Which of the following is the MOST significant risk to …
Which of the following is the MOST significant risk to business continuity when using an external cloud service
provider?
Which tool should you use?
Your network contains one Active Directory domain named contoso.com. The domain contains 10 domain
controllers and a read-only domain controller (RODC) named RODC01.
You have a domain controller named DC5 that has the Server Graphical Shell disabled.
You create an organizational unit (OU) named OU1.
From DC5, you need to create 50 new user accounts in OU1.
Which tool should you use?
which of the following?
When using SaaS, the cloud computing vendor is responsible to maintain which of the following?
Which tool should you use?
Your network contains one Active Directory domain named contoso.com. The domain contains 10 domain
controllers and a read-only domain controller (RODC) named RODC01.
You plan to deploy a child domain for contoso.com in Microsoft Azure.
To the Azure subscription, you add several virtual machines that have a Server Core installation of Windows
Server 2012 R2.
You need to create the new domain on one of the virtual machines.
Which tool should you use?
Which of the following are the common elements of platf…
Which of the following are the common elements of platform as a service and software as a service? (Select
two.)
What command should you run?
Your network contains one Active Directory forest named contoso.com. The forest contains a single domain. All
domain controllers run Windows Server 2012 R2.
You need to modify the membership of a group named Group1 to include two users named User1 and User2.
What command should you run? To answer, select the appropriate options in the answer area.
Select three.
Which of the following enables hardware independence?
Which of the following enables hardware independence?
Which two pieces of information should you identify?
You have a server named Server1 that runs Windows Server 2012 R2.
You configure IPSec rules for connections to Server1.
On Server1, you plan to create an inbound firewall rule that contains the following settings:
Allows inbound connections to an application named App1.exe
Applies to the domain profile
Overrides any block rules
You need to identify the minimum information required to create the rule.
Which two pieces of information should you identify? Each correct answer presents part of the solution.
which of the following?
A company wants to implement an internal virtualized infrastructure to provide its employees with on demand
storage which will be the accessible through a web interface over the public Internet. This is an example of
which of the following?
What should you configure?
You have a Hyper-V host named Hyper1 that runs Windows Server 2012 R2.Hyper1 hosts several virtual machines that run Windows 8.1.
Several developers connect to the virtual machines by using the Virtual Machine Connection tool.
You need to ensure that the devlopers can print to their local printers from within virtual machine sessions.
What should you configure?