PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which five actions should you perform?

Your network contains an Active Directory domain named contoso.com. The domain contains four member
servers named Server1, Server2, Server3, and Server4. Server1 and Server2 run Windows Server 2008 R2.
Server1 and Server2 have the Hyper-V server role and the Failover Clustering feature installed. Failover
Clustering is configured to provide highly available virtual machines by using a cluster named Cluster1. Cluster1
hosts 10 virtual machines.
Server3 and Server4 run Windows Server 2012 R2.You install the Hyper-V server role and the Failover Clustering feature on Server3 and Server4. You create a
cluster named Cluster2.
You need to migrate cluster resources from Cluster1 to Cluster2. The solution must minimize downtime on the
virtual machines.
Which five actions should you perform?
To answer, move the appropriate five actions from the list of actions to the answer area and arrange them in
the correct order.
Select and Place:

What should you identify?

You have a file server named Server1 that runs Windows Server 2012 R2. The folders on Server1 are
configured as shown in the following table.

A new corporate policy states that backups must use Windows Azure Online Backup whenever possible.
You need to identify which technology you must use to back up Server1. The solution must use Windows Azure
Online Backup whenever possible.
What should you identify?
To answer, drag the appropriate backup type to the correct location or locations. Each backup type may beused once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view
content.
Select and Place:

How should you configure the witness disk?

Your network contains an Active Directory domain named contoso.com. The domain contains two member
servers named Server1 and Server2 that run Windows Server 2012 R2.
You configure a new failover cluster named Cluster1. Server1 and Server2 are nodes in Cluster1. You need to
configure the disk that will be used as a witness disk for Cluster1.
How should you configure the witness disk?To answer, drag the appropriate configurations to the correct location or locations. Each configuration may be
used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view
content.
Select and Place:

Which three actions should you perform?

Your network contains an Active Directory forest. The forest contains a single domain named contoso.com. The
forest contains two Active Directory sites named Main and Branch1. The sites connect to each other by using a
site link named Main-Branch1. There are no other site links.
Each site contains several domain controllers. All domain controllers run Windows Server 2012 R2. Your
company plans to open a new branch site named Branch2. The new site will have a WAN link that connects to
the Main site only. The site will contain two domain controllers that run Windows Server 2012 R2.
You need to create a new site and a new site link for Branch2. The solution must ensure that the domain
controllers in Branch2 only replicate to the domain controllers in Branch1 if all of the domain controllers in Main
are unavailable.
Which three actions should you perform?
To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in
the correct order.
Select and Place:

Which three actions should you perform in sequence?

You have a server named Server2 that runs Windows Server 2012 R2. You have storage provisioned on
Server2 as shown in the exhibit. (Click the Exhibit button.)

You need to configure the storage so that it appears in Windows Explorer as a drive letter on Server1.
Which three actions should you perform in sequence?
the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Select and Place:

Which three actions should you perform in sequence?

Your network contains an Active Directory domain named contoso.com. The domain contains a file server
named Server1. All servers run Windows Server 2012 R2.
All domain user accounts have the Division attribute automatically populated as part of the user provisioning
process. The Support for Dynamic Access Control and Kerberos armoring policy is enabled for the domain.
You need to control access to the file shares on Server1 based on the values in the Division attribute and the
Division resource property.
Which three actions should you perform in sequence?
Select and Place:

What should you identify?

You have a file server named Server1 that runs Windows Server 2012 R2. The folders on Server1 are
configured as shown in the following table.

A new corporate policy states that backups must use Microsoft Online Backup whenever possible.
You need to identify which technology you must use to back up Server1. The solution must use Microsoft
Online Backup whenever
What should you identify?
To answer, drag the appropriate backup type to the correct location or locations. Each backup type may be
used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view
content.Select and Place:

which order should you Perform the five actions?

Your network contains an Active Directory domain named contoso.com. All file servers in the domain run
Windows Server 2012.
The computer accounts of the file servers are in an organizational unit (OU) named OU1. A Group Policy object
(GPO) named GPO1 is linked to OU1.
You plan to modify the NTFS permissions for many folders on the file servers by using central access policies.
You need to identify any users who will be denied access to resources that they can currently access once the
new permissions are implemented.
In which order should you Perform the five actions?
Select and Place:

Which two actions should you perform?

Your network contains an Active Directory domain named contoso.com. The domain contains a server named
Server1 that runs Windows Server 2012 R2.
Server1 is an enterprise root certification authority (CA) for contoso.com.
You need to ensure that the members of a group named Group1 can request code signing certificates. The
certificates must be issued automatically to the members.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

You need to ensure that a user named User1 can decrypt …

Your network contains an Active Directory domain named adatum.com. The domain contains a server named
CA1 that runs Windows Server 2012 R2. CA1 has the Active Directory Certificate Services server role installed
and is configured to support key archival and recovery.
You need to ensure that a user named User1 can decrypt private keys archived in the Active Directory
Certificate Services (AD CS) database. The solution must prevent User1 from retrieving the private keys from
the AD CS database.
What should you do?


Page 495 of 6,830« First...102030...493494495496497...500510520...Last »