Q1. HOTSPOT - (Topic 2)
You need to recommend a configuration for the DHCP infrastructure.
What should you recommend? To answer, select the appropriate options in the answer area.
Answer:
Q2. - (Topic 10)
Your network contains an Active Directory domain named contoso.com.
The corporate security policy states that when new user accounts, computer accounts, and contacts are added to an organizational unit (OU) named Secure, the addition must be audited.
You need to recommend an auditing solution to meet the security policy.
What should you include in the recommendation? (Each answer presents part of the solution. Choose all that apply.)
A. From the Default Domain Controllers Policy, enable the Audit directory services setting.
B. Create a new Group Policy object (GPO) that is linked to the Secure OU, and then modify the Audit directory services setting.
C. From the Secure OU, modify the Auditing settings.
D. From the Default Domain Controllers Policy, enable the Audit object access setting.
E. From the Secure OU, modify the Permissions settings.
F. Create a new Group Policy object (GPO) that is linked to the Secure OU, and then modify the Audit object access setting.
Answer: A,C
Explanation:
Creating a New Object: Resulting in multiple Event ID 5137 entries containing all attributes provided explicitly by the security principal that invoked the operation (but not those automatically generated by the system). Note that similar information also gets recorded if audit of User Account Management or Directory Service Access is enabled.
Q3. - (Topic 4)
You need to recommend an Office 365 integration solution. What should you include in the recommendation?
A. Active Directory directory synchronization
B. The Active Directory Migration Tool (ADMT)
C. Windows Identity Foundation (WIF) 3.5
D. The Sync Framework Toolkit
Answer: A
Q4. HOTSPOT - (Topic 9)
Your network contains an Active Directory domain named contoso.com.
The domain has a certification authority (CA). You create four certificate templates. The templates are configured as shown in the following table:
You install the Remote Access server role in the domain.
You need to configure DirectAccess to use one-time password (OTP) authentication.
What should you do? To answer, select the appropriate options in the answer area,
Answer:
Q5. DRAG DROP - (Topic 10)
Your network contains multiple servers that run Windows Server 2012.
You plan to implement three virtual disks. The virtual disks will be configured as shown in the following table.
You need to identify the minimum number of physical disks required for each virtual disk.
How many disks should you identify?
To answer, drag the appropriate number of disks to the correct virtual disk in the answer area. Each number of disks may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content.
Answer:
Q6. - (Topic 6)
You are evaluating the use of VMM to migrate APP1 for the sales users. You need to identify the effects of the migration.
What should you identify?
A. The VHDs and the virtual machine configuration files will move. The sales users' access to APP1 will be interrupted.
B. The VHDs will move but the virtual machine configuration files will remain in the original location. The sales users will continue to have uninterrupted access to APP1.
C. The virtual machine configuration files will move but the VHDs will remain in the original location. The sales users' access to APP1 will be interrupted.
D. The VHDs and the virtual machine configuration files will move. The sales users will continue to have uninterrupted access to APP1.
Answer: D
Q7. DRAG DROP - (Topic 2)
You need to recommend changes for the Active Directory infrastructure.
What should you recommend? To answer, drag the appropriate domain and forest functional levels for proseware.com to the correct locations. Each functional level may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
Answer:
Topic 3, Litware, Inc
Overview
Litware, Inc., is a manufacturing company. The company has a main office and two branch offices. The main office is located in Seattle. The branch offices are located in Los Angeles and Boston.
Existing Environment
Active Directory
The network contains an Active Directory forest named litwareinc.com. The forest contains a child domain for each office. The child domains are named boston.litwareinc.com and la.litwareinc.com. An Active Directory site exists for each office.
In each domain, all of the client computer accounts reside in an organizational unit (OU) named AllComputers and all of the user accounts reside in an OU named AllUsers.
All domain controllers run Windows Server 2008 R2 and are configured as DNS servers. The functional level of the domain and the forest is Windows Server 2008.
