Question No 47:
Your network contains an Active Directory domain named contoso.com. The domain contains a file server named Server1 that runs Windows Server 2012 R2. You view the effective policy settings of Server1 as shown in the exhibit. (Click the Exhibit button.)
On Server1, you have a folder named C:\Share1 that is shared as Share1. Share1 contains confidential data. A group named Group1 has full control of the content in Share1.
You need to ensure that an entry is added to the event log whenever a member of Group1 deletes a file in Share1. What should you configure?
A. The Audit File Share setting of Servers GPO
B. The Sharing settings of C:\Share1
C. The Audit File System setting of Servers GPO
D. The Security settings of C:\Share1
Answer: D
Thursday, 31 March 2016
Sunday, 27 March 2016
Microsoft shows how artificial our intelligence is
When the chatbot Microsoft Tay started tweeting offensive, the response from the company showed us how little we understand about human nature, both less artificial intelligence, writes David glance.
It was a nightmare than a week PR for Microsoft. It started with the head of Microsoft's Xbox division, Phil Spencer, having to apologize for light dancers clothing scantily clad dancers dressed school girls at a party hosted by Microsoft at the Conference of Game Developers (GDC) . He said the dancers who participated in this event "was absolutely not consistent or aligned with our values. This was unequivocally wrong and will not be tolerated."
The matter was handled internally and therefore not known who was responsible and why they might have thought this would be a good idea.
But things were much worse for Microsoft when a call chatterbot Tay started tweeting offensive apparently supporting, anti-feminist and racist views Nazis. The idea was that the artificial intelligence behind Tay could learn from others on Twitter and other social networks and appear as a person of 19 years it means female. What happened, however, is that the experience was kidnapped by a group of people in the (politically incorrect) "pol" notorious 4chan bulletin board and establishing training 8chan Tay say very inappropriate things.
This time it was down to Peter Lee, corporate vice president of Microsoft Research had to say: "We are deeply sorry for tweets offensive and hurtful unintentional Tay, who do not represent what we are or what we represent."
Tay was removed and removed the tweets, but not before some of the most offensive of them were captured and spread even more on the Internet.
Apparently, researchers at Microsoft have thought that, as they had successfully developed an AI chatbot similarly named XiaoIce was being successful execution in China in the social network Weibo, experience with Tay in Twitter Western audiences would follow the same path .
Caroline Sinders, AI interaction designer working on the IBM computer Watson wrote a good explanation of how Tay developers should have foreseen this result and protected against it. There had been no sufficient evidence that the robot and certainly developers no sociological technology skills to understand the variety of online communities and what they would do once the technology was launched in Nature.
The disturbing result was that Peter Tay Lee Microsoft has seen the problem with the "experience" of Tay as technology that could be solved with a simple technology solution. He missed completely the problem was sociological and philosophical, unless addressed in this context, will always result in technology that seems superficially human but always far from true intelligence stop the show.
Chatbots are designed to learn more about how language is built and use this knowledge to create words that are relevant to the context and correct. They are not taught to understand what these words really mean, or to understand the social, moral and ethical context of those words. Tay did not know what a feminist is when he suggested that "everyone must die and burn in hell", which was more than repeat a word building that had entered as parts of phrases that could be reformatted with a high probability of being as it was logical.
It is a testament to the ability of human nature to anthropomorphize technology to jump into something that sounds intelligent to an entity that is really smart. This was the case recently with Google AlphaGo AI software that beat complex human world class player going to play. Comment on this suggested that AlphaGo showed many of the characteristics instead of what he did with human intelligence, which was effective in finding and calculation of winning strategies in the millions of games that had access.
Even the "learning" term applied to bird flu led many, including developers of AI itself to assume wrongly that is equivalent to the learning process that humans pass. This in turn leads to the risk that AI experts as Stuart Russell and Peter Norvig have warned for years that a "learning function of artificial intelligence system that can evolve into a system with unexpected behavior."
