Q1. DRAG DROP - (Topic 9)
Your network contains an Active Directory domain named contoso.com. The domain contains five servers. The servers are configured as shown in the following table.
You plan to implement Network Access Protection (NAP) with IPSec enforcement on all client computers.
You need to identify on which servers you must perform the configurations for the NAP deployment.
Which servers should you identify? To answer, drag the appropriate servers to the correct actions. Each server may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
Answer:
Q2. - (Topic 10)
Your network contains an Active Directory domain named contoso.com. The domain contains a Microsoft System Center 2012 infrastructure.
You deploy a service named Service1 by using a service template. Service1 contains two virtual machines. The virtual machines are configured as shown in the following table.
You need to recommend a monitoring solution to ensure that an administrator can review the availability information of Service1.
You need to recommend a monitoring solution to ensure that an administrator can review the availability information of Service1.
Solution: From Configuration Manager, you create a Collection and a Desired Configuration Management baseline.
Does this meet the goal?
A. Yes
B. No
Answer: B
Q3. DRAG DROP - (Topic 9)
Your network contains an Active Directory domain named contoso.com. The domain contains an IP Address Management (IPAM) server.
You plan to delegate the administration of IPAM as shown in the following table.
You need to recommend which IPAM security group must be used for each department. The solution must minimize the number of permissions assigned to each group.
What should you recommend?
To answer, drag the appropriate group to the correct department in the answer area. Each group may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content.
Answer:
Q4. DRAG DROP - (Topic 9)
Your company plans to deploy a remote access solution to meet the following requirements:
. Ensure that client computers that are connected to the Internet can be managed remotely without requiring that the user log on.
. Ensure that client computers that run Windows Vista or earlier can connect remotely.
. Ensure that non-domain-joined computers can connect remotely by using TCP port 443.
You need to identify which remote access solutions meet the requirements.
Which solutions should you identify?
To answer, drag the appropriate solution to the correct requirement in the answer area. Each solution may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content.
Answer:
Q5. - (Topic 3)
You need to recommend a remote access solution that meets the VPN requirements.
Which role service should you include in the recommendation?
A. Routing
B. Network Policy Server
C. DirectAccess and VPN (RAS)
D. Host Credential Authorization Protocol
Answer: B
Explanation:
D:\Documents and Settings\useralbo\Desktop\1.jpg
Updated: March 29, 2012 Applies To: Windows Server 2008 R2, Windows Server 2012 Network Policy Server Network Policy Server (NPS) allows you to create and enforce organization-wide network access policies for client health, connection request authentication, and connection request authorization. In addition, you can use NPS as a Remote Authentication Dial-In User Service (RADIUS) proxy to forward connection requests to a server running NPS or other RADIUS servers that you configure in remote RADIUS server groups. NPS allows you to centrally configure and manage network access authentication, authorization, are client health policies with the following three features: RADIUS server. NPS performs centralized authorization, authorization, and accounting for wireless, authenticating switch, remote access dial-up and virtual private network (VNP) connections. When you use NPS as a RADIUS server, you configure network access servers, such as wireless access points and VPN servers, as RADIUS clients in NPS. You also configure network policies that NPS uses to authorize connection requests, and you can configure RADIUS accounting so that NPS logs accounting information to log files on the local hard disk or in a Microsoft SQL Server database. For more information, see RADIUS Server. http://technet.microsoft.com/en-us/library/cc732912.aspx
Q6. HOTSPOT - (Topic 4)
On Server2, you create a Run As Account named Account1. Account1 is associated to an Active Directory account named VMMIPAM.
You need to implement an IPAM solution.
What should you do? To answer, select the appropriate configuration for each server in the answer area.
Answer:
Q7. DRAG DROP - (Topic 10)
Your network contains multiple servers that run Windows Server 2012.
You plan to implement three virtual disks. The virtual disks will be configured as shown in the following table.
You need to identify the minimum number of physical disks required for each virtual disk.
How many disks should you identify?
To answer, drag the appropriate number of disks to the correct virtual disk in the answer area. Each number of disks may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content.
Answer:
Q8. - (Topic 9)
Your network contains an Active Directory forest named contoso.com. The forest contains five domains. You need to ensure that the CountryCode attribute is replicated to the global catalog.
What should you do?
