PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

What should you create?

Your network contains an Active Directory forest. The forest contains two domains named
contoso.com and fabrikam.com. The functional level of the forest is Windows Server 2003.
You have a domain outside the forest named adatum.com.
You need to configure an access solution to meet the following requirements:
* Users in adatum.com must be able to access resources in contoso.com.
* Users in adatum.com must be prevented from accessing resources in fabrikam.com.
* Users in both contoso.com and fabrikam.com must be prevented from accessing resources in
adatum.com.
What should you create?

Which two actions should you perform?

Your network contains an Active Directory forest named contoso.com. The forest contains two
domains named contoso.com and childl.contoso.com. The domains contain three domain
controllers. The domain controllers are configured as shown in the following table.

You need to ensure that the KDC support for claims, compound authentication, and kerberos
armoring setting is enforced in both domains.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose
two.)

What should you do?

Your network contains an Active Directory forest named contoso.com. The forest contains a single
domain. The forest contains three Active Directory sites named SiteA, SiteB, and SiteC. The sites
contain four domain controllers. The domain controllers are configured as shown in the following
table.

An IP site link exits between each site.
Youdiscover that the users in SiteC are authenticated by the domain controllers in SiteA and SiteB.
Youneed to ensure that the SiteC users are authenticated by the domain controllers in SiteB, unless
all of the domain controllers in SiteB are unavailable.
What should you do?

What should you do first?

Yournetwork contains an Active Directory forest. The forest contains one domain named
adatum.com. The domain contains three domain controllers. The domain controllers are configured
as shown in the following table.

DC2 has all of the domain-wide operations master roles. DC3 has all of the forest-wide operation
master roles.
Youneed to ensure that you can use Password Settings objects (PSOs) in the domain.
What should you do first?