Q1. HOTSPOT - (Topic 8)
Your company has four offices. The offices are located in Montreal, Seattle, New York, and Miami.
Users access all of the web-based resources by using web proxy servers. The IP addresses of the web proxies at each office are configured as shown in the following table.
The connections to the web proxies are balanced by using round-robin DNS.
The company plans to deploy a new application. The new application has a farm of front-end web servers that connect to a back-end application server. When a session to a web server is established, the web server stores data until the session closes. Once the session closes, the data is sent to the application server.
You need to ensure that the incoming sessions to the web server farm are distributed among the web servers. The solution must ensure that if a web server fails, the users are NOT directed to the failed server.
How should you configure the port rule? To answer, select the appropriate options in the answer area.
Answer:
Q2. HOTSPOT - (Topic 6)
You need to deploy the new SQL cluster for App2.
How should you complete the relevant Windows PowerShell command? To answer, select the appropriate Windows PowerShell segment from each list in the answer area.
Answer:
Q3. DRAG DROP - (Topic 8)
Your network contains multiple servers that run Windows Server 2012.
You plan to implement three virtual disks. The virtual disks will be configured as shown in the following table.
You need to identify the minimum number of physical disks required for each virtual disk.
How many disks should you identify?
To answer, drag the appropriate number of disks to the correct virtual disk in the answer area. Each number of disks may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content.
Answer:
Q4. - (Topic 8)
Your network contains an Active Directory domain named contoso.com. The network has an Active Directory Certificate Services (AD CS) infrastructure.
You need to issue a certificate to users to meet the following requirements:
. Ensure that the users can encrypt files by using Encrypting File System (EFS). . Ensure that all of the users reenroll for their certificate every six months.
Solution: You create a copy of the User certificate template, and then you modify the extensions of the copy.
Does this meet the goal?
A. Yes
B. No
Answer: B
Q5. - (Topic 8)
You are an Active Directory administrator for Contoso, Ltd. You have a properly configured certification authority (CA) in the contoso.com Active Directory Domain Services (AD DS) domain. Contoso employees authenticate to the VPN by using a user certificate issued by the CA.
Contoso acquires a company named Litware, Inc., and establishes a forest trust between contoso.com and litwareinc.com. No CA currently exists in the litwareinc.com AD DS domain. Litware employees do not have user accounts in contoso.com and will continue to use their litwareinc.com user accounts.
Litware employees must be able to access Contoso's VPN and must authenticate by using a user certificate that is issued by Contoso's CA.
You need to configure cross-forest certificate enrollment for Litware users.
Which two actions should you perform? Each correct answer presents part of the solution.
A. Grant the litwareinc.com AD DS Domain Computers group permissions to enroll for the VPN template on the Contoso CA.
B. Copy the VPN certificate template from contoso.com to litwareinc.com.
C. Add Contoso's root CA certificate as a trusted root certificate to the Trusted Root Certification Authority in litware.com.
D. Configure clients in litwareinc.com to use a Certificate Policy server URI that contains
the location of Contoso's CA.
Answer: A,C
Q6. - (Topic 2)
You need to recommend changes to the virtual desktop infrastructure (VDI) environment.
What should you recommend?
A. Implement Hyper-V replication between VDI1 and VDI2.
B. Create new VDI virtual machines that are Generation 2 virtual machines.
C. Convert the existing VHDs to .vhdx format.
D. Move the VHDs to a Cluster Shared Volume (CSV) and implement Data Deduplication on the CSV.
Answer: D
Q7. - (Topic 1)
You are planning the deployment of System Center 2012 Virtual Machine Manager (VMM).
You need to identify which additional System Center 2012 product is required to meet the virtualization requirements.
What should you include in the recommendation?
A. App Controller
B. Operations Manager
C. Configuration Manager
D. Service Manager
Answer: B
Q8. - (Topic 8)
You have a System Center 2012 R2 Configuration Manager deployment.
All users have client computers that run Windows 8.1. The users log on to their client computer as standard users.
An application named App1 is deployed to the client computers by using System Center.
You need to recommend a solution to validate a registry key used by App1. If the registry key has an incorrect value, the value must be changed. The registry key must be validated every day. The solution must generate a report on non-compliant computers.
What is the best approach to achieve the goal? More than one answer choice may achieve the goal. Select the BEST answer.
