Q1. - (Topic 10)
You have a Windows Server 2012 R2 failover cluster that contains four nodes. The cluster has Dynamic Optimization enabled. You deploy three highly available virtual machines to the cluster by using System Center 2012 R2 Virtual Machine Manager (VMM).
You need to prevent Dynamic Optimization from placing any of the three virtual machines in the same node.
What should you do?
A. From the Virtual Machine Manager console, modify the Compatibility settings in the Hardware Configuration properties of the virtual machines.
B. Set the Priority property of the virtual machine cluster role.
C. From the Virtual Machine Manager console, modify the Servicing Windows settings of the virtual machines.
D. From the Virtual Machine Manager console, modify the Availability settings in the Hardware Configuration properties of the virtual machines.
Answer: D
Q2. - (Topic 5)
You need to recommend a solution that resolves the current file server issue. The solution must meet the business requirements.
What should you include in the recommendation?
A. BranchCache in hosted cache mode
B. BranchCache in distributed cache mode
C. A storage pool
D. Distributed File System (DFS)
Answer: D
Q3. - (Topic 10)
Your company has three main offices named Main1, Main2, and Main3.
The network contains an Active Directory domain named contoso.com.
Each office contains a help desk group.
You plan to deploy Microsoft System Center 2012 Configuration Manager to meet the following requirements:
. The members of the Domain Admins group must be able to manage all of the Configuration Manager settings.
. The help desk groups must be able to manage only the client computers in their respective office by using Configuration Manager.
You need to recommend a Configuration Manager infrastructure to meet the requirements.
Which infrastructure should you recommend? More than one answer choice may achieve the goal. Select the BEST answer.
A. Three sites that contain one collection for each office
B. One site that contains one collection
C. Three sites that each contain one collection
D. One site that contains a collection for each office
Answer: D
Q4. HOTSPOT - (Topic 7)
You need to recommend changes to allow Customer1 to delegate permissions in its hosting environment to its users.
Where should you recommend performing each task? To answer, select the appropriate location for each task in the answer area.
Answer:
Q5. HOTSPOT - (Topic 9)
You have a domain controller that hosts an Active Directory-integrated zone. On the domain controller, you run the following cmdlet:
PS C:\> Get-DnsServerScavenging NoRefreshlnterval:2.00:00:00
Refreshlnterval:3.00:00:00 Scavenginglnterval:4.00:00:00 ScavengingState:True LastScavengeTime:1/30/2014 9:10:36 AM
Use the drop-down menus to select the answer choice that completes each statement.
Answer:
Q6. - (Topic 9)
Your network contains 50 servers that run Windows Server 2003 and 50 servers that run Windows Server 2008.
You plan to implement Windows Server 2012 R2.
You need to create a report that includes the following information:
. The servers that run applications and services that can be moved to Windows
Server 2012 R2
. The servers that have hardware that can run Windows Server 2012 R2
. The servers that are suitable to be converted to virtual machines hosted on Hyper-
V hosts that run Windows Server 2012 R2
Solution: From an existing server, you run the Microsoft Application Compatibility Toolkit (ACT).
Does this meet the goal?
A. Yes
B. No
Answer: B
Q7. DRAG DROP - (Topic 9)
Your company plans to deploy a remote access solution to meet the following requirements:
. Ensure that client computers that are connected to the Internet can be managed remotely without requiring that the user log on.
. Ensure that client computers that run Windows Vista or earlier can connect remotely.
. Ensure that non-domain-joined computers can connect remotely by using TCP port 443.
You need to identify which remote access solutions meet the requirements.
Which solutions should you identify?
To answer, drag the appropriate solution to the correct requirement in the answer area. Each solution may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content.
Answer:
Q8. DRAG DROP - (Topic 2)
You need to recommend the VPN protocols for Proseware.
What should you recommend? To answer, drag the appropriate VPN protocols to the correct offices. Each protocol may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content,
Answer:
Q9. - (Topic 9)
Your network contains an Active Directory domain named contoso.com. The domain contains multiple sites.
You plan to deploy DirectAccess.
The network security policy states that when client computers connect to the corporate network from the Internet, all of the traffic destined for the Internet must be routed through the corporate network.
You need to recommend a solution for the planned DirectAccess deployment that meets the security policy requirement.
Solution: You enable force tunneling. Does this meet the goal?
A. Yes
B. No
Answer: A
Q10. - (Topic 4)
You need to recommend a solution for GPO1.
What is the best approach to achieve the goal? More than one answer choice may achieve the goal. Select the BEST answer.
A. In west.northwindtraders.com, create a copy of GPO1 and link the new GPO to Site2. Apply a WMI filter to the new GPO.
B. In west.northwindtraders.com, create a copy of GPO1 and link the new GPO to west.northwindtraders.com. Configure security filtering on the new GPO.
C. Link GPO1 to west.northwindtraders.com and configure security filtering on GPO1.
D. Link GPO1 to Site2 and apply a WMI filter to GPO1.
Answer: D
Q11. - (Topic 9)
Your network contains an Active Directory domain named contoso.com. The domain contains three VLANs. The VLANs are configured as shown in the following table.
All client computers run either Windows 7 or Windows 8.
The corporate security policy states that all of the client computers must have the latest
security updates installed.
You need to implement a solution to ensure that only the client computers that have all of
the required security updates installed can connect to VLAN 1. The solution must ensure
that all other client computers connect to VLAN 3.
Solution: You implement the VPN enforcement method.
Does this meet the goal?
A. Yes
B. No
Answer: B
Q12. - (Topic 8)
You need to recommend a solution that meets the notification requirements.
Which System Center 2012 components should you include in the recommendation?
A. Service Manager, Orchestrator and App Controller
B. Configuration Manager, Service Manager and Orchestrator
C. App Controller, Configuration Manager and Operations Manager
D. Operations Manager, Service Manager and Orchestrator
Answer: D
Q13. HOTSPOT - (Topic 9)
You run the ldifde command and receive the following output:
The command completes successfully.
Use the drop-down menus to select the answer choice that completes each statement.
Answer:
Q14. HOTSPOT - (Topic 9)
Your network contains an Active Directory forest name fabrikam.com. The forest contains two domains named fabrikam.com and contoso.com. All servers run Windows Server 2012 R2.
The forest contains a DHCP server named Server1 and a DNS server named Server2.
You need to recommend a solution to ensure that any computers that are neither members of contoso.com nor fabrikam.com receive a DNS suffix of guest.fabrikam.com.
What two commands should you run? To answer, select the appropriate options in the answer area.
Answer:
Q15. - (Topic 9)
Your network contains an Active Directory domain named contoso.com. The functional level of the domain and the forest is Windows Server 2008 R2.
All domain controllers run Windows Server 2008 R2.
You plan to deploy a new line-of-business application named App1 that uses claims-based authentication.
You need to recommend changes to the network to ensure that Active Directory can provide claims for App1.
What should you include in the recommendation? (Each correct answer presents part of the solution. Choose all that apply.)
A. From the properties of the computer accounts of the domain controllers, enable Kerberos constrained delegation.
B. From the Default Domain Controllers Policy, enable the Support for Dynamic Access Control and Kerberos armoring setting.
C. Deploy Active Directory Lightweight Directory Services (AD LDS).
D. Raise the domain functional level to Windows Server 2012.
E. Add domain controllers that run Windows Server 2012.
Answer: B,E