Which permissions should you assign to Testuser5 from S…
You have a System Center 2012 Service Manager infrastructure that contains a Self-Service Portal.
The corporate network access policy states that users must be assigned the minimum number of permissions to access the network resources.
You need to ensure that a user named Testuser5 can create incidents by using the Self-Service Portal.
The solution must meet the requirements of the network access policy .
Which permissions should you assign to Testuser5 from Site Settings?
How many connections and subscriptions should you identify?
Developers at Contoso have two Windows Azure subscriptions.
Contoso creates a partnership with another company named A. Datum.
The A. Datum network contains a System Center 2012 Virtual Machine Manager (VMM) infrastructure that contains three clouds.
Developers at A.Datum have two Windows Azure subscriptions.
You deploy System Center 2012 App Controller at A.Datum.
You plan to manage the clouds and the Windows Azure subscriptions for both companies from the App Controller portal.
You need to identify the minimum number of subscriptions and the minimum number connections required for the planned management.
How many connections and subscriptions should you identify?
What should you include in the recommendation?
You plan to deploy a System Center 2012 infrastructure.
You plan to create and deploy a service named CloudService1.
You need to recommend a solution to deploy CloudService1 to a Windows Azure subscription.
What should you include in the recommendation?
Does this meet the goal?
You need to ensure that the developers can manage their own virtual machines.
Solution: You perform the following actions:
In Virtual Machine Manager, you create a new user role named DevUsers that uses the Application Administrator profile.
You create and publish a request offering that allows the DevUsers role to create checkpoints.
You grant Checkpoint permissions to the DevUsers role.
You distribute the Self-Service Portal to the developers.
Does this meet the goal?
Does this meet the goal?
An organization uses an Active Directory Rights Management Services (AD RMS) cluster named RMS1 to protect content for a project. You uninstall AD RMS when
the project is complete.
You need to ensure that the protected content is still available after AD RMS is uninstalled.
Solution: You enable the decommissioning service by using the AD RMS management console. You grant all users the Read & Execute permission to
the decommission pipeline.
Does this meet the goal?
Solution: You run the following Windows PowerShell comm…
An organization uses an Active Directory Rights Management Services (AD RMS) cluster names RMS1 to protect content for a project. You uninstall AD RMS when
the project is complete.
You need to ensure that the protected content is still available after AD RMS is uninstalled.
Solution: You run the following Windows PowerShell command:
Set-ItemProperty -Path <protected content>:\\ -Name IsDecommissioned -Value $true EnableDecommission
Does this meet the goal?
Does this meet the goal?
An organization uses an Active Directory Rights Management Services (AD RMS) cluster named RMS1 to protect content for a project. You uninstall AD RMS when
the project is complete.
You need to ensure that the protected content is still available after AD RMS is uninstalled.
Solution: You add the backup service account to the SuperUsers group and back up the protected content. Then, you restore the content to a file server
and apply the required NTFS permissions to the files.
Does this meet the goal?
Solution: You run the following command from an adminis…
An organization uses an Active Directory Rights Management Services (AD RMS) cluster names RMS1 to protect content for a project. You uninstall AD RMS when
the project is complete.
You need to ensure that the protected content is still available after AD RMS is uninstalled.
Solution: You run the following command from an administrative command prompt:
cipher /a/d/s:<protected share name>
Does this meet the goal?
Does this meet the goal?
Your network contains five servers that run Windows Server 2012 R2.
You install the Hyper-V server role on the servers.
You create an external virtual network switch on each server.
You plan to deploy five virtual machines to each Hyper-V server.
Each virtual machine will have a virtual network adapter that is connected to the external virtual network switch and that has a VLAN identifier of 1.
Each virtual machine will run Windows Server 2012 R2.
All of the virtual machines will run the identical web application.
You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each virtual machine to an NLB cluster.
The cluster will be configured to use unicast only.
You need to ensure that the NLB feature can distribute connections across all of the virtual machines.
Solution: From the properties of each virtual machine, you add a second virtual network adapter. You connect the new virtual network adapters to the
external virtual network switch and configure the new virtual network adapters to use a VLAN identifier of 2.
Does this meet the goal?
Does this meet the goal?
Your network contains five servers that run Windows Server 2012 R2.
You install the Hyper-V server role on the servers.
You create an external virtual network switch on each server.
You plan to deploy five virtual machines to each Hyper-V server.
Each virtual machine will have a virtual network adapter that is connected to the external virtual network switch and that has a VLAN identifier of 1.
Each virtual machine will run Windows Server 2012 R2.
All of the virtual machines will run the identical web application.
You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each virtual machine to an NLB cluster.
The cluster will be configured to use unicast only.
You need to ensure that the NLB feature can distribute connections across all of the virtual machines.
Solution: On each Hyper-V server, you create a new private virtual network switch.
From the properties of each virtual machine, you add a second virtual network adapter and connect the new virtual network adapters to the new private
virtual network switches.
Does this meet the goal?