PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

What should you do?

Your company has a single Active Directory domain. All servers run Windows Server 2008 R2. You install an iSCSI storage area network (SAN) for a group of file servers. Corporate security policy requires that all data communication to and from the iSCSI SAN must be as secure as possible.
You need to implement the highest security available for communications to and from the iSCSI SAN.
What should you do?

What should you do?

You have two servers named FC1 and FC2 that run Windows Server 2008 R2 Enterprise. Both servers have the Failover Clustering feature installed. You configure the servers as a two-node cluster. The cluster runs an application named APP1. Business hours for your company are 09:00 to 17:00. APP1 must be available during these hours. You configure FC1 as the preferred owner for APP1. You need to prevent failback of the cluster during business hours.
What should you do?

Which two actions should you perform?

Your company named Contoso, Ltd. has a Network Load Balancing cluster named nlb.contoso.com. The cluster hosts are named WEB1 and WEB2. The cluster is configured with a single port rule that evenly distributes HTTP traffic between both hosts.
You need to configure WEB2 to handle all HTTPS traffic for nlb.contoso.com. You must retain the even distribution of HTTP traffic between WEB1 and WEB2. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

Which two actions should you perform?

Your company named Contoso, Ltd. has a two-node Network Load Balancing cluster. The cluster is intended to provide high availability and load balancing for only the intranet Web site. The name of the cluster is web.contoso.com.
You discover that Contoso users can see the Network Load Balancing cluster in the network neighborhood and can connect to various services by using the web.contoso.com name. The web.contoso.com Network Load Balancing cluster is configured with only one port rule. You need to configure the web.contoso.com Network Load Balancing cluster to accept only HTTP traffic.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

Which two actions should you perform?

You have two servers that run Windows Server 2008 R2 Enterprise. Both servers have the Failover Clustering feature installed. You configure the servers as a two-node cluster. The cluster nodes are named NODE1 and NODE2.
You have an application named PrintService that includes a print spooler resource. You need to configure the cluster to automatically return the PrintService application to NODE1 after a failover.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

What should you do first?

You have a server that runs Windows Server 2008 R2 and has the Hyper-V server role installed.? You create a new virtual machine.
You need to configure the virtual machine to meet the following requirements:
Allow network communications between the virtual machine and the host system.
Prevent communications to other network servers.

What should you do first?

What should you do?

You have a server that runs Windows Server 2008 R2. The server has the Hyper-V server role installed.
You create a new virtual machine and perform an installation of Windows Server 2003 on the virtual machine. You configure the virtual machine to use the physical network card of the host server. You notice that you are unable to access network resources from the virtual machine. You need to ensure that the virtual host can connect to the physical network.
What should you do?

Which two actions should you perform?

Your company has a single Active Directory domain named contoso.com. The domain has two domain controllers and 60 member servers. All servers run Windows Server 2008 R2. One of the domain controllers has Key Management Service (KMS) installed and activated. All servers use KMS auto-discovery to find the KMS server. You need to change the port used by KMS from its default port to port 12200. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

What should you do?

Your company has a single Active Directory domain named contoso.com. All servers in the domain run Windows Server 2008 R2.
The DNS Server server role is installed on two domain controllers named DC1 and DC2. Both DNS servers host Active Directory-integrated zones that are configured to allow the most secure updates only.
DC1 has Key Management Service (KMS) installed and activated. You discover that the service locator records from the contoso.com zone hosted on DC1 and DC2 are missing.
You need to force registration of the KMS service locator records in the contoso.com zone.
What should you do?