PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

You need to ensure that all users from the Internet are pre-authenticated before they can access App1

DRAG DROP
Your network contains an Active Directory domain named contoso.com. The domain contains two
servers named Server1 and Server3. The network contains a standalone server named Server2. All
servers run Windows Server 2012 R2. The servers are configured as shown in the following table.

Server3 hosts an application named App1. App1 is accessible internally by using the URL
https://app1.contoso.com. App1 only supports Integrated Windows authentication.
You need to ensure that all users from the Internet are pre-authenticated before they can access
App1.
What should you do? To answer, drag the appropriate servers to the correct actions. Each server
may be used once, more than once, or not at all. You may need to drag the split bar between panes
or scroll to view content.

Which rule types should you configure on each side of the federated trust?

DRAG DROP
Your network contains two Active Directory forests named contoso.com and adatum.com. All
domain controllers run Windows Server 2012 R2.
A federated trust exists between adatum.com and contoso.com. The trust provides adatum.com
users with access to contoso.com resources.
You need to configure Active Directory Federation Services (AD FS) claim rules for the federated
trust.
The solution must meet the following requirements:
In contoso.com, replace an incoming claim type named Group with an outgoing claim type named
Role.
In adatum.com, allow users to receive their tokens for the relying party by using their Active
Directory group membership as the claim type.
The AD FS claim rules must use predefined templates.
Which rule types should you configure on each side of the federated trust?
To answer, drag the appropriate rule types to the correct location or locations. Each rule type may
be used once, more than once, or not at all. You may need to drag the split bar between panes or
scroll to view content.

What should you identify?

Your network contains a perimeter network and an internal network. The internal network contains
an Active Directory Federation Services (AD FS) 2.1 infrastructure. The infrastructure uses Active
Directory as the attribute store.
You plan to deploy a federation server proxy to a server named Server2 in the perimeter network.
You need to identify which value must be included in the certificate that is deployed to Server2.
What should you identify?

Which two actions should you perform?

Your network contains an Active Directory domain named contoso.com. The domain contains
servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 has the Active
Directory Federation Services server role installed.Server2 is a file server.
Your company introduces a Bring Your Own Device (BYOD) policy.
You need to ensure that users can use a personal device to access domain resources by using Single
Sign-On (SSO) while they are connected to the internal network.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose
two.)

You need to move all of the applications and the services from Cluster1 to Cluster2

Your network contains two servers named Server1 and Server2 that run Windows Server 2008 R2.
Server1 and Server2 are nodes in a failover cluster named Cluster1. The network contains two
servers named Server3 and Server4 that run Windows Server 2012 R2. Server3 and Server4 are
nodes in a failover cluster named Cluster2.
You need to move all of the applications and the services from Cluster1 to Cluster2.
What should you do first from Failover Cluster Manager?

What should you run from Windows PowerShell?

DRAG DROP
Your network contains an Active Directory domain named contoso.com. The domain contains four
member servers named Server 1, Server2, Server3, and Server4. All servers run Windows Server
2012 R2.
Server1 and Server2 are located in a site named Site1. Server3 and Server4 are located in a site
named Site2. The servers are configured as nodes in a failover cluster named Cluster1.
Cluster1 is configured to use the Node Majority quorum configuration.
You need to ensure that Server1 is the only server in Site1 that can vote to maintain quorum.
What should you run from Windows PowerShell?
To answer, drag the appropriate commands to the correct location. Each command may be used
once, more than once, or not at all. You may need to drag the split bar between panes or scroll to
view content.

Which method should you use to move each virtual machine?

HOTSPOT

Your network contains an Active Directory domain named contoso.com. The domain contains two
member servers named Server1 and Server2. All servers run Windows Server 2012 R2.
Server1 and Server2 have the Hyper-V server role installed. The servers are configured as shown in
the following table.

You add a third server named Server3 to the network. Server3 has Intel processors.
You need to move VM3 and VM6 to Server3. The solution must minimize downtime on the virtual
machines.
Which method should you use to move each virtual machine?
To answer, select the appropriate method for each virtual machine in the answer area.

You need to start all of the virtual machines on HV2

Your network contains two servers named HV1 and HV2. Both servers run Windows Server 2012 R2
and have the Hyper-V server role installed.
HV1 hosts 25 virtual machines. The virtual machine configuration files and the virtual hard disks are
stored in D:\VM.
You shut down all of the virtual machines on HV1.
You copy D:\VM to D:\VM on HV2.
You need to start all of the virtual machines on HV2. You want to achieve this goal by using the
minimum amount of administrative effort.
What should you do?

which group should you add User2?

Your network contains an Active Directory domain named contoso.com. The domain contains a
server named Server1 that runs Windows Server 2012. Server1 has the Remote Access server role
installed.
You log on to Server1 by using a user account named User2.
From the Remote Access Management Console, you run the Getting Started Wizard and you receive
a warning message as shown in the exhibit. (Click the Exhibit button.)

You need to ensure that you can configure DirectAccess successfully. The solution must minimize the
number of permissions assigned to User2.
To which group should you add User2?