PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

You need to recover the encrypted data from the user’s computers

You are a desktop support technician for your company. The computers in your company run Windows Vista. The computers are encrypted with BitLocker. Each computers motherboard contains a Trusted Platform Model (TPM) chip. The password for the BitLocker is stored on the USB drive. A user reports that her computer does not start. You discovered that the computers TPM chip is faulty. You need to recover the encrypted data from the user’s computers. What should you do?

What should you create first?

Your company has a private cloud that is managed by using a System Center 2012 Operations Manager infrastructure.

The network contains a Microsoft Exchange Server 2010 organization.

You plan to import the Exchange Server 2010 Management Pack.

You need to configure Operation Manager to send Exchange-related notifications to Exchange Server administrators.

What should you create first?

What should you do?

You are a desktop support technician for your company. The computers in your company run Windows Vista. You install a legacy application and its compatibility fix on the computers. Users report that the compatibility fix is applied to all the applications that have the same name as the legacy application. You need to ensure that the compatibility fix is applied only to the legacy earlier application. What should you do?

You need to ensure that Server1 can send security events to Server2

The network contains two servers named Server1 and Server2 that run Windows Server 2008 R2.

The private cloud contains two servers. The servers are configured as shown in the following table.

The network segments are separated by a firewall. All of the TCP ports from 1 to 1024 are allowed on the firewall.

You need to ensure that Server1 can send security events to Server2.

What should you do?

You need to compare the current security policy of the branch office computers with the custom security templa

You are a desktop support technician for your company. The computers in your company run Windows Vista. Your company has a main office and a branch office. You manage the computers at the branch office. The IT manager at the main office provides you with a custom security template. You need to compare the current security policy of the branch office computers with the custom security template. What should yo do?

What should you modify?

Your company has a private cloud that is managed by using a System Center 2012 Operations Manager infrastructure.

The network contains an Active Directory forest named adatum.com

Operations Manager monitors a server named Operations1. Operations1 has a computer account in an oganizational unit (OU) named ServerOU1.

You create a group named GP1 as shown in the exhibit. (Refer to the Exhibit.)

You create a ruled named OMRule1 that generates an alert when an error is added to the Application log.

You target OMRule1 to GP1.

You discover that alerts fail to be generated when errors are added to the Application log on Operations1.

You need to ensure that an alert is generated when an error is added to the Application log on Operations1.

What should you modify?

Exhibit:

Which firewall port or ports should you allow on the firewall?

Your company has a private cloud that is managed by using a System Center 2012 Operations Manager infrastructure.

The network contains two network segments that are separated by a firewall.

You have a management server named Server1.

You create a discovery rule and configure the rule to discover SNMP devices.

You discover that only the devices on the network segment that contains Server1 are discovered.

You need to ensure that the devices supporting SNMP on both network segments are discovered.

Which firewall port or ports should you allow on the firewall?