Q1. - (Topic 8)
You plan to allow users to run internal applications from outside the company’s network. You have a Windows Server 2012 R2 that has the Active Directory Federation Services (AD FS) role installed. You must secure on-premises resources by using multi-factor authentication (MFA). You need to design a solution to enforce different access levels for users with personal Windows 8.1 or iOS 8 devices.
Solution: You install a local instance of the MFA Server. You connect the instance to the Microsoft Azure MFA provider and then you use Microsoft Intune to manage personal devices.
Does this meet the goal?
A. Yes
B. No
Answer: A
Q2. - (Topic 8)
Your network contains the following roles and applications:
Microsoft SQL Server 2012
Distributed File System (DFS) Replication
Active Directory Domain Services (AD DS)
Active Directory Rights Management Services (AD RMS)
Active Directory Lightweight Directory Services (AD LDS)
You plan to deploy Active Directory Federation Services (AD FS).
You need to identify which deployed services or applications can be used as attribute stores for the planned AD FS deployment.
What should you identify? (Each correct answer presents a complete solution. Choose all that apply.)
A. DFS
B. AD RMS
C. Microsoft SQL Server 2012
D. AD LDS
E. AD DS
Answer: C,D,E
Q3. - (Topic 8)
Your network contains an Active Directory forest named contoso.com.
Your company works with a partner company that has an Active Directory forest named fabrikam.com. Both forests contain domain controllers that run only Windows Server 2012 R2.
The certification authority (CA) infrastructure of both companies is configured as shown in the following table.
You need to recommend a certificate solution that meets the following requirements:
. Server authentication certificates issued from fabrikam.com must be trusted automatically by the computers in contoso.com.
. The computers in contoso.com must not trust automatically any other type of certificates issued from the CA hierarchy in fabrikam.com.
What should you include in the recommendation?
A. Deploy a Group Policy object (GPO) that defines intermediate CAs. Import a certificate that has an application policy object identifier (OID) of CA Encryption Certificate.
B. Deploy a Group Policy object (GPO) that defines an enterprise trust. Import a certificate that has an application policy object identifier (OID) of Microsoft Trust List Signing.
C. Deploy a Group Policy object (GPO) that defines an enterprise trust. Import a certificate that has an application policy object identifier (OID) of CA Encryption Certificate.
D. Deploy a Group Policy object (GPO) that defines intermediate CAs. Import a certificate that has an application policy object identifier (OID) of Microsoft Trust List Signing.
Answer: B
Q4. HOTSPOT - (Topic 6)
You need to implement App1.
How should you configure the locations? To answer, select the appropriate option from each list in the answer area.
Answer:
Q5. - (Topic 1)
You need to recommend a solution that manages the security events. The solution must meet the technical requirements.
Which configuration should you include in the recommendation?
A. Object access auditing by using a Group Policy object (GPO)
B. Event rules by using System Center 2012 Operations Manager
C. Event forwarding by using Event Viewer
D. Audit Collection Services (ACS) by using System Center 2012
Answer: D
Q6. - (Topic 8)
Your network contains five Active Directory forests.
You plan to protect the resources in one of the forests by using Active Directory Rights
Management Services (AD RMS).
Users in all of the forests will access the protected resources.
You need to identify the minimum number of AD RMS clusters required for the planned
deployment.
What should you identify?
A. Five root clusters
B. Five licensing clusters
C. One licensing cluster and five root clusters
D. One root cluster and five licensing clusters
Answer: A
Q7. DRAG DROP - (Topic 6)
You need to implement Windows Network Load Balancing (NLB). Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Answer:
Q8. - (Topic 8)
Your network contains an Active Directory domain. The domain contains 10 file servers. The file servers connect to a Fibre Channel SAN. You plan to implement 20 Hyper-V hosts in a failover cluster.
The Hyper-V hosts will not have host bus adapters (HBAs).
You need to recommend a solution for the planned implementation that meets the following requirements:
The virtual machines must support live migration.
The virtual hard disks (VHDs) must be stored on the file servers.
Which two technologies achieve the goal? Each correct answer presents a complete solution.
A. Cluster Shared Volume (CSV)
B. An NFS share
C. Storage pools
D. SMB 3.0 shares
Answer: C,D
Q9. - (Topic 8)
Your network contains an Active Directory domain named contoso.com. The domain
contains a Microsoft System Center 2012 infrastructure.
You deploy a service named Service1 by using a service template. Service1 contains two virtual machines. The virtual machines are configured as shown in the following table.
You need to recommend a monitoring solution to ensure that an administrator can review the availability information of Service1.
Solution: From Operations Manager, you create a Distributed Application and a Monitor Override.
Does this meet the goal?