Experience with Tay highlighted the lack of discretion of Microsoft developers, provided that the limit of chatbots. It seems that in this case, humans and software could not learn the real lessons of this unfortunate incident.
It was a nightmare than a week PR for Microsoft. It started with the head of Microsoft's Xbox division, Phil Spencer, having to apologize for light dancers clothing scantily clad dancers dressed school girls at a party hosted by Microsoft at the Conference of Game Developers (GDC) . He said the dancers who participated in this event "was absolutely not consistent or aligned with our values. This was unequivocally wrong and will not be tolerated."
The matter was handled internally and therefore not known who was responsible and why they might have thought this would be a good idea.
But things were much worse for Microsoft when a call chatterbot Tay started tweeting offensive apparently supporting, anti-feminist and racist views Nazis. The idea was that the artificial intelligence behind Tay could learn from others on Twitter and other social networks and appear as a person of 19 years it means female. What happened, however, is that the experience was kidnapped by a group of people in the (politically incorrect) "pol" notorious 4chan bulletin board and establishing training 8chan Tay say very inappropriate things.
This time it was down to Peter Lee, corporate vice president of Microsoft Research had to say: "We are deeply sorry for tweets offensive and hurtful unintentional Tay, who do not represent what we are or what we represent."
Tay was removed and removed the tweets, but not before some of the most offensive of them were captured and spread even more on the Internet.
Apparently, researchers at Microsoft have thought that, as they had successfully developed an AI chatbot similarly named XiaoIce was being successful execution in China in the social network Weibo, experience with Tay in Twitter Western audiences would follow the same path .
Caroline Sinders, AI interaction designer working on the IBM computer Watson wrote a good explanation of how Tay developers should have foreseen this result and protected against it. There had been no sufficient evidence that the robot and certainly developers no sociological technology skills to understand the variety of online communities and what they would do once the technology was launched in Nature.
The disturbing result was that Peter Tay Lee Microsoft has seen the problem with the "experience" of Tay as technology that could be solved with a simple technology solution. He missed completely the problem was sociological and philosophical, unless addressed in this context, will always result in technology that seems superficially human but always far from true intelligence stop the show.
Chatbots are designed to learn more about how language is built and use this knowledge to create words that are relevant to the context and correct. They are not taught to understand what these words really mean, or to understand the social, moral and ethical context of those words. Tay did not know what a feminist is when he suggested that "everyone must die and burn in hell", which was more than repeat a word building that had entered as parts of phrases that could be reformatted with a high probability of being as it was logical.
It is a testament to the ability of human nature to anthropomorphize technology to jump into something that sounds intelligent to an entity that is really smart. This was the case recently with Google AlphaGo AI software that beat complex human world class player going to play. Comment on this suggested that AlphaGo showed many of the characteristics instead of what he did with human intelligence, which was effective in finding and calculation of winning strategies in the millions of games that had access.
Even the "learning" term applied to bird flu led many, including developers of AI itself to assume wrongly that is equivalent to the learning process that humans pass. This in turn leads to the risk that AI experts as Stuart Russell and Peter Norvig have warned for years that a "learning function of artificial intelligence system that can evolve into a system with unexpected behavior."
Experience with Tay highlighted the lack of discretion of Microsoft developers, provided that the limit of chatbots. It seems that in this case, humans and software could not learn the real lessons of this unfortunate incident.
Thursday, 24 March 2016
70-411 Exam Question No 46
Question No 46:
Your network contains an Active Directory domain named contoso.com. The domain contains a virtual machine named Server1 that runs Windows Server 2012 R2 Server1 has a dynamically expanding virtual hard disk that is mounted to drive E. You need to ensure that you can enable BitLocker Drive Encryption (BitLocker) on drive E. Which command should you run?
A. Manage-bde -protectors -add c: -startup e:
B. Manage-bde -lock e:
C. Manage-bde -protectors -add e: -startupkey c:
D. Manage-bde -on e:
Answer: D
Your network contains an Active Directory domain named contoso.com. The domain contains a virtual machine named Server1 that runs Windows Server 2012 R2 Server1 has a dynamically expanding virtual hard disk that is mounted to drive E. You need to ensure that you can enable BitLocker Drive Encryption (BitLocker) on drive E. Which command should you run?
