PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

You need to ensure that all client computers are added to the KMS current count on Server1

Your network contains 20 servers that run Windows Server 2008 R2 and 800 client computers that
run Windows 7 Enterprise. The network contains a server named Server1 that has the Key
Management Service (KMS) installed. You discover that the Windows 7 client computers are not
added to the current count on the KMS host. You need to ensure that all client computers are added
to the KMS current count on Server1. What should you do?

Which VPN protocol should you include in the recommendation?

###BeginCaseStudy###
Case Study: 2
Northwind Traders
COMPANY OVERVIEW
Northwind Traders is a manufacturing company that has a main office and three branch offices.
PLANNED CHANGES
• Northwind Traders plans to implement the following changes:
• Implement a remote access solution.
• Upgrade all of the client computers in the shipping department to Windows 7 Enterprise.
• Deny the users in east.northwindtraders.com access to the shared resources in contoso.com.
• Provide the users in the northwindtraders.com domain access to a shared folder in contoso.com.
• Deploy test computers that run either Windows 7 or Windows Server 2008 R2 in a lab
environment.
• Deny the users in contoso.com access to the shared resources in both northwindtraders.com and
east.northwindtraders.com.
• Evaluate whether to migrate all of the users in contoso.com to east.northwindtraders.com.
EXISTING ENVIRONMFNT
Northwind Traders has five departments, including a shipping department. All of the client
computers in the shipping department run windows XP Service Pack 3 (SP3). All of the users in the
shipping department run a-line-of-business application named App1 that only runs on Windows XP.
Existing Active Directory Environment
The network contains two Active Directory forests named north wind traders.com and contoso.com.
Northwindtrades.com contains two domains named northwindtraders.com and
east.northwindtraders.com. Contoso.com contains one domain.
Forest trust relationships do not exist between the forests.
Existing Network infrastructure
The network and the Internet are separated by a firewall. The network contains the IPv4 subnets
shown in the following table.

Technical Requirements
• Centrally manage all client computers.
• Only open ports 80 and 443 on the external firewall.
• Ensure that only smart card authentication is used for remote access.
• Reduce the security risk of having a domain controller in an unsecure location.
• Minimize the amount of Active Directory replication traffic between the offices.
• Minimize the amount of time it takes to restore deleted Active Directory objects.
• Perform all operations by using an account that has the minimum number of rights.
• Ensure that App1 is available to users who are either connected to or disconnected from the
network.
• Prevent Active Directory attributes that contain sensitive information from being stored in the
branch offices.
• Ensure that when client computers authenticate, they always attempt to connect to a domain
controller in their respective local office first.
###EndCaseStudy###

You need to recommend a remote access solution that meets the company’s technical
requirements. Which VPN protocol should you include in the recommendation?

Which action should you select from Failover Cluster Manager?

Your network contains two Hyper-V hosts named Server1 and Server2. Server1 and Server2 belong
to a failover cluster. Server1 and Server2 are connected to the same 2- terabyte logical unit number
(LUN). You open Failover Cluster Manager as shown in the exhibit. (Click the Exhibit button.)

The cluster will host 20 highly available virtual machines (VMs). You need to ensure that the VMs can
fail over independently. Which action should you select from Failover Cluster Manager?

Which trust configuration should you include in the recommendation?

###BeginCaseStudy###
Case Study: 2
Northwind Traders
COMPANY OVERVIEW
Northwind Traders is a manufacturing company that has a main office and three branch offices.
PLANNED CHANGES
• Northwind Traders plans to implement the following changes:
• Implement a remote access solution.
• Upgrade all of the client computers in the shipping department to Windows 7 Enterprise.
• Deny the users in east.northwindtraders.com access to the shared resources in contoso.com.
• Provide the users in the northwindtraders.com domain access to a shared folder in contoso.com.
• Deploy test computers that run either Windows 7 or Windows Server 2008 R2 in a lab
environment.
• Deny the users in contoso.com access to the shared resources in both northwindtraders.com and
east.northwindtraders.com.
• Evaluate whether to migrate all of the users in contoso.com to east.northwindtraders.com.
EXISTING ENVIRONMFNT
Northwind Traders has five departments, including a shipping department. All of the client
computers in the shipping department run windows XP Service Pack 3 (SP3). All of the users in the
shipping department run a-line-of-business application named App1 that only runs on Windows XP.
Existing Active Directory Environment
The network contains two Active Directory forests named north wind traders.com and contoso.com.
Northwindtrades.com contains two domains named northwindtraders.com and
east.northwindtraders.com. Contoso.com contains one domain.
Forest trust relationships do not exist between the forests.
Existing Network infrastructure
The network and the Internet are separated by a firewall. The network contains the IPv4 subnets
shown in the following table.

Technical Requirements
• Centrally manage all client computers.
• Only open ports 80 and 443 on the external firewall.
• Ensure that only smart card authentication is used for remote access.
• Reduce the security risk of having a domain controller in an unsecure location.
• Minimize the amount of Active Directory replication traffic between the offices.
• Minimize the amount of time it takes to restore deleted Active Directory objects.
• Perform all operations by using an account that has the minimum number of rights.
• Ensure that App1 is available to users who are either connected to or disconnected from the
network.
• Prevent Active Directory attributes that contain sensitive information from being stored in the
branch offices.
• Ensure that when client computers authenticate, they always attempt to connect to a domain
controller in their respective local office first.
###EndCaseStudy###

You need to recommend a trust configuration that supports the company’s planned changes.
Which trust configuration should you include in the recommendation?

Which node from RD Gateway Manager should you use to achieve this task?

HOTSPOT
Your network contains three servers. The servers are configured as shown in the following table.

You need to allow only certain users to establish Remote Desktop connections through the RD
Gateway server. Which node from RD Gateway Manager should you use to achieve this task? To
answer, select the appropriate node in the answer area.

Which role service should you install on Server3?

Your network contains three servers named Server1, Server2, and Server3. Server1 is located on a
perimeter network. Server2 and Server3 are accessible from the internal network only. Users
connect to Server2 and Server3 to run RemoteApp programs. You need to ensure that remote users
can run the RemoteApp programs on Server2 and Server3. The solution must minimize the number
of ports that must be opened on the internal firewall. Which role service should you install on
Server3?

What should you recommend?

###BeginCaseStudy###
Case Study: 3
Proseware Inc
COMPANY OVERVIEW
Proseware Inc. is an international software development company that has three offices. The offices
are located in New York, London, and Washington.
PLANNED CHANGES
Proseware plans to deploy a remote access solution and a centralized Windows Update solution on
all client computers.
Proseware plans to consolidate 10 physical servers in a virtualization solution.
EXISTING ENVIRONMENT
The network contains client computers that run either Windows XP Service Pack 3 (SP3), Windows
Vista Service Pack 2 (SP2). or Windows 7.
The network contains 10 client computers that run a UNIX-based operating system.
Existing Active Directory Environment
The Active Directory contains the two domains shown in the exhibit. (Click the Case Study Exhibits
button.)

The relevant domain controllers are configured as shown in the following table.

The Active Directory sites are configured as shown in the exhibit. (Click the Case Study Exhibits
button.)
Proseware has a sales department and a marketing department.
The relevant organizational units (OU) are configured as shown in the following table.

The relevant Group Policy objects (GPO) are configured as shown in the following table.

Existing Network Infrastructure
Users from litwareinc.com regularly travel to the Washington office.
All of the client computers that authenticate to the domain controllers in the Washington office run
Windows 7.
All servers are configured to audit logons by an administrator.
Each office has a Windows Server Update Services (WSUS) server. Each WSUS server is managed
independently.
REQUIREMENTS
Technical Requirements
Proseware must meet the following technical requirements:
• Remote network access must be encrypted.
• A report that contains the following information must be generated monthly:
• All of the client computers that failed to install the latest Windows updates.
• All of the Windows updates that are currently installed on the client computers.
• Each failed attempt to log on to the servers by using the local Administrator account.
• The hardware and software assets on the client computers must be inventoried.
• Only client computers that have the latest antivirus definitions must be able to access the
network.
• Client computers that run the UNIX-based operating system must be able to connect to
shares on the file servers.
• If DC3.proseware.com fails, all of the client computers in proseware.com that are in the
Washington site must authenticate to a domain controller in the New York office.
User Requirements
Users in litewareinc.com report that it takes a long time to log on when they travel to the
Washington office.
Users in the Proseware.com sales department report that it takes a long time to log on when they
travel to the New York office. You verify that the users in the other Proseware departments log on in
an acceptable amount of time.
###EndCaseStudy###

You need to ensure that all of the users in proseware.com log on in an acceptable amount of time.
What should you recommend?

You need to ensure that when users open files that have the .kfa file extension, App1 automatically opens

DRAG DROP
Your network contains three servers. The servers are configured as shown in the following table.

All client computers run the 32-bit version of Windows 7. You have a 64-bit application named Appl.
App1 is associated with the .kfa file extension. You need to ensure that when users open files that
have the .kfa file extension, App1 automatically opens. What should you do? To answer, move the
appropriate actions from the Possible Actions list to the Necessary Actions area and arrange them in
the correct order.