Does this meet the goal?
Your network contains an Active Directory domain named contoso.com. The network has an Active
Directory Certificate Services (AD CS) infrastructure.
You need to issue a certificate to users to meet the following requirements:
Ensure that the users can encrypt files by using Encrypting File System (EFS).
Ensure that all of the users reenroll for their certificate every six months.
Solution: From the properties of the User certificate template, you assign the Allow – Enroll
permission to the Authenticated Users group.
Does this meet the goal?
What should you include in the recommendation?
Your network contains an Active Directory forest named contoso.com. The forest contains multiple
servers that run Windows Server 2012. The network contains 1,000 client computers that run
Windows 7. Two hundred remote users have laptop computers and only work from home.
The network does not provide remote access to users.
You need to recommend a monitoring solution to meet the following requirements:
Generate a list of updates that are applied successfully to all computers.
Minimize the amount of bandwidth used to download updates.
An administrator must approve the installation of an update on any client computer.
What should you include in the recommendation? (Each correct answer presents part of the
solution. Choose all that apply.)
You need to automate the remediation of non-compliant Hyper-V hosts
Your network contains a Microsoft System Center 2012 infrastructure.
You use Virtual Machine Manager (VMM) to manage 20 Hyper-V hosts.
You deploy a Windows Server Update Services (WSUS) server.
You need to automate the remediation of non-compliant Hyper-V hosts. The solution must minimize
the amount of time that virtual machines are unavailable.
What should you do first?
Which technology best achieves the goal?
Your network contains an Active Directory domain named contoso.com. The domain contains a
System Center 2012 R2 Virtual Machine Manager (VMM) deployment.
The domain contains 20 Hyper-V hosts that run Windows Server 2012 R2. Currently, the computer
accounts of all of the Hyper-V hosts are in organizational unit (OU) named Virtualization.
You plan to create two private clouds by using VMM named Cloud1 and Cloud2. The virtual
machines for Cloud1 will be hosted on two Hyper-V hosts named Server1 and Server2. The virtual
machines for Cloud2 will be hosted on two Hyper-V hosts named Server3 and Server4.
You need to recommend an administrative model for Cloud1 and Cloud2.
Which technology best achieves the goal? More than one answer choice may achieve the goal.
Select the BEST answer.
What should you identify?
Your network contains an internal network and a perimeter network. The internal network contains
an Active Directory domain named contoso.com. All client computers in the perimeter network are
part of a workgroup.
The internal network contains a Microsoft System Center 2012 infrastructure.
You plan to implement an update infrastructure to update the following:
Windows Server 2012
System Center 2012
Windows Server 2003
Microsoft SQL Server 2012
Third-party virtualization hosts
Microsoft SharePoint Server 2010
Another administrator recommends implementing a single WSUS server to manage all of the
updates. You need to identify which updates can be applied by using the recommended deployment
of WSUS.
What should you identify? (Each correct answer presents part of the solution. Choose all that apply.)
What should you include in the recommendation?
Your company has three offices. The offices are located in Seattle, London, and Tokyo.
The network contains an Active Directory domain named northwindtraders.com. Each office is
configured as an Active Directory site.
System Center 2012 R2 Operations Manager is deployed to the domain. The servers in all three sites
are monitored by using Operations Manager.
The company has a web site for its customers. The web site requires users to sign-in.
You need to recommend a solution to monitor the web site.
The solution must meet the following requirements:
Monitor the availability of the web site from locations in North America, Europe, Asia, and Australia.
Monitor multi-step requests to the web site.
Use a central console for monitoring.
What should you include in the recommendation?
Which System Center 2012 roles should you identify?
Your network contains an Active Directory domain named contoso.com.
You plan to implement Microsoft System Center 2012.
You need to identify which solution automates the membership of security groups for contoso.com.
The solution must use workflows that provide administrators with the ability to approve the addition
of members to the security groups.
Which System Center 2012 roles should you identify?
What should you include in the recommendation?
Your network contains an Active Directory domain named contoso.com.
The corporate security policy states that when new user accounts, computer accounts, and contacts
are added to an organizational unit (OU) named Secure, the addition must be audited.
You need to recommend an auditing solution to meet the security policy.
What should you include in the recommendation? (Each answer presents part of the solution.
Choose all that apply.)
What is the best approach to achieve the goal?
You have a System Center 2012 R2 Configuration Manager deployment.
All users have client computers that run Windows 8.1. The users log on to their client computer as
standard users.
An application named App1 is deployed to the client computers by using System Center.
You need to recommend a solution to validate a registry key used by App1. If the registry key has an
incorrect value, the value must be changed. The registry key must be validated every day. The
solution must generate a report on non-compliant computers.
What is the best approach to achieve the goal? More than one answer choice may achieve the goal.
Select the BEST answer.
Which System Center 2012 roles should you recommend?
Your network contains 20 servers that run Windows Server 2012. The servers have the Hyper-V
server role installed.
You plan to deploy a management solution.
You need to recommend which Microsoft System Center 2012 roles must be deployed to meet the
following requirements:
An administrator must be notified when an incident occurs, such as a serious error in the event log,
on a Hyper-V host, or on a virtual machine.
An administrator must be able to assign an incident to a specific administrator for resolution.
An incident that remains unresolved for more than 10 hours must be escalated automatically to
another administrator.
Administrators must be able to generate reports that contain the details of incidents and
escalations.
Which System Center 2012 roles should you recommend? More than one answer choice may
achieve the goal. Select the BEST answer.