PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

You need to give users Web access to the content in Share1

Your network contains two servers named Server1 and Server2 that run Windows Server 2008 R2.
Server1 has the Web Server (IIS) role installed. Server2 has the File Services role installed. Server1
has a Web site named Web1. Server2 has a shared folder named Share1. You need to give users
Web access to the content in Share1. What should you do on Server1?

What should you recommend?

All servers in an Active Directory Domain Services (AD DS) domain run Windows Server 2008 R2. All
Remote Desktop Services (RDS) servers are in an organizational unit (OU) named RDS Servers. All
computer security policy settings are configured in a Group Policy object (GPO) named Security
Policy. The Security Policy GPO is linked to the domain. A new GPO named RDS Security is linked to
the RDS Servers OU. You need to ensure that domain-linked GPOs are not applied to the RDS Servers
OU. What should you recommend? (More than one answer choice may achieve the goal. Select the
BEST answer.)

Which addresses should you assign?

DRAG DROP
An existing network is IPv6-enabled on all network segments. You deploy a server to an IPv6-only
network segment. The following IPv6 addresses are assigned to the local interface of the network
router:
• ::1
• FE80::l
• FEC0::1
• 2001:777:ld:ldc::l
You need to ensure that the server has the correct static address information and access to the
Internet. Which addresses should you assign?
To answer, drag the appropriate address or addresses to the correct location or locations in the
answer area. (Use only addresses that apply.)

What should you recommend?

Trey Research is merging with Proseware, Inc. Trey Research has an Active Directory Domain
Services (AD DS) domain named treyresearch.net with domain controllers named DC01, DC02, and
DC03. Proseware has an AD DS domain named proseware.com. All domain controllers run Windows
Server 2008 R2 and the DNS server role. When creating a forest trust from dc01.treyresearch.net,
the New Trust Wizard displays the following error message:
The New Trust Wizard cannot continue because the specified domain cannot be contacted. Either
the domain does not exist, or network or other problems are preventing connection.
You need to ensure that the forest trust can be created.
What should you recommend? (More than one answer choice may achieve the goal. Select the BEST
answer.)

What should you configure?

Your network contains an FTP server that runs Windows Server 2008 R2. You need to configure SSL
security for the FTP connections. The solution must meet the following requirements:
• All user names and passwords must be encrypted.
• The anonymous user identity must be allowed to establish a connection without requiring
encryption. What should you configure?

You need to configure Server1 to meet the following requirements: Relay email messages for contoso.com

Your network contains a server named Server1 that runs Windows Server 2008 R2. Server1 has the
SMTP Server feature installed and has one SMTP Virtual Server named SMTP1. You need to
configure Server1 to meet the following requirements: Relay email messages for contoso.com. Relay
email messages for nwtraders.com. Prevent the relaying of email messages to other domains. What
should you do?

What should you recommend next?

A company has a main office and multiple branch offices. The corporate network contains an Active
Directory Domain Services (AD DS) domain and servers that run Windows Server 2008 R2. You plan
to deploy 50 read-only domain controllers (RODCs) to the branch offices. You will configure the
RODCs at the company’s main office and then ship them to the branch offices for installation by onsite technicians. You have the following requirements:
• Minimize network traffic related to the installation.
• Ensure the security of the RODCs.
You need to create a server configuration plan that meets the requirements.
You use the Ntdsutil command-line utility to prepare an Install From Media (IFM) source, removing
any sensitive credentials. What should you recommend next? (More than one answer choice may
achieve the goal. Select the BEST answer.)

Which actions should you perform in sequence?

DRAG DROP
A company has retail locations throughout the United States. You are planning the deployment of a
server for each retail location. You will prepare the servers at the main data center and ship them to
the retail locations. You will deploy a custom application and an Active Directory Domain Services
(AD DS) role on each server. Each server must meet the following security requirements:
• All application data must be encrypted on the local hard drive.
• All application data must be encrypted when communicating with users.
• AD DS accounts on the computer must be easily managed in case of security violations.
You need to plan the server deployment.
Which actions should you perform in sequence?
To answer, move the appropriate actions from the list of actions to the answer area and arrange
them in the correct order. (Use only actions that apply.)