Q1. DRAG DROP - (Topic 8)
Your network contains an Active Directory domain named contoso.com. The domain contains two domain controllers named DC1 and DC2. The domain contains a server named Server1.
Server1 is a certification authority (CA). All servers run Windows Server 2012 R2.
You plan to deploy BitLocker Drive Encryption (BitLocker) to all client computers. The unique identifier for your organization is set to Contoso.
You need to ensure that you can recover the BitLocker encrypted data by using a BitLocker data recovery agent. You must be able to perform the recovery from any administrative computer.
Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Answer:
Q2. - (Topic 8)
You need to deploy the virtual network for the development servers.
Which two actions should you perform? Each correct answer presents part of the solution.
A. Associate VLAN ID 40 with the new logical network.
B. On HV-Cluster1, create a new logical network that uses a single connected network.
C. Associate VLAN ID 20 with the new logical network.
D. On HV-Cluster1, create a new logical network that uses private VLAN networks.
E. On HV-Cluster2, create a new logical network that uses a single connected network.
F. On HV-Cluster2, create a new logical network that uses private VLAN networks.
Answer: A,B
Q3. - (Topic 8)
Your network contains an Active Directory domain named contoso.com. The domain contains a Microsoft System Center 2012 infrastructure.
You deploy a service named Service1 by using a service template. Service1 contains two virtual machines. The virtual machines are configured as shown in the following table.
You need to recommend a monitoring solution to ensure that an administrator can review the availability information of Service1.
Solution: From Operations Manager, you create a Distributed Application and a Monitor Override.
Does this meet the goal?
A. Yes
B. No
Answer: B
Q4. DRAG DROP - (Topic 8)
Your network contains an Active Directory domain named contoso.com. The domain contains multiple servers that are configured as Hyper-V hosts.
You plan to implement four virtual machines. The virtual machines will be configured as shown in the following table.
You need to identify which network must be added to each virtual machine.
Which network types should you identify?
To answer, drag the appropriate Network Type to the correct virtual machine in the answer area. Each Network Type may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content.
Answer:
Q5. HOTSPOT - (Topic 3)
You need to recommend a solution that meets the AD RMS requirements of Customer1 and Customer2.
Which actions should you recommend performing for each customer? To answer, select the appropriate customer for each action in the answer area.
Answer:
Q6. - (Topic 8)
Your network contains an Active Directory domain named contoso.com.
You deploy Active Directory Certificate Services (AD CS).
Your company, which is named Contoso, Ltd., has a partner company named Fabrikam, Inc. Fabrikam also deploys AD CS.
Contoso and Fabrikam plan to exchange signed and encrypted email messages.
You need to ensure that the client computers in both Contoso and Fabrikam trust each other's email certificates. The solution must prevent other certificates from being trusted and minimize administrative effort.
What should you do?
More than one answer choice may achieve the goal. Select the BEST answer.
A. Implement an online responder in each company.
B. Exchange the root certification authority (CA) certificates of both companies, and then deploy the certificates to the Enterprise Trust store by using Group Policy objects (GPOs).
C. Implement cross-certification in each company.
D. Exchange the root certification authority (CA) certificates of both companies, and then deploy the certificates to the Trusted Root Certification Authorities store by using Group Policy objects (GPOs).
Answer: C
Q7. - (Topic 4)
You need to recommend a solution to maintain a copy of App2. The solution must meet the application requirements and must minimize additional hardware purchases.
What should you include in the recommendation?
A. Single-site Failover Clustering
B. Hyper-V replicas
C. Multi-site Failover Clustering
D. Distributed File System (DFS) Replication
Answer: B
Q8. - (Topic 4)
You need to recommend a storage solution for the App1 VHDs. The solution must minimize downtime if a Hyper-V host fails.
What should you include in the recommendation?
A. Distributed File System (DFS) Replication
B. A clustered file server of the File Server for scale-out application data type
C. A clustered file server of the File Server for general use type
D. A Distributed File System (DFS) namespace
Answer: B
Q9. HOTSPOT - (Topic 3)
You need to recommend which setting must be applied to the virtualization infrastructure of Northwind Traders to minimize the impact of multiple virtual machines starting concurrently.
What command should you recommend running? To answer, select the appropriate options in the answer area.
Answer:
Q10. HOTSPOT - (Topic 8)
You plan to deploy a certification authority (CA) infrastructure that contains the following servers:
. An offline standalone root CA named CA1
. An enterprise subordinate CA named CA2
On all of the computers, you import the root CA certificate from CA1 to the Trusted Root Certification Authorities Certificates store.
You need to ensure that CA2 can issue certificates for the CA hierarchy.
What should you do? To answer, select the appropriate options in the answer area.
Answer:
Q11. - (Topic 8)
Your network contains an Active Directory domain named contoso.com.
