What should you recommend?
###BeginCaseStudy###
Case Study: 16
Trey Research
Scenario
COMPANY OVERVIEW
Trey Research is a pharmaceutical company that has a main office and two branch offices.
The main office is located in Denver. The branch offices are located in New York and
Seattle. The main office has 10,000 users. Each branch office has approximately 200 users.
PLANNED CHANGES
You plan to deploy a new Application named App1. App1 is developed in-house. The binary
executables and support files for App1 contain sensitive intellectual property. Users must
access App1 through document invocation. The users must be prevented from directly
copying or accessing the App1 program files.
EXISTING ENVIRONMENT
The network contains a single Active Directory domain named treyresearch.com. All servers
run Windows Server 2008 R2. All client computers run Windows 7 Enterprise. The network
contains a Web server named Web1 that hosts an intranet site. All users use Web1. Users
report that access to the content on Web1 is slow. You discover that the CPU utilization of
Web1 is approximately 90 percent during peak hours. Microsoft System Center
Configuration Manager is used to deploy updates to all of the client computers.
Existing Network Infrastructure
Each office has several file servers. The file servers have a limited amount of storage space.
Users access the data on all of the file servers. Each branch office has a WAN link to the
main office. Users in the branch office frequently access the file server in the main office.
Current Administration Model
All servers are currently administered remotely by using Remote Desktop. Help desk users
perform the following administrative tasks in the domain:
• Manage printers.
• Create shared folders.
• Manage Active Directory users.
• Modify file permissions and share permissions.
All of the help desk users are members of a global group named HelpDesk. Business Goals.
Trey Research has the following business goals:
• Minimize the cost of making changes to the environment.
• Minimize the cost of managing the network infrastructure and the servers
REQUIREMENTS
Technical Requirements
Trey Research plans to Virtualize all of the servers during the next three years. Trey
Research must meet the following technical requirements for virtualization:
• Simplify the management of all hardware.
• Allocate CPU resources between virtual machines (VMs).
• Ensure that the VMs can connect to multiple virtual local area networks (VLANs).
• Minimize the amount of administrative effort required to convert physical servers to
VMs.
Trey Research must ensure that users can access content in the shared folders if a single
server fails. The solution must also reduce the amount of bandwidth used to access the shared
folders from the branch offices. Trey Research must meet the following technical
requirements for the intranet site:
• Improve response time for users.
• Provide redundancy if a single server fails.
Security Requirements
A new corporate security policy states that only Enterprise Administrators are allowed to
interactively log on to servers.
User Requirements
Users report that it is difficult to locate files in the shared folders across the network. The
users want a single point of access for all of the shared folders in the company.
###EndCaseStudy###
You need to recommend a deployment strategy for App1. What should you recommend?
What are two possible ways to achieve this goal?
You have a server that runs Windows Server 2008 R2. The server has the Web Server (IIS) server role
and the FTP Service role service installed. You add a new FTP site to the server. You need to ensure
that the new FTP site is available. What are two possible ways to achieve this goal? (Each correct
answer presents a complete solution. Choose two.)
Which technical requirement is NOT met by a HyperV deployment?
###BeginCaseStudy###
Case Study: 16
Trey Research
Scenario
COMPANY OVERVIEW
Trey Research is a pharmaceutical company that has a main office and two branch offices.
The main office is located in Denver. The branch offices are located in New York and
Seattle. The main office has 10,000 users. Each branch office has approximately 200 users.
PLANNED CHANGES
You plan to deploy a new Application named App1. App1 is developed in-house. The binary
executables and support files for App1 contain sensitive intellectual property. Users must
access App1 through document invocation. The users must be prevented from directly
copying or accessing the App1 program files.
EXISTING ENVIRONMENT
The network contains a single Active Directory domain named treyresearch.com. All servers
run Windows Server 2008 R2. All client computers run Windows 7 Enterprise. The network
contains a Web server named Web1 that hosts an intranet site. All users use Web1. Users
report that access to the content on Web1 is slow. You discover that the CPU utilization of
Web1 is approximately 90 percent during peak hours. Microsoft System Center
Configuration Manager is used to deploy updates to all of the client computers.
Existing Network Infrastructure
Each office has several file servers. The file servers have a limited amount of storage space.
Users access the data on all of the file servers. Each branch office has a WAN link to the
main office. Users in the branch office frequently access the file server in the main office.
Current Administration Model
All servers are currently administered remotely by using Remote Desktop. Help desk users
perform the following administrative tasks in the domain:
• Manage printers.
• Create shared folders.
• Manage Active Directory users.
• Modify file permissions and share permissions.
All of the help desk users are members of a global group named HelpDesk. Business Goals.
Trey Research has the following business goals:
• Minimize the cost of making changes to the environment.
• Minimize the cost of managing the network infrastructure and the servers
REQUIREMENTS
Technical Requirements
Trey Research plans to Virtualize all of the servers during the next three years. Trey
Research must meet the following technical requirements for virtualization:
• Simplify the management of all hardware.
• Allocate CPU resources between virtual machines (VMs).
• Ensure that the VMs can connect to multiple virtual local area networks (VLANs).
• Minimize the amount of administrative effort required to convert physical servers to
VMs.
Trey Research must ensure that users can access content in the shared folders if a single
server fails. The solution must also reduce the amount of bandwidth used to access the shared
folders from the branch offices. Trey Research must meet the following technical
requirements for the intranet site:
• Improve response time for users.
• Provide redundancy if a single server fails.
Security Requirements
A new corporate security policy states that only Enterprise Administrators are allowed to
interactively log on to servers.
User Requirements
Users report that it is difficult to locate files in the shared folders across the network. The
users want a single point of access for all of the shared folders in the company.
###EndCaseStudy###
You are evaluating whether to deploy Hyper-V. Which technical requirement is NOT met by a HyperV
deployment?
You need to ensure that users can only access files that have the .htm, .html, .asp, and .aspx file extensions
Your network contains a Web server. You need to ensure that users can only access files that have
the .htm, .html, .asp, and .aspx file extensions. What should you do?
You need to identify each help desk user who bypasses the new corporate security policy
###BeginCaseStudy###
Case Study: 16
Trey Research
Scenario
COMPANY OVERVIEW
Trey Research is a pharmaceutical company that has a main office and two branch offices.
The main office is located in Denver. The branch offices are located in New York and
Seattle. The main office has 10,000 users. Each branch office has approximately 200 users.
PLANNED CHANGES
You plan to deploy a new Application named App1. App1 is developed in-house. The binary
executables and support files for App1 contain sensitive intellectual property. Users must
access App1 through document invocation. The users must be prevented from directly
copying or accessing the App1 program files.
EXISTING ENVIRONMENT
The network contains a single Active Directory domain named treyresearch.com. All servers
run Windows Server 2008 R2. All client computers run Windows 7 Enterprise. The network
contains a Web server named Web1 that hosts an intranet site. All users use Web1. Users
report that access to the content on Web1 is slow. You discover that the CPU utilization of
Web1 is approximately 90 percent during peak hours. Microsoft System Center
Configuration Manager is used to deploy updates to all of the client computers.
Existing Network Infrastructure
Each office has several file servers. The file servers have a limited amount of storage space.
Users access the data on all of the file servers. Each branch office has a WAN link to the
main office. Users in the branch office frequently access the file server in the main office.
Current Administration Model
All servers are currently administered remotely by using Remote Desktop. Help desk users
perform the following administrative tasks in the domain:
• Manage printers.
• Create shared folders.
• Manage Active Directory users.
• Modify file permissions and share permissions.
All of the help desk users are members of a global group named HelpDesk. Business Goals.
Trey Research has the following business goals:
• Minimize the cost of making changes to the environment.
• Minimize the cost of managing the network infrastructure and the servers
REQUIREMENTS
Technical Requirements
Trey Research plans to Virtualize all of the servers during the next three years. Trey
Research must meet the following technical requirements for virtualization:
• Simplify the management of all hardware.
• Allocate CPU resources between virtual machines (VMs).
• Ensure that the VMs can connect to multiple virtual local area networks (VLANs).
• Minimize the amount of administrative effort required to convert physical servers to
VMs.
Trey Research must ensure that users can access content in the shared folders if a single
server fails. The solution must also reduce the amount of bandwidth used to access the shared
folders from the branch offices. Trey Research must meet the following technical
requirements for the intranet site:
• Improve response time for users.
• Provide redundancy if a single server fails.
Security Requirements
A new corporate security policy states that only Enterprise Administrators are allowed to
interactively log on to servers.
User Requirements
Users report that it is difficult to locate files in the shared folders across the network. The
users want a single point of access for all of the shared folders in the company.
###EndCaseStudy###
You need to identify each help desk user who bypasses the new corporate security policy. What
should you do?
You need to enable SSL encryption for the Web site
Your network contains a Web server named Web1 that runs Windows Server 2008 R2. You import an
SSL certificate to Web1. You need to enable SSL encryption for the Web site. What should you do?
Which tool should you identify?
###BeginCaseStudy###
Case Study: 16
Trey Research
Scenario
COMPANY OVERVIEW
Trey Research is a pharmaceutical company that has a main office and two branch offices.
The main office is located in Denver. The branch offices are located in New York and
Seattle. The main office has 10,000 users. Each branch office has approximately 200 users.
PLANNED CHANGES
You plan to deploy a new Application named App1. App1 is developed in-house. The binary
executables and support files for App1 contain sensitive intellectual property. Users must
access App1 through document invocation. The users must be prevented from directly
copying or accessing the App1 program files.
EXISTING ENVIRONMENT
The network contains a single Active Directory domain named treyresearch.com. All servers
run Windows Server 2008 R2. All client computers run Windows 7 Enterprise. The network
contains a Web server named Web1 that hosts an intranet site. All users use Web1. Users
report that access to the content on Web1 is slow. You discover that the CPU utilization of
Web1 is approximately 90 percent during peak hours. Microsoft System Center
Configuration Manager is used to deploy updates to all of the client computers.
Existing Network Infrastructure
Each office has several file servers. The file servers have a limited amount of storage space.
