Which tool should you use?
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1 that runs Windows Server 2012.
Server1 is the enterprise root certification authority (CA) for contoso.com.
You need to enable CA role separation on Server1.
Which tool should you use?
What should you modify?
Your network contains an Active Directory domain named corp.contoso.com.
You deploy Active Directory Rights Management Services (AD RMS).
You have a rights policy template named Template1. Revocation is disabled for the
template.
A user named User1 can open content that is protected by Template1 while the user is
connected to the corporate network.
When User1 is disconnected from the corporate network, the user cannot open the protected
content even if the user previously opened the content.
You need to ensure that the content protected by Template1 can be opened by users who
are disconnected from the corporate network.
What should you modify?
You need to ensure that User10 can read the contents of the Data folder on Server5 in the adatum.com domain
Your network contains two Active Directory forests named contoso.com and adatum.com. All
of the domain controllers in both of the forests run Windows Server 2012 R2. The
adatum.com domain contains a file server named Servers.
Adatum.com has a one-way forest trust to contoso.com.
A contoso.com user name User10 attempts to access a shared folder on Servers and
receives the error message shown in the exhibit. (Click the Exhibit button.)
You verify that the Authenticated Users group has Read permissions to the Data folder.
You need to ensure that User10 can read the contents of the Data folder on Server5 in the
adatum.com domain.
What should you do?
You need to ensure that all users from the Internet are pre-authenticated before they can access Appl
DRAG DROP
Your network contains an Active Directory domain named contoso.com. The domain
contains two servers named Server1 and Server3. The network contains a standalone
server named Server2.
All servers run Windows Server 2012 R2. The servers are configured as shown in the
following table.
Server3 hosts an application named App1. App1 is accessible internally by using the URL
https://app1.contoso.com. App1 only supports Integrated Windows authentication.
You need to ensure that all users from the Internet are pre-authenticated before they can
access Appl.
What should you do?
To answer, drag the appropriate servers to the correct actions. Each server may be used
once, more than once, or not at all. You may need to drag the split bar between panes or
scroll to view content.
You need to ensure that you can use Password Settings objects (PSOs) in the domain
Your network contains an Active Directory forest. The forest contains one domain named
contoso.com. The domain contains three domain controllers. The domain controllers are
configured as shown in the following table.
DC1 has all of the operations master roles installed.
You transfer all of the operations master roles to DC2, and then you uninstall Active
Directory from DC1.
You need to ensure that you can use Password Settings objects (PSOs) in the domain.
What should you do?
You need to ensure that the users in Site2 are authenticated by both DC2 and DC3
Your network contains an Active Directory domain named adatum.com. The domain
contains two sites named Site1 and Site2 and two domain controllers named DC1 and DC2.
DC1 is located in Site1 and DC2 is located in Site2.
You install an additional domain controller named DC3 in Site1 and you ship DC3 to Site2.
A technician connects DC3 to Site2.
You discover that users in Site2 are authenticated only by DC2.
You need to ensure that the users in Site2 are authenticated by both DC2 and DC3.
What should you do?
You need to ensure that the SiteC users are authenticated by the domain controllers in SiteB, unless all of th
Your network contains an Active Directory forest named contoso.com. The forest contains a
single domain. The forest contains three Active Directory sites named SiteA, SiteB, and
SiteC. The sites contain four domain controllers. The domain controllers are configured as
shown in the following table.
An IP site link exits between each site.
You discover that the users in SiteC are authenticated by the domain controllers in SiteA and
SiteB.
You need to ensure that the SiteC users are authenticated by the domain controllers in
SiteB, unless all of the domain controllers in SiteB are unavailable.
What should you do?
You need to start VM1 on Server2
Your network contains two servers named Server1 and Server 2. Both servers run Windows
Server 2012 R2 and have the Hyper-V server role installed.
Server1 hosts a virtual machine named VM1. The virtual machine configuration files and the
virtual hard disks for VM1 are stored in D: \VM1.
You shut down VM1 on Server1.
You copy D:\VM1 to D:\VM1 on Server2.
You need to start VM1 on Server2. You want to achieve this goal by using the minimum
amount of administrative effort.
What should you do?
Which setting should you configure in GPO1?
HOTSPOT
Your network contains an Active Directory domain named contoso.com. The domain
contains a file server named Server1. Server1 is a BranchCache hosted cache server that is
located in a branch office.
The network contains client computers that run either Windows 7 or Windows 8.
For the branch office, all of the user accounts and the client computer accounts are located
in an organizational unit (OU) named Branch1. A Group Policy object (GPO) named GPO1
is linked to Branch 1. GPO1 contains the BranchCache settings.
You discover that users in the branch office who have client computers that run Windows 7
do not access cached content from Server1. Users in the branch office who have Windows 8
computers access cached content from Server1.
You need to configure the Windows 7 computers to use BranchCache on Server1. Which
setting should you configure in GPO1?
To answer, select the appropriate setting in the answer area.
How should you configure the witness disk?
DRAG DROP
You plan to deploy a failover cluster that will contain two nodes that run Windows Server
2012 R2.
You need to configure a witness disk for the failover cluster.
How should you configure the witness disk?
To answer, drag the appropriate configurations to the correct location or locations. Each
configuration may be used once, more than once, or not at all. You may need to drag the
split bar between panes or scroll to view content.