Which Windows PowerShell cmdlet should you run?
Your company has two offices. The offices are located in Seattle and Montreal.
The network contains an Active Directory domain named contoso.com. The domain contains
two DHCP servers named Server1 and Server2. Server1 is located in the Seattle office.
Server2 is located in the Montreal office. All servers run Windows Server 2012 R2.
You need to create a DHCP scope for video conferencing in the Montreal office. The scope
must be configured as shown in the following table.
Which Windows PowerShell cmdlet should you run?
You need to ensure that the client computers can obtain IPv4 addresses from DC1
Your network contains an Active Directory domain named contoso.com. The domain
contains a domain controller named DC1 that runs Windows Server 2012 R2. DC1 has the
DHCP Server server role installed.
DHCP is configured as shown in the exhibit. (Click the Exhibit button.)
You discover that client computers cannot obtain IPv4 addresses from DC1.
You need to ensure that the client computers can obtain IPv4 addresses from DC1.
What should you do?
which server should you install IPAM?
Your network contains an Active Directory forest named adatum.com. All servers run
Windows Server 2012 R2. The domain contains four servers. The servers are configured as
shown in the following table.
You need to deploy IP Address Management (IPAM) to manage DNS and DHCP.
On which server should you install IPAM?
Which two actions should you perform?
You have an Active Directory Rights Management Services (AD RMS) cluster.
You need to prevent users from encrypting new content. The solution must ensure that the
users can continue to decrypt content that was encrypted already.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)
Which tool should you use?
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1 that runs Windows Server 2012.
Server1 is the enterprise root certification authority (CA) for contoso.com.
You need to enable CA role separation on Server1.
Which tool should you use?
What should you modify?
Your network contains an Active Directory domain named corp.contoso.com.
You deploy Active Directory Rights Management Services (AD RMS).
You have a rights policy template named Template1. Revocation is disabled for the
template.
A user named User1 can open content that is protected by Template1 while the user is
connected to the corporate network.
When User1 is disconnected from the corporate network, the user cannot open the protected
content even if the user previously opened the content.
You need to ensure that the content protected by Template1 can be opened by users who
are disconnected from the corporate network.
What should you modify?
You need to ensure that all users from the Internet are pre-authenticated before they can access Appl
DRAG DROP
Your network contains an Active Directory domain named contoso.com. The domain
contains two servers named Server1 and Server3. The network contains a standalone
server named Server2.
All servers run Windows Server 2012 R2. The servers are configured as shown in the
following table.
Server3 hosts an application named App1. App1 is accessible internally by using the URL
https://app1.contoso.com. App1 only supports Integrated Windows authentication.
You need to ensure that all users from the Internet are pre-authenticated before they can
access Appl.
What should you do?
To answer, drag the appropriate servers to the correct actions. Each server may be used
once, more than once, or not at all. You may need to drag the split bar between panes or
scroll to view content.
You need to ensure that User10 can read the contents of the Data folder on Server5 in the adatum.com domain
Your network contains two Active Directory forests named contoso.com and adatum.com. All
of the domain controllers in both of the forests run Windows Server 2012 R2. The
adatum.com domain contains a file server named Servers.
Adatum.com has a one-way forest trust to contoso.com.
A contoso.com user name User10 attempts to access a shared folder on Servers and
receives the error message shown in the exhibit. (Click the Exhibit button.)
You verify that the Authenticated Users group has Read permissions to the Data folder.
You need to ensure that User10 can read the contents of the Data folder on Server5 in the
adatum.com domain.
What should you do?
You need to ensure that you can use Password Settings objects (PSOs) in the domain
Your network contains an Active Directory forest. The forest contains one domain named
contoso.com. The domain contains three domain controllers. The domain controllers are
configured as shown in the following table.
DC1 has all of the operations master roles installed.
You transfer all of the operations master roles to DC2, and then you uninstall Active
Directory from DC1.
You need to ensure that you can use Password Settings objects (PSOs) in the domain.
What should you do?
You need to ensure that the users in Site2 are authenticated by both DC2 and DC3
Your network contains an Active Directory domain named adatum.com. The domain
contains two sites named Site1 and Site2 and two domain controllers named DC1 and DC2.
DC1 is located in Site1 and DC2 is located in Site2.
You install an additional domain controller named DC3 in Site1 and you ship DC3 to Site2.
A technician connects DC3 to Site2.
You discover that users in Site2 are authenticated only by DC2.
You need to ensure that the users in Site2 are authenticated by both DC2 and DC3.
What should you do?