PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

You need to ensure that you can clone DC6

Your network contains an Active Directory domain named contoso.com. The domain contains six
domain controllers. The domain controllers are configured as shown in the following table.

The network contains a server named Server1 that has the Hyper-V server role installed. DC6 is a
virtual machine that is hosted on Server1.
You need to ensure that you can clone DC6.
What should you do?

Which tool should you use before you start the DFS Replication service on DC10?

Your company deploys a new Active Directory forest named contoso.com. The first domain
controller in the forest runs Windows Server 2012 R2. The forest contains a domain controller
named DC10.
On DC10, the disk that contains the SYSVOL folder fails.
You replace the failed disk. You stop the Distributed File System (DFS) Replication service. You
restore the SYSVOL folder.
You need to perform a non-authoritative synchronization of SYSVOL on DC10.
Which tool should you use before you start the DFS Replication service on DC10?

You need to ensure that members of G_HelpDesk can perform the following tasks: Reset the passwords of the sale

Your network contains an Active Directory domain named contoso.com. The domain contains an
organizational unit (OU) named IT and an OU named Sales.
All of the help desk user accounts are located in the IT OU. All of the sales user accounts are located
in the Sales OU. The Sales OU contains a global security group named G_Sales. The IT OU contains a
global security group named G_HelpDesk.
You need to ensure that members of G_HelpDesk can perform the following tasks:
Reset the passwords of the sales users.
Force the sales users to change their password at their next logon.
What should you do?

You need to prepare a domain controller for cloning

Your network contains an Active Directory domain named contoso.com. All domain controllers run
Windows Server 2012 R2.
On all of the domain controllers, Windows is installed in C:\Windows and the Active Directory
database is located in D:\Windows\NTDS\.
All of the domain controllers have a third-party application installed.
The operating system fails to recognize that the application is compatible with domain controller
cloning.
You verify with the application vendor that the application supports domain controller cloning.
You need to prepare a domain controller for cloning.
What should you do?

You need to ensure that you can view the Delegation tab from the properties of the User1 account

Your network contains an Active Directory domain named contoso.com.
You create a user account named User1. The properties of User1 are shown in the exhibit. (Click the
Exhibit button.)

You plan to use the User1 account as a service account. The service will forward authentication
requests to other servers.
You need to ensure that you can view the Delegation tab from the properties of the User1 account.
What should you do first?

Which naming context should you use?

HOTSPOT
Your network contains an Active Directory forest named contoso.com. The forest contains a single
domain. All domain controllers run Windows Server 2012 R2 and are configured as DNS servers. All
DNS zones are Active Directory-integrated. Active Directory Recycle Bin is enabled.
You need to modify the amount of time deleted objects are retained in the Active Directory Recycle
Bin.
Which naming context should you use? To answer, select the appropriate naming context in the
answer area.

You need to delegate the rights to apply PSO1 to the Active Directory objects in an organizational unit named

Your network contains an Active Directory forest named contoso.com. The forest functional level is
Windows Server 2012 R2. The forest contains a single domain.
You create a Password Settings object (PSO) named PSO1.
You need to delegate the rights to apply PSO1 to the Active Directory objects in an organizational
unit named OU1.
What should you do?

Which three actions should you perform?

Your network contains an Active Directory domain named contoso.com. All servers run Windows
Server 2012 R2. The domain contains two servers. The servers are configured as shown in the
following table.

All client computers run Windows 8 Enterprise.
You plan to deploy Network Access Protection (NAP) by using IPSec enforcement.
A Group Policy object (GPO) named GPO1 is configured to deploy a trusted server group to all of the
client computers.
You need to ensure that the client computers can discover HRA servers automatically.
Which three actions should you perform? (Each correct answer presents part of the solution. Choose
three.)

Which two nodes should you configure from the Network Policy Server console?

HOTSPOT

Your network contains an Active Directory domain named contoso.com. The domain contains a
server named Server1 that has the Network Policy Server server role installed. The domain contains
a server named Server2 that is configured for RADIUS accounting.
Server1 is configured as a VPN server and is configured to forward authentication requests to
Server2.
You need to ensure that only Server2 contains event information about authentication requests
from connections to Server1.
Which two nodes should you configure from the Network Policy Server console?
To answer, select the appropriate two nodes in the answer area.