A. Modify the schema partition.
B. Create and modify an application partition.
C. Modify the configuration partition.
D. Modify the domain partitions.
Answer: A
Q9. - (Topic 6)
You need to recommend changes to the existing environment to meet the email requirement.
What should you recommend?
A. Implement a two-way forest trust that has selective authentication.
B. Implement qualified subordination.
C. Deploy the FabrikamCA root certificate to all of the client computers.
D. Deploy a user certificate from FabrikamCA to all of the users.
Answer: B
Topic 7, Northwind Traders (B)
Overview
Northwind Traders is an IT services and hosting provider.
Northwind Traders has two main data centers in North America. The data centers are located in the same city. The data centers connect to each other by using high-bandwidth, low-latency WAN links. Each data center connects directly to the Internet.
Northwind Traders also has a remote office in Asia that connects to both of the North American data centers by using a WAN link. The Asian office has 30 multipurpose servers.
Each North American data center contains two separate network segments. One network segment is used to host the internal servers of Northwind Traders. The other network segment is used for the hosted customer environments.
Existing Environment
Active Directory
The network contains an Active Directory forest named northwindtraders.com. The forest contains a single domain. All servers run Windows Server 2012 R2.
Server Environment
The network has the following technologies deployed:
Service Provider Foundation
Windows Azure Pack for Windows Server
System Center 2012 R2 Virtual Machine Manager (VMM)
An Active Directory Rights Management Services (AD RMS) cluster
An Active Directory Certificate Services (AD CS) enterprise certification authority (CA)
All newly deployed servers will include the following components:
Dual 10-GbE Remote Direct Memory Access (RDMA)-capable network adapters
Dual 1-GbE network adapters
128 GB of RAM
Requirements
Business Goals
Northwind Traders will provide hosting services to two customers named Customer1 and Customer2. The network of each customer is configured as shown in the following table.
Planned Changes
Northwind Traders plans to implement the following changes:
Deploy System Center 2012 R2 Operations Manager.
Deploy Windows Server 2012 R2 iSCSI and SMB-based storage.
Implement Hyper-V Recovery Manager to protect virtual machines.
Deploy a certificate revocation list (CRL) distribution point (CDP) on the internal network.
For Customer 1, install server authentication certificates issued by the CA of Northwind Traders on the virtual machine in the hosting networks.
General Requirements
Northwind Traders identifies the following requirements:
Storage traffic must use dedicated adapters.
All storage and network traffic must be load balanced.
The amount of network traffic between the internal network and the hosting network must be minimized.
The publication of CRLs to CDPs must be automatic.
Each customer must use dedicated Hyper-V hosts.
Administrative effort must be minimized, whenever possible.
All servers and networks must be monitored by using Operations Manager.
Anonymous access to internal file shares from the hosting network must be prohibited.
All Hyper-V hosts must use Cluster Shared Volume (CSV) shared storage to host virtual machines.
All Hyper-V storage and network traffic must remain available if single network adapter fails.
The Hyper-V hosts connected to the SMB-based storage must be able to make use of the RDMA technology.
The number of servers and ports in the hosting environment to which the customer
has access must be minimized.
Customer1 Requirements
Northwind Traders identifies the following requirements for Customer1:
. Customer1 must use SMB-based storage exclusively.
. Customer1 must use App Controller to manage hosted virtual machines.
. The virtual machines of Customer1 must be recoverable if a single data center fails.
. Customer1 must be able to delegate self-service roles in its hosted environment to its users.
. Customer1 must be able to check for the revocation of certificates issued by the CA of Northwind Traders.
. The users of Customer1 must be able to obtain use licenses for documents protected by the AD RMS of Northwind Traders.
. Certificates issued to the virtual machines of Customer1 that reside on the hosted networks must be renewed automatically.
Customer2 Requirements
Northwind Traders identifies the following requirements for Customer2:
. Customer2 must use iSCSI-based storage exclusively.
. All of the virtual machines of Customer2 must be migrated by using a SAN transfer.
. None of the metadata from the virtual machines of Customer2 must be stored in Windows Azure.
. The network configuration of the Hyper-V hosts for Customer2 must be controlled by using logical switches.
. The only VMM network port profiles and classifications allowed by Customer2 must be low-bandwidth, medium-bandwidth, or high-bandwidth.
