PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

you need to configure, in order to complete the deployment of AD RMS?

Company has a single domain network with Windows 2000, Windows 2003, and Windows 2008 servers. Client computers running Windows XP and Windows Vista. All domain controllers are running Windows server 2008.

You need to deploy Active Directory Rights Management System (AD RMS) to secure all documents, spreadsheets and to provide user authentication. What do you need to configure, in order to complete the deployment of AD RMS?

Which two group policy settings should you configure? (Each correct answer presents part of the solution

Your network contains an Active Directory domain. The network has DirectAccess deployed. You deploy the DirectAccess Connectivity Assistant (DCA) to all client computers. You need to ensure that users can view their DirectAccess status by using the DCA. Which two group policy settings should you configure? (Each correct answer presents part of the solution. Choose two.)

Which backup should you use to perform non- authoritative restore of Active Directory Domain Services (AD DS)

ABC.com has a network that consists of a single Active Directory domain. A technician has accidently deleted an Organizational unit (OU) on the domain controller. As an administrator of ABC.com, you are in process of restoring the OU. You need to execute a non-authoritative restore before an authoritative restore of the OU. Which backup should you use to perform non- authoritative restore of Active Directory Domain Services (AD DS) without disturbing other data stored on domain controller?

You need to change the domain security settings to trace the shutdowns and identify the cause of it

You are an administrator at ABC.com. Company has a network of 5 member servers acting as file servers. It has an Active Directory domain. You have installed a software application on the servers. As soon as the application is installed, one of the member servers shuts down itself. To trace and rectify the problem, you create a Group Policy Object (GPO). You need to change the domain security settings to trace the shutdowns and identify the cause of it.

What should you do to perform this task?

Which settings should you modify from the DirectAccess Setup console?

Your network contains an Active Directory domain named contoso.com. The network has DirectAccess deployed.

You deploy a new server named Server1 that hosts a management application. You need to ensure that Server1 can initiate connections to DirectAccess client computers. Which settings should you modify from the DirectAccess Setup console?

Which two actions should you perform to achieve this task? (Choose two answers

ABC.com has a software evaluation lab. There is a server in the evaluation lab named as CKT. CKT runs Windows Server 2008 and Microsoft Virtual Server 2005 R2. CKT has 200 virtual servers running on an isolated virtual segment to evaluate software. To connect to the internet, it uses physical network interface card.

ABC.com requires every server in the company to access Internet.

ABC.com security policy dictates that the IP address space used by software evaluation lab must not be used by other networks. Similarly, it states the IP address space used by other networks should not be used by the evaluation lab network. As an administrator you find you that the applications tested in the software evaluation lab need to access normal network to connect to the vendors update servers on the internet. You need to configure all virtual servers on the CKT server to access the internet. You also need to comply with company’s security policy.

Which two actions should you perform to achieve this task? (Choose two answers. Each answer is a part of the complete solution)

You need to ensure that the users’ computers are configured to use DirectAccess

Your network contains a server named Server1. Server1 has DirectAccess deployed. A group named Group1 is enabled for DirectAccess.

Users report that when they log on to their computers, the computers are not configured to use DirectAccess. You need to ensure that the users’ computers are configured to use DirectAccess.
What should you do first?