Does this meet the goal?
Your network contains an Active Directory domain named contoso.com. The network has an Active
Directory Certificate Services (AD CS) infrastructure.
You need to issue a certificate to users to meet the following requirements:
Ensure that the users can encrypt files by using Encrypting File System (EFS).
Ensure that all of the users reenroll for their certificate every six months.
Solution: You create a copy of the User certificate template, and then you modify the extensions of
the copy.
Does this meet the goal?
Does this meet the goal?
Your network contains an Active Directory domain named contoso.com. The network has an Active
Directory Certificate Services (AD CS) infrastructure.
You need to issue a certificate to users to meet the following requirements:
Ensure that the users can encrypt files by using Encrypting File System (EFS).
Ensure that all of the users reenroll for their certificate every six months.
Solution: From the properties of the Basic EFS template, you assign the Allow – Enroll permission to
the Authenticated Users group.
Does this meet the goal?
Does this meet the goal?
Your network contains an Active Directory domain named contoso.com. The network has an Active
Directory Certificate Services (AD CS) infrastructure.
You need to issue a certificate to users to meet the following requirements:
Ensure that the users can encrypt files by using Encrypting File System (EFS).
Ensure that all of the users reenroll for their certificate every six months.
Solution: You create a copy of the Basic EFS certificate template, and then you modify the validity
period of the copy.
Does this meet the goal?
Does this meet the goal?
Your network contains an Active Directory domain named contoso.com. The network has an Active
Directory Certificate Services (AD CS) infrastructure.
You need to issue a certificate to users to meet the following requirements:
Ensure that the users can encrypt files by using Encrypting File System (EFS).
Ensure that all of the users reenroll for their certificate every six months.
Solution: From the properties of the User certificate template, you assign the Allow – Enroll
permission to the Authenticated Users group.
Does this meet the goal?
What should you include in the recommendation?
Your network contains an Active Directory forest named contoso.com. The forest contains multiple
servers that run Windows Server 2012. The network contains 1,000 client computers that run
Windows 7. Two hundred remote users have laptop computers and only work from home.
The network does not provide remote access to users.
You need to recommend a monitoring solution to meet the following requirements:
Generate a list of updates that are applied successfully to all computers.
Minimize the amount of bandwidth used to download updates.
An administrator must approve the installation of an update on any client computer.
What should you include in the recommendation? (Each correct answer presents part of the
solution. Choose all that apply.)
You need to automate the remediation of non-compliant Hyper-V hosts
Your network contains a Microsoft System Center 2012 infrastructure.
You use Virtual Machine Manager (VMM) to manage 20 Hyper-V hosts.
You deploy a Windows Server Update Services (WSUS) server.
You need to automate the remediation of non-compliant Hyper-V hosts. The solution must minimize
the amount of time that virtual machines are unavailable.
What should you do first?
Which technology best achieves the goal?
Your network contains an Active Directory domain named contoso.com. The domain contains a
System Center 2012 R2 Virtual Machine Manager (VMM) deployment.
The domain contains 20 Hyper-V hosts that run Windows Server 2012 R2. Currently, the computer
accounts of all of the Hyper-V hosts are in organizational unit (OU) named Virtualization.
You plan to create two private clouds by using VMM named Cloud1 and Cloud2. The virtual
machines for Cloud1 will be hosted on two Hyper-V hosts named Server1 and Server2. The virtual
machines for Cloud2 will be hosted on two Hyper-V hosts named Server3 and Server4.
You need to recommend an administrative model for Cloud1 and Cloud2.
Which technology best achieves the goal? More than one answer choice may achieve the goal.
Select the BEST answer.
What should you identify?
Your network contains an internal network and a perimeter network. The internal network contains
an Active Directory domain named contoso.com. All client computers in the perimeter network are
part of a workgroup.
The internal network contains a Microsoft System Center 2012 infrastructure.
You plan to implement an update infrastructure to update the following:
Windows Server 2012
System Center 2012
Windows Server 2003
Microsoft SQL Server 2012
Third-party virtualization hosts
Microsoft SharePoint Server 2010
Another administrator recommends implementing a single WSUS server to manage all of the
updates. You need to identify which updates can be applied by using the recommended deployment
of WSUS.
What should you identify? (Each correct answer presents part of the solution. Choose all that apply.)
What should you include in the recommendation?
Your company has three offices. The offices are located in Seattle, London, and Tokyo.
The network contains an Active Directory domain named northwindtraders.com. Each office is
configured as an Active Directory site.
System Center 2012 R2 Operations Manager is deployed to the domain. The servers in all three sites
are monitored by using Operations Manager.
The company has a web site for its customers. The web site requires users to sign-in.
You need to recommend a solution to monitor the web site.
The solution must meet the following requirements:
Monitor the availability of the web site from locations in North America, Europe, Asia, and Australia.
Monitor multi-step requests to the web site.
Use a central console for monitoring.
What should you include in the recommendation?
Which System Center 2012 roles should you identify?
Your network contains an Active Directory domain named contoso.com.
You plan to implement Microsoft System Center 2012.
You need to identify which solution automates the membership of security groups for contoso.com.
The solution must use workflows that provide administrators with the ability to approve the addition
of members to the security groups.
Which System Center 2012 roles should you identify?