how many days will the record be deleted?
Your network contains an Active Directory domain named contoso.com. The domain
contains a domain controller named DC1. DC1 has the DNS Server server role installed and
hosts an Active Directory-integrated zone for contoso.com. The no-refresh interval and the
refresh interval are both set to three days. The Advanced DNS settings of DC1 are shown in
the Advanced DNS Settings exhibit. (Click the Exhibit button.)
You open the properties of a static record named Server1 as shown in the Server1 Record
exhibit.(Click the Exhibit button.)
You discover that the scavenging process ran today, but the record for Server1 was not
deleted.
You run dnscmd.exe and specify the age all records parameter.
You need to identify when the record for Server1 will be deleted from the zone.
In how many days will the record be deleted?
You need to ensure that DC1 and DC4 are the only servers that replicate Active Directory changes between the s
Your network contains an Active Directory domain named contoso.com.
The Active Directory sites are configured as shown in the Sites exhibit. (Click the Exhibit
button.)
You need to ensure that DC1 and DC4 are the only servers that replicate Active Directory
changes between the sites.
What should you do?
You need to install a Microsoft Office 2007 application only on the computers in the Marketing OUs
Your company has an Active Directory forest. Each regional office has an organizational unit
(OU) named Marketing. The Marketing OU contains all users and computers in the region’s
Marketing department.
You need to install a Microsoft Office 2007 application only on the computers in the
Marketing OUs.
You create a GPO named MarketingApps.
What should you do next?
You need to install the AD CS server role as an Enterprise CA on CA1
A company has an Active Directory forest. You plan to install an offline Enterprise root
certification authority (CA) on a server named CA1. CA1 is a member of the
PerimeterNetwork workgroup and is attached to a hardware security module for private key
storage.
You attempt to add the Active Directory Certificate Services (AD CS) server role to CA1. The
Enterprise CA option is not available.
You need to install the AD CS server role as an Enterprise CA on CA1.
What should you do first?
You need to ensure that DNS1 receives zone updates from DC4
A domain controller named DC4 runs Windows Server 2008 R2. DC4 is configured as a
DNS server for fabrikam.com.
You install the DNS Server server role on a member server named DNS1 and then you
create a standard secondary zone for fabrikam.com. You configure DC4 as the master
server for the zone.
You need to ensure that DNS1 receives zone updates from DC4.
What should you do?
Which tool should you use?
You have an Active Directory domain named contoso.com.
You need to view the account lockout threshold and duration for the domain.
Which tool should you use?
You need to generate a file that contains the last logon time and the custom attribute values for each user in
Your network contains an Active Directory forest. The forest schema contains a custom
attribute for user objects.
You need to generate a file that contains the last logon time and the custom attribute values
for each user in the forest.
What should you use?
Which tool should you use?
Your network contains an Active Directory domain named litwareinc.com. The domain
contains two sites named Sitel and Site2. Site2 contains a read-only domain controller
(RODC).
You need to identify which user accounts attempted to authenticate to the RODC.
Which tool should you use?
Which tool should you use?
Your network contains an Active Directory forest named contoso.com. The forest contains
six domains.
You need to ensure that the administrators of any of the domains can specify a user
principal name (UPN) suffix oflitwareinc.com when they create user accounts by using Active
Directory Users and Computers.
Which tool should you use?
You need to ensure that events from the Security log of DC1 are collected on Computer1
You have a client computer named Computer1 that runs Windows 7.
On Computer1, you configure a source-initiated subscription.
You configure the subscription to retrieve all events from the Windows logs of a domain
controller named DC1.
The subscription is configured to use the HTTP protocol.
You discover that events from the Security log of DC1 are not collected on Computer1.
Events from the
Application log of DC1 and the System log of DC1 are collected on Computer1.
You need to ensure that events from the Security log of DC1 are collected on Computer1.
What should you do?