. The users at Northwind Traders must be able to obtain use licenses for documents protected by the AD RMS cluster of Customer2. Customer2 plans to decommission its AD RMS cluster during the next year.
Q10. - (Topic 9)
Your company has a main office and four branch offices. The main office is located in London.
The network contains an Active Directory domain named contoso.com. The network is configured as shown in the exhibit. (Click the Exhibit button.)
Each office contains several servers that run Windows Server 2012.
In each branch office, you plan to deploy an additional 20 servers that will run Windows Server 2012. Some of the servers will have a Server Core installation of Windows Server 2012.
You identify the following requirements for the deployment of the new servers:
Operating system images must be administered centrally.
The operating system images must be deployed by using PXE.
The WAN traffic caused by the deployment of each operating system must be
minimized.
You need to recommend a solution for the deployment of the new servers.
What should you recommend?
Exhibits
A. Deploy Windows Deployment Services (WDS) in each office. Replicate the images by using Distributed File System (DFS) Replication,
B. Deploy Windows Deployment Services (WDS) in the main office only. Replicate the images by using Distributed File System (DFS) Replication.
C. Deploy Windows Deployment Services (WDS) in each office. Copy the images by using BranchCache.
D. Deploy Windows Deployment Services (WDS) in the main office only. Copy the images by using BranchCache.
Answer: A
Q11. - (Topic 10)
Your network contains 20 servers that run Windows Server 2012. The servers have the Hyper-V server role installed.
You plan to deploy a management solution.
You need to recommend which Microsoft System Center 2012 roles must be deployed to meet the following requirements:
. An administrator must be notified when an incident occurs, such as a serious error in the event log, on a Hyper-V host, or on a virtual machine.
. An administrator must be able to assign an incident to a specific administrator for resolution.
. An incident that remains unresolved for more than 10 hours must be escalated automatically to another administrator.
. Administrators must be able to generate reports that contain the details of incidents and escalations.
Which System Center 2012 roles should you recommend?
More than one answer choice may achieve the goal. Select the BEST answer.
A. Operations Manager and Orchestrator
B. Operations Manager and Service Manager
C. Configuration Manager and Service Manager
D. Service Manager and Virtual Machine Manager (VMM)
Answer: B
Q12. DRAG DROP - (Topic 10)
You have a failover cluster named Cluster1 that contains four Hyper-V hosts. Cluster1 hosts 20 virtual machines.
You deploy a new failover cluster named Cluster2.
You plan to replicate the virtual machines from Cluster1 to Cluster2.
You need to recommend which actions must be performed on Cluster2 for the planned deployment.
Which three actions should you recommend?
To answer, move the three appropriate actions from the list of actions to the answer area
and arrange them in the correct order.
Answer:
Q13. DRAG DROP - (Topic 7)
You need to prepare the required Hyper-V virtual network components for Customer2.
Which four objects should you create and configure in sequence? To answer, move the appropriate objects from the list of objects to the answer area and arrange them in the correct order.
Answer:
Q14. - (Topic 10)
Your company has a human resources department and a finance department.
You are planning an administrative model for both departments to meet the following requirements:
. Provide human resources managers with the ability to view the audit logs for the files of their department.
. Ensure that only domain administrators can view the audit logs for the files of the finance department.
You need to recommend a solution for the deployment of file servers for both departments.
What should you recommend?
More than one answer choice may achieve the goal. Select the BEST answer.
A. Deploy one file server. Add the human resources managers to the local Administrators group.
B. Deploy one file server. Add the human resources managers to the local Event Log Readers group.
C. Deploy two file servers. Add the human resources managers to the local Administrators group on one of the servers.
D. Deploy two file servers. Add the human resources managers to the local Event Log Readers group on one of the servers.
Answer: D
Q15. - (Topic 9)
You plan to deploy multiple servers in a test environment by using Windows Deployment Services (WDS).
You need to identify which network services must be available in the test environment to deploy the servers.
Which network services should you identify? (Each correct answer presents part of the solution. Choose all that apply.)
A. Active Directory Domain Services (AD DS)
B. DNS
C. DHCP
D. WINS
E. Active Directory Lightweight Directory Services (AD LDS)
F. Network Policy Server (NPS)
Answer: B,C
Explanation: http://technet.microsoft.com/en-us/library/hh831764.aspx