Q1. - (Topic 9)
Your network contains an Active Directory domain named contoso.com. The domain contains 10 sites. The sites are located in different cities and connect to each other by using low-latency WAN links.
In each site, you plan to implement Microsoft System Center 2012 Configuration Manager and to deploy multiple servers.
You need to recommend which Configuration Manager component must be deployed to each site for the planned deployment.
What should you include in the recommendation?
More than one answer choice may achieve the goal. Select the BEST answer.
A. A management point
B. A software update point
C. A distribution group point
D. A secondary site server that has all of the Configuration Manager roles installed
Answer: C
Explanation:
http://technet.microsoft.com/en-us/library/hh427335.aspx Distribution point groups provide a logical grouping of distribution points and collections for content distribution. A Distribution point group is not limited to distribution points from a single site, and can contain one or more distribution points from any site in the hierarchy. When you distribute content to a distribution point group, all distribution points that are members of the distribution point group receive the content.
Q2. - (Topic 9)
Your network contains an Active Directory domain named contoso.com. The domain contains an organizational unit (OU) named OU1.
You have a Group Policy object (GPO) named GPO1 that is linked to contoso.com. GPO1 contains custom security settings.
You need to design a Group Policy strategy to meet the following requirements:
. The security settings in GPO1 must be applied to all client computers.
. Only GPO1 and other GPOs that are linked to OU1 must be applied to the client computers in OU1.
What should you include in the design?
More than one answer choice may achieve the goal. Select the BEST answer.
A. Enable the Block Inheritance option at the domain level. Enable the Enforced option on GPO1.
B. Enable the Block Inheritance option on OU1. Link GPO1 to OU1.
C. Enable the Block Inheritance option on OU1. Enable the Enforced option on all of the GPOs linked to OU1.
D. Enable the Block Inheritance option on OU1. Enable the Enforced option on GPO1.
Answer: D
Q3. DRAG DROP - (Topic 10)
You are planning to set up a proof-of-concept network virtualization environment. The environment will contain three servers. The servers will be configured as shown in the following table.
You need to enable network connectivity between the virtual machines and Server3.
Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Answer:
Q4. - (Topic 10)
Your network contains an Active Directory domain named contoso.com. The network has an Active Directory Certificate Services (AD CS) infrastructure.
You need to issue a certificate to users to meet the following requirements:
. Ensure that the users can encrypt files by using Encrypting File System (EFS).
. Ensure that all of the users reenroll for their certificate every six months.
Solution: From the properties of the Basic EFS template, you assign the Allow - Enroll permission to the Authenticated Users group.
Does this meet the goal?
A. Yes
B. No
Answer: B
Q5. - (Topic 9)
A new company registers the domain name of contoso.com. The company has a web presence on the Internet. All Internet resources have names that use a DNS suffix of contoso.com.
A third-party hosts the Internet resources and is responsible for managing the contoso.com DNS zone on the Internet. The zone contains several hundred records.
The company plans to deploy an Active Directory forest.
You need to recommend an Active Directory forest infrastructure to meet the following requirements:
. Ensure that users on the internal network can resolve the names of the company's Internet resources.
. Minimize the amount of administrative effort associated with the addition of new Internet servers.
What should you recommend?
A. A forest that contains a single domain named contoso.local
B. A forest that contains a root domain named contoso.com and another domain named contoso.local
C. A forest that contains a root domain named contoso.com and another domain named ad.contoso.com
D. A forest that contains a single domain named contoso.com
Answer: A
Q6. DRAG DROP - (Topic 10)
Your network contains two servers named Server1 and Server2 that run Windows Server 2012. Server1 and Server2 have the Hyper-V server role installed and are members of a failover cluster.
The network contains a Storage Area Network (SAN) that has a LUN named LUN1. LUN1 is connected to a 12-TB disk on the SAN.
You plan to host three new virtual machines on the failover cluster. Each virtual machine will store up to 4 TB of data on a single disk. The virtual machines will be backed up from the hosts by using the Volume Shadow Copy Service (VSS).
You need to ensure that Server1 and Server2 can store the new virtual machines on the SAN.
Which three actions should you perform?
To answer, move the three appropriate actions from the list of actions to the answer area
and arrange them in the correct order.
Answer:
Q7. - (Topic 4)
You need to implement a solution for DNS replication.
Which cmdlets should you run?
A. Set-DnsServer and Invoke-DnsServerZoneSign
B. ConvertTo-DnsServerPrimaryZone and Register-DnsServerDirectoryPartition
C. UnRegister-DnsServerDirectoryPartition and Add-DnsServerForwarder
D. Set-DnsServerDnsSecZoneSetting and Invoke-DnsServerZoneSign
Answer: C
Q8. DRAG DROP - (Topic 9)
Your network contains an Active Directory forest named contoso.com.
Your company merges with another company that has an Active Directory forest named
litwareinc.com.
Each forest has one domain.
You establish a two-way forest trust between the forests.
The network contains three servers. The servers are configured as shown in the following table.
You confirm that the client computers in each forest can resolve the names of the client computers in both forests.
On dc1.litwareinc.com, you create a zone named GlobalNames.
