Which user roles should you identify?
DRAG DROP
You plan to delegate the management of virtual machines to five groups by using Microsoft System
Center 2012 Virtual Machine Manager (VMM).
The network contains 20 Hyper-V hosts in a host group named HostGroup1. You identify the
requirements for each group as shown in the following table.
You need to identify which user role must be assigned to each group.
Which user roles should you identify?
To answer, drag the appropriate user role to the correct group in the answer area. Each user role may
be used once, more than once, or not at all. Additionally, you may need to drag the split bar between
panes or scroll to view content.
Which three actions should you recommend?
DRAG DROP
Your network contains an Active Directory domain named contoso.com. The network has an Active
Directory Certificate Services (AD CS) infrastructure.
You publish the certificate revocation list (CRL) to a farm of Web servers. You are creating a disaster
recovery plan for the AD CS infrastructure. You need to recommend which actions must be performed
to restore certificate revocation checking if a certification authority (CA) is offline for an extended period
of time.
Which three actions should you recommend? To answer, move the three appropriate actions from the
list of actions to the answer area and arrange them in the correct order.
You need to ensure that both virtual machines can use App1data.vhdx simultaneously
HOTSPOT
Your network contains an Active Directory domain named contoso.com. You have a failover cluster
named Cluster1 that contains two nodes named Server1 and Server2. Both servers run Windows Server
2012 R2 and have the Hyper-V server role installed.
You plan to create two virtual machines that will run an application named App1. App1 will store data
on a virtual hard drive named App1data.vhdx. App1data.vhdx will be shared by both virtual machines.
The network contains the following shared folders:
An SMB file share named Share1 that is hosted on a Scale-Out File Server.
An SMB file share named Share2 that is hosted on a standalone file server.
An NFS share named Share3 that is hosted on a standalone file server.
You need to ensure that both virtual machines can use App1data.vhdx simultaneously.
What should you do? To answer, select the appropriate configurations in the answer area.
Hot Area:
Which two actions should you perform?
A company has offices in Seattle and Shanghai. You use Hyper-V Server 2012 R2 as the server
virtualization platform. Each office has a secured server room where all the servers are located. Eighty
percent of the company’s servers are virtual. The company signs a data center services agreement with
a vendor that is located in New York. The agreement includes a 1 GB per second link to the collocation
facility in New York.
The link between the Seattle and Shanghai offices is slow and unreliable. You must design and
implement a cost-effective data recovery solution to replicate virtual servers from Seattle to both the
New York and Shanghai locations.
The solution must support the following requirements:
Perform failover replication from Seattle to New York.
Perform scheduled replication between as many locations as possible.
In case of a disaster, a fast failover should be possible to the replicated servers with minimal
changes required to the existing infrastructure.
Which two actions should you perform? Each correct answer presents part of the solution.
Which storage pools should you identify?
Your network contains servers that run only Windows Server 2012.
You have five storage pools. The storage pools are configured as shown in the following table.
You need to identify which storage pools can be used as clustered disk resources.
Which storage pools should you identify? (Each correct answer presents part of the solution. Choose all
that apply.)
Solution: You run the following command from an administrative command prompt: cipher /a /d /s:<protected s
An organization uses an Active Directory Rights Management Services (AD RMS) cluster named RMS1 to
protect content for a project. You uninstall AD RMS when the project is complete. You need to ensure
that the protected content is still available after AD RMS is uninstalled.
Solution: You run the following command from an administrative command prompt:
cipher /a /d /s:<protected share name>
Does this meet the goal?
Solution: You create a Windows Events monitor in SCOM and configure it to monitor events related to the http.s
You need to automatically restart the appropriate web service on DETCRL01 and CHICRL01 if the web
service is stopped.
Solution: You create a Windows Events monitor in SCOM and configure it to monitor events related to
the http.sys service?
Does this meet the goal?
Which certificate or certificates should you identify?
Your network contains an Active Directory domain named adatum.com. The domain contains a server
named ADFS1.
You plan to deploy Active Directory Federation Services (AD FS) to ADFS1.
You plan to register the company’s SMTP domain for Office 365 and to configure single sign-on for all
users.You need to identify which certificate or certificates are required for the planned deployment.
Which certificate or certificates should you identify? (Each correct answer presents a complete solution.
Choose all that apply.)
Does this meet the goal?
You manage a Hyper-V 2012 cluster by using System Center Virtual Machine Manager 2012 SP1. You
need to ensure high availability for business-critical virtual machines (VMs) that host business-critical
SQL Server databases.
Solution: You create a custom placement rule and apply it to all business-critical VMs.
Does this meet the goal?
You need to implement two-factor authentication for each client device.What should you install on each client
You have a properly configured certification authority in an Active Directory Domain Services domain.
You must implement two-factor authentication and use virtual smart cards to secure user sessions.
You need to implement two-factor authentication for each client device.What should you install on each client device?