Q1. - (Topic 4)
You need to recommend a solution for the sales reports.
What should you include in the recommendation?
A. BranchCache in distributed cache mode
B. Offline files
C. BranchCache in hosted cache mode
D. Distributed File System (DFS)
Answer: A
Explanation: * Scenario: Server3 has a shared folder that contains sales reports. The sales reports are read frequently by the users in both offices. The reports are generated automatically once per week by an enterprise resource planning (ERP) system.
* BranchCache is designed to reduce WAN link utilization and improve application responsiveness for branch office workers who access content from servers in remote locations. Branch office client computers use a locally maintained cache of data to reduce traffic over a WAN link. The cache can be distributed across client computers (Distributed Cache mode) or can be housed on a server in the branch (Hosted Cache mode).
Reference: BranchCache Overview
Q2. - (Topic 8)
Your network contains an Active Directory domain named contoso.com. The domain contains a Microsoft System Center 2012 infrastructure. The domain contains two sites named Site1 and Site2. The sites connect to each other by using a 1-Mbps WAN link.
The sites contain four servers. The servers are configured as shown in the following table.
In Site2, you plan to deploy 50 Hyper-V hosts.
You need to recommend a solution to deploy the Hyper-V hosts by using VMM. The solution must minimize the amount of traffic between Site1 and Site2 during deployment.
What should you recommend?
A. On Server4, install VMM. From the Virtual Machine Manager console, add Server1 as a PXE server and add Server4 as a library server.
B. On Server4/ install VMM. From the Virtual Machine Manager console, add Server1 as a PXE server and a library server.
C. On Server4, install WDS. From the Virtual Machine Manager console, add Server4 as a PXE server and a library server.
D. On Server4, install WDS. From the Virtual Machine Manager console, add Server4 as a PXE server and add Server1 as a library server.
Answer: C
Q3. DRAG DROP - (Topic 8)
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012. Server1 resides in the perimeter network and has the Remote Access server role installed.
Some users have laptop computers that run Windows 7 and are joined to the domain. Some users work from home by using their home computers. The home computers run either Windows XP, Windows Vista/ Windows 7, or Windows 8.
You need to configure the computers for remote access.
Which three actions should you perform?
To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Answer:
Q4. - (Topic 3)
You need to recommend a server virtualization strategy that meets the technical requirements and the virtualization requirements.
What should you include in the recommendation?
A. Windows Server Backup
B. The Microsoft Virtual Machine Converter
C. Microsoft System Center 2012 Virtual Machine Manager (VMM)
D. Disk2vhd
Answer: C
Explanation:
* Scenario:
Virtualize the application servers.
Automatically distribute the new virtual machines to Hyper-V hosts based on the current
resource us The main office has the following servers:
Five physical Hyper-V hosts that run Windows Server 2012age of the Hyper-V hosts.
* System Center Virtual Machine Manager 2012: VMM Gets Major Upgrade Expanded hypervisor support, virtual application support and a myriad of other upgrades are coming in the new VMM 2012.
There's no doubt that Microsoft is making System Center Virtual Machine Manager (VMM) a key component of the System Center suite. The scope of the product is being expanded so much that it could be renamed "System Center Virtual Datacenter Manager." The new version of VMM is currently in beta and is scheduled for release in the second half of 2011. VMM can now do bare-metal installations on fresh hardware, create Hyper-V clusters instead of just managing them, and communicate directly with your SAN arrays to provision storage for your virtual machines (VMs). The list of supported hypervisors has also arown—it includes not only Hyper-V and VMware vSphere Hvpervisor, but
Reference: System Center Virtual Machine Manager 2012: VMM Gets Major Upgrade
Q5. - (Topic 1)
You are planning the implementation of two new servers that will be configured as RADIUS servers.
You need to recommend which configuration must be performed on the VPN servers. The solution must meet the technical requirements.
What should you do on each VPN server?
A. Add a RADIUS client.
B. Install the Health Registration Authority role service.
C. Enable DirectAccess.
D. Modify the authentication provider.
Answer: D
Explanation:
* Implement RADIUS authentication for VPN connections.
* The new sales.contoso.com domain will contain a web application that will access data from a Microsoft SQL Server located in the contoso.com domain. The web application must use integrated Windows authentication. Users' credentials must be passed from the web applications to the SQL Server.
