PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which tool should you use?

Your network contains an Active Directory domain named contoso.com. All servers run Windows
Server 2012 R2.
The domain contains a domain controller named DC1 that is configured as an enterprise root
certification authority (CA).
All users in the domain are issued a smart card and are required to log on to their domain-joined
client computer by using their smart card.
A user named User1 resigned and started to work for a competing company.
You need to prevent User1 immediately from logging on to any computer in the domain. The
solution must not prevent other users from logging on to the domain.
Which tool should you use?

which method should you move VM1?

You have a datacenter that contains six servers. Each server has the Hyper-V server role installed
and runs Windows Server 2012 R2. The servers are configured as shown in the following table.

Host4 and Host5 are part of a cluster named Cluster1. Cluster1 hosts a virtual machine named VM1.
You need to move VM1 to another Hyper-V host. The solution must minimize the downtime of
VM1.
To which server and by which method should you move VM1?

Which rule types should you configure on each side of the federated trust?

DRAG DROP
Yournetwork contains two Active Directory forests named contoso.com and adatum.com. All
domain controllers run Windows Server 2012 R2.
A federated trust exists between adatum.com and contoso.com. The trust provides adatum.com
users with access to contoso.com resources.
Youneed to configure Active Directory Federation Services (AD FS) claim rules for the federated
trust.
The solution must meet the following requirements:
 In contoso.com, replace an incoming claim type named Group with an outgoing claim type
named Role.
 In adatum.com, allow users to receive their tokens for the relying party by using their Active
Directory group membership as the claim type.
The AD FS claim rules must use predefined templates.
Which rule types should you configure on each side of the federated trust?
To answer, drag the appropriate rule types to the correct location or locations. Each rule type may
be used once, more than once, or not at all. You may need to drag the split bar between panes or
scroll to view content.

Which cmdlet should you run?

Yournetwork contains an Active Directory domain named contoso.com. The domain contains two
member servers named Server1 and Server2. All servers run Windows Server 2012 R2.
Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as
nodes in a failover cluster named Cluster1. Cluster1 contains a Clustered Shared Volume (CSV).
A developer creates an application named App1. App1 is NOT a cluster-aware application. App1
stores data in the file system.
Youneed to ensure that App1 runs in Cluster1. The solution must minimize development effort.
Which cmdlet should you run?

Which three actions should you perform in sequence?

DRAG DROP
You have two failover clusters named Cluster1 and Cluster2. All of the nodes in both of the clusters
run Windows Server 2012 R2.
Cluster1 hosts two virtual machines named VM1 and VM2.
You plan to configure VM1 and VM2 as nodes in a new failover cluster named Cluster3.
You need to configure the witness disk for Cluster3 to be hosted on Cluster2.
Which three actions should you perform in sequence?
To answer, move the appropriate three actions from the list of actions to the answer area and
arrange them in the correct order.

What command should you run?

HOTSPOT
Yournetwork contains two Web servers named Server1 and Server2. Both servers run Windows
Server 2012 R2.
Server1 and Server2 are nodes in a Network Load Balancing (NLB) cluster.The NLB cluster contains
an application named App1 that is accessed by using the URL http://app1.contoso.com.
Youdeploy a new server named Server3 that runs Windows Server 2012 R2. The contoso.com DNS
zone contains the records shown in the following table.

Youneed to add Server3 to the NLB cluster.
What command should you run?
To answer, select the appropriate options in the answer area.

What should you configure?

Yournetwork contains an Active Directory domain named contoso.com. The domain contains two
member servers named Server1 and Server2. All servers run Windows Server 2012 R2.
Server1 and Server2 have the Network Load Balancing (NLB) feature installed. The servers are
configured as nodes in an NLB cluster named Cluster1.
Port rules are configured for all clustered Applications.
You need to ensure that Server2 handles all client requests to the cluster that are NOT covered by a
port rule.
What should you configure?

What should you run from Windows PowerShell?

DRAG DROP
Yournetwork contains an Active Directory domain named contoso.com. The domain contains four
member servers named Server1, Server2, Server3, and Server4. All servers run Windows Server
2012 R2.
Server1 and Server3 are located in a site named Site1. Server2 and Server4 are located in a site
named Site2. The servers are configured as nodes in a failover cluster named Cluster1.
Dynamic quorum management is disabled.
Cluster1 is configured to use the Node Majority quorum configuration.
Youneed to ensure that users in Site2 can access Cluster1 if the network connection between the
two sites becomes unavailable.
What should you run from Windows PowerShell?
Toanswer, drag the appropriate commands to the correct location. Each command may be used
once, more than once, or not at all. Youmay need to drag the split bar between panes or scroll to
view content.

What should you configure?

Your network contains an Active Directory domain named contoso.com. The domain contains two
member servers named Server1 and Server2. All servers run Windows Server 2012 R2.
Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as
nodes in a failover cluster named Cluster1.
Cluster1 hosts an Application named App1.
Youneed to ensure that Server2 handles all of the client requests to the cluster for App1. The
solution must ensure that if Server2 fails, Server1 becomes the active node for App1.
What should you configure?

What should you configure?

Yournetwork contains an Active Directory domain named contoso.com. The domain contains two
member servers named Server1 and Server2. All servers run Windows Server 2012 R2.
Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as
nodes in a failover cluster named Cluster1.
You add two additional nodes to Cluster1.
You have a folder named Folder1 on Server1 that contains Application data.
You plan to provide continuously available access to Folder1.
You need to ensure that all of the nodes in Cluster1 can actively respond to the client requests for
Folder1.
What should you configure?