PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which virtual machines can have their volumes protected…

You have a Hyper-V host named Server1 that runs Windows Server 2016.
Server1 hosts the virtual machines configured as shown in the following table.

All the virtual machines have two volumes named C and D.
You plan to implement BitLocker Drive Encryption (BitLocker) on the virtual machines.
Which virtual machines can have their volumes protected by using BitLocker? Choose Two.

How should you configure the group?

You are implementing Privileged Access Management (PAM) for an Active Directory forest named
contoso.com.
You install a bastion forest named adatum.com, and you establish a trust between the forests.
You need to create a group in contoso.com that will be used by Microsoft Identity Manager to create groups in
adatum.com.
How should you configure the group? Choose Two.

You need to configure Server22 as a Host Guardian Servi…

Your network contains an Active Directory forest named contoso.com.
The forest functional level is Windows Server 2012. The forest contains a single domain. The domain contains
multiple Hyper-V hosts.
You plan to deploy guarded hosts.
You deploy a new server named Server22 to a workgroup.
You need to configure Server22 as a Host Guardian Service server.
What should you do before you initialize the Host Guardian Service on Server22?

Which components should you install?

You have 10 Hyper-V hosts that run Windows Server 2016.
Each Hyper-V host has eight virtual machines that run a distributed web application named App1.
You plan to implement a Software Load Balancing (SLB) solution for client access to App1.
You deploy two new virtual machines named SLB1 and SLB2.
You need to install the required components on the Hyper-V hosts and the new servers for the planned
implementation.
Which components should you install? Choose Two.

Does this meet the goal?

Your network contains an Active Directory domain named contoso.com.
The domain contains a computer named Computer1 that runs Windows 10.
Computer1 connects to a home network and a corporate network.
The corporate network uses the 172.16.0.0/24 address space internally.
Computer1 runs an application named App1 that listens to port 8080.
You need to prevent connections to App1 when Computer1 is connected to the home network.
Solution: From Windows Firewall with Advanced Security, you create an inbound rule.
Does this meet the goal?


Page 137 of 6,830« First...102030...135136137138139...150160170...Last »