PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

What should you configure on DNS2 for contoso.com?

Your company has a main office and a branch office.
The network contains two DNS servers named DNS1 and DNS2. DNS1 is located in the main office. DNS1 hosts a primary standard zone named contoso.com. The contoso.com zone is configured to use DNSSEC.
DNS2 is located in the branch office. DNS2 is a caching-only DNS server. You need to ensure that client computers in the branch office can receive authoritative responses to queries for contoso.com if a WAN link fails. DNSSEC security must be maintained.
What should you configure on DNS2 for contoso.com?

Which type of resource record should you create?

Your network contains a DNS server named DNS1 that runs Windows Server 2008 R2. DNS1 hosts a zone named contoso.com. Dynamic updates are enabled on the zone. The network contains a server named Web1.contoso.com. All computers on the network are configured to use DNS1 as their DNS server.
You need to ensure that users can connect to Web1.contoso.com by using the name portal.contoso.com. The solution must ensure that the users can connect by using portal.contoso.com if the IP address of Web1.contoso.com changes.
Which type of resource record should you create?

What should you do?

Your network contains an Active Directory domain named contoso.com. The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2008 R2. DC1 hosts a primary zone for contoso.com. DC2 hosts a secondary zone for contosto.com. You need to ensure that DNS zone data is encrypted when the data replicates across the network. DC2 must provide authoritative responses to client computers.
What should you do?

What should you do?

Your network contains an Active Directory domain. All client computers run Windows XP Service Pack 3 (SP3). The domain contains a member server named Server1 that runs Windows Server 2008 R2.
On Server1, you create a connection security rule that requires authentication for inbound and outbound connections. You configure the connection security rule to use Kerberos authentication. You need to ensure that the client computers can connect to Server1. The solution must ensure that all connections to Server1 are encrypted.
What should you do?