Q6. - (Topic 5)
You need to configure the connection between the new remote branch office and the existing branch offices.
What should you create?
A. SMTP site link
B. Forest trust
C. Certification authority
D. IP subnet
Answer: A
Q7. - (Topic 6)
You need To configure the Group Policy for salespeople.
Solution: You move all shared desktops to a separate organizational unit (OU). You create one Group Policy object (GPO) that has an AppLocker policy rule and enable loopback policy processing within the GPO. You link the GPO to the new OU.
Does this meet the goal?
A. Yes
B. No
Answer: B
Q8. - (Topic 1)
After the planned upgrade to Windows Server 2012, you restore a user account from the Active Directory Recycle Bin.
You need to replicate the restored user account as quickly as possible.
Which cmdlets should you run?
A. Get-ADReplicationSite and Set-ADReplicationConnection
B. Get-ADReplicationAttributeMetadata and Compare-Object
C. Get-ADReplicationUpToDatenessVectorTable and Set-ADReplicationSite
D. Get ADDomainController and Sync-ADObject
Answer: D
Explanation:
* Scenario:
All of the domain controllers are global catalog servers.
The FSMO roles were not moved since the domains were deployed.
* The Get-ADDomainController cmdlet gets the domain controllers specified by the
parameters.
You can get domain controllers by setting the Identity, Filter or Discover parameters.
* The Sync-ADObject cmdlet replicates a single object between any two domain controllers
that have partitions in common. The two domain controllers do not need to be direct
replication partners. It can also be used to populate passwords in a read-only domain
controller (RODC) cache.
Reference: Get-ADDomainController, Sync-ADObject
Q9. - (Topic 8)
You deploy an Active Directory domain named contoso.com to the network. The domain is configured as an Active Directory-integrated zone. All domain controllers run Windows Server
2012 and are DNS servers.
You plan to deploy a child domain named operations.contoso.com.
You need to recommend changes to the DNS infrastructure to ensure that users in the operations department can access the servers in the contoso.com domain.
What should you include in the recommendation?
A. A zone delegation for _msdcs.contoso.com
B. Changes to the replication scope of contoso.com
C. Changes to the replication scope of _msdcs.contoso.com
D. Changes to the replication scope of operations.contoso.com
Answer: B
Explanation:
Manually Create a Delegation for the Child Domain on the Parent (Root) DNS Server
1. Right-click the root zone, click New Delegation, and then click Next.
2. Type the domain name for the child domain, and then click Next.
3. Add the child DNS server to host the new zone, and then click Next. NOTE: A domain controller that is a DNS server should have a static Transport Control Protocol/Internet Protocol (TCP/IP) address. Verify that this step is performed before you install DNS on the child domain controller. If no DNS TCP/IP address exists, DNS is installed as a root server. If you see that a "." folder is created after you install DNS, you must remove the root configuration. For additional information about how to do this, click the article number below to view the article in the Microsoft Knowledge Base: 229840 DNS Server's Root Hints and Forwarder Pages Are Unavailable
4. On the child domain DNS server, right-click My Network Places, and then click Properties.
5. Right-click the appropriate local connection, and then click Properties.
6. Under Components checked are used by this connection, click Internet Protocol (TCP/IP), and then click Properties.
7. Click Use the following DNS server addresses:, and then type the TCP/IP address of the parent (root) DNS server.
Reference: How To Create a Child Domain in Active Directory and Delegate the DNS Namespace to the Child Domain
http://support.microsoft.com/kb/255248
Q10. - (Topic 1)
You are evaluating the implementation of data deduplication on the planned Windows Server 2012 file servers.
The planned servers will have the identical disk configurations as the current servers.
You need to identify which volumes can be enabled for data deduplication.
Which volumes should you identify? (Each correct answer presents part of the solution. Choose all that apply.)
A. C
B. D
C. E
D. The CSV
E. DATA
Answer: C,E
Explanation:
* Scenario: A mounted virtual hard disk (VHD) named DATA that is formatted NTFS A simple volume named E that is formatted NTFS * It slices, it dices, and it cleans your floors! Well, the Data Deduplication feature doesn't do everything in this version. It is only available in certain Windows Server 2012 editions and has some limitations. Deduplication was built for NTFS data volumes and it does not support boot or system drives and cannot be used with Cluster Shared Volumes (CSV). We don't support deduplicating live VMs or running SQL databases. See how to determine which volumes are candidates for deduplication on Technet.
Q11. - (Topic 8)
Your company has a main office and a branch office.
The network contains an Active Directory domain named contoso.com. The domain contains three domain controllers. The domain controllers are configured as shown in the following table.
The domain contains two global groups. The groups are configured as shown in the following table.
You need to ensure that the RODC is configured to meet the following requirements:
. Cache passwords for all of the members of Branch1Users.
. Prevent the caching of passwords for the members of Helpdesk.
What should you do?
A. Modify the password replication policy of RODC1.
B. Modify the delegation settings of RODC1.
C. Modify the membership of the Allowed RODC Password Replication group.
D. Modify the membership of the Denied RODC Password Replication group.
E. Modify the delegation settings of DC1 and DC2.
F. Install the BranchCache feature on RODC1.
G. Create a Password Settings object (PSO) for the Helpdesk group.
H. Create a Password Settings object (PSO) for the Branch1Users group.
Answer: A
Explanation: The Password Replication Policy acts as an access control list (ACL). It determines if an RODC should be permitted to cache a password. After the RODC receives an authenticated user or computer logon request, it refers to the Password Replication Policy to determine if the password for the account should be cached.
Reference: Password Replication Policy
Q12. - (Topic 6)
You need to plan the migration of App1. What should you do?
A. Install App1 on drive C. Move all of the data that supports App1 to drive D.
B. Expand the size of drive C Install App1 and all of the data that supports the app on drive C
C. Install App1 on drive D. Move all of the data that supports App1 to an additional data drive.
D. Install App1 on drive C. Move all of the data that supports App1 to an additional data drive.
Answer: C
Q13. DRAG DROP - (Topic 8)
Your network contains an Active Directory forest named contoso.com.
Your company merges with another company that has an Active Directory forest named
litwareinc.com.
Each forest has one domain.
You establish a two-way forest trust between the forests.
The network contains three servers. The servers are configured as shown in the following table.
You confirm that the client computers in each forest can resolve the names of the client computers in both forests.
On dc1.litwareinc.com, you create a zone named GlobalNames.
You need to recommend changes in both forests to ensure that the users in both forests can resolve single-label names by using the GlobalNames zone in litwareinc.com.
Which changes should you recommend?
To answer, drag the appropriate configuration to the correct server in the answer area. Each configuration may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content.
Answer:
Q14. DRAG DROP - (Topic 8)
You manage an Active Directory Domain Services forest that contains a root domain named contoso.com and a child domain named branch.contoso.com. You have three servers named SRV01, SRV02, and SRV03. All servers run Windows Server 2012 R2. SRV01 and SRV02 are domain controllers for the domain contoso.com. SRV03 is the domain controller for branch.contoso.com. User accounts and resources exist in both domains. All resources in branch.contoso.com are physically located in a remote branch office.
The remote branch office must be configured as Read-Only Domain Controller (RODC). The solution must minimize the impact on users and the number of servers deployed in the branch office.
You need to configure the environment.
Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Answer:
Q15. - (Topic 8)
Your network contains an Active Directory domain named contoso.com. The domain contains multiple sites.
You plan to deploy DirectAccess.
The network security policy states that when client computers connect to the corporate
network from the Internet, all of the traffic destined for the Internet must be routed through
the corporate network.
You need to recommend a solution for the planned DirectAccess deployment that meets
the security policy requirement
Solution: You set the ISATAP State to state disabled.
Does this meet the goal?
A. Yes
B. No
Answer: A
Explanation: With NAT64 and DNS64, the DirectAccess server now has the ability to take those client IPv6 packets and spin them down into IPv4 packets, so you can simply leave your internal network all IPv4. So back in the beginning it was standard practice to enable ISATAP globally. Today, because of the known issues, it is recommended not to use ISATAP at all, unless you have a specific reason for needing it
Note: ISATAP defines a method for generating a link-local IPv6 address from an IPv4 address, and a mechanism to perform Neighbor Discovery on top of IPv4.
Reference: IS ISATAP REQUIRED FOR DIRECTACCESS?