A. Manage-bde -protectors -add c: -startup e:
B. Manage-bde -lock e:
C. Manage-bde -protectors -add e: -startupkey c:
D. Manage-bde -on e:
Answer: D
Thursday, 17 March 2016
70-411 Exam Question No 45
Question No 45:
Your network contains an Active Directory domain named contoso.com. The domain contains a read-only domain controller (RODC) named R0DC1. You create a global group named RODC_Admins. You need to provide the members of RODC_Admins with the ability to manage the hardware and the software on R0DC1. The solution must not provide RODC_Admins with the ability to manage Active Directory objects. What should you do?
A. From Active Directory Sites and Services, run the Delegation of Control Wizard.
B. From a command prompt, run the dsadd computer command.
C. From Active Directory Site and Services, configure the Security settings of the R0DC1 server object.
D. From a command prompt, run the dsmgmt local roles command.
Answer: D
Your network contains an Active Directory domain named contoso.com. The domain contains a read-only domain controller (RODC) named R0DC1. You create a global group named RODC_Admins. You need to provide the members of RODC_Admins with the ability to manage the hardware and the software on R0DC1. The solution must not provide RODC_Admins with the ability to manage Active Directory objects. What should you do?
A. From Active Directory Sites and Services, run the Delegation of Control Wizard.
B. From a command prompt, run the dsadd computer command.
C. From Active Directory Site and Services, configure the Security settings of the R0DC1 server object.
D. From a command prompt, run the dsmgmt local roles command.
Answer: D
Thursday, 10 March 2016
70-411 Exam Question No 44
Question No 44:
Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1. You run ntdsutil as shown in the exhibit. (Click the Exhibit button.)
You need to ensure that you can access the contents of the mounted snapshot.
What should you do?
A. From the snapshot context of ntdsutil, run activate instance "NTDS".
B. From a command prompt, run dsamain.exe -dbpathc:\$snap_201204131056_volumec$\windows\ntds\ntds. dit -Idapport 389.
C. From the snapshot context of ntdsutil, run mount {79f94f82-5926-4f44-8af0-2f56d827a57d}.
D. From a command prompt, run dsamain.exe -dbpath
c:\$snap_201204131056_volumec$\windows\ntds\ntds. dit -Idapport 33389.
Answer: D
Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1. You run ntdsutil as shown in the exhibit. (Click the Exhibit button.)
You need to ensure that you can access the contents of the mounted snapshot.
What should you do?
A. From the snapshot context of ntdsutil, run activate instance "NTDS".
B. From a command prompt, run dsamain.exe -dbpathc:\$snap_201204131056_volumec$\windows\ntds\ntds. dit -Idapport 389.
C. From the snapshot context of ntdsutil, run mount {79f94f82-5926-4f44-8af0-2f56d827a57d}.
D. From a command prompt, run dsamain.exe -dbpath
c:\$snap_201204131056_volumec$\windows\ntds\ntds. dit -Idapport 33389.
Answer: D
Thursday, 3 March 2016
70-411 Exam Question No 43
Question No 43:
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the File Server
Resource Manager role service installed. Server1 has a folder named Folder1 that is used by the human resources department. You need to ensure that an email notification is sent immediately to the human resources manager when a user copies an audio file or a video file to Folder1.
What should you configure on Server1?
A. A storage report task
B. A file screen exception
C. A file screen
D. A file group
Answer: C
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the File Server
Resource Manager role service installed. Server1 has a folder named Folder1 that is used by the human resources department. You need to ensure that an email notification is sent immediately to the human resources manager when a user copies an audio file or a video file to Folder1.
What should you configure on Server1?
A. A storage report task
B. A file screen exception
C. A file screen
D. A file group
Answer: C
Subscribe to:
Posts (Atom)