Which two actions should you perform?
Your network contains a single Active Directory domain. The domain contains five read-only
domain controllers (RODCs) and five writable domain controllers. All servers run Windows
Server 2008. You plan to install a new RODC that runs Windows Server 2008 R2. You need
to ensure that you can add the new RODC to the domain. You want to achieve this goal by
using the minimum amount of administrative effort. Which two actions should you perform?
(Each correct answer presents part of the solution. Choose two.)
You need to create new organizational units in the AD LDS application directory partition
Your company has a server that runs an instance of Active Directory Lightweight Directory
Services (AD LDS). You need to create new organizational units in the AD LDS application
directory partition. What should you do?
Which of the following should you recommend?
You administer laptops that run Windows 8 Enterprise and are members of an Active Directory domain.
Users travel frequently and access domain resources from inside client networks or from their home network.
You want to manage the laptops when they are connected to the company network from the external
networks.
You need to ensure that the laptops can be managed and maintained while users are not logged on to the
computers. Which of the following should you recommend?
Which three actions should you perform in sequence?
DRAG DROP
You support a desktop computer that runs Windows 8 Pro. The computer is joined to an Active Directory
domain.
The computer has a folder named C:\Reports. The folder NTFS permissions are shown in Exhibit 1. (Click the
Exhibit button.)
The folder is shared over the network with Read permission for a domain user account named User1 as shown
in Exhibit 2. (Click the Exhibit button.)
Members of the domain security group named Accountants must have access to the shared folder.
You need to assign the required permissions.
Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list
of actions to the answer area and arrange them in the correct order.)
which group should you add User1?
Your network contains a single Active Directory domain. Active Directory Rights
Management Services (AD RMS) is deployed on the network. A user named User1 is a
member of only the AD RMS Enterprise Administrators group. You need to ensure that
User1 can change the service connection point (SCP) for the AD RMS installation. The
solution must minimize the administrative rights of User1. To which group should you add
User1?
You need to prevent users from impersonating contoso.com users
Your network contains two Active Directory forests named contoso.com and adatum.com.
Active Directory Rights Management Services (AD RMS) is deployed in contoso.com. An
AD RMS trusted user domain (TUD) exists between contoso.com and adatum.com. From
the AD RMS logs, you discover that some clients that have IP addresses in the adatum.com
forest are authenticating as users from contoso.com. You need to prevent users from
impersonating contoso.com users. What should you do?
You need to configure the user’s computer to prevent possible user data loss in the future
You support computers that run Windows 8 and are members of an Active Directory domain. Recently, several
domain user accounts have been configured with super-mandatory user profiles.
A user reports that she has lost all of her personal data after a computer restart.
You need to configure the user’s computer to prevent possible user data loss in the future.
What should you do?
You need to configure AD RMS so that users are able to protect their documents
Your company has an Active Directory Rights Management Services (AD RMS) server.
Users have Windows Vista computers. An Active Directory domain is configured at the
Windows Server 2003 functional level. You need to configure AD RMS so that users are
able to protect their documents. What should you do?
You need to verify that the client laptops and tablets support Virtual Smart Cards
You are an IT consultant for small and mid-sized businesses.
One of your clients wants to start using Virtual Smart Cards on its laptops and tablets, which run Windows 8
Pro. Before implementing any changes, the client wants to ensure that the laptops and tablets support Virtual
Smart Cards.
You need to verify that the client laptops and tablets support Virtual Smart Cards.
What should you do?
What should you allow from Windows Firewall on Server1?
Your network contains a server named Server1 that runs Windows Server 2008 R2. You
plan to deploy DirectAccess on Server1. You need to configure Windows Firewall on
Server1 to support DirectAccess connections. What should you allow from Windows
Firewall on Server1?