Which three actions should you perform in sequence?
DRAG DROP
Your network contains an Active Directory domain named adatum.com. The domain contains three servers.
The servers are configured as shown in the following table.
Server1 is configured as shown in the exhibit. (Click the Exhibit button.)
Template1 contains custom cryptography settings that are required by the corporate security team.
On Server2, an administrator successfully installs a certificate based on Template1.
The administrator reports that Template1 is not listed in the Certificate Enrollment wizard on Server3, even after
selecting the Show all templates check box.
You need to ensure that you can install a server authentication certificate on Server3. The certificate must
comply with the cryptography requirements.
Which three actions should you perform in sequence?
To answer, move the appropriate three actions from the list of actions to the answer area and arrange them in
the correct order.
Select and Place:
You need to assign a user named User1 permission to add…
Your network contains an Active Directory domain named contoso.com. The domain contains a server named
Server1 that runs Windows Server 2012 R2 and has the DNS Server server role installed.
Server1 has a zone named contoso.com. The zone is configured as shown in the exhibit. (Click the Exhibit
button.)
You need to assign a user named User1 permission to add and delete records from the contoso.com zone
only.
What should you do first?
What should you run on Server1?
Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Active
Directory Certificate Services server role installed and is configured as a standalone certification authority (CA).
You install a second server named Server2. You install the Online Responder role service on Server2.
You need to ensure that Server1 can issue an Online Certificate Status Protocol (OCSP) Response Signing
certificate to Server2.
What should you run on Server1?
Which command should you run?
Your network contains an Active Directory domain named contoso.com. The domain contains a file server
named File1 that runs a Server Core Installation of Windows Server 2012 R2.
File1 has a volume named D that contains home folders. File1 creates a shadow copy of volume D twice a day.
You discover that volume D is almost full.
You add a new volume named H to File1.
You need to ensure that the shadow copies of volume D are stored on volume H.
Which command should you run?
You need to add an additional replica of VM1
You have a virtual machine named VM1 that runs on a host named Host1.
You configure VM1 to replicate to another host named Host2. Host2 is located in the same physical location as
Host1.
You need to add an additional replica of VM1. The replica will be located in a different physical site.
What should you do?
You need to verily whether the replica of VMS on Server…
Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1
and Server2 have the Hyper-V server role installed. Server1 and Server2 are configured as Hyper-V replicas of
each other.
Server2 hosts a virtual machine named VM5. VM5 is replicated to Server1.
You need to verily whether the replica of VMS on Server1 is functional. The solution must ensure that VMS
remains accessible to clients.
What should you do from Hyper-V Manager?
Which type of trust policy should you create?
Your network contains an Active Directory forest named adatum.com. The forest contains an Active DirectoryRights Management Services (AD RMS) cluster.
A partner company has an Active Directory forest named litwareinc.com. The partner company does not have
AD RMS deployed.
You need to ensure that users in litwareinc.com can consume rights-protected content from adatum.com.
Which type of trust policy should you create?
You need to ensure that a user named User1 can decrypt …
Your network contains an Active Directory domain named adatum.com. The domain contains a server named
CA1 that runs Windows Server 2012 R2. CA1 has the Active Directory Certificate Services server role installed
and is configured to support key archival and recovery.
You need to ensure that a user named User1 can decrypt private keys archived in the Active Directory
Certificate Services (AD CS) database. The solution must prevent User1 from retrieving the private keys from
the AD CS database.
What should you do?
You need to ensure that you can manage the certificates…
Your network contains an Active Directory domain named contoso.com. The domain contains a server named
Server1 that runs Windows Server 2012 R2. Server1 is an enterprise root certification authority (CA) for
contoso.com.
Your user account is assigned the certificate manager role and the auditor role on the contoso.com CA. Your
account is a member of the local Administrators group on Server1.
You enable CA role separation on Server1.You need to ensure that you can manage the certificates on the CA.
What should you do?
Which cmdlet should you run on each server?
HOTSPOT
Your network contains an Active Directory domain named contoso.com. The domain contains a domain
controller named DC1 and a file server named Server1. Both servers run Windows Server 2012 R2.
You configure the classification of a share on Server1 as shown in the Share1 Properties exhibit. (Click the
Exhibit button.)
You configure the resource properties in Active Directory as shown in the Resource Properties exhibit. (Click
the Exhibit button.)
You need to ensure that the Impact classification can be assigned to Share1 immediately.
Which cmdlet should you run on each server?
To answer, select the appropriate cmdlet for each server in the answer area.
Hot Area: