PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which three actions should you perform?

Your network contains a server named Web1 that has Microsoft SharePoint Foundation 2010
installed. You create a new web application named WebApp1. You configure WebApp1 to use the
default Authentication settings and Authorization settings. In WebApp1, you create a site collection
named Sitecollection1. In Sitecollection1, you create a site named Site1. You need to provide
anonymous access to some of the content in Site1. The solution must ensure that new lists and
libraries created in Site1 cannot be accessed anonymously by default. Which three actions should
you perform? (Each correct answer presents part of the solution. Choose three.)

What should you include in the recommendation?

###BeginCaseStudy###
Case Study: 10
Litware Inc.
COMPANY OVERVIEW
Litwate Inc. is a manufacturing company that has a main office and four branch offices.
PLANNED CHANGES
Litware plans to deploy Group Policy object (GPOs). The planned deployment must meet the
following requirements:

Deploy a GPO to a client computer based on its respective local office.
Minimize the amount of administrative effort required to manage the GPOs.
Prevent the users m each department from receiving CPOs from other departments.
Deploy a GPO to a user based on his respective department.
Litware plans to change the name of AD.liteware.com to east.ktware.com. The planned change must
meet the following retirements:
Minimize administrative effort.
Minimize the impact on the users m AD.liteware.com.
Litware plans to deploy RemoteApp programs to meet the following requirements:
The RemoteApp programs must be visible from the Start menu on each client computer.
The RemoteApp programs must be published by using the minimum amount of administrative
effort.
Litware plans to deploy several Hyper-V servers that will host multiple virtual machines (VMs). The
deployment must meet the following requirements:
Minimize administrative effort.
Back up the VMs to a tape library.
Store all of the VM files on a Storage Area Network (SAN).
Convert all of the client computers in the finance department to a VM.
Litware plans to deploy a network access solution. The planned deployment must use the minimum
amount of administrative effort.
EXISTING ENVIRONMENT
All servers run Widows Server 2008 R2. All client computers run Windows 7.
Litware has three departments, including a finance department. Each department has users n each
office. The network contains a Microsoft Exchange Server 2010 organization.
Existing Active Directory Environment
The network contains a single Active Directory forest named litware.com. The Forest contains one
child domain named AD.litware.com and two other domains.
The functional level of the forest is Windows Server 2003.
A single Active Directory site exists for all of the offices.
Existing Network Infrastructure
The network contains an internal network and a perimeter network that are separated by a
hardware-based firewall. A hardware-based firewall also separates the perimeter network and the
Internet.
The following protocols on the default ports are allowed through the firewall that is connected to
the Internet:
HTTP
HTTPS
Point-To-Point Tunneling Protocol (PPTP)
Only the client computers on the perimeter network can connect to the client computers on the
internal network.
The perimeter network contains a VPN server. Users who work remotely use PPTP to establish VPN
connections to the network.
Current Administration Model
Each domain contains a file server that stores confidential documents.
Each domain has dedicated user Accounts for auditing purposes. The user accounts are only used for
auditing the company’s confidential documents.
SECURITY REQUIREMLNTS
The corporate security policy states the following requirements:

• Ensure that the latest windows updates are installed on all client computers.
• Ensure that Windows Firewall is enabled on every client computer that connects remotely.
• Prevent all client computers that do not comply with the security policy from connecting to
the internal servers.
The corporate auditing poky must meet the following requirements:
• Only the dedicated user accounts must be able access servers that contain confidential
documents.
• The dedicated user accounts must be assigned auditing rights as a group, not as individual
users.
• The number of groups that contain the dedicated user accounts must be minimized.
###EndCaseStudy###

You need to recommend a Remote Desktop Services (RDS) solution for RemoteApp programs that
supports the company’s planned changes.
What should you include in the recommendation?

What should you configure as the log on account for the Report Server service?

Your network contains a server named Server1 and a server named Server2. Server1 has Microsoft
SharePoint Foundation 2010 installed. Server2 has Microsoft SQL Server Reporting Services installed.
The SharePoint Foundation databases are located on Server2. You need to ensure that the Report
Server service can access the SharePoint Foundation databases. What should you configure as the
log on account for the Report Server service?

Which group scope should you recommend?

###BeginCaseStudy###
Case Study: 10
Litware Inc.
COMPANY OVERVIEW
Litwate Inc. is a manufacturing company that has a main office and four branch offices.
PLANNED CHANGES
Litware plans to deploy Group Policy object (GPOs). The planned deployment must meet the
following requirements:

Deploy a GPO to a client computer based on its respective local office.
Minimize the amount of administrative effort required to manage the GPOs.
Prevent the users m each department from receiving CPOs from other departments.
Deploy a GPO to a user based on his respective department.
Litware plans to change the name of AD.liteware.com to east.ktware.com. The planned change must
meet the following retirements:
Minimize administrative effort.
Minimize the impact on the users m AD.liteware.com.
Litware plans to deploy RemoteApp programs to meet the following requirements:
The RemoteApp programs must be visible from the Start menu on each client computer.
The RemoteApp programs must be published by using the minimum amount of administrative
effort.
Litware plans to deploy several Hyper-V servers that will host multiple virtual machines (VMs). The
deployment must meet the following requirements:
Minimize administrative effort.
Back up the VMs to a tape library.
Store all of the VM files on a Storage Area Network (SAN).
Convert all of the client computers in the finance department to a VM.
Litware plans to deploy a network access solution. The planned deployment must use the minimum
amount of administrative effort.
EXISTING ENVIRONMENT
All servers run Widows Server 2008 R2. All client computers run Windows 7.
Litware has three departments, including a finance department. Each department has users n each
office. The network contains a Microsoft Exchange Server 2010 organization.
Existing Active Directory Environment
The network contains a single Active Directory forest named litware.com. The Forest contains one
child domain named AD.litware.com and two other domains.
The functional level of the forest is Windows Server 2003.
A single Active Directory site exists for all of the offices.
Existing Network Infrastructure
The network contains an internal network and a perimeter network that are separated by a
hardware-based firewall. A hardware-based firewall also separates the perimeter network and the
Internet.
The following protocols on the default ports are allowed through the firewall that is connected to
the Internet:
HTTP
HTTPS
Point-To-Point Tunneling Protocol (PPTP)
Only the client computers on the perimeter network can connect to the client computers on the
internal network.
The perimeter network contains a VPN server. Users who work remotely use PPTP to establish VPN
connections to the network.
Current Administration Model
Each domain contains a file server that stores confidential documents.
Each domain has dedicated user Accounts for auditing purposes. The user accounts are only used for
auditing the company’s confidential documents.
SECURITY REQUIREMLNTS
The corporate security policy states the following requirements:

• Ensure that the latest windows updates are installed on all client computers.
• Ensure that Windows Firewall is enabled on every client computer that connects remotely.
• Prevent all client computers that do not comply with the security policy from connecting to
the internal servers.
The corporate auditing poky must meet the following requirements:
• Only the dedicated user accounts must be able access servers that contain confidential
documents.
• The dedicated user accounts must be assigned auditing rights as a group, not as individual
users.
• The number of groups that contain the dedicated user accounts must be minimized.
###EndCaseStudy###

You need to recommend a group scope for the dedicated auditing user accounts that meets the
company’s security requirements.
Which group scope should you recommend?

You need to ensure that client requests for the content on Server1 are served from the cache on Server2

Your network contains two servers named Server1 and Server2 that have the Streaming Media
Services server role installed. On Server1, you create a new on-demand publishing point that uses a
file as a content source. You configure Server2 as the cache/proxy server for Server1. The cache is
configured. You need to ensure that client requests for the content on Server1 are served from the
cache on Server2. What should you do?

What should you include in the recommendation?

###BeginCaseStudy###
Case Study: 10
Litware Inc.
COMPANY OVERVIEW
Litwate Inc. is a manufacturing company that has a main office and four branch offices.
PLANNED CHANGES
Litware plans to deploy Group Policy object (GPOs). The planned deployment must meet the
following requirements:

Deploy a GPO to a client computer based on its respective local office.
Minimize the amount of administrative effort required to manage the GPOs.
Prevent the users m each department from receiving CPOs from other departments.
Deploy a GPO to a user based on his respective department.
Litware plans to change the name of AD.liteware.com to east.ktware.com. The planned change must
meet the following retirements:
Minimize administrative effort.
Minimize the impact on the users m AD.liteware.com.
Litware plans to deploy RemoteApp programs to meet the following requirements:
The RemoteApp programs must be visible from the Start menu on each client computer.
The RemoteApp programs must be published by using the minimum amount of administrative
effort.
Litware plans to deploy several Hyper-V servers that will host multiple virtual machines (VMs). The
deployment must meet the following requirements:
Minimize administrative effort.
Back up the VMs to a tape library.
Store all of the VM files on a Storage Area Network (SAN).
Convert all of the client computers in the finance department to a VM.
Litware plans to deploy a network access solution. The planned deployment must use the minimum
amount of administrative effort.
EXISTING ENVIRONMENT
All servers run Widows Server 2008 R2. All client computers run Windows 7.
Litware has three departments, including a finance department. Each department has users n each
office. The network contains a Microsoft Exchange Server 2010 organization.
Existing Active Directory Environment
The network contains a single Active Directory forest named litware.com. The Forest contains one
child domain named AD.litware.com and two other domains.
The functional level of the forest is Windows Server 2003.
A single Active Directory site exists for all of the offices.
Existing Network Infrastructure
The network contains an internal network and a perimeter network that are separated by a
hardware-based firewall. A hardware-based firewall also separates the perimeter network and the
Internet.
The following protocols on the default ports are allowed through the firewall that is connected to
the Internet:
HTTP
HTTPS
Point-To-Point Tunneling Protocol (PPTP)
Only the client computers on the perimeter network can connect to the client computers on the
internal network.
The perimeter network contains a VPN server. Users who work remotely use PPTP to establish VPN
connections to the network.
Current Administration Model
Each domain contains a file server that stores confidential documents.
Each domain has dedicated user Accounts for auditing purposes. The user accounts are only used for
auditing the company’s confidential documents.
SECURITY REQUIREMLNTS
The corporate security policy states the following requirements:

• Ensure that the latest windows updates are installed on all client computers.
• Ensure that Windows Firewall is enabled on every client computer that connects remotely.
• Prevent all client computers that do not comply with the security policy from connecting to
the internal servers.
The corporate auditing poky must meet the following requirements:
• Only the dedicated user accounts must be able access servers that contain confidential
documents.
• The dedicated user accounts must be assigned auditing rights as a group, not as individual
users.
• The number of groups that contain the dedicated user accounts must be minimized.
###EndCaseStudy###

You need to recommend a network access solution that meets the company’s security requirements.
What should you include in the recommendation?

What should you include in the recommendation?

###BeginCaseStudy###
Case Study: 11
Wingtip Toys Case A
COMPANY OVERVIEW
Wingtip Toys has a main office and 10 branch offices.
PLANNED CHANGES
Wingtip Toys plans to implement the following changes:
Assign IPv6 addresses to all client computers.
Deploy domain controllers in the branch offices.
Provide VPN access to all of the users in both forests.
Deploy Network Access Protection (NAP) in the wingtiptoys.com forest.

Ensure that only the users in the tailspintoys.com accounting department can access the resources
in wingtiptoys.com.
EXISTING ENVIRONMENT
The network contains a Microsoft Exchange Server 2010 organization.
Wingtip Toys has many departments; including an accounting department.
Business Goals
New software and hardware solutions must be implemented by using the minimum amount of
administrative effort.
Existing Active Directory Environment
The network contains two Active Directory forests named wingtiptoys.com and tailspintoys.com.
Each forest contains one domain.
All of the domain controllers in wingtiptoys.com run Windows Server 2008 R2. All of the domain
controllers in tailspintoys.com run Windows Server 2003.
The forest and domains are configured as shown in the following table.

Existing Network Infrastructure
Each office is on a separate IPv4 subnet.
All of the domain controllers are located in the main office.
REQUIREMENTS
Technical Requirements
Wingtip Toys must meet the following technical requirements:
All IPv6 addresses must use a private IP address range.
All IPv6 addresses must be routable between offices only.
Security Requirements
Wingtip Toys must meet the following security requirements:
Ensure that client computers do not require certificates.
Prevent certain users from printing confidential documents and forwarding the documents by email.
Prevent administrator passwords from being replicated to the domain controllers in the branch
office.
Control remote access to client computers that use static IP addresses and dynamically-assigned IP
addresses.
Quarantine the local client computers and the remote client computers that do not have the latest
Windows updates installed.
Ensure that the users in tailspintoys.com can only access the shares in wingtiptoys.com to which
they have explicit permissions.
Ensure that all of the users who run Microsoft Office Outlook can perform global address list (GAL)
lookups on a server in their local office.
###EndCaseStudy###

You need to recommend a document protection strategy that meets the company’s security
requirements. What should you include in the recommendation?

Which two actions should you include in the recommendation?

