PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

You need to ensure that the client computers can obtain IPv4 addresses from DC2

Your network contains an Active Directory domain named contoso.com. The domain
contains a domain controller named DC2 that runs Windows Server 2012 R2. DC2 has the
DHCP Server server role installed.
DHCP is configured as shown in the exhibit. (Click the Exhibit button.)

You discover that client computers cannot obtain IPv4 addresses from DC2.
You need to ensure that the client computers can obtain IPv4 addresses from DC2.
What should you do?

What should you configure on VM1?

HOTSPOT
Your network contains two servers named Server1 and Server2 that run Windows Server
2012 R2. Server1 and Server2 have the Hyper-V server role installed.
Server1 and Server2 have different processor models from the same manufacturer.
On Server1, you plan to create a virtual machine named VM1. Eventually, VM1 will be
exported to Server2.
You need to ensure that when you import VM1 to Server2, you can start VM1 from saved
snapshots.
What should you configure on VM1?
To answer, select the appropriate node in the answer area.

Which port rule should you use?

HOTSPOT
Your network contains two application servers that run Windows Server 2012 R2. The
application servers have the Network Load Balancing (NLB) feature installed.
You create an NLB cluster that contains the two servers.
You plan to deploy an application named App1 to the nodes in the cluster. App1 uses TCP
port 8080 and TCP port 8081.

Clients will connect to App1 by using HTTP and HTTPS via a single reverse proxy. App1
does not use session state information.
You need to configure a port rule for Appl. The solution must ensure that connections to
App1 are distributed evenly between the nodes.
Which port rule should you use?
To answer, select the appropriate rule in the answer area.

You need to ensure that a user named User1 can prevent the deletion of every email message that contains a spe

You have an Exchange Server 2013 organization.
You need to ensure that a user named User1 can prevent the deletion of every email message that
contains a specific word from all of the mailboxes. The solution must minimize the number of
permissions assigned to User1.
What should you do?

Which three actions should you perform?

DRAG DROP
You have an Exchange Server organization. The organization contains servers that have Exchange
Server 2010 and Exchange Server 2013 installed.
A new compliance policy requires that all email messages remain stored for two years.
You create two retention tags named Tag1 and Tag2. Tag1 moves the email messages to an Archive
mailbox after one year. Tag2 permanently deletes the email messages after two years.
You need to meet the compliance policy requirements. The solution must ensure that all email
messages that are older than two years are removed as quickly as possible.
Which three actions should you perform?
To answer, move the three appropriate actions from the list of actions to the answer area and
arrange them in the correct order.

Which technology should you recommend for each requirement?

DRAG DROP

Contoso, Ltd., is a bank that has offices in North America and Europe.
The company must comply with different regulations for North America and Europe.
The company uses Information Right Management (IRM) to protect sensitive documents, such as
internal financial reports.
You need to recommend a compliance solution to meet the following requirements:
Prevent users from disclosing customers’ personal information in email messages.
Prevent users from disclosing internal financial data to people outside of the company.
Prevent the permanent deletion of email messages of users who are under investigation.
Allow compliance officers to search the mailbox of users who are under investigation without
being able to alter the data in the mailbox.
Which technology should you recommend for each requirement?
To answer, drag the appropriate technology to the correct requirement in the answer area. Each
technology may be used once, more than once, or not at all. Additionally, you may need to drag the
split bar between panes or scroll to view content.

Which method should you use to move each virtual machine?

HOTSPOT
Your network contains an Active Directory domain named contoso.com. The domain
contains two member servers named Server1 and Server2. All servers run Windows Server
2012 R2.
Server1 and Server2 have the Hyper-V server role installed. The servers are configured as
shown in the following table.

You add a third server named Server3 to the network. Server3 has Intel processors.
You need to move VM3 and VM6 to Server3. The solution must minimize downtime on the
virtual machines.
Which method should you use to move each virtual machine?
To answer, select the appropriate method for each virtual machine in the answer area.


You need to ensure that you can assign classifications to Folder1 from Windows Explorer manually

You have a server named Server1 that runs Windows Server 2012 R2.
You install the File and Storage Services server role on Server1.
From Windows Explorer, you view the properties of a folder named Folder1 and you
discover that the Classification tab is missing.
You need to ensure that you can assign classifications to Folder1 from Windows Explorer
manually.

What should you do?

Which three actions should you perform in sequence?

DRAG DROP

You have a server named Server2 that runs Windows Server 2012 R2. You have storage
provisioned on Server2 as shown in the exhibit. (Click the Exhibit button.)

You need to configure the storage so that it appears in Windows Explorer as a drive letter on
Server1.
Which three actions should you perform in sequence? To answer, move the three
appropriate actions from the list of actions to the answer area and arrange them in the
correct order.