PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

You need to allow users from the corp.contoso.com domain to log on to the client computers in the fabrikam

Your network contains two Active Directory forests named contoso.com and fabrikam.com.
The contoso.com forest contains two domains named corp.contoso.com and contoso.com.
You establish a two-way forest trust between contoso.com and fabrikam.com.
Users from the corp.contoso.com domain report that they cannot log on to client computers in the fabrikam.
com domain by using their corp.contoso.com user account.
When they try to log on, they receive following error message:
“The computer you are signing into is protected by an authentication firewall. The specified account is not
allowed to authenticate to the computer.”
corp.contoso.com users can log on successfully to client computers in the contoso.com domain by using their
corp.contoso.com user account credentials.
You need to allow users from the corp.contoso.com domain to log on to the client computers in the fabrikam.
com forest.
What should you do?

Which Advanced Boot Option should you select?

You have a server named SERVER1 that runs Windows Server 2012 and is used for testing.
A developer at your company creates and installs anunsigned kernel-mode driver on SERVER1.
The developer reports that SERVER1 will no longer start.
You need to ensure that the developer can test the new driver.
The solution must minimize the amount of data loss.
Which Advanced Boot Option should you select?

Which of the following describes reason for creating a superscope?

You are employed as a network administrator and have an Active Directory domain named abc.com.
All servers on the abc.com network have Windows Server 2012 installed.
abc.com has a server, named SERVER1 which is configured as a DHCP server.
You have created a superscope on SERVER1.
Which of the following describes reason for creating a superscope? (choose all that apply.)

Which of the following is TRUE with regards to hot standby mode?

You are employed as a network administrator and have an Active Directory domain named abc.com.
All servers on the abc.com network run Windows Server 2012.
You are running a training exercise for junior network administrators.
You are currently discussing DHCP failover architecture.
You have informed the trainees that DHCP servers can be deployed as fail over partners in either hot standby
mode or load sharing mode.
Which of the following is TRUE with regards to hot standby mode? (Choose all that apply)

Which of the following is the attribute that needs to be configured?

You are employed as a network administrator and have an Active Directory domain named abc.com.
All servers on the abc.com network run Windows Server 2012.
The abc.com domain has two Active Directory sites configured.
You want to make use of change notification configure replication between these Active Directory Sites.
You have opened DEFAULTIPSITELINK properties to configure the necessary attribute.
Which of the following is the attribute that needs to be configured?

Which of the following actions should you take ?

You have an Active Directory domain named abc.com.
All servers on the abc.com network run Windows Server 2012.
abc.com has a server named SERVER1 which has been configured to run the HYPER-V server role,
SERVER1 is configured to host multiple virtual machines.
When abc.com acquires a server with a better hardware configuration to SERVER1, you are instructed to
relocate the virtual machines to the new server with as little interruptions as possible.
Which of the following actions should you take ? (Choose all that apply.)

Which of the following actions should you take?

You have an Active Directory domain named contoso.com.
All Servers on the contoso.com network have WindowsServer 2012 installed.
A contoso.com server, named SERVER1, hosts the Active Directory Certificate Services Server (ADCS) role
and utilizes a Hardware Security Module (HSM) to safeguard its private key.
You have been instructed to backup the Active Directory Certificate Services (ADCS) database, log files, and
private key regularly.
You should not use a utility supplied by the hardware security module (HSM) creator.
Which of the following actions should you take?

Which of the following actions should you take?

You have an Active Directory domain named contoso.com.
All Servers on the contoso.com network have WindowsServer 2012 installed.
Contoso.com has a server named SERVER1, which is configured as a file server.
You have been instructed to enable a feature that discovers and eradicates duplication within data without
compromising its reliability or accuracy.
Which of the following actions should you take?