PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

What should you recommend?

Your network consists of one Active Directory domain. All servers run Windows Server 2008 R2.
You plan to publish a Web site on two Web servers. You need to recommend a solution for the
deployment of the two Web servers. The solution must provide the following requirements:
• Session-state information for all users
• Access to the Web site if a single server fails
• Scalability to as many as seven Web servers
• Support for multiple dedicated IP addresses for each Web server
What should you recommend?

You need to configure WSRM to enforce Policy1

You manage a member server that runs Windows Server 2008 R2. The server has the Remote
Desktop Services server role installed. Windows System Resource Manager (WSRM) is installed on
the server. Users report performance degradation on the Remote Desktop Session Host Server. You
monitor the server and notice that one user is consuming 100 percent of the processor time. You
create a resource-allocation policy named Policy1 that limits each user to 30 percent of the total
processor time. You observe no performance improvement. You need to configure WSRM to enforce
Policy1. What should you do?

You need to force registration of the KMS service locator records in the contoso.com zone

Your company has a single Active Directory domain named contoso.com. All servers in the domain
run Windows Server 2008. The DNS service is installed on two domain controllers named DC1 and
DC2. Both DNS servers host Active Directory integrated zones that are configured to allow the most
secure updates only. DC1 has Key Management Service (KMS) installed and activated. You discover
that the service locator records from the contoso.com zone hosted on DC1 and DC2 are missing. You
need to force registration of the KMS service locator records in the contoso.com zone. What should
you do?

What should you include in your plan?

Your Company has one main office and one branch office. An Active Directory site exists for each
office. The offices are connected across a wide area network (WAN) link. Servers in both offices run
Windows Server 2008 R2. You need to plan a failover clustering solution for servers that run
Microsoft SQL Server 2008. The solution must meet the following requirements:
Withstand the failure of any single cluster node.
Minimize the number of servers required to implement failover clustering.
What should you include in your plan?

What should you include in your design?

Your network consists of one Active Directory domain that contains domain controllers that run
Windows Server 2008. The intranet site contains confidential documents. You need to design an
identity and access management policy for the documents to meet the following requirements:
Record each time a document is accessed.
Protect confidential documents on the intranet site.
Place a time limit on access to documents, including documents sent outside the organization.
What should you include in your design?

You need to ensure that the users can launch TimeReport on Server1 from the Terminal Services Web Access Web p

Your company has an Active Directory domain. The company has a server named Server1 that has
the Terminal Services role and the Terminal Services Web Access role installed. All client computers
run Windows XP Service Pack 2 (SP2). You deploy and publish an application named TimeReport on
Server1. The Terminal Services Web Access role uses Active Directory Domain Services (AD DS) and
Network Level Authentication is enabled. You need to ensure that the users can launch TimeReport
on Server1 from the Terminal Services Web Access Web page. What should you do?

You need to prepare the environment so that users from contoso.com can protect confidential files from being c

Your company named Contoso, Ltd. and another company named Fabrikam, Inc. establish a
partnership. The Contoso network consists of one Active Directory forest named contoso.com. The
Fabrikam network consists of one Active Directory forest named fabrikam.com. Users from
contoso.com plan to share files with users from fabrikam.com. You need to prepare the
environment so that users from contoso.com can protect confidential files from being copied or
forwarded to unauthorized users. What should you do?

You need to configure the WSRM settings on all the servers to match the WSRM settings on TS01

You manage 20 servers that run Windows Server 2008 R2. The Remote Desktop Services server role
and the Windows System Resource Manager (WSRM) feature are installed on all the servers. You
create and configure a resource-allocation policy that has the required custom settings on a server
named TS01. You need to configure the WSRM settings on all the servers to match the WSRM
settings on TS01. What should you do?