You need to recommend changes in both forests to ensure that the users in both forests can resolve single-label names by using the GlobalNames zone in litwareinc.com.
Which changes should you recommend?
To answer, drag the appropriate configuration to the correct server in the answer area. Each configuration may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content.
Answer:
Q9. - (Topic 9)
Your network contains a server named Server1 that runs Windows Server 2012. Server1 has the DHCP Server server role installed.
All of the client computers that are in a subnet named Subnet1 receive their IP address configurations from Server1.
You plan to add another DHCP server named Server2 to Subnet1.
You need to recommend changes to the DHCP infrastructure to ensure that the client computers continue to receive IP addressing information if a single DHCP server fails.
What should you do?
More than one answer choice may achieve the goal. Select the BEST answer.
A. Create a Network Load Balancing (NLB) cluster.
B. Configure Failover for the scope.
C. Create a DHCP failover cluster.
D. Create a split scope.
Answer: B
Explanation:
http://blogs.technet.com/b/keithmayer/archive/2012/10/28/step-by-step-scoping-out-the-new-dhcpfailover-inwindows-server-2012-31-days-of-favorite-features-part-28-of-31.aspx#.UQhW-b-jbK0
D:\Documents and Settings\useralbo\Desktop\1.jpg
Q10. - (Topic 5)
You need to recommend a solution for managing updates. The solution must meet the technical requirements.
What should you include in the recommendation?
A. A System Center 2012 Configuration Manager management point in the main office and a WSUS downstream server in each office
B. A System Center 2012 Configuration Manager software update point in the main office and a System Center 2012 Configuration Manager distribution point in each office
C. A System Center 2012 Configuration Manager management point in the main office and a System Center 2012 Configuration Manager distribution point in each office
D. A WSUS upstream server in the main office and a WSUS downstream server in each office
Answer: B
Q11. - (Topic 6)
You need to ensure that RESEARCH1 only contains the required virtual machines.
What should you do?
A. Create an availability set.
B. Create a custom placement rule.
C. Set RESEARCH1 as a possible owner.
D. Set RESEARCH1 as a preferred owner.
Answer: B
Q12. DRAG DROP - (Topic 9)
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012. Server1 resides in the perimeter network and has the Remote Access server role installed.
Some users have laptop computers that run Windows 7 and are joined to the domain. Some users work from home by using their home computers. The home computers run either Windows XP, Windows Vista/ Windows 7, or Windows 8.
You need to configure the computers for remote access.
Which three actions should you perform?
To answer, move the three appropriate actions from the list of actions to the answer area
and arrange them in the correct order.
Answer:
Q13. - (Topic 9)
Your network contains an Active Directory domain named contoso.com. The Active Directory site topology is configured as shown in the exhibit. (Click the Exhibit button.)
DC1 and DC2 run Windows Server 2003 R2. All FSMO roles are located on DC2.
You plan to deploy a read-only domain controller (RODC) to Site3.
You need to recommend changes to the network to support the planned RODC
implementation.
What should you recommend?
More than one answer choice may achieve the goal. Select the BEST answer.
A. To Site1, add an RODC that runs Windows Server 2012.
B. Replace DC2 with a domain controller that runs Windows Server 2012.
C. To Site2, add an RODC that runs Windows Server 2012.
D. Replace DC1 with a domain controller that runs Windows Server 2012.
Answer: D
Explanation: http://technet.microsoft.com/en-us/library/cc772065%28v=ws.10%29.aspx Each RODC requires a writable domain controller running Windows Server 2008 for the same domain from which the RODC can directly replicate. Typically, this requires that a writable domain controller running Windows Server 2008 be placed in the nearest site in the topology.
Q14. - (Topic 9)
Your network contains an Active Directory domain named contoso.com. The domain contains multiple sites.
You plan to deploy DirectAccess.
The network security policy states that when client computers connect to the corporate
network from the Internet, all of the traffic destined for the Internet must be routed through
the corporate network.
You need to recommend a solution for the planned DirectAccess deployment that meets
the security policy requirement
Solution: You set the ISATAP State to state disabled.
Does this meet the goal?
A. Yes
B. No
Answer: B
Q15. - (Topic 9)
Your company has a main office that contains several servers and several users. The main
office contains a file server named Server1 that runs Windows Server 2012.
The users access a large report file that is created on Server1 each day.
The company plans to open a new branch office. The branch office will contain only client computers.
You need to implement a solution to reduce the amount of bandwidth used by the client computers in the branch office to download the report each day.
What should you do?
More than one answer choice may achieve the goal. Select the BEST answer.
A. Install the BranchCache for network files role service on Server1. Configure the client computers to use BranchCache in hosted cache mode.
B. Configure the offline settings of the shared folder that contains the report.
C. Install the BranchCache for network files role service on Server1. Configure the client computers to use Branchcache in distributed mode.
D. Enable the Background Intelligent Transfer Service (BITS) feature on Server1 and on each client computer in the branch office. Move the report to a web folder.
Answer: C
Explanation:
http://technet.microsoft.com/library/ee649232(WS.10).aspx Distributed cache mode. In this mode, branch office client computers download content from the content servers in the main office and then cache the content for other computers in the same branch office. Distributed cache mode does not require a server computer in the branch office.