Users access the data on all of the file servers. Each branch office has a WAN link to the
main office. Users in the branch office frequently access the file server in the main office.
Current Administration Model
All servers are currently administered remotely by using Remote Desktop. Help desk users
perform the following administrative tasks in the domain:
• Manage printers.
• Create shared folders.
• Manage Active Directory users.
• Modify file permissions and share permissions.
All of the help desk users are members of a global group named HelpDesk. Business Goals.
Trey Research has the following business goals:
• Minimize the cost of making changes to the environment.
• Minimize the cost of managing the network infrastructure and the servers
REQUIREMENTS
Technical Requirements
Trey Research plans to Virtualize all of the servers during the next three years. Trey
Research must meet the following technical requirements for virtualization:
• Simplify the management of all hardware.
• Allocate CPU resources between virtual machines (VMs).
• Ensure that the VMs can connect to multiple virtual local area networks (VLANs).
• Minimize the amount of administrative effort required to convert physical servers to
VMs.
Trey Research must ensure that users can access content in the shared folders if a single
server fails. The solution must also reduce the amount of bandwidth used to access the shared
folders from the branch offices. Trey Research must meet the following technical
requirements for the intranet site:
• Improve response time for users.
• Provide redundancy if a single server fails.
Security Requirements
A new corporate security policy states that only Enterprise Administrators are allowed to
interactively log on to servers.
User Requirements
Users report that it is difficult to locate files in the shared folders across the network. The
users want a single point of access for all of the shared folders in the company.
###EndCaseStudy###
You need to identify which tool the help desk users must use to perform administrative tasks. Which
tool should you identify?
You need to identify how many computers were activated by Server1
You have a server named Server1 that runs Windows Server 2008 R2. Server1 has the Key
Management Service (KMS) installed. You need to identify how many computers were activated by
Server1. What should you run?
What should you include in the recommendation?
###BeginCaseStudy###
Case Study: 16
Trey Research
Scenario
COMPANY OVERVIEW
Trey Research is a pharmaceutical company that has a main office and two branch offices.
The main office is located in Denver. The branch offices are located in New York and
Seattle. The main office has 10,000 users. Each branch office has approximately 200 users.
PLANNED CHANGES
You plan to deploy a new Application named App1. App1 is developed in-house. The binary
executables and support files for App1 contain sensitive intellectual property. Users must
access App1 through document invocation. The users must be prevented from directly
copying or accessing the App1 program files.
EXISTING ENVIRONMENT
The network contains a single Active Directory domain named treyresearch.com. All servers
run Windows Server 2008 R2. All client computers run Windows 7 Enterprise. The network
contains a Web server named Web1 that hosts an intranet site. All users use Web1. Users
report that access to the content on Web1 is slow. You discover that the CPU utilization of
Web1 is approximately 90 percent during peak hours. Microsoft System Center
Configuration Manager is used to deploy updates to all of the client computers.
Existing Network Infrastructure
Each office has several file servers. The file servers have a limited amount of storage space.
Users access the data on all of the file servers. Each branch office has a WAN link to the
main office. Users in the branch office frequently access the file server in the main office.
Current Administration Model
All servers are currently administered remotely by using Remote Desktop. Help desk users
perform the following administrative tasks in the domain:
• Manage printers.
• Create shared folders.
• Manage Active Directory users.
• Modify file permissions and share permissions.
All of the help desk users are members of a global group named HelpDesk. Business Goals.
Trey Research has the following business goals:
• Minimize the cost of making changes to the environment.
• Minimize the cost of managing the network infrastructure and the servers
REQUIREMENTS
Technical Requirements
Trey Research plans to Virtualize all of the servers during the next three years. Trey
Research must meet the following technical requirements for virtualization:
• Simplify the management of all hardware.
• Allocate CPU resources between virtual machines (VMs).
• Ensure that the VMs can connect to multiple virtual local area networks (VLANs).
• Minimize the amount of administrative effort required to convert physical servers to
VMs.
Trey Research must ensure that users can access content in the shared folders if a single
server fails. The solution must also reduce the amount of bandwidth used to access the shared
folders from the branch offices. Trey Research must meet the following technical
requirements for the intranet site:
• Improve response time for users.
• Provide redundancy if a single server fails.
Security Requirements
A new corporate security policy states that only Enterprise Administrators are allowed to
interactively log on to servers.
User Requirements
Users report that it is difficult to locate files in the shared folders across the network. The
users want a single point of access for all of the shared folders in the company.
###EndCaseStudy###
You need to recommend changes to the environment that meet the company’s user requirements.
What should you include in the recommendation?
How should you configure Cluster1?
Your network contains two servers named Server1 and Server2. The network contains a Storage
Area Network (SAN). Server1 and Server2 each connect to two logical unit numbers (LUNs) on the
SAN. You create a failover cluster named Cluster1. Server1 and Server2 are nodes in Cluster1. One of
the LUNs is used as a witness disk. You plan to create 10 virtual machine (VM) instances in Cluster1.
You need to ensure that each VM instance can be moved between nodes independently of the other
VMs. How should you configure Cluster1?