A. Yes
B. No
Answer: A
Q10. - (Topic 8)
Your network contains two data centers named DataCenter1 and DataCenter2. The two data centers are connected by using a low-latency high-speed WAN link.
Each data center contains multiple Hyper-V hosts that run Windows Server 2012. All servers connect to a Storage Area Network (SAN) in their local data center.
You plan to implement 20 virtual machines that will be hosted on the Hyper-V hosts.
You need to recommend a hosting solution for the virtual machines.
The solution must meet the following requirements:
. Virtual machines must be available automatically on the network if a single Hyper-V host fails. . Virtual machines must be available automatically on the network if a single data center fails.
What should you recommend?
A. One failover cluster in DataCenter1 and Hyper-V replicas to DataCenter2
B. One failover cluster in DataCenter2 and one DFS Replication group in DataCenter1
C. One failover cluster that spans both data centers and SAN replication between the data centers
D. One failover cluster and one Distributed File System (DFS) Replication group in each data center
Answer: C
Q11. - (Topic 8)
Your network contains a Microsoft System Center 2012 infrastructure.
You use Virtual Machine Manager (VMM) to manage 20 Hyper-V hosts.
You deploy a Windows Server Update Services (WSUS) server.
You need to automate the remediation of non-compliant Hyper-V hosts. The solution must minimize the amount of time that virtual machines are unavailable.
What should you do first?
A. Configure the Hyper-V hosts to download Windows updates from the WSUS server by using a Group Policy object (GPO).
B. Install the WSUS Administration console on the VMM server, and then add the WSUS server to the fabric.
C. Install the Virtual Machine Manager console on the WSUS server, and then add the WSUS server to the fabric.
D. Configure the Hyper-V hosts to download Windows updates from the VMM server by using a Group Policy object (GPO).
Answer: B
Q12. DRAG DROP - (Topic 2)
You need to recommend a monitoring solution for Proseware.
Which three actions should you recommend performing in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Answer:
Q13. - (Topic 8)
Your network contains an Active Directory domain named contoso.com. The domain contains multiple servers that run Windows Server 2012. All client computers run Windows 7.
The network contains two data centers.
You plan to deploy one file server to each data center.
You need to recommend a solution to provide redundancy for shared folders if a single data center fails.
What should you recommend?
More than one answer choice may achieve the goal. Select the BEST answer.
A. A Distributed File System (DFS) namespace and DFS Replication
B. Cluster Shared Volumes (CSVs)
C. The clustered File Server role of the File Server for general use type
D. The clustered File Server role of the File Server scale-out application data type
Answer: A
Q14. - (Topic 8)
Your company has a human resources department a finance department, a sales department and an R&D department.
The company audits the access of documents that contain department-specific sensitive information.
You are planning an administrative model for the departments to meet the following requirements:
. Provide R&D managers with the ability to back up all the files of their department only. . Provide finance managers with the ability to view the audit logs for the files of their department only. . Provide human resources managers with the ability to view the audit logs for the files of their department only. . Provide sales managers with the ability to modify the permissions on all the shared folders of their department only.
You need to identify the minimum amount of file servers required on the network to meet the requirements of each department.
How many file servers should you identify?
A. 1
B. 2
C. 3
D. 4
Answer: C
Q15. - (Topic 8)
Your network contains two servers named Server1 and Server2 that run Windows Server 2012. Server1 and Server2 have the Hyper-V server role installed and are part of a host group named Group1 in Microsoft System Center 2012 Virtual Machine Manager (VMM).
Server1 and Server2 have identical hardware, software, and settings.
You configure VMM to migrate virtual machines if the CPU utilization on a host exceeds 65 percent. The current load on the servers is shown following table.
You start a new virtual machine on Server2 named VM8. VM8 has a CPU utilization of 20
percent.
You discover that none of the virtual machines hosted on Server2 are migrated to Server1.
You need to ensure that the virtual machines hosted on Server2 are migrated to Server1.
What should you modify from the Dynamic Optimization configuration?
A. The Host Reserve threshold
B. The Power Optimization threshold
C. The Aggressiveness level
D. The Dynamic Optimization threshold
Answer: C
Q16. DRAG DROP - (Topic 8)
Your network contains two servers named Server1 and Server2 that run Windows Server
2012.
Server1 has the iSCSI Target Server role service installed and is configured to have five
iSCSI virtual disks.
You install the Multipath I/O (MPIO) feature on Server2. From the MPIO snap-in, you add support for iSCSI devices.
You need to ensure that Server2 can connect to the five iSCSI disks. The solution must
ensure that Server2 uses MPIO to access the disks.
Which three actions should you perform?
To answer, move the three appropriate actions from the list of actions to the answer area
and arrange them in the correct order.
Answer: