Q1. HOTSPOT - (Topic 4)
You are planning the certificates for Northwind Traders.
You need to identify the certificate configurations required for App1.
How should you configure the certificate request? To answer, select the appropriate
options in the answer area.
Answer:
Q2. - (Topic 3)
You need to recommend a solution that meets the security requirements.
Which schema attribute properties should you recommend modifying?
A. isIndexed
B. searchFlags
C. isCriticalSystemObject
D. schemaFlagsEx
Answer: B
Explanation:
D:\Documents and Settings\useralbo\Desktop\1.jpg
Applies To: Windows Server 2008, Windows Server 2012 This topic includes procedures for adding an attribute to the filtered attribute set (FAS) for a readonly domain controller (RODC) and marking the attribute as confidential data. You can perform these procedures to exclude specific data from replicating to RODCs in the forest. Because the data is not replicated to any RODCs, you can be assured that the data will not be revealed to an attacker who manages to successfully compromise an RODC. In most cases, adding an attribute to the RODC FAS is completed by the developer of the application that added the attribute to the schema.
. Determine and then modify the current searchFlags value of an attribute
. Verify that an attribute is added to the RODC FAS
-Determine and then modify the current searchFlags value of an attribute To add an attribute to an RODC FAS, you must first determine the current searchFlags value of the attribute that you want to add, and then set the following values for searchflags:
. To add the attribute to the RODC FAS, set the 10th bit to 0x200.
. To mark the attribute as confidential, set the 7th bit to 0x080. http://technet.microsoft.com/en-us/library/cc754794(v=ws.10).aspx
Q3. - (Topic 9)
Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. The forest functional level is Windows Server 2012.
Your company plans to deploy an application that will provide a search interface to users in the company. The application will query the global catalog for the Employee-Number attribute.
You need to recommend a solution to ensure that the application can retrieve the Employee-Number value from the global catalog.
What should you include in the recommendation?
A. the Dsmod command
B. the Ldifde command
C. the Enable-ADOptionalFeaturecmdlet
D. the Csvde command
Answer: B
Explanation: http://technet.microsoft.com/en-us/library/ee617209.aspx - Enable-AdOptionalFeature http://technet.microsoft.com/en-us/library/ee617218.aspx - Get-ADOptionalFeature (as of W2012R2, only OptionalFeature is ActiveDirectory Recycle Bin).
Q4. - (Topic 10)
Your network contains an Active Directory domain named contoso.com. The domain contains a Microsoft System Center 2012 infrastructure.
You deploy a service named Service1 by using a service template. Service1 contains two virtual machines. The virtual machines are configured as shown in the following table.
You need to recommend a monitoring solution to ensure that an administrator can review the availability information of Service1.
Solution: From Virtual Machine Manager (VMM), you modify the properties of the service template.
Does this meet the goal?
A. Yes
B. No
Answer: B
Q5. - (Topic 9)
Your company has a main office, ten regional datacenters. and 100 branch offices. You are designing the site topology for an Active Directory forest named contoso.com.
The forest will contain the following servers:
. In each regional datacenter and in the main office, a domain controller that runs Windows Server 2012 . In each branch office, a file server that runs Windows Server 2012
You have a shared folder that is accessed by using the path \\contoso.com\shares\software. The folder will be replicated to a local file server in each branch office by using Distributed File System (DFS) replication.
You need to recommend an Active Directory site design to meet the following requirements:
. Ensure that users in the branch offices will be authenticated by a domain controller in the closest regional datacenter.
. Ensure that users automatically connect to the closest file server when they access \\contoso.com\shares\software.
How many Active Directory sites should you recommend?
A. 1
B. 10
C. 11
D. 111
Answer: D
Q6. - (Topic 10)
Your network contains an Active Directory domain named contoso.com. The domain contains 200 servers that run either Windows Server 2012 R2, Windows Server 2012, or Windows Server 2008 R2. The servers run the following enterprise applications:
. Microsoft Exchange Server 2013
. Microsoft SQL Server 2014
System Center 2012 R2 Operations Manager is deployed to the domain. Operations Manager monitors all of the servers in the domain. Audit Collection Services (ACS) is installed.
You need to recommend a monitoring strategy for the domain that meets the following requirements:
. A group of administrators must be notified when an error is written to the System log on the servers that run Exchange Server 2013.
. A group of administrators must be notified when a specific event is written to The Application log on the servers that run SQL Server 2014.
What is the best approach to achieve the goal? More than one answer choice may achieve the goal. Select the BEST answer.
A. From Operations Manager, enable audit collection.
B. From Operations Manager, implement two monitors.
C. From Computer Management, implement one event subscription.
D. From Operations Manager, implement two rules.
Answer: D
Q7. - (Topic 2)
You need to recommend a solution for the remote access servers. What should you include in the recommendation?
A. Network address translation (NAT)
B. Logging levels
C. Packet filtering
D. Packet tracing
Answer: A
Q8. - (Topic 1)
What method should you use to deploy servers?
A. WDS
B. AIK
C. ADK
D. EDT
Answer: A
Explanation: http://technet.microsoft.com/en-us/library/hh974416.aspx
Q9. - (Topic 8)
You need to recommend a solution that meets the notification requirements.
Which System Center 2012 components should you include in the recommendation?
A. Service Manager, Orchestrator and App Controller
B. Configuration Manager, Service Manager and Orchestrator
C. App Controller, Configuration Manager and Operations Manager
D. Operations Manager, Service Manager and Orchestrator
Answer: D
Q10. DRAG DROP - (Topic 10)
Your network contains two servers named Server1 and Server2 that run Windows Server 2012.
Server1 has the iSCSI Target Server role service installed and is configured to have five iSCSI virtual disks.
You install the Multipath I/O (MPIO) feature on Server2.
From the MPIO snap-in, you add support for iSCSI devices.
You need to ensure that Server2 can connect to the five iSCSI disks. The solution must ensure that Server2 uses MPIO to access the disks.
Which three actions should you perform?
To answer, move the three appropriate actions from the list of actions to the answer area
and arrange them in the correct order.
Answer: