What should you configure?
Your company is implementing Network Access Protection (NAP) with DHCP enforcement. You need
to define which network resources non-compliant client computers can access. What should you
configure?
Which tool should you use?
You need to mount a VHD file that was created by using Windows Server Backup. Which tool should
you use?
You need to ensure that the clients on both of the subnets can receive IP addresses from DC1
Your network contains a server named DC1 that has the DHCP Server server role installed. Clients
located on the same subnet as DC1 are assigned valid IP addresses from DC1. Clients located on a
different subnet are not assigned IP addresses from DC1. You verify that there is network
connectivity between the two subnets. You need to ensure that the clients on both of the subnets
can receive IP addresses from DC1. What should you do?
You need to ensure that you can view all of the events in the Security log
Your network contains a server named Server1 that runs Windows Server 2008 R2 Service Pack 1
(SP1). You log on to Server1 by using an account named Admin1, and then you open Event Viewer as
shown in the exhibit. (Click the Exhibit button.)
You need to ensure that you can view all of the events in the Security log. What should you do?
You need to log the CPU utilization of the processes running on Server1 if the CPU utilization exceeds 85 perc
Your network contains a server named Server1 that runs Windows Server 2008 R2 Service Pack 1
(SP1). Server1 has Microsoft SQL Server 2008 R2 and the File Services server role installed. Users
report that access to Server1 during the morning is very slow. An administrator creates a Data
Collector Set and provides the results shown in the exhibit. (Click the Exhibit button.)
You need to log the CPU utilization of the processes running on Server1 if the CPU utilization exceeds
85 percent for more than one minute. What should you do? (Each correct answer presents part of
the solution. Choose two.)
Which tool should you use?
Your network contains an Active Directory domain named contoso.com. The domain contains two
Active Directory sites named Site1 and Site2. You have a domain-based Distributed File System (DFS)
namespace named \\contoso.com\public that has a single namespace server located in Site1. You
install another namespace server in Site2. You need to verify that the client computers in Site2 use
the new namespace server. You want to achieve this goal by using the minimum amount of
administrative effort. Which tool should you use?
You need to ensure that you can immediately resolve Server1.contoso.com to the new IP address
Your network contains a DNS zone for contoso.com.
All servers register their host names in DNS by using dynamic updates.
The network contains a server named Server1.contoso.com.
From a computer named Computer1 that runs Windows 7, you successfully resolve
Server1.contoso.com to an IP address.
You change the IP address ofServer1.contoso.com.
From Computer1, you discover that Server1.contoso.com still resolves to the old IP address.
You successfully connect to Server1.contoso.com by using the new IP address. You need to ensure
that you can immediately resolve Server1.contoso.com to the new IP address. What should you do
on Computer1?
You need to ensure that DC1 has enough IP addresses to assign to clients
Your network contains a server named DC1 that has the DHCP Server server role installed.
DC1 has a DHCP scope for the 10.10.10.0/24 network ID. You discover the following warning
message in the Event log on DC1: “Scope, Scope1, is 98 percent full with only two IP addresses
remaining.” You need to ensure that DC1 has enough IP addresses to assign to clients. The solution
must not cause any IP conflicts. What should you do?
Which VPN protocol should you identify?
Your network contains a server named Server1 that runs Windows Server 2008 R2 Service Pack
(SP1). All users have laptops that run Windows 7. The users frequently work from network locations
that only allow outbound communication to the Internet by using HTTP and HTTPS. You plan to
configure Server1 as a VPN server. You need to identify which VPN protocol you should use to
ensure that all of the users can establish VPN connections to Server1. Which VPN protocol should
you identify?
Which port or ports should you allow through Windows Firewall?
Your network contains an Active Directory domain named contoso.com. The domain contains a
server named Server1 that has Microsoft SQL Server 2008 R2 installed. You need to configure the
Windows Firewall on Server1 to allow client computers access to the SQL Server installation. Which
port or ports should you allow through Windows Firewall?