You need to ensure that data transmissions between remote client computers and the corporate network are as se
Your company’s corporate network uses Network Access Protection (NAP). Users are able to connect
to the corporate network remotely. You need to ensure that data transmissions between remote
client computers and the corporate network are as secure as possible. What should you do?
You need to ensure that data transmissions between remote client computers and the corporate network are as se
Your company’s corporate network uses Network Access Protection (NAP). Users are able to connect
to the corporate network remotely. You need to ensure that data transmissions between remote
client computers and the corporate network are as secure as possible. What should you do?
What should you recommend?
###BeginCaseStudy###
Case Study: 12
Wingtip Toys
Scenario
COMPANY OVERVIEW
Wingtip Toys is an international company that has a main office and several branch offices.
The main office is located in Moscow. The branch offices are located throughout Europe. The
main office has 500 users. Each branch office has 4 to 70 users.
PLANNED CHANGES
Wingtip Toys opens a new branch office that contains a file server. You plan to promote the
file server to a Read-only Domain Controller (RODC). Wingtip Toys plans to hire a
consulting firm to manage its Web site. The consulting firm must only be permitted to
manage the Web site and must be prevented from accessing to all other server resources.
Wingtip Toys plans to purchase a high-resolution printer that will be connected to a print
server in the main office. Users must be charged for each page that they print on the printer.
You plan to present additional storage to a two node failover cluster in the main office. The
storage will be used by the file server instance.
EXISTING ENVIRONMENT
All servers run either Windows Server 2008 or Windows Server 2008 R2. All client
computers run either Windows Vista Enterprise or Windows 7 Enterprise.
Existing Network Infrastructure
The network contains an internal network and a perimeter network. The company Web site is
hosted on a standalone server in the perimeter network. The main office connects to each
branch office by using a 1-Mbps WAN link.
Existing Active Directory Environment
The network contains a single Active Directory domain named wingtiptoys.com. An Active
Directory site exists for each office. Each Active Directory site contains a single subnet. The
main office has two domain controllers. Each branch office has a single domain controller.
REQUIREMENTS
Technical Requirements
Wingtip Toys must meet the following technical requirements:
• Minimize network utilization.
• Minimize WAN link utilization.
• Ensure that the file servers can access additional storage as a local drive.
• Ensure that changes to the network are transparent to users whenever possible.
• Ensure that new storage solutions are supported by Windows Failover Clustering.
• Ensure that each user can access his Documents folder from any client computer.
• Automatically organize the files on the file servers according to the contents of the
files.
• Ensure that storage can be provisioned without causing any downtime of the file
servers.
• Ensure that the data on the file servers is protected by using Windows BitLocker
Drive Encryption (BitLocker).
Problem Statements
All users store their documents and other data in the Documents folder on their respective
client computers. The users report that when they log on to a computer that is not their own,
their documents are unavailable.
###EndCaseStudy###
You need to recommend a strategy for delegating administration to the consulting firm. What should
you recommend?
You need to ensure that all client computers that access the network are evaluated by NAP
Your company has deployed Network Access Protection (NAP). You configure secure wireless access
to the network by using 802.1X authentication from any access point. You need to ensure that all
client computers that access the network are evaluated by NAP. What should you do?
You need to ensure that all client computers that access the network are evaluated by NAP
Your company has deployed Network Access Protection (NAP). You configure secure wireless access
to the network by using 802.1X authentication from any access point. You need to ensure that all
client computers that access the network are evaluated by NAP. What should you do?
What should you include in the recommendations?
###BeginCaseStudy###
Case Study: 12
Wingtip Toys
Scenario
COMPANY OVERVIEW
Wingtip Toys is an international company that has a main office and several branch offices.
The main office is located in Moscow. The branch offices are located throughout Europe. The
main office has 500 users. Each branch office has 4 to 70 users.
PLANNED CHANGES
Wingtip Toys opens a new branch office that contains a file server. You plan to promote the
file server to a Read-only Domain Controller (RODC). Wingtip Toys plans to hire a
consulting firm to manage its Web site. The consulting firm must only be permitted to
manage the Web site and must be prevented from accessing to all other server resources.
Wingtip Toys plans to purchase a high-resolution printer that will be connected to a print
server in the main office. Users must be charged for each page that they print on the printer.
You plan to present additional storage to a two node failover cluster in the main office. The
storage will be used by the file server instance.
EXISTING ENVIRONMENT
All servers run either Windows Server 2008 or Windows Server 2008 R2. All client
computers run either Windows Vista Enterprise or Windows 7 Enterprise.
Existing Network Infrastructure
The network contains an internal network and a perimeter network. The company Web site is
hosted on a standalone server in the perimeter network. The main office connects to each
branch office by using a 1-Mbps WAN link.
