What should you configure?
Your network contains an Active Directory domain named contoso.com. The domain contains two
member servers named Server1 and Server2. All servers run Windows Server 2012 R2.
Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as
nodes in a failover cluster named Cluster1.
You add two additional nodes in Cluster1.
You have a folder named Folder1 on Server1 that hosts Application data. Folder1 is a folder target in
a Distributed File System (DFS) namespace.
You need to provide highly available access to Folder1. The solution must support DFS Replication to
Folder1.
What should you configure?
What should you configure?
Your network contains an Active Directory domain named contoso.com. The domain contains two
member servers named Server1 and Server2. All servers run Windows Server 2012 R2.
Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as
nodes in a failover cluster named Cluster1.
You add two additional nodes in Cluster1.
You have a folder named Folder1 on Server1 that hosts Application data. Folder1 is a folder target in
a Distributed File System (DFS) namespace.
You need to provide highly available access to Folder1. The solution must support DFS Replication to
Folder1.
What should you configure?
Which two tools should you use?
Your network contains an Active Directory domain named contoso.com. The domain contains three
servers named Server1, Server2, and Server3 that run Windows Server 2012 R2. All three servers
have the Hyper-V server role installed and the Failover Clustering feature installed.
Server1 and Server2 are nodes in a failover cluster named Cluster1. Several highly available virtual
machines run on Cluster1. Cluster1 has the Hyper-V Replica Broker role installed. The Hyper-V
Replica Broker currently runs on Server1.
Server3 currently has no virtual machines.
You need to configure Cluster1 to be a replica server for Server3 and Server3 to be a replica server
for Cluster1.
Which two tools should you use? (Each correct answer presents part of the solution. Choose two.)
You need to start the operating system on Server1 as soon as possible
You have a server named Server1 that runs Windows Server 2012 R2.
Server1 has a single volume that is encrypted by using BitLocker Drive Encryption (BitLocker).
BitLocker is configured to save encryption keys to a TrustedPlatform Module (TPM). Server1 is
configured to perform a daily system image backup.
The motherboard on Server1 is upgraded.
After the upgrade, Windows Server 2012 R2 on Server1 fails to start.
You need to start the operating system on Server1 as soon as possible.
What should you do?
What should you do?
Yournetwork contains two servers that run Windows Server 2012 R2 named Server1 and Server2.
Both servers have the File Server role service installed.
On Server2, you create a share named Backups.
From Windows Server Backup on Server1, you schedule a full backup to run every night. Youset the
backup destination to \\Server2 \Backups.
After several weeks, you discover that \\Server2\Backups only contains the last backup that
completed on Server1.
Youneed to ensure that multiple backups of Server1 are maintained.
What should you do?
You need to verify whether the replica of VM5 on Server1 is functional
Yournetwork contains two servers named Server1 and Server2 that run Windows Server 2012 R2.
Server1 and Server2 have the Hyper-V server role installed. Server1 and Server2 are configured as
Hyper-V replicas of each other.
Server2 hosts a virtual machine named VM5. VM5 is replicated to Server1.
You need to verify whether the replica of VM5 on Server1 is functional. The solution must ensure
that VM5 remains accessible to clients.
What should you do from Hyper-V Manager?
Which common name should you use for the certificates on each server?
HOTSPOT
Yournetwork contains an Active Directory domain named contoso.com. The domain contains two
servers named Server1 and Server2 that run Windows Server 2012 R2. The servers have the HyperV server role installed.
A certification authority (CA) is available on the network.
A virtual machine named vml.contoso.com is replicated from Server1 to Server2. A virtual machine
named vm2.contoso.com is replicated from Server2 to Server1.
You need to configure Hyper-V to encrypt the replication of the virtual machines.
Which common name should you use for the certificates on each server?
To answer, configure the appropriate common name for the certificate on each server in the answer
area.
You need to ensure that you can manage the certificates on the C
Your network contains an Active Directory domain named contoso.com. The domain contains a
server named Server1 that runs Windows Server 2012 R2. Server1 is an enterprise root certification
authority (CA) for contoso.com.
Your user account is assigned the certificate manager role and the auditor role on the contoso.com
CA. Your account is a member of the local Administrators group on Server1.
You enable CA role separation on Server1.
You need to ensure that you can manage the certificates on the CA.
What should you do?
How should you configure the certificate request?
DRAG DROP
Your network contains an Active Directory domain named contoso.com. The domain contains a
server named Server1 that runs Windows Server 2012 R2.
You plan to install the Active Directory Federation Services server role on Server1 to allow for
Workplace Join.
You run nslookup enterprise registration and you receive the following results:
You need to create a certificate request for Server1 to support the Active Directory Federation
Services (AD FS) installation.
How should you configure the certificate request?
To answer, drag the appropriate names to the correct locations. Each name may be used once, more
than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
Which two actions should you perform?
Yournetwork contains an Active Directory domain named contoso.com. The domain contains
servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 has the Active
Directory Federation Services server role installed. Server2 is a file server.
Yourcompany introduces a Bring YourOwn Device (BYOD) policy.
Youneed to ensure that users can use a personal device to access domain resources by using Single
Sign-On (SSO) while they are connected to the internal network.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose
two.)