A. Group Policy preferences
B. A desired configuration baseline
C. The Windows PowerShell Desired State Configuration (DSC) feature
D. The Microsoft Baseline Security Analyzer (MBSA)
Answer: B
Q9. - (Topic 8)
Your network contains five servers that run Windows Server 2012 R2.
You install the Hyper-V server role on the servers. You create an external virtual network switch on each server.
You plan to deploy five virtual machines to each Hyper-V server. Each virtual machine will have a virtual network adapter that is connected to the external virtual network switch and that has a VLAN identifier of 1.
Each virtual machine will run Windows Server 2012 R2. All of the virtual machines will run the identical web application.
You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each virtual machine to an NLB cluster. The cluster will be configured to use unicast only.
You need to ensure that the NLB feature can distribute connections across all of the virtual machines.
Solution: From the properties of each virtual machine, you enable MAC address spoofing for the existing virtual network adapter.
Does this meet the goal?
A. Yes
B. No
Answer: A
Q10. - (Topic 6)
You need to implement a new highly available storage solution for the Hyper-V environment. Which servers should you include in the scale-out file cluster?
A. CHI-SERVER1 and CHI-SERVER2
B. SEA3-HVNODE1 and SEA3-HVNODE2
C. SEA-SERVER1 and SEA-SERVER2
D. CHIl-HVNODE1 and CHI1-HVNODE2
Answer: B
Q11. - (Topic 8)
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. The network contains a System Center 2012 R2 Data Protection Manager (DPM) deployment.
The domain contains six servers. The servers are configured as shown in the following table.
You install System Center 2012 R2 Virtual Machine Manager (VMM) on the nodes in
Cluster2.
You configure VMM to use a database in Cluster1. Server5 is the first node in the cluster.
You need to back up the VMM encryption key.
What should you back up?
A. A full system backup of Server1
B. A full system backup of Server3
C. A backup of the Windows\DigitalLocker folder on Server5
D. A backup of the Windows\DigitalLocker folder on Server1
Answer: A
Q12. - (Topic 4)
You need to recommend which type of clustered file server and which type of file share must be used in the Hyper-V cluster that hosts App2. The solution must meet the technical requirements and the security requirements.
Solution: You recommend a scale-out file server that uses an NFS share.
Does this meet the goal?
A. Yes
B. No
Answer: B
Q13. DRAG DROP - (Topic 5)
You need to configure Active Directory Rights Management Services (AD RMS).
What should you do? To answer, drag the appropriate domain or option to the correct location.
Each domain or option may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
Answer:
Q14. DRAG DROP - (Topic 8)
You need to ensure that all new production Hyper-V virtual machines can be deployed correctly.
Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Answer:
Q15. - (Topic 8)
Your network contains multiple servers that run Windows Server 2012.
The network contains a Storage Area Network (SAN) that only supports Fibre Channel connections.
You have two failover clusters. The failover clusters are configured as shown in the following table.
Only the members of Cluster1 can connect to the SAN.
You plan to implement 15 highly available virtual machines on Cluster2. All of the virtual machines will be stored in a single shared folder.
You need to ensure that the VHD files of the virtual machines can be stored on the SAN.
What should you do? (Each correct answer presents a complete solution. Choose all that apply.)
A. From a node in Cluster2, create a Virtual Fibre Channel SAN.
B. From a node in Cluster1, create a Virtual Fibre Channel SAN.
C. From Cluster1, add the iSCSI Target Server cluster role.
D. From Cluster1, configure the clustered File Server role of the File Server for scale-out application data type.
Answer: A,D
Q16. - (Topic 8)
Your network contains five servers that run Windows Server 2012 R2.
You install the Hyper-V server role on the servers. You create an external virtual network switch on each server.
You plan to deploy five virtual machines to each Hyper-V server. Each virtual machine will have a virtual network adapter that is connected to the external virtual network switch and that has a VLAN identifier of 1.
Each virtual machine will run Windows Server 2012 R2. All of the virtual machines will run the identical web application.
You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each virtual machine to an NLB cluster. The cluster will be configured to use unicast only.
You need to ensure that the NLB feature can distribute connections across all of the virtual machines.
Solution: From the properties of each virtual machine, you add a second virtual network adapter. You connect the new virtual network adapters to the external virtual network switch and configure the new virtual network adapters to use a VLAN identifier of 2.
Does this meet the goal?
A. Yes
B. No
Answer: B