PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which two nodes should you configure in File Server Resource Manager?

Hotspot Question
You have a file server named Server1 that runs Windows Server 2012 R2.
Server1 contains a file share that must be accessed by only a limited number of users.
You need to ensure that if an unauthorized user attempts to access the file share, a custom accessdenied message appears, which contains a link to request access to the share.
The message must not appear when the unauthorized user attempts to access other shares.
Which two nodes should you configure in File Server Resource Manager? To answer, select the
appropriate two nodes in the answer area.

What should you run on Server1?

Your network contains a server named Server1 that runs Windows Server 2012 R2.
Server1 has the Active Directory Certificate Services server role installed and is configured as a
standalone certification authority (CA).
You install a second server named Server2.
You install the Online Responder role service on Server2.
You need to ensure that Server1 can issue an Online Certificate Status Protocol (OCSP) Response
Signing certificate to Server2.
What should you run on Server1?

>You have a server that runs Windows Server 2012 R2 and has the iSCSI Target Server role service installed.

Hotspot Question
You have a server that runs Windows Server 2012 R2 and has the iSCSI Target Server role service
installed.
You run the New-IscsiVirtualDisk cmdlet as shown in the New-IscsiVirtualDisk exhibit.
(Click the Exhibit button.)

To answer, complete each statement according to the information presented in the exhibits.
Each correct selection is worth one point.

You need to ensure that the rights account certificates issued in adatum.com are accepted by the AD RMS root c

Drag and Drop Question
Your network contains two Active Directory forests named contoso.com and adatum.com.
Each forest contains an Active Directory Rights Management Services (AD RMS) root cluster.
All servers run Windows Server 2012 R2.
You need to ensure that the rights account certificates issued in adatum.com are accepted by the
AD RMS root cluster in contoso.com.
What should you do in each forest? To answer, drag the appropriate actions to the correct forests.
Each action may be used once, more than once, or not at all. You may need to drag the split bar
between panes or scroll to view content.

Which tool should you use?

Your network contains an Active Directory domain named contoso.com.
All servers run Windows Server 2012 R2.
The domain contains a domain controller named DC1 that is configured as an enterprise root
certification authority (CA).
All users in the domain are issued a smart card and are required to log on to their domain- joined
client computer by using their smart card.
A user named User1 resigned and started to work for a competing company.
You need to prevent User1 immediately from logging on to any computer in the domain.
The solution must not prevent other users from logging on to the domain.
Which tool should you use?

Which cmdlet should you run?

Your network contains an Active Directory domain named contoso.com.
The domain contains two member servers named Server1 and Server2.
All servers run Windows Server 2012 R2.
Server1 and Server2 have the Failover Clustering feature installed.
The servers are configured as nodes in a failover cluster named Cluster1.
Cluster1 contains a cluster disk resource.
A developer creates an application named App1.
App1 is NOT a cluster-aware application.
App1 runs as a service. App1 stores date on the cluster disk resource.
You need to ensure that App1 runs in Cluster1.
The solution must minimize development effort.
Which cmdlet should you run?

Which tool should you use?

Your network contains an Active Directory domain named contoso.com.
A previous administrator implemented a Proof of Concept installation of Active Directory Rights
Management Services (AD RMS).
After the proof of concept was complete, the Active Directory Rights Management Services server
role was removed.
You attempt to deploy AD RMS.
During the configuration of AD RMS, you receive an error message indicating that an existing AD
RMS Service Connection Point (SCP) was found.
You need to remove the existing AD RMS SCP.
Which tool should you use?

Which three actions should you perform?

Your network contains an Active Directory domain named contoso.com. The domain contains four
servers named Server1, Server2, Server3, and Server4 that run Windows Server 2012 R2.
All servers have the Hyper-V server role and the Failover Clustering feature installed.

You need to replicate virtual machines from Cluster1 to Cluster2.
Which three actions should you perform? (Each correct answer presents part of the solution.

Choose three.)