Which three actions should you perform?
Your network contains an Active Directory domain named contoso.com. All servers run
Windows Server 2012 R2. The domain contains two servers. The servers are configured as
shown in the following table.
All client computers run Windows 8 Enterprise.
You plan to deploy Network Access Protection (NAP) by using IPSec enforcement.
A Group Policy object (GPO) named GPO1 is configured to deploy a trusted server group to
all of the client computers.
You need to ensure that the client computers can discover HRA servers automatically.
Which three actions should you perform? (Each correct answer presents part of the solution.
Choose three.)
Which two nodes should you configure from the Network Policy Server console?
HOTSPOT
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1 that has the Network Policy Server server role installed.
The domain contains a server named Server2 that is configured for RADIUS accounting.
Server1 is configured as a VPN server and is configured to forward authentication requests
to Server2.
You need to ensure that only Server2 contains event information about authentication
requests from connections to Server1.
Which two nodes should you configure from the Network Policy Server console?
To answer, select the appropriate two nodes in the answer area.
Which two should you configure on Server3?
Your network contains two Active Directory forests named contoso.com and adatum.com.
The contoso.com forest contains a server named Server1.contoso.com. The adatum.com
forest contains a server named server2. adatum.com. Both servers have the Network Policy
Server role service installed.
The network contains a server named Server3. Server3 is located in the perimeter network
and has the Network Policy Server role service installed.
You plan to configure Server3 as an authentication provider for several VPN servers.
You need to ensure that RADIUS requests received by Server3 for a specific VPN server are
always forwarded to Server1.contoso.com.
Which two should you configure on Server3? (Each correct answer presents part of the
solution. Choose two.)
Which two authentication methods should you identify?
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1 that runs Windows Server 2012 P.2. Server1 has the
Network Policy and Access Services server role installed.
Your company’s security policy requires that certificate-based authentication must be used
by some network services.
You need to identify which Network Policy Server (NPS) authentication methods comply with
the security policy.
Which two authentication methods should you identify? (Each correct answer presents part
of the solution. Choose two.)
You need to ensure that user settings are saved to \\Server1 \Users\
Your network contains an Active Directory domain named adatum.com. The domain
contains a file server named Server1 that runs Windows Server 2012 R2.
All client computers run Windows 7.
You need to ensure that user settings are saved to \\Server1 \Users\.
What should you do?
Which Group Policy preference should you configure?
Your network contains an Active Directory domain named contoso.com. The domain
contains a domain controller named DC1 that runs Windows Server 2012 R2.
All client computers run Windows 8 Enterprise.
DC1 contains a Group Policy object (GPO) named GPO1.
You need to update the PATH variable on all of the client computers.
Which Group Policy preference should you configure?
Which additional command or cmdlet should you include in the recommendation?
Your company has a main office and a branch office.
The main office contains a server that hosts a Distributed File System (DFS) replicated
folder.
You plan to implement a new DFS server in the branch office.
You need to recommend a solution that minimizes the amount of network bandwidth used to
perform the initial synchronization of the folder to the branch office.
You recommend using the Export-DfsrClone and Import-DfsrClonecmdlets.
Which additional command or cmdlet should you include in the recommendation?
What should you modify?
Your network contains an Active Directory domain named contoso.com. The domain
contains two servers named Server1 and Server2. Both servers run Windows Server 2012
R2. Both servers have the File and Storage Services server role, the DFS Namespaces role
service, and the DFS Replication role service installed.
Server1 and Server2 are part of a Distributed File System (DFS) Replication group named
Group1. Server1 and Server2 are separated by a low-speed WAN connection.
You need to limit the amount of bandwidth that DFS can use to replicate between Server1 and Server2.
What should you modify?
What should you configure on Task1?
You have a file server named Server1 that runs Windows Server 2012 R2. Server1 has the
File Server Resource Manager role service installed.
Files created by users in the human resources department are assigned the Department
classification property automatically.
You are configuring a file management task named Task1 to remove user files that have not
been accessed for 60 days or more.
You need to ensure that Task1 only removes files that have a Department classification
property of human resources. The solution must minimize administrative effort.
What should you configure on Task1?
Which two object types should you identify?
Your network contains an Active Directory domain named contoso.com. All domain
controllers run Windows Server 2012 R2. You plan to use fine-grained password policies to
customize the password policy settings ofcontoso.com.
You need to identify to which Active Directory object types you can directly apply the finegrained password policies.
Which two object types should you identify? (Each correct answer presents part of the
solution. Choose two.)