says Hammond. But it's less than ideal if you're a manufacturing company, retailer or anything else that involves real-world logistics, where you may not have the same engineering resources, and those pre-packaged services do not meet your needs.


 While many AI systems focus on "machine learning," or the ability for computers to learn from experience, Hammond says, there is less emphasis on so-called "machine teaching." In other words, these systems are excellent today for connecting to databases; Less to connect to, say, factory industrial robots.

In that scenario, a factory already has software they are using to feed that robot and its actions, but they may want to use AI to optimize their habits for greater efficiency. Existing AI tools do not facilitate the bridge with such software, but it is a kind of Bonsai specialty. Programmers can add AI without having to be a PhD genius.

"We focus on a little-attended part of the spectrum," Hammond says.

Thursday 30 March 2017

Microsoft 70-768 Question Answer

You purchase licenses for several apps from the Windows Store and you list the apps in your Windows Store for Business.
You need to tell users how to install the apps.
What should you instruct the users to use?


A. a web browser and a Microsoft Azure Active Directory (Azure AD) account
B. a web browser and a Microsoft account
C. the Windows Store app and a Microsoft account
D. the Windows Store app and a Microsoft Azure Active Directory (Azure AD) account

Answer: D

Friday 17 March 2017

Microsoft 70-768 Question Answer

You have a computer named Computer1 that is configured to install updates from Windows Server Update Services (WSUS).
Microsoft releases a new Windows update that is not approved in WSUS.
You need to install the update on Computer1.
What should you do?


A. From a command prompt, run gpupdate /force /sync.
B. Click Check online for updates from Microsoft Updates, and then check for updates.
C. Clear the defer upgrades check box, and then check for updates.
D. From Windows PowerShell, run the Get-WindowsUpdateLog cmdlet, and then run the Update-Module cmdlet.

Answer: C

Wednesday 1 March 2017

Microsoft 70-768 Question Answer

You have a computer named Computer1 that has the following stored credentials.
- A Windows credential for accessing a shared folder on a workgroup computer
- A Windows credential for accessing Remote Desktop
- A Windows credential for accessing an HTTP URL
- A web credential for accessing an HTTPS URL
- A web credential for accessing an HTTP URL
Which two passwords can be viewed in clear text from Credential Manager on Computer1?


A. the web credential for accessing the HTTPS URL
B. the Windows credential for accessing the shared folder
C. the Windows credential for accessing the HTTP URL
D. the Windows credential for accessing Remote Desktop
E. the web credential for accessing the HTTP URL

Answer: BD