Q1. - (Topic 8)
An organization uses an Active Directory Rights Management Services (AD RMS) cluster named RMS1 to protect content for a project. You uninstall AD RMS when the project is complete. You need to ensure that the protected content is still available after AD RMS is uninstalled.
Solution: You add the backup service account to the SuperUsers group and back up the protected content. Then, you restore the content to a file server and apply the required NTFS permissions to the files.
Does this meet the goal?
A. Yes
B. No
Answer: B
Q2. - (Topic 2)
You need to ensure that RESEARCH1 only contains the required virtual machines.
What should you do?
A. Create an availability set.
B. Create a custom placement rule.
C. Set RESEARCH1 as a possible owner.
D. Set RESEARCH1 as a preferred owner.
Answer: B
Q3. - (Topic 4)
You need to recommend which type of clustered file server and which type of file share must be used in the Hyper-V cluster that hosts App2. The solution must meet the technical requirements and the security requirements.
Solution: You recommend a scale-out file server that uses an SMB share. Does this meet the goal?
A. Yes
B. No
Answer: A
Q4. - (Topic 8)
Your network contains an Active Directory domain named contoso.com. The domain contains a Microsoft System Center 2012 infrastructure.
You deploy a service named Service1 by using a service template. Service1 contains two virtual machines. The virtual machines are configured as shown in the following table.
You need to recommend a monitoring solution to ensure that an administrator can review the availability information of Service1.
Solution: From Operations Manager, you create a Distributed Application and a Service Level Tracking object.
Does this meet the goal?
A. Yes
B. No
Answer: A
Q5. - (Topic 5)
You need to ensure that the developers can manage their own virtual machines.
Solution: You perform the following tasks:
In Virtual Machine Manager, you create a new user role named DevUsers that
uses the Application Administrator profile,
You add the virtual machines to the DevUsers role.
You grant Checkpoint permissions to the DevUsers role.
You install and configure App Controller.
You distribute the App Controller console URL to the developers.
Does this meet the goal?
A. Yes
B. No
Answer: A
Q6. DRAG DROP - (Topic 8)
Your network contains two servers named Server1 and Server2 that run Windows Server
2012.
Server1 has the iSCSI Target Server role service installed and is configured to have five
iSCSI virtual disks.
You install the Multipath I/O (MPIO) feature on Server2. From the MPIO snap-in, you add support for iSCSI devices.
You need to ensure that Server2 can connect to the five iSCSI disks. The solution must
ensure that Server2 uses MPIO to access the disks.
Which three actions should you perform?
To answer, move the three appropriate actions from the list of actions to the answer area
and arrange them in the correct order.
Answer:
Q7. - (Topic 8)
You are an Active Directory administrator for Contoso, Ltd. You have a properly configured certification authority (CA) in the contoso.com Active Directory Domain Services (AD DS) domain. Contoso employees authenticate to the VPN by using a user certificate issued by the CA.
Contoso acquires a company named Litware, Inc., and establishes a forest trust between contoso.com and litwareinc.com. No CA currently exists in the litwareinc.com AD DS domain. Litware employees do not have user accounts in contoso.com and will continue to use their litwareinc.com user accounts.
Litware employees must be able to access Contoso's VPN and must authenticate by using a user certificate that is issued by Contoso's CA.
You need to configure cross-forest certificate enrollment for Litware users.
Which two actions should you perform? Each correct answer presents part of the solution.
A. Grant the litwareinc.com AD DS Domain Computers group permissions to enroll for the VPN template on the Contoso CA.
B. Copy the VPN certificate template from contoso.com to litwareinc.com.
C. Add Contoso's root CA certificate as a trusted root certificate to the Trusted Root Certification Authority in litware.com.
D. Configure clients in litwareinc.com to use a Certificate Policy server URI that contains
the location of Contoso's CA.
Answer: A,C
Q8. - (Topic 2)
You need to recommend changes to the virtual desktop infrastructure (VDI) environment.
What should you recommend?
A. Implement Hyper-V replication between VDI1 and VDI2.
B. Create new VDI virtual machines that are Generation 2 virtual machines.
C. Convert the existing VHDs to .vhdx format.
D. Move the VHDs to a Cluster Shared Volume (CSV) and implement Data Deduplication on the CSV.
Answer: D
Q9. - (Topic 8)
Your network contains an Active Directory domain named contoso.com. The network contains a perimeter network. The perimeter network and the internal network are separated by a firewall.
On the perimeter network, you deploy a server named Server1 that runs Windows Server 2012.
You deploy Active Directory Certificate Services (AD CS).
Each user is issued a smart card.
Users report that when they work remotely, they are unable to renew their smart card certificate.
You need to recommend a solution to ensure that the users can renew their smart card certificate from the Internet.
What should you recommend implementing on Server1?
More than one answer choice may achieve the goal. Select the BEST answer.
A. The Certificate Enrollment Policy Web Service role service and the Certificate Enrollment Web Service role service
B. The Active Directory Federation Services server role
C. An additional certification authority (CA) and the Online Responder role service
D. The Certification Authority Web Enrollment role service and the Online Responder role service
Answer: A