17.  Topic 3, Litware inc 
Case Study
To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might contain exhibits and other resources that provide more information about the scenario that is described in the case study. Each question is independent of the other questions in this case study. 
At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to the next section of the exam. After you begin a new section, you cannot return to this section. 
To start the case study
Overview
Environment
The network that uses 192.168.10.0/24 connects to the internet by using a Network Address Translation (NAT) device.
The domain contains the users shown in the following table. 
Computer1 Configuration
Computer1 contains a folder named D:Folder1 that has permission inheritance disabled.
D:Folder1Report.docx has auditing configured as shown in the following table. 
The Local Computer Policy for Computer1 is configured as shown in the following table. 
Windows Defender Firewall for Computer1 has the rules shown in the following table. 
Computer2 Configuration
Group1 and Group2 are members of the Remote Desktop Users group.
Windows Defender Firewall for Computer2 has the rules shown in the following table. 
Computer3 Configuration
Windows Defender Firewall for Computer3 has the rules shown in the following table. 
Requirements and Planned Changes
Technical Requirements
Delivery Optimization on the computers that run Windows 10 must be configured to meet the following requirements:
Which users can sign in to Computer2 by using Remote Desktop?