You currently have an intranet web site that is hosted by two Web servers named Web1 and Web2. Web1 and Web2 run Windows Server 2012.
Users use the name intranet.contoso.com to request the web site and use DNS round robin.
You plan to implement the Network Load Balancing (NLB) feature on Web1 and Web2.
You need to recommend changes to the DNS records for the planned implementation.
What should you recommend?
A. Create a service locator (SRV) record. Map the SRV record to Intranet.
B. Delete both host (A) records named Intranet. Create a pointer (PTR) record for each Web server.
C. Remove both host (A) records named Intranet. Create a new host (A) record named Intranet.
D. Delete both host (A) records named Intranet. Create two new alias (CNAME) records named Intranet. Map each CNAME record to a Web server name.
Answer: C
Q12. HOTSPOT - (Topic 6)
You need to implement the file share for the new virtual desktop environment.
How should you configure the implementation? To answer, select the appropriate option from each list in the answer area.
Answer:
Q13. - (Topic 8)
Your network contains an Active Directory domain named contoso.com. The domain contains several domain controllers. The domain controllers run either Windows Server 2012 or Windows Server 2008 R2.
The domain functional level is Windows Server 2008 R2. The forest functional level is Windows Server 2008.
The corporate compliance policy states that all items deleted from Active Directory must be recoverable from a Recycle Bin.
You need to recommend changes to the current environment to meet the compliance policy.
Which changes should you recommend? (Each correct answer presents part of the solution. Choose all that apply.)
A. Raise the forest functional level to Windows Server 2008 R2.
B. Run the Enable-ADOptionalFeaturecmdlet.
C. Run the New-ADObject cmdlet.
D. Run the Set-Server cmdlet
E. Raise the domain functional level to Windows Server 2012.
Answer: A,B
Explanation: You can enable Active Directory Recycle Bin only if the forest functional level of your environment is set to Windows Server 2008 R2.
B: Enabling Active Directory Recycle Bin After the forest functional level of your environment is set to Windows Server 2008 R2, you can enable Active Directory Recycle Bin by using the following methods: / Enable-ADOptionalFeature Active Directory module cmdlet (This is the recommended method.) / Ldp.exe
Note: By default, Active Directory Recycle Bin in Windows Server 2008 R2 is disabled.
Reference: Enable Active Directory Recycle Bin
Q14. - (Topic 7)
You have a small Hyper-V cluster built on two hosts that run Windows Server 2012 R2 Hyper-V. You manage the virtual infrastructure by using System Center Virtual Machine Manager 2012.
Distributed Key Management is not installed. You have the following servers in the environment:
You have the following requirements:
. You must back up virtual machines at the host level. . You must be able to back up virtual machines that are configured for live migration. . You must be able to restore the entire VMM infrastructure.
You need to design and implement the backup plan.
What should you do?
A. Run the following Windows PowerShell command:
Get-VM VMM1 | Checkpoint-VM-SnapshotName “VMM backup”
B. Run the following Windows PowerShell command:
Set-DPMGlobalProperty-DPMServerName DPM1-KnownVMMServers VMM1
C. Configure System State Backup for DCL.
D. Configure backup for all disk volumes on FILESERVER1
Answer: B
Explanation: DPM can protect Hyper-V virtual machines V during live migration. Connect servers—Run the the Set-DPMGlobalProperty PowerShell command to connect all the servers that are running Hyper-V to all the DPM servers. The cmdlet accepts multiple DPM server names.
Set-DPMGlobalProperty -dpmservername <dpmservername> -knownvmmservers <vmmservername>
Reference: Set up protection for live migration
https://technet.microsoft.com/en-us/library/jj656643.aspx
Topic 8, Mix Questions
Q15. - (Topic 5)
You need to ensure that the developers can manage their own virtual machines.
Solution: You perform the following actions:
. In Virtual Machine Manager, you create a new user role named DevUsers that
uses the Application Administrator profile.
. You grant Checkpoint permissions to the DevUsers role.
. You distribute the Self-Service Portal URL to the developers.
Does this meet the goal?
A. Yes
B. No
Answer: B
Q16. - (Topic 8)
Your network contains an Active Directory domain named contoso.com. The network contains a server named Server1 that runs Windows Server 2012. Server1 has the Active Directory Certificate Services server role installed. Server1 is configured as an offline standalone root certification authority (CA).
You install the Active Directory Certificate Services server role on Server2 and configure the server as an enterprise subordinate CA.
You need to ensure that the certificate issued to Server2 is valid for 10 years.
What should you do first?
A. Modify the subordinate CA certificate template.
B. Modify the registry on Server2.
C. Modify the registry on Server1.
D. Modify the CAPolicy.inf file on Server2.
E. Modify the CAPolicy.inf file on Server1.
Answer: C