###BeginCaseStudy###
Case Study: 11
Wingtip Toys Case A
COMPANY OVERVIEW
Wingtip Toys has a main office and 10 branch offices.
PLANNED CHANGES
Wingtip Toys plans to implement the following changes:
Assign IPv6 addresses to all client computers.
Deploy domain controllers in the branch offices.
Provide VPN access to all of the users in both forests.
Deploy Network Access Protection (NAP) in the wingtiptoys.com forest.

Ensure that only the users in the tailspintoys.com accounting department can access the resources
in wingtiptoys.com.
EXISTING ENVIRONMENT
The network contains a Microsoft Exchange Server 2010 organization.
Wingtip Toys has many departments; including an accounting department.
Business Goals
New software and hardware solutions must be implemented by using the minimum amount of
administrative effort.
Existing Active Directory Environment
The network contains two Active Directory forests named wingtiptoys.com and tailspintoys.com.
Each forest contains one domain.
All of the domain controllers in wingtiptoys.com run Windows Server 2008 R2. All of the domain
controllers in tailspintoys.com run Windows Server 2003.
The forest and domains are configured as shown in the following table.

Existing Network Infrastructure
Each office is on a separate IPv4 subnet.
All of the domain controllers are located in the main office.
REQUIREMENTS
Technical Requirements
Wingtip Toys must meet the following technical requirements:
All IPv6 addresses must use a private IP address range.
All IPv6 addresses must be routable between offices only.
Security Requirements
Wingtip Toys must meet the following security requirements:
Ensure that client computers do not require certificates.
Prevent certain users from printing confidential documents and forwarding the documents by email.
Prevent administrator passwords from being replicated to the domain controllers in the branch
office.
Control remote access to client computers that use static IP addresses and dynamically-assigned IP
addresses.
Quarantine the local client computers and the remote client computers that do not have the latest
Windows updates installed.
Ensure that the users in tailspintoys.com can only access the shares in wingtiptoys.com to which
they have explicit permissions.
Ensure that all of the users who run Microsoft Office Outlook can perform global address list (GAL)
lookups on a server in their local office.
###EndCaseStudy###

You need to recommend a VPN strategy that meets the company’s business goals Which two actions
should you include in the recommendation? (Each correct answer presents part of the solution.
Choose two.)

What should you include in the recommendation?

###BeginCaseStudy###
Case Study: 11
Wingtip Toys Case A
COMPANY OVERVIEW
Wingtip Toys has a main office and 10 branch offices.
PLANNED CHANGES
Wingtip Toys plans to implement the following changes:
Assign IPv6 addresses to all client computers.
Deploy domain controllers in the branch offices.
Provide VPN access to all of the users in both forests.
Deploy Network Access Protection (NAP) in the wingtiptoys.com forest.

Ensure that only the users in the tailspintoys.com accounting department can access the resources
in wingtiptoys.com.
EXISTING ENVIRONMENT
The network contains a Microsoft Exchange Server 2010 organization.
Wingtip Toys has many departments; including an accounting department.
Business Goals
New software and hardware solutions must be implemented by using the minimum amount of
administrative effort.
Existing Active Directory Environment
The network contains two Active Directory forests named wingtiptoys.com and tailspintoys.com.
Each forest contains one domain.
All of the domain controllers in wingtiptoys.com run Windows Server 2008 R2. All of the domain
controllers in tailspintoys.com run Windows Server 2003.
The forest and domains are configured as shown in the following table.

Existing Network Infrastructure
Each office is on a separate IPv4 subnet.
All of the domain controllers are located in the main office.
REQUIREMENTS
Technical Requirements
Wingtip Toys must meet the following technical requirements:
All IPv6 addresses must use a private IP address range.
All IPv6 addresses must be routable between offices only.
Security Requirements
Wingtip Toys must meet the following security requirements:
Ensure that client computers do not require certificates.
Prevent certain users from printing confidential documents and forwarding the documents by email.
Prevent administrator passwords from being replicated to the domain controllers in the branch
office.
Control remote access to client computers that use static IP addresses and dynamically-assigned IP
addresses.
Quarantine the local client computers and the remote client computers that do not have the latest
Windows updates installed.
Ensure that the users in tailspintoys.com can only access the shares in wingtiptoys.com to which
they have explicit permissions.
Ensure that all of the users who run Microsoft Office Outlook can perform global address list (GAL)
lookups on a server in their local office.
###EndCaseStudy###

You are evaluating whether to create a trust relationship between tailspintoys.com and
wingtiptoys.com.
You need to recommend a trust relationship configuration that supports the company’s planned
changes.
What should you include in the recommendation?