Existing Active Directory Environment
The network contains a single Active Directory domain named wingtiptoys.com. An Active
Directory site exists for each office. Each Active Directory site contains a single subnet. The
main office has two domain controllers. Each branch office has a single domain controller.
REQUIREMENTS
Technical Requirements
Wingtip Toys must meet the following technical requirements:
• Minimize network utilization.
• Minimize WAN link utilization.
• Ensure that the file servers can access additional storage as a local drive.
• Ensure that changes to the network are transparent to users whenever possible.
• Ensure that new storage solutions are supported by Windows Failover Clustering.
• Ensure that each user can access his Documents folder from any client computer.
• Automatically organize the files on the file servers according to the contents of the
files.
• Ensure that storage can be provisioned without causing any downtime of the file
servers.
• Ensure that the data on the file servers is protected by using Windows BitLocker
Drive Encryption (BitLocker).
Problem Statements
All users store their documents and other data in the Documents folder on their respective
client computers. The users report that when they log on to a computer that is not their own,
their documents are unavailable.
###EndCaseStudy###
You need to recommend a solution for promoting the RODC in the new branch office. What should
you include in the recommendations?
You need to ensure that Server1 can read the dial-in properties of the user accounts in the eu.contoso.com dom
Your network contains an Active Directory forest. The forest contains two domains named
contoso.com and eu.contoso.com. You install a Network Policy Server (NPS) named Server1 in the
contoso.com domain. You need to ensure that Server1 can read the dial-in properties of the user
accounts in the eu.contoso.com domain. What should you do?
You need to ensure that Server1 can read the dial-in properties of the user accounts in the eu.contoso.com dom
Your network contains an Active Directory forest. The forest contains two domains named
contoso.com and eu.contoso.com. You install a Network Policy Server (NPS) named Server1 in the
contoso.com domain. You need to ensure that Server1 can read the dial-in properties of the user
accounts in the eu.contoso.com domain. What should you do?
Which technical requirement cannot be met when using an iSCSI target?
###BeginCaseStudy###
Case Study: 12
Wingtip Toys
Scenario
COMPANY OVERVIEW
Wingtip Toys is an international company that has a main office and several branch offices.
The main office is located in Moscow. The branch offices are located throughout Europe. The
main office has 500 users. Each branch office has 4 to 70 users.
PLANNED CHANGES
Wingtip Toys opens a new branch office that contains a file server. You plan to promote the
file server to a Read-only Domain Controller (RODC). Wingtip Toys plans to hire a
consulting firm to manage its Web site. The consulting firm must only be permitted to
manage the Web site and must be prevented from accessing to all other server resources.
Wingtip Toys plans to purchase a high-resolution printer that will be connected to a print
server in the main office. Users must be charged for each page that they print on the printer.
You plan to present additional storage to a two node failover cluster in the main office. The
storage will be used by the file server instance.
EXISTING ENVIRONMENT
All servers run either Windows Server 2008 or Windows Server 2008 R2. All client
computers run either Windows Vista Enterprise or Windows 7 Enterprise.
Existing Network Infrastructure
The network contains an internal network and a perimeter network. The company Web site is
hosted on a standalone server in the perimeter network. The main office connects to each
branch office by using a 1-Mbps WAN link.
Existing Active Directory Environment
The network contains a single Active Directory domain named wingtiptoys.com. An Active
Directory site exists for each office. Each Active Directory site contains a single subnet. The
main office has two domain controllers. Each branch office has a single domain controller.
REQUIREMENTS
Technical Requirements
Wingtip Toys must meet the following technical requirements:
• Minimize network utilization.
• Minimize WAN link utilization.
• Ensure that the file servers can access additional storage as a local drive.
• Ensure that changes to the network are transparent to users whenever possible.
• Ensure that new storage solutions are supported by Windows Failover Clustering.
• Ensure that each user can access his Documents folder from any client computer.
• Automatically organize the files on the file servers according to the contents of the
files.
• Ensure that storage can be provisioned without causing any downtime of the file
servers.
• Ensure that the data on the file servers is protected by using Windows BitLocker
Drive Encryption (BitLocker).
Problem Statements
All users store their documents and other data in the Documents folder on their respective
client computers. The users report that when they log on to a computer that is not their own,
their documents are unavailable.
###EndCaseStudy###
You are evaluating whether to add an iSCSI target in the main office to add storage to the file
servers. Which technical requirement cannot be met when using an iSCSI target?
What should you modify on NPS2?
Your network contains a Network Policy Server (NPS) named NPS1. You deploy a new NPS named
NPS2. You need to ensure that NPS2 sends all authentication requests to NPS1. What should you
modify on NPS2?