PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

You need to prevent the problem from reoccurring if the WAN link fails

Your network contains an Active Directory domain. The domain contains two sites named
Site1 and Site2. Site1 contains four domain controllers. Site2 contains a read-only domain
controller (RODC). You add a user named User1 to the Allowed RODC Password
Replication Group. The WAN link between Site1 and Site2 fails. User1 restarts his computer
and reports that he is unable to log on to the domain. The WAN link is restored and User1
reports that he is able to log on to the domain. You need to prevent the problem from
reoccurring if the WAN link fails. What should you do?

What should you create on Server1?

Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1. The Active Directory Federation Services (AD FS) role is
installed on Server1. Contoso.com is defined as an account store. A partner company has a
Web-based application that uses AD FS authentication. The partner company plans to
provide users from contoso.com access to the Web application. You need to configure AD
FS on contoso.com to allow contoso.com users to be authenticated by the partner

company. What should you create on Server1?

Which two actions should you perform?

You are the network administrator for Contoso.com and are creating an image for a Windows 8.1
implementation for all of your users.

You find out that an application your company has used for many years is not compatible with Windows 8.1. It
has always worked on your Vista computers with SP2. The application requires administrator privileges.
You need to configure the correct settings so that the application can run on Windows 8.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

You need to prevent users from impersonating contoso.com users

Your network contains two Active Directory forests named contoso.com and adatum.com.
Active Directory Rights Management Services (AD RMS) is deployed in contoso.com. An
AD RMS trusted user domain (TUD) exists between contoso.com and adatum.com. From
the AD RMS logs, you discover that some clients that have IP addresses in the adatum.com
forest are authenticating as users from contoso.com. You need to prevent users from
impersonating contoso.com users. What should you do?

Which four actions should you perform in sequence?

DRAG DROP
You are on a company’s desktop support team.
You receive a call from an employee. The employee is having problems installing an old printer on a Windows
8.1 Pro computer. The employee asks you to look at the driver that is installed and assess if it is the correct
one.
You need to open the device manager remotely.
Which four actions should you perform in sequence? (To answer, move the appropriate four actions from the
list of actions to the answer area and arrange them in the correct order.)

You need to prevent Admin1s password from being cached on DC2

Your company has a main office and a branch office. The network contains an Active
Directory domain. The main office contains a writable domain controller named DC1. The
branch office contains a read-only domain controller (RODC) named DC2. You discover that
the password of an administrator named Admin1 is cached on DC2. You need to prevent
Admin1s password from being cached on DC2. What should you do?