Network Infrastructure
The main office has the following servers:
Five physical Hyper-V hosts that run Windows Server 2012
Three virtual file servers that run Windows Server 2008 R2
One physical DHCP server that runs Windows Server 2008 R2
Ten physical application servers that run Windows Server 2012
One virtual IP Address Management (IPAM) server that runs Windows Server 2012
One virtual Windows Server Update Services (WSUS) server that runs Windows Server 2008 R2
One physical domain controller and two virtual domain controllers that run Windows Server 2008 R2
Each branch office has following servers:
One virtual file server that runs Windows Server 2008 R2
Two physical Hyper-V hosts that run Windows Server 2012
One physical DHCP server that runs Windows Server 2008 R2
One physical domain controller and two virtual domain controllers that run Windows Server 2008 R2
All of the offices have a high-speed connection to the Internet. The offices connect to each other by using T1 leased lines.
The IPAM server in the main office gathers data from the DNS servers and the DHCP servers in all of the offices.
Requirements Planned Changes
The company plans to implement the following changes:
Implement the Active Directory Recycle Bin.
Implement Network Access Protection (NAP).
Implement Folder Redirection in the Boston office only.
Deploy an application named Appl to all of the users in the Boston office only.
Migrate to IPv6 addressing on all of the servers in the Los Angeles office. Some
application servers in the Los Angeles office will have only IPv6 addresses.
Technical Requirements
The company identifies the following technical requirements:
Minimize the amount of administrative effort whenever possible.
Ensure that NAP with IPSec enforcement can be configured.
Rename boston.litwareinc.com domain to bos.litwareinc.com.
Migrate the DHCP servers from the physical servers to a virtual server that runs Windows Server 2012.
Ensure that the members of the Operators groups in all three domains can manage the IPAM server from their client computer.
VPN Requirements
You plan to implement a third-party VPN server in each office. The VPN servers will be configured as RADIUS clients. A server that runs Windows Server 2012 will perform RADIUS authentication for all of the VPN connections.
Visualization Requirements
The company identifies the following visualization requirements:
Virtualize the application servers.
Ensure that the additional domain controllers for the branch offices can be deployed by using domain controller cloning.
Automatically distribute the new virtual machines to Hyper-V hosts based on the current resource usage of the Hyper-V hosts.
Server Deployment Requirements
The company identifies the following requirements for the deployment of new servers on the network:
Deploy the new servers over the network.
Ensure that all of the server deployments are done by using multicast.
Security Requirements
A new branch office will open in Chicago. The new branch office will have a single read-only domain controller (RODC). Confidential attributes must not be replicated to the Chicago office.
Q8. - (Topic 10)
Your network contains an Active Directory domain named contoso.com.
You plan to implement Network Load Balancing (NLB).
You need to identify which network services and applications can be load balanced by using NLB.
Which services and applications should you identify?
A. Microsoft SQL Server 2012 Reporting Services
B. A failover cluster
C. A DHCP server
D. A Microsoft Exchange Server 2010 Mailbox server
E. A file server
F. A Microsoft SharePoint Server 2010 front-end Web server
Answer: A,F
Q9. DRAG DROP - (Topic 10)
Your network contains an Active Directory domain named contoso.com. The domain contains four servers named Server1, Server2, Server3 and Server4 that run Windows Server 2012.
Server1 and Server2 are configured as file servers and are part of a failover cluster named Cluster1. Server3 and Server4 have Microsoft SQL Server 2012 installed and are part of a failover cluster named Cluster2.
You add a disk named Disk1 to the nodes in Cluster1. Disk1 will be used to store the data files and log files used by SQL Server 2012.
You need to configure the environment so that access to Disk1 remains available when a node on Cluster1 fails over or fails back.
Which three actions should you perform?
To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Answer:
Q10. - (Topic 9)
Your network contains a server named Server1 that runs Windows Server 2012. Server1 has the DHCP Server server role installed. The network contains a Virtual Desktop Infrastructure (VDI).
All virtual machines run Windows 8.
You identify the following requirements for allocating IPv4 addresses to client computers:
. All virtual desktops must have static IP addresses.
. All laptop computers must receive dynamic IP addresses.
. All virtual desktops must be prevented from obtaining dynamic address.
You need to recommend a DHCP solution that meets the requirements for allocating IPv4 addresses.
The solution must use the least amount of administrative effort.
What should you recommend?
More than one answer choice may achieve the goal. Select the BEST answer.
A. Configure DHCP filtering.
B. Configure DHCP policies.
C. Create two physical subnets. Connect the laptop computers to the subnet that contains Server1.
D. Create two physical subnets. Configure 802.1X authentication for each subnet.
Answer: A