You use the Windows PowerShell Desired State Configuration feature to configure
Which of the following actions should you take?
You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named
Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed.
Contoso.com has a server, named ENSUREPASS-SR13, which is configured as the primary DNS server in the
Contoso.com domain. Contoso.com has another server, named ENSUREPASS-SR14, which makes use of
ENSUREPASSSR13 for DNS queries.
You want to make sure that running nslookup.exe from ENSUREPASS-SR14 produces a result that shows the
proper name of the default server.
Which of the following actions should you take?
Which approach should you use?
You are creating virtual machines (VMs) that are hosted on Azure.
You must be able to change the Remote Desktop access settings for the VMs. You must also be able to
change the password for the built-in administrator account on all VMs. You identify the VMAccess VM
extensions that have the required capabilities.
You need to enable the VMAccess VM extensions.
Which approach should you use?
Which of the following actions should you take?
You work as an administrator at ABC.com. The ABC.com network consists of a single domain named
ABC.com. All servers in the ABC.com domain, including domain controllers, have Windows Server 2012 R2
installed.
ABC.com has a domain controller, named ABC-DC01, which contains the ABC.com domain’s primary DNS
zone. ABC.com’s workstations refer to ABC-DC01 as their primary DNS server.You have been instructed to make sure that any DNS requests that are not for the ABC.com domain, is
resolved by ABC-DC01 querying the DNS server of ABC.com’s Internet Service Provider (ISP).
Which of the following actions should you take?
You are creating a set of load-balanced virtual machines…
Which of the following is TRUE with regards to Group Po…
You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain
named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed.
You are running a training exercise for junior administrators. You are currently discussing Group Policy
preference.
Which of the following is TRUE with regards to Group Policy preference?
Which three data analysis tasks should you perform?
A company maintains an Azure storage account. The storage account uses blobs and tables.
Customers access the storage account by using shared access signatures (SASs).
You need to monitor the usage of the storage services. You need to do the following:
Understand which storage areas perform operations that incur an Azure fee.
Understand which requests are denied because of insufficient permissions.
Validate that the performance of the storage account meets the service level agreement (SLA) for the Azure
Storage service.
Which three data analysis tasks should you perform? Each correct answer presents part of the solution.
Which of the following is the rule based on?
You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named
Contoso.com. All servers in the Contoso.com domain, including domain controllers, have Windows Server
2012 R2 installed.
You have been instructed to make sure that Contoso.com users are not able to install a Windows Store
application. You then create a rule for packaged apps.
Which of the following is the rule based on? (Choose all that apply.)
You create the following Windows PowerShell script to create…
HOTSPOT
Your company works with trusted partners. These partners upload files into a storage account that you control.
Partners must be able to create, read, and write files. Partners must NOT be allowed to see files from other
partners. You generate a shared access signature (SAS) for each partner.
You create the following Windows PowerShell script to create a new container for each partner. Line numbers
are included for reference only.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Hot Area:
Which of the following is TRUE with regards to connecti…
You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain
named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed.
You are running a training exercise for junior administrators. You are currently discussing connection security
rules.
Which of the following is TRUE with regards to connection security rules? (Choose all that apply.)