you need to configure, in order to complete the deployment of AD RMS?
Company has a single domain network with Windows 2000, Windows 2003, and Windows 2008 servers. Client computers running Windows XP and Windows Vista. All domain controllers are running Windows server 2008.
You need to deploy Active Directory Rights Management System (AD RMS) to secure all documents, spreadsheets and to provide user authentication. What do you need to configure, in order to complete the deployment of AD RMS?
You need to configure the DNS servers on your network to support DirectAccess
Your network contains an Active Directory forest. The functional level of the forest is Windows Server 2008 R2. You plan to deploy DirectAccess.
You need to configure the DNS servers on your network to support DirectAccess. What should you do?
What should you do to achieve this task?
ABC.com has a network that consists of a single Active Directory domain.Windows Server 2008 is installed on all domain controllers in the network. You are instructed to capture all replication errors from all domain controllers to a central location.
What should you do to achieve this task?
Which two group policy settings should you configure? (Each correct answer presents part of the solution
Your network contains an Active Directory domain. The network has DirectAccess deployed. You deploy the DirectAccess Connectivity Assistant (DCA) to all client computers. You need to ensure that users can view their DirectAccess status by using the DCA. Which two group policy settings should you configure? (Each correct answer presents part of the solution. Choose two.)
Which backup should you use to perform non- authoritative restore of Active Directory Domain Services (AD DS)
ABC.com has a network that consists of a single Active Directory domain. A technician has accidently deleted an Organizational unit (OU) on the domain controller. As an administrator of ABC.com, you are in process of restoring the OU. You need to execute a non-authoritative restore before an authoritative restore of the OU. Which backup should you use to perform non- authoritative restore of Active Directory Domain Services (AD DS) without disturbing other data stored on domain controller?
You need to identify the URL of the network location server that Computer1 is configured to use
Your network contains a client computer named Computer1 that runs Windows 7. Computer1 is configured to use DirectAccess.
You need to identify the URL of the network location server that Computer1 is configured to use.
What should you do?
You need to change the domain security settings to trace the shutdowns and identify the cause of it
You are an administrator at ABC.com. Company has a network of 5 member servers acting as file servers. It has an Active Directory domain. You have installed a software application on the servers. As soon as the application is installed, one of the member servers shuts down itself. To trace and rectify the problem, you create a Group Policy Object (GPO). You need to change the domain security settings to trace the shutdowns and identify the cause of it.
What should you do to perform this task?
Which settings should you modify from the DirectAccess Setup console?
Your network contains an Active Directory domain named contoso.com. The network has DirectAccess deployed.
You deploy a new server named Server1 that hosts a management application. You need to ensure that Server1 can initiate connections to DirectAccess client computers. Which settings should you modify from the DirectAccess Setup console?
Which two actions should you perform to achieve this task? (Choose two answers
ABC.com has a software evaluation lab. There is a server in the evaluation lab named as CKT. CKT runs Windows Server 2008 and Microsoft Virtual Server 2005 R2. CKT has 200 virtual servers running on an isolated virtual segment to evaluate software. To connect to the internet, it uses physical network interface card.
ABC.com requires every server in the company to access Internet.
ABC.com security policy dictates that the IP address space used by software evaluation lab must not be used by other networks. Similarly, it states the IP address space used by other networks should not be used by the evaluation lab network. As an administrator you find you that the applications tested in the software evaluation lab need to access normal network to connect to the vendors update servers on the internet. You need to configure all virtual servers on the CKT server to access the internet. You also need to comply with company’s security policy.
Which two actions should you perform to achieve this task? (Choose two answers. Each answer is a part of the complete solution)
You need to ensure that the users’ computers are configured to use DirectAccess
Your network contains a server named Server1. Server1 has DirectAccess deployed. A group named Group1 is enabled for DirectAccess.
Users report that when they log on to their computers, the computers are not configured to use DirectAccess. You need to ensure that the users’ computers are configured to use DirectAccess.
What should you do first?