What should you do?
Your company has an Active Directory domain.
A server named Server1 runs Windows Server 2008 R2.
The Remote Desktop Services server role and the RD Web Access role service are installed on Server1.
You install the RD Gateway role service on Server1.
You create the Remote Desktop connection authorization policy.
Users report that they cannot connect to Server1.
You need to ensure that users can connect to Server1.
What should you do?
What should you do?
Your company has an Active Directory domain.
The company has a server named Server1 that has the Remote Desktop Services server role and the RD Web Access role service installed.
The company has a server named Server2 that runs ISA Server 2006.
The company deploys the Remote Desktop Gateway (RD Gateway) role on a new server named Server3.
The company wants to use ISA as the SSL endpoint for Remote Desktop connections.
You need to configure the RD Gateway role on Server3 to use ISA 2006 on Server2.
What should you do?
What should you do?
You have a server that runs the Remote Desktop Gateway (RD Gateway) role service.
Users need to connect remotely through the gateway to desktop computers located in their offices.
You create a security group named Remote1 for the users who need to connect to computers in their offices.
You need to enable the users to connect to the RD Gateway.
What should you do?
What should you do?
You have a server that runs Windows Server 2008 R2.
The server has Remote Desktop Web Access (RD Web Access) installed.
Several line-of-business applications are available on the server by using RD Web Access.
You install a new application on the server.
You need to make the application available through RD Web Access.
What should you do?
What should you do?
A server named Server2 runs Windows Server 2008 R2.
The Remote Desktop Services server role is installed on Server2.
You plan to deploy an application on Server2.
The application vendor confirms that the application can be deployed in a Remote Desktop Services environment.
The application does not use Microsoft Windows Installer packages for installation.
The application makes changes to the current user registry during installation.
You need to install the application to support multiple user sessions.
What should you do?
What should you do?
Your company has a single Active Directory domain.
All servers run Windows Server 2008 R2.
You install an iSCSI storage area network (SAN) for a group of file servers.
Corporate security policy requires that all data communication to and from the iSCSI SAN must be as secure as possible.
You need to implement the highest security available for communications to and from the iSCSI SAN.
What should you do?
What should you do?
You have two servers named FC1 and FC2 that run Windows Server 2008 R2 Enterprise.
Both servers have the Failover Clustering feature installed.
You configure the servers as a two-node cluster.
The cluster runs an application named APP1.
Business hours for your company are 09:00 to 17:00. APP1 must be available during these hours.
You configure FC1 as the preferred owner for APP1.
You need to prevent failback of the cluster during business hours.
What should you do?
Which two actions should you perform?
You have two servers that run Windows Server 2008 R2 Enterprise.
Both servers have the Failover Clustering feature installed.
You configure the servers as a two-node cluster.
The cluster nodes are named NODE1 and NODE2.
You have an application named PrintService that includes a print spooler resource.
You need to configure the cluster to automatically return the PrintService application to NODE1 after a failover.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
What should you do?
You have a server that runs Windows Server 2008 R2. The server has the Hyper-V server role installed.
You create a new virtual machine and perform an installation of Windows Server 2003 on the virtual machine.
You configure the virtual machine to use the physical network card of the host server.
You notice that you are unable to access network resources from the virtual machine.
You need to ensure that the virtual host can connect to the physical network.
What should you do?
Which two actions should you perform?
Your company has a single Active Directory domain named contoso.com. The domain has two domain controllers and 60 member servers.
All servers run Windows Server 2008 R2.
One of the domain controllers has Key Management Service (KMS) installed and activated.
All servers use KMS auto-discovery to find the KMS server.
You need to change the port used by KMS from its default port to port 12200.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)