You need to allow users on instance to query remote data sources by using the OPENROWSET() sp_configure config
You administer a SQL Server 2008 instance. You need to allow users on instance to query
remote data sources by using the OPENROWSET() sp_configure configuration option
should you configure?
Does this meet the goal?
Your network contains an Active Directory domain named contoso.com. The domain
contains three VLANs. The VLANs are configured as shown in the following table.
All client computers run either Windows 7 or Windows 8.
The corporate security policy states that all of the client computers must have the latest
security updates installed.
You need to implement a solution to ensure that only the client computers that have all of the
required security updates installed can connect to VLAN 1. The solution must ensure that all
other client computers connect to VLAN 3.
Solution: You implement the IPsec enforcement method.
Does this meet the goal?
What should you identify?
Your network contains an Active Directory forest named contoso.com.
You plan to deploy 200 Hyper-V hosts by using Microsoft System Center 2012 Virtual
Machine Manager (VMM) Service Pack 1 (SP1).
You add a PXE server to the fabric.
You need to identify which objects must be added to the VMM library for the planned
deployment.
What should you identify? (Each correct answer presents part of the solution. Choose all that
apply.)
Which two actions should you perform?
You administer a SQL Server 2008 instance that runs on a Windows Server 2003 computer.
The instance uses mixed authentication mode.
You need to ensure that the SQL Server 2008 authenticated logins follow the same
password complexity rules that are enforced by Windows Server 2003. You also need to
ensure that the password complexity rules continue to be enforced.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)
Which network services should you identify?
You plan to deploy multiple servers in a test environment by using Windows Deployment
Services (WDS).
You need to identify which network services must be available in the test environment to
deploy the servers.
Which network services should you identify? (Each correct answer presents part of the
solution. Choose all that apply.)
Which data type should you use?
You currently store date information in two columns. One column contains the date in local time and
one column contains the difference between local time and UTC time. You need to store this data in
a
single column. Which data type should you use?
What are two possible profile types that achieve the goal?
You have a System Center 2012 R2 Virtual Machine Manager (VMM) infrastructure that
manages five Hyper-V hosts. The Hyper-V hosts are not clustered.
You have a virtual machine template that deploys a base image of Windows Server 2012
R2. No role services or features are enabled in the base image.
You need to deploy a virtual machine named VM1 that is based on the virtual machine
template.
VM1 will be deployed as part of a service. VM1 must have the Web Server (IIS) server role
installed. The solution must not require modifications to the virtual machine template or the
base image.
What are two possible profile types that achieve the goal? Each correct answer presents a
complete solution.
Which NAP enforcement method should you recommend?
Your network contains an Active Directory domain named contoso.com. The domain
contains servers that run either Windows Server 2008 R2 or Windows Server 2012.
All client computers on the internal network are joined to the domain. Some users establish
VPN connections to the network by using Windows computers that do not belong to the
domain.
All client computers receive IP addresses by using DHCP.
You need to recommend a Network Access Protection (NAP) enforcement method to meet
the following requirements:
Verify whether the client computers have up-to-date antivirus software.
Provides a warning to users who have virus definitions that are out-of-date.
Ensure that client computers that have out-of-date virus definitions can connect to the
network.
Which NAP enforcement method should you recommend?
Which Transact-SQL statements should you run?
You are reviewing and configuring the security of a SQL Server 2008 instance that contains
database DB1.
The security audit policy specifies the following requirements:
Only successful and failed logon attempts are recorded in log files.
The SQL Server instance is shut down if records cannot be written to the log files.
You need to configure the SQL Server instance to comply with the security audit policy.
Which Transact-SQL statements should you run?
What should you recommend?
Your company is a hosting provider that provides cloud-based services to multiple
customers.
Each customer has its own Active Directory forest located in your company’s datacenter.
You plan to provide VPN access to each customer. The VPN solution will use RADIUS for
authentication services and accounting services.
You need to recommend a solution to forward authentication and accounting messages from
the perimeter network to the Active Directory forest of each customer.
What should you recommend?
More than one answer choice may achieve the goal. Select the BEST answer.