You need to ensure that the virtual machines on Server1 remain available while drive E is being replaced
Your network contains an Active Directory domain named contoso.com. The domain
contains two servers named Server1 and Server2 that run Windows Server 2012 R2.
Server1 is a file server that has the Hyper-V server role installed.
Server1 hosts several virtual machines. The virtual machine configuration files are stored on
drive D and the VHD files are stored on drive E.
You plan to replace drive E with a larger volume.
You need to ensure that the virtual machines on Server1 remain available while drive E is
being replaced.
What should you do?
You need to move some of the public folders in the public folder mailbox to another public folder mailbox
You have an Exchange Server 2013 organization. You successfully migrate the public folders from a
previous version of Exchange Server. You discover that one of the public folder mailboxes almost
reached its quota size. You need to move some of the public folders in the public folder mailbox to
another public folder mailbox. What should you run?
You need to move all of the applications and the services from Cluster1 to Cluster2
Your network contains two servers named Server1 and Server2 that run Windows Server
2008 R2. Server1 and Server2 are nodes in a failover cluster named Cluster1. The network
contains two servers named Server3 and Server4 that run Windows Server 2012 R2.
Server3 and Server4 are nodes in a failover cluster named Cluster2.
You need to move all of the applications and the services from Cluster1 to Cluster2.
What should you do first from Failover Cluster Manager?
Which DNS modification should you identify?
HOTSPOT
Your network contains two Active Directory sites named Site1 and Site2.
You have an Exchange Server 2013 organization that contains six servers. The servers are configured
as shown in the following table.
All of the mailbox databases replicate to all of the servers.
Users in Site1 connect to sitel-mail.contoso.com to access their mailbox. Users in Site2 connect to
site2-mail.contoso.com to access their mailbox. All of the users use Microsoft Outlook 2013.
You need to identify which DNS modification must be made to fail over the email services from Site1
to Site2.
Which DNS modification should you identify? (To answer, select the appropriate record to modify
and the new data for the record in the answer area.)
Which Windows PowerShell command should you run?
You deploy an Active Directory Federation Services (AD FS) 2.1 infrastructure. The
infrastructure uses Active Directory as the attribute store.
Some users report that they fail to authenticate to the AD FS infrastructure.
You discover that only users who run third-party web browsers experience issues.
You need to ensure that all of the users can authenticate to the AD FS infrastructure
successfully.
Which Windows PowerShell command should you run?
What should you run on Server1?
Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1
has the Active Directory Certificate Services server role installed and is configured as a
standalone certification authority (CA).
You install a second server named Server2. You install the Online Responder role service
on Server2.
You need to ensure that Server1 can issue an Online Certificate Status Protocol (OCSP)
Response Signing certificate to Server2.
What should you run on Server1?
Which command should you run?
HOTSPOT
You have an Exchange Server 2013 organization that has mailbox audit logging enabled for all users.
You deploy two third-party applications named App1 and App2. Both applications access a mailbox
named Mailbox1.
App1 uses a mail-enabled user account named App1_user. App2 uses a mailbox-enabled user
account named App2_user. You need to prevent the audit logs from containing entries that relate to
App2. Which command should you run? (To answer, select the appropriate options in the answer
area.)
Which tool should you run in each environment?
DRAG DROP
You have an Exchange Server 2013 organization and a Microsoft Lync Server 2013 infrastructure.
You plan to implement voice mail for all users.
You need to prepare the environment for the planned implementation.
Which tool should you run in each environment? (To answer, drag the appropriate tool to the
correct environment or environments. Each tool may be used once, more than once, or not at all.
You may need to drag the split bar between panes or scroll to view content.)
How many trusts should you identify?
Your network contains four Active Directory forests. Each forest contains an Active Directory
Rights Management Services (AD RMS) root cluster.
All of the users in all of the forests must be able to access protected content from any of the
forests.
You need to identify the minimum number of AD RMS trusts required.
How many trusts should you identify?
You need to ensure that the rights account certificates issued in adatum.com are accepted by the AD RMS root c
DRAG DROP
Your network contains two Active Directory forests named contoso.com and adatum.com.
Each forest contains an Active Directory Rights Management Services (AD RMS) root
cluster. All servers run Windows Server 2012 R2.
You need to ensure that the rights account certificates issued in adatum.com are accepted
by the AD RMS root cluster in contoso.com.
What should you do in each forest?
To answer, drag the appropriate actions to the correct forests. Each action may be used
once, more than once, or not at all. You may need to drag the split bar between panes or
scroll to view content.