PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which two tools should you use?

Your network contains an Active Directory domain named contoso.com. The domain
contains three servers named Server1, Server2, and Server3 that run Windows Server 2012
R2. All three servers have the Hyper-V server role installed and the Failover Clustering
feature installed.
Server1 and Server2 are nodes in a failover cluster named Cluster1. Several highly available
virtual machines run on Cluster1. Cluster1 has the Hyper-V Replica Broker role installed.
The Hyper-V Replica Broker currently runs on Server1.
Server3 currently has no virtual machines.
You need to configure Cluster1 to be a replica server for Server3 and Server3 to be a replica
server for Cluster1.
Which two tools should you use? (Each correct answer presents part of the solution. Choose two.)

Which command should you run?

Your network contains an Active Directory domain named contoso.com. The domain
contains a file server named File1 that runs a Server Core Installation of Windows Server
2012 R2.
File1 has a volume named D that contains home folders. File1 creates a shadow copy of
volume D twice a day.
You discover that volume D is almost full.
You add a new volume named H to File1.
You need to ensure that the shadow copies of volume D are stored on volume H.
Which command should you run?

You need to start the operating system on Server1 as soon as possible

You have a server named Server1 that runs Windows Server 2012 R2.
Server1 has a single volume that is encrypted by using BitLocker Drive Encryption
(BitLocker).
BitLocker is configured to save encryption keys to a Trusted Platform Module (TPM).
Server1 is configured to perform a daily system image backup.
The motherboard on Server1 is upgraded.
After the upgrade, Windows Server 2012 R2 on Server1 fails to start.
You need to start the operating system on Server1 as soon as possible.
What should you do?

You need to ensure that multiple backups of Server1 are maintained

Your network contains two servers that run Windows Server 2012 R2 named Server1 and
Server2. Both servers have the File Server role service installed.
On Server2, you create a share named Backups.
From Windows Server Backup on Server1, you schedule a full backup to run every night.
You set the backup destination to \\Server2 \Backups.
After several weeks, you discover that \\Server2\Backups only contains the last backup that
completed on Server1.
You need to ensure that multiple backups of Server1 are maintained.
What should you do?

You need to verify whether the replica of VM5 on Server1 is functional

Your network contains two servers named Server1 and Server2 that run Windows Server
2012 R2. Server1 and Server2 have the Hyper-V server role installed. Server1 and Server2
are configured as Hyper-V replicas of each other.
Server2 hosts a virtual machine named VM5. VM5 is replicated to Server1.
You need to verify whether the replica of VM5 on Server1 is functional. The solution must
ensure that VM5 remains accessible to clients.
What should you do from Hyper-V Manager?

Which common name should you use for the certificates on each server?

HOTSPOT

Your network contains an Active Directory domain named contoso.com. The domain
contains two servers named Server1 and Server2 that run Windows Server 2012 R2. The
servers have the Hyper-V server role installed.
A certification authority (CA) is available on the network.
A virtual machine named vml.contoso.com is replicated from Server1 to Server2. A virtual
machine named vm2.contoso.com is replicated from Server2 to Server1.
You need to configure Hyper-V to encrypt the replication of the virtual machines.
Which common name should you use for the certificates on each server?
To answer, configure the appropriate common name for the certificate on each server in the answer area.

You need to ensure that you can manage the certificates on the CA What should you do?

Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1 that runs Windows Server 2012 R2. Server1 is an
enterprise root certification authority (CA) for contoso.com.
Your user account is assigned the certificate manager role and the auditor role on the
contoso.com CA. Your account is a member of the local Administrators group on Server1.
You enable CA role separation on Server1.
You need to ensure that you can manage the certificates on the CA
What should you do?

How should you configure the certificate request?

DRAG DROP
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1 that runs Windows Server 2012 R2.
You plan to install the Active Directory Federation Services server role on Server1 to allow
for Workplace Join.
You run nslookup enterprise registration and you receive the following results:

You need to create a certificate request for Server1 to support the Active Directory
Federation Services (AD FS) installation.
How should you configure the certificate request?
To answer, drag the appropriate names to the correct locations. Each name may be used
once, more than once, or not at all. You may need to drag the split bar between panes or
scroll to view content.

Which two actions should you perform?

Your network contains an Active Directory domain named contoso.com. The domain
contains servers named Server1 and Server2 that run Windows Server 2012 R2. Server1
has the Active Directory Federation Services server role installed. Server2 is a file server.
Your company introduces a Bring Your Own Device (BYOD) policy.
You need to ensure that users can use a personal device to access domain resources by
using Single Sign-On (SSO) while they are connected to the internal network.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)

Which tool should you use?

Your network contains an Active Directory domain named contoso.com. All servers run
Windows Server 2012 R2.
The domain contains a domain controller named DC1 that is configured as an enterprise root
certification authority (CA).
All users in the domain are issued a smart card and are required to log on to their domainjoined client computer by using their smart card.
A user named User1 resigned and started to work for a competing company.
You need to prevent User1 immediately from logging on to any computer in the domain. The
solution must not prevent other users from logging on to the domain.
Which tool should you use?