Which two network connections should you include on the…
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed.
You need to implement NIC teaming on Server1.
Which two network connections should you include on the NIC team? (To answer, select the two appropriate network connections in the answer area.)
Hot Area:
You need to ensure that the SiteC users are authenticat…
Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The
forest contains three Active Directory sites named SiteA, SiteB, and SiteC. The sites contain four domain
controllers. The domain controllers are configured as shown in the following table.
An IP site link exits between each site.
You discover that the users in SiteC are authenticated by the domain controllers in SiteA and SiteB.
You need to ensure that the SiteC users are authenticated by the domain controllers in SiteB, unless all of the
domain controllers in SiteB are unavailable.
What should you do?
Which option should you select?
Your network contains an Active Directory domain named contoso.com. The domain contains a print server named Print1 that runs Windows Server 2012 R2.
Print1 has 50 shared printers. Each printer is listed in Active Directory.
From Active Directory Users and Computers, you browse to Print1 and you discover that the 50 printers are not visible.
You need to ensure that you can view the printer objects in Active Directory Users and Computers.
Which option should you select? To answer, select the appropriate option in the answer area.
Hot Area:
Which tool should you use?
Your company recently deployed a new Active Directory forest named contoso.com. The forest contains two
Active Directory sites named Site1 and Site2.
The first domain controller in the forest runs Windows Server 2012 R2.
You need to force the replication of the SYSVOL folder from Site1 to Site2.
Which tool should you use?
How should you configure the rule?
Your network contains an Active Directory domain named contoso.com. The domain contains 25 servers. All servers run Windows Server 2012 R2.
You need to create a Windows Firewall rule to prevent administrators from using Internet Explorer to access the Internet while they are logged on interactively to the
servers. The solution must not prevent administrators from accessing websites on the internal network.
How should you configure the rule?
To answer, select the appropriate options in the answer area.
Hot Area:
Which two actions should you perform?
Your network contains an Active Directory forest named contoso.com. The forest contains two domains named
contoso.com and childl.contoso.com. The domains contain three domain controllers. The domain controllers
are configured as shown in the following table.
You need to ensure that the KDC support for claims, compound authentication, and kerberos armoring setting
is enforced in both domains.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
Which actions should you perform on each server? To ans…
Your network contains an Active Directory domain named contoso.com. The domain contains servers named Server1 and Server2 that run Windows Server 2012
R2.
You create a windows PowerShell script named Scriptl.psl that contains the following configuration:
You need to apply the configuration to Server1. The solution must ensure that the configuration on Server1 can be updated by modifying a MOF file on Server2.
Which actions should you perform on each server?
To answer, select the appropriate server on which to perform each action in the answer area.
Hot Area:
Which tool should you use?
Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The
forest functional level is Windows Server 2012 R2.You have a domain controller named DC1.
On DC1, you create a new Group Policy object (GPO) named GPO1. You need to verify that GPO1 was
replicated to all of the domain controllers.
Which tool should you use?
What should you identify?
You have a file server named Server1 that runs Windows Server 2012 R2. Server1 contains a folder named Folder1.
A user named User1 is a member of Group1 and Group2. A user named User2 is a member of Group2 and Group3.
You need to identify which actions the users can perform when they access the files in Share1.
What should you identify?
To answer, select the appropriate actions for each user in the answer area.
Hot Area:
What should you create?
Your network contains an Active Directory forest. The forest contains two domains named contoso.com and
fabrikam.com. The functional level of the forest is Windows Server 2003.
You have a domain outside the forest named adatum.com.
You need to configure an access solution to meet the following requirements:
Users in adatum.com must be able to access resources in contoso.com.
Users in adatum.com must be prevented from accessing resources in fabrikam.com.
Users in both contoso.com and fabrikam.com must be prevented from accessing resources in adatum.com.
What should you create?