PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which type of trust policy should you create?

Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the
Active Directory Rights Management Services server role installed.
Your company works with a partner organization that does not have its own Active Directory
Rights Management Services (AD RMS) implementation.
You need to create a trust policy for the partner organization.
The solution must meet the following requirements:
Grant users in the partner organization access to protected content.
Provide users in the partner organization with the ability to create protected content.
Which type of trust policy should you create?

Which two actions should you perform?

Your network contains an Active Directory domain named contoso.com. The domain
contains a certification authority (CA).
You suspect that a certificate issued to a Web server is compromised.
You need to minimize the likelihood that users will trust the compromised certificate.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)

You need to ensure that a user named User1 can decrypt private keys archived in the Active Directory Certifica

Your network contains an Active Directory domain named adatum.com. The domain
contains a server named CA1 that runs Windows Server 2012 R2. CA1 has the Active
Directory Certificate Services server role installed and is configured to support key archival
and recovery.
You need to ensure that a user named User1 can decrypt private keys archived in the Active
Directory Certificate Services (AD CS) database. The solution must prevent User1 from
retrieving the private keys from the AD CS database.
What should you do?

Which two actions should you perform?

Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1 that runs Windows Server 2012 R2.
Server1 is an enterprise root certification authority (CA) for contoso.com.
You need to ensure that the members of a group named Group1 can request code signing
certificates. The certificates must be issued automatically to the members.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)

What should you configure?

Your network contains an Active Directory domain named adatum.com. The domain
contains a file server named FS1 that runs Windows Server 2012 R2 and has the File Server
Resource Manager role service installed. All client computers run Windows 8.
File classification and Access-Denied Assistance are enabled on FS1.

You need to ensure that if users receive an Access Denied message, they can request
assistance by email from the Access Denied dialog box.
What should you configure?

Which attribute should you modify?

HOTSPOT
Your network contains an Active Directory domain named contoso.com. The domain
contains two Active
Directory sites named Site1 and Site2.
You discover that when the account of a user in Site1 is locked out, the user can still log on
to the servers in Site2 for up to 15 minutes by using Remote Desktop Services (RDS).
You need to reduce the amount of time it takes to synchronize account lockout information
across the domain.
Which attribute should you modify?
To answer, select the appropriate attribute in the answer area.

Which four actions should you perform in sequence?

DRAG DROP
You have 3 server named Server1 that runs Windows Server 2012 R2.
You are asked to test Windows Azure Online Backup to back up Server1.
You need to back up Server1 by using Windows Azure Online Backup.
Which four actions should you perform in sequence?
To answer, move the appropriate four actions from the list of actions to the answer area and
arrange them in the correct order.

Which five actions should you perform?

DRAG DROP
Your network contains an Active Directory domain named contoso.com. The domain
contains four member servers named Server1, Server2, Server3, and Server4. Server1 and
Server2 run Windows Server 2008 R2.
Server1 and Server2 have the Hyper-V server role and the Failover Clustering feature
installed. Failover
Clustering is configured to provide highly available virtual machines by using a cluster
named Cluster1.
Cluster1 hosts 10 virtual machines.
Server3 and Server4 run Windows Server 2012 R2.
You install the Hyper-V server role and the Failover Clustering feature on Server3 and
Server4. You create a cluster named Cluster2.
You need to migrate cluster resources from Cluster1 to Cluster2. The solution must minimize
downtime on the virtual machines.
Which five actions should you perform?
To answer, move the appropriate five actions from the list of actions to the answer area and
arrange them in the correct order.