Q1. - (Topic 9)
Your company has a main office and a branch office.
The network contains an Active Directory domain named contoso.com. The domain contains three domain controllers. The domain controllers are configured as shown in the following table.
The domain contains two global groups. The groups are configured as shown in the following table.
You need to ensure that the RODC is configured to meet the following requirements: . Cache passwords for all of the members of Branch1Users. . Prevent the caching of passwords for the members of Helpdesk. What should you do?
A. Modify the password replication policy of RODC1.
B. Modify the delegation settings of RODC1.
C. Modify the membership of the Allowed RODC Password Replication group.
D. Modify the membership of the Denied RODC Password Replication group.
E. Modify the delegation settings of DC1 and DC2.
F. Install the BranchCache feature on RODC1.
G. Create a Password Settings object (PSO) for the Helpdesk group.
H. Create a Password Settings object (PSO) for the Branch1Users group.
Answer: A
Q2. - (Topic 10)
Your company has a main office and a branch office.
You plan to implement a failover cluster named Cluster1 to host an application named App1. The data of App1 will replicate to all of the nodes in Cluster1.
Cluster1 will contain two servers. The servers will be configured as shown in the following table.
The cluster nodes will not use shared storage.
The branch office contains two file servers named Server3 and Server4.
You need to ensure that App1 fails over automatically to another server if a single node in Cluster1 fails.
What should you do?
More than one answer choice may achieve the goal. Select the BEST answer.
A. Add Server3 as a node in Cluster1.
B. Add Server1, Server2, and Server3 to a Network Load Balancing (NLB) cluster.
C. Add Server3 and Server4 to a new failover cluster named Cluster2. Install App1 on Cluster2.
D. Add Server3 as a file share witness for Cluster1.
Answer: D
Q3. - (Topic 10)
Your network contains 500 client computers that run Windows 7 and a custom application named App1. App1 uses data stored in a shared folder.
You have a failover cluster named Cluster1 that contains two servers named Server1 and Server2.
Server1 and Server2 run Windows Server 2012 and are connected to an iSCSI Storage Area Network (SAN).
You plan to move the shared folder to Cluster1.
You need to recommend which cluster resource must be created to ensure that the shared folder can be accessed from Cluster1.
What should you recommend?
More than one answer choice may achieve the goal. Select the BEST answer.
A. The Generic Application cluster role
B. The DFS Namespace Server cluster role
C. The clustered File Server role of the File Server for general use type
D. The clustered File Server role of the File Server for scale-out application data type
Answer: C
Q4. - (Topic 8)
You need to recommend which Certificate Services role service must be deployed to the perimeter network. The solution must meet the security requirements.
Which Certificate Services role services should you recommend?
A. Online Responder and Network Device Enrollment Service
B. Online Responder and Certificate Enrollment Web Service
C. Certificate Enrollment Web Service and Certificate Enrollment Policy Web Service
D. Certificate Enrollment Policy Web Service and Certification Authority Web Enrollment
Answer: C
Q5. HOTSPOT - (Topic 7)
You need to recommend a solution that meets the AD RMS requirements of Customer1
and Customer2.
Which actions should you recommend performing for each customer? To answer, select the appropriate customer for each action in the answer area.
Answer:
Q6. - (Topic 9)
Your network contains an Active Directory forest named contoso.com. The forest is managed by using Microsoft System Center 2012.
You plan to create virtual machine templates to deploy servers by using the Virtual Machine
Manager Self-service Portal (VMMSSP).
To the Virtual Machine Manager (VMM) library, you add a VHD that has a generalized image of Windows Server 2012.
You need to identify which VMM components must be associated with the image.
Which components should you identify? (Each correct answer presents part of the solution.
Choose all that apply.)
A. A guest OS profile
B. A hardware profile
C. A capability profile
D. A host profile
Answer: A,B
Explanation:
http://technet.microsoft.com/en-us/library/jj860424.aspx Profiles VMM provides the following profiles: Hardware profile—A hardware profile defines hardware configuration settings such as
CPU, memory, network adapters, a video adapter, a DVD drive, a floppy drive, COM ports,
and the priority given the virtual machine when allocating resources on a virtual machine
host.
Guest operating system profile—A guest operating system profile defines operating system
configured settings which will be applied to a virtual machine created from the template. It
defines common operating system settings such as the type of operating system, the
computer name, administrator password, domain name, product key, and time zone,
answer file and run once file.
NOTE: VMM also includes host profiles. Host profiles are not used for virtual machine
creation.
They are used during the conversion of a bare-metal computer to a Hyper-V host.
(http://technet.microsoft.com/en-us/library/hh368987.aspx)
Q7. HOTSPOT - (Topic 10)
You have a System Center 2012 R2 Virtual Machine Manager (VMM) deployment.
You implement Hyper-V Recovery Manager for the deployment.
You create two new clouds named Cloud1 and Cloud2. Metadata for both clouds is uploaded to Windows Azure.
You need to ensure that the virtual machines in Cloud1 are protected by using replicas in Cloud2.
Where should you perform each action? To answer, select the appropriate tool for each action in the answer area.
Answer:
Q8. - (Topic 9)
Your network contains an Active Directory domain named contoso.com. The domain contains servers that run either Windows Server 2008 R2 or Windows Server 2012.
All client computers on the internal network are joined to the domain. Some users establish VPN connections to the network by using Windows computers that do not belong to the domain.
All client computers receive IP addresses by using DHCP.
You need to recommend a Network Access Protection (NAP) enforcement method to meet the following requirements:
Verify whether the client computers have up-to-date antivirus software.
Provides a warning to users who have virus definitions that are out-of-date.
Ensure that client computers that have out-of-date virus definitions can connect to
the network.
Which NAP enforcement method should you recommend?
A. DHCP
B. IPSec
C. VPN
D. 802.1x
Answer: A
Explanation:
http://technet.microsoft.com/en-us/library/cc733020(v=ws.10).aspx
NAP enforcement for DHCP
DHCP enforcement is deployed with a DHCP Network Access Protection (NAP) enforcement server component, a DHCP enforcement client component, and Network Policy Server (NPS).
Using DHCP enforcement, DHCP servers and NPS can enforce health policy when a computer attempts to lease or renew an IP version 4 (IPv4) address. However, if client computers are configured with a static IP address or are otherwise configured to circumvent the use of DHCP, this enforcement method is not effective.
Q9. - (Topic 4)
You need to implement a solution for DNS replication.
Which cmdlets should you run?
A. Set-DnsServer and Invoke-DnsServerZoneSign
B. ConvertTo-DnsServerPrimaryZone and Register-DnsServerDirectoryPartition
C. UnRegister-DnsServerDirectoryPartition and Add-DnsServerForwarder
D. Set-DnsServerDnsSecZoneSetting and Invoke-DnsServerZoneSign
Answer: C
Q10. DRAG DROP - (Topic 9)
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012. Server1 resides in the perimeter network and has the Remote Access server role installed.
Some users have laptop computers that run Windows 7 and are joined to the domain. Some users work from home by using their home computers. The home computers run either Windows XP, Windows Vista/ Windows 7, or Windows 8.
You need to configure the computers for remote access.
Which three actions should you perform?
To answer, move the three appropriate actions from the list of actions to the answer area
and arrange them in the correct order.
Answer: