Q1. - (Topic 8)
A company has a single-forest and single Active Directory Domain Services domain named contoso.com. The company has offices in multiple geographic locations and manages all computing devices from a network operations center located at a main office.
You deploy physical servers and user devices by using a Windows Deployment Services (WDS) server named WDS1, and a server that runs System Center 2012 Virtual Machine Manager SP1 named VMM1.
Every three months you update the standard deployment images and push the update images to all client devices in the organization. You use multicast deployments for the servers and client devices at the remote offices. To automate the deployment process, you create an Auto-Cast multicast transmission and pre-stage client devices.
You need to ensure that client devices continue the deployment process after the first reboot and do not restart the installation.
What should you do?
A. Option A
B. Option B
C. Option C
D. Option D
Answer: C
Q2. - (Topic 1)
You implement a new virtualized print server that runs Windows Server 2012.
You need to migrate the print queues.
Which tool should you use?
A. Windows Server Migration Tools
B. Active Directory Migration Tool (ADMT)
C. Print Management
D. Computer Management
Answer: C
Explanation:
* Scenario: Migrate the existing print queues to virtualized instances of Windows Server 2012.
* To manage the migration process, use one of the following: . The Printer Migration Wizard, which you access through Print Management, a
snap-in in
. Microsoft Management Console (MMC).
. The Printbrm.exe command-line tool.
You can perform the migration locally or remotely, and from either a client computer or server. Important
As a best practice, run the Printer Migration Wizard or Printbrm.exe from a computer running Windows Server 2012
* Reference: Migrate Print and Document Services to Windows Server 2012
Q3. - (Topic 4)
You need to recommend a solution for the sales reports.
What should you include in the recommendation?
A. BranchCache in distributed cache mode
B. Offline files
C. BranchCache in hosted cache mode
D. Distributed File System (DFS)
Answer: A
Explanation: * Scenario: Server3 has a shared folder that contains sales reports. The sales reports are read frequently by the users in both offices. The reports are generated automatically once per week by an enterprise resource planning (ERP) system.
* BranchCache is designed to reduce WAN link utilization and improve application responsiveness for branch office workers who access content from servers in remote locations. Branch office client computers use a locally maintained cache of data to reduce traffic over a WAN link. The cache can be distributed across client computers (Distributed Cache mode) or can be housed on a server in the branch (Hosted Cache mode).
Reference: BranchCache Overview
Q4. - (Topic 1)
You need to recommend a management solution for the GPOs. The solution must meet the technical requirements. What should you include in the recommendation?
A. Microsoft Baseline Security Analyzer (MBSA)
B. Microsoft Desktop Optimization Pack (MDOP)
C. Microsoft System Center 2012 Operations Manager
D. Microsoft System Center 2012 Data Protection Manager (DPM)
Answer: B
Explanation:
* Scenario:
/ All changes to Group Policies must be logged.
/ Administrators in the Paris office need to deploy a series of desktop restrictions to the
entire company by using Group Policy.
* Microsoft Desktop Optimization Pack
Windows Vista Enterprise helps global organizations and enterprises with complex IT
infrastructures lower IT costs, reduce risk, and stay connected. The Microsoft Desktop
Optimization Pack for Software Assurance further extends this value by reducing
application deployment costs, enabling delivery of applications as services, and allowing for
better management and control of enterprise desktop environments. Together these
technologies deliver a highly cost-effective and flexible Windows desktop management
solution.
What is the Microsoft Desktop Optimization Pack?
The Microsoft Desktop Optimization Pack (MDOP) for Software Assurance is an add-on
subscription license available to Software Assurance customers. It uses innovative
technologies to help reduce the total cost of ownership (TCO) of the Windows desktop by
accelerating operating system and application management and enhancing IT
responsiveness and end-user uptime. It will enable you to better control the desktop,
accelerate and simplify desktop deployments and management, and create a dynamic
infrastructure by turning software into centrally managed services.
MDOP facilitates accelerated deployment and manageability of Windows through these
innovative technologies— available only to Windows Software Assurance customers.
Reference: Microsoft Desktop Optimization Pack
URL: http://technet.microsoft.com/en-us/library/cc507880.aspx
Q5. - (Topic 8)
Your network contains an Active Directory domain named contoso.com. The domain
contains an organizational unit (OU) named OU1.
You have a Group Policy object (GPO) named GPO1 that is linked to contoso.com. GPO1 contains custom security settings.
You need to design a Group Policy strategy to meet the following requirements:
. The security settings in GPO1 must be applied to all client computers.
. Only GPO1 and other GPOs that are linked to OU1 must be applied to the client computers in OU1.
What should you include in the design?
More than one answer choice may achieve the goal. Select the BEST answer.
A. Enable the Block Inheritance option at the domain level. Enable the Enforced option on GPO1.
B. Enable the Block Inheritance option on OU1. Link GPO1 to OU1.
C. Enable the Block Inheritance option on OU1. Enable the Enforced option on all of the GPOs linked to OU1.
D. Enable the Block Inheritance option on OU1. Enable the Enforced option on GPO1.
Answer: D
Explanation: * You can block inheritance for a domain or organizational unit. Blocking inheritance prevents Group Policy objects (GPOs) that are linked to higher sites, domains, or organizational units from being automatically inherited by the child-level.
* GPO links that are enforced cannot be blocked from the parent container.
Q6. - (Topic 7)
A company has offices in multiple geographic locations. The sites have high-latency, low-bandwidth connections. You need to implement a multisite Windows Deployment Services (WDS) topology for deploying standard client device images to all sites.
Solution: At each site, you deploy a local WDS server that runs only the Transport role. You configure local DHCP servers to direct local clients to the local WDS server.
Does this meet the goal?
A. Yes
B. No
Answer: A
Reference: Windows Deployment Services Getting Started Guide for Windows Server 2012
Q7. DRAG DROP - (Topic 8)
Your network contains an Active Directory forest. The forest contains two domains named contoso.com and fabrikam.com.
You plan to decommission the fabrikam.com domain.
You need to perform the following migration tasks:
. Copy user accounts from the fabrikam.com domain to the contoso.com domain.
. Move the client computers from fabrikam.com to contoso.com.
The solution must ensure that all of the user profiles are associated to the migrated user accounts.
Which tool should you use to perform each task?
To answer, drag the appropriate tool to the correct migration task in the answer area. Each tool may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content.
Answer:
Q8. - (Topic 2)
You run the Get-DNSServer cmdlet on DC01 and receive the following output:
You need to recommend changes to DC01. Which attribute should you recommend modifying?
A. EnablePollutionProtection
B. isReadOnly
C. Locking Percent
D. ZoneType
Answer: C
Explanation: * Scenario: The DNS servers must be prevented from overwriting the existing DNS entries that have been stored in cache.
* Cache locking is configured as a percent value. For example, if the cache locking value is set to 50, then the DNS server will not overwrite a cached entry for half of the duration of the TTL. By default, the cache locking percent value is 100. This means that cached entries will not be overwritten for the entire duration of the TTL. The cache locking value is stored in the CacheLockingPercent registry key. If the registry key is not present, then the DNS server will use the default cache locking value of 100.
Reference: DNS Cache Locking
Q9. DRAG DROP - (Topic 8)
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012. Server1 resides in the perimeter network and has the Remote Access server role installed.
Some users have laptop computers that run Windows 7 and are joined to the domain. Some users work from home by using their home computers. The home computers run either Windows XP, Windows Vista/ Windows 7, or Windows 8.
You need to configure the computers for remote access.
Which three actions should you perform?
To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Answer:
Q10. - (Topic 8)
A company has offices in multiple geographic locations. The sites have high-latency, low-bandwidth connections. You need to implement a multisite Windows Deployment Services (WDS) topology for deploying standard client device images to all sites.
Solution: At each site, you create a multicast deployment. You pre-stage the client images that you plan to deploy and point them to the local WDS server.
Does this meet the goal?
A. Yes
B. No
Answer: A
Q11. - (Topic 8)
You have a server named Server1 that runs Windows Server 2012.
You have a 3-TB database that will be moved to Server1.
Server1 has the following physical disks:
. Three 2-TB SATA disks that are attached to a single IDE controller . One 1-TB SATA disk that is attached to a single IDE controller
You need to recommend a solution to ensure that the database can be moved to Server1. The solution must ensure that the database is available if a single disk fails.
What should you include in the recommendation?
A. Add each disk to a separate storage pool. Create a mirrored virtual disk.
B. Add two disks to a storage pool. Add the other disk to another storage pool. Create a mirrored virtual disk.
C. Add all of the disks to a single storage pool, and then create two simple virtual disks.
D. Add all of the disks to a single storage pool, and then create a parity virtual disk.
Answer: D
Explanation:
Parity A parity virtual disk is similar to a hardware Redundant Array of Inexpensive Disks (RAID5). Data, along with parity information, is striped across multiple physical disks. Parity enables Storage Spaces to continue to service read and write requests even when a drive has failed. A minimum of three physical disks is required for a parity virtual disk. Note that a parity disk cannot be used in a failover cluster.
Q12. - (Topic 8)
Your company has two divisions named Division1 and Division2.
The network contains an Active Directory domain named contoso.com. The domain contains two child domains named divisionl.contoso.com and division2.contoso.com.
The company sells Division1 to another company.
You need to prevent administrators in contoso.com and division2.contoso.com from gaining administrative access to the resources in divisionl.contoso.com.
What should you recommend?
A. Create a new tree in the forest named contoso.secure. Migrate the resources and the accounts in divisionl.contoso.com to contoso.secure.
B. On the domain controller accounts in divisionl.contoso.com, deny the Enterprise Admins group the Allowed to Authenticate permission.
C. Create a new forest and migrate the resources and the accounts in divisionl.contoso.com to the new forest.
D. In divisionl.contoso.com, remove the Enterprise Admins group from the Domain Admins group and remove the Enterprise Admins group from the access control list (ACL) on the divisionl.contoso.com domain object.
Answer: C
Q13. DRAG DROP - (Topic 8)
You manage a Network Policy Server (NPS) infrastructure that contains four servers named NPSPRX01, NPS01, NPS02, and NPS03. All servers run Microsoft Windows Server 2012 R2. NPSPRX01 is configured as an NPS proxy. NPS01, NPS02, and NPS03 are members of a remote RADIUS server group named GR01. GR01 is configured as shown below:
You need to ensure that authentication requests are identified even when a server is unavailable.
If a given server is unavailable, which percentage of authentication requests will another server manage? To answer, drag the appropriate value to the correct scenario. Each value may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
Answer:
Q14. DRAG DROP - (Topic 8)
Your network contains an Active Directory forest named corp.contoso.com. All servers run Windows Server 2012.
The network has a perimeter network that contains servers that are accessed from the Internet by using the contoso.com namespace.
The network contains four DNS servers. The servers are configured as shown in the following table.
All of the client computers on the perimeter network use Server1 and Server2 for name resolution.
You plan to add DNS servers to the corp.contoso.com domain.
You need to ensure that the client computers automatically use the additional name servers. The solution must ensure that only computers on the perimeter network can resolve names in the corp.contoso.com domain.
Which DNS configuration should you implement on Server1 and Server2?
To answer, drag the appropriate DNS configuration to the correct location in the answer area. Each DNS configuration may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content.
Answer:
Q15. - (Topic 2)
You need to recommend a solution for the RODC.
Which attribute should you include in the recommendation?
A. systemFlags
B. searchFlags
C. policy-Replication-Flags
D. flags
Answer: B
Explanation: * Scenario: Deploy a read-only domain controller (RODC) to the London office
* The read-only domain controller (RODC) filtered attribute set (FAS) is a set of attributes of the Active Directory schema that is not replicated to an RODC. If you have data that you do not want to be replicated to an RODC in case it is stolen, you can add these attributes to the RODC FAS. If you add the attributes to the RODC FAS before you deploy the first RODC, the attributes are never replicated to any RODC.
/ To decide which attributes to add to the RODC FAS, review any schema extensions that have been performed in your environment and determine whether they contain credential-like data or not. In other words, you can exclude from consideration any attributes that are part of the base schema, and review all other attributes. Base schema attributes have the.systemFlags.attribute value 16 (0x10) set.
Reference: Customize the RODC Filtered Attribute Set