How many Windows 8 images should you create?
Your role of Network Administrator at ABC.com includes the management of the Active Directory
Domain Services (AD DS) domain named ABC.com. The network includes servers that run
Windows Server 2012.
The network contains 2,000 client computers. You plan to deploy Windows 8 to all the client
computers.
You need to create custom Windows 8 images for the deployment. The images will be frequently
updated.
The company uses a custom line of business 32-bit application named CorpApp1. You need to
ensure that CorpApp1 is included in the Windows 8 images.
The client computers all have a single hard disk but the sizes vary between 100GB and 2TB. The
client computers also have various memory (RAM) configurations and use either x86 (32-bit) or
x64 (64-bit) architectures.
You need to minimize the number of Windows 8 images you need to manage.
How many Windows 8 images should you create?
Which of the following would be the best solution?
Your role of Network Administrator at ABC.com includes the management of the Active Directory
Domain Services (AD DS) domain named ABC.com. The network includes servers that run
Windows Server 2012.
The company has 300 users and each user has a client computer that runs Windows 7.
You are planning to deploy a virtual desktop infrastructure. All users will have access to a virtual
desktop that runs Windows 8.
You configure a Windows 8 image with corporate applications to be used for the virtual desktops.
You need to ensure that all users receive the same desktop containing the same shortcuts for the
corporate applications. Your solution must ensure that users cannot modify the desktops. You
need to be able to easily modify the desktop shortcuts as new applications are installed.
Which of the following would be the best solution?
What should you do to comply with the new company security policy?
Your role of Network Administrator at ABC.com includes the management of the Active Directory
Domain Services (AD DS) domain named ABC.com. The network includes servers that run
Windows Server 2012.
An organizational unit named ClientComputers contains the user accounts of all client computers.
An organizational unit named AllUsers contains the user accounts of all users.
The network includes a Remote Desktop Services (RDS) infrastructure. The RDS infrastructure
includes a Remote Desktop Services (RDS) session collection that provides access to RDS
sessions for all company users. Users are able to copy files from their RDS session to their client
computers.
Sales users often work away from the office. When the Sales users are away from the office, they
can connect to RDS sessions via a Remote Desktop Gateway (RD Gateway) server. All Sales
users are members of a global security group named SalesGroup. The Sales users often connect
to RDS sessions from their home computers or computers at customer sites.
A new company security policy states that Sales users should not be able to copy files from their
RDS sessions to their home computers or computers at customer sites. Other users should
continue to be able to copy files from their RDS session to their client computers.
What should you do to comply with the new company security policy?
How can you ensure that managers can decrypt the files?
Your role of Network Administrator at ABC.com includes the management of the Active Directory
Domain Services (AD DS) domain named ABC.com. The network includes servers that run
Windows Server 2012.
Client computers run Windows XP Professional, Windows 7 or Windows 8.
A server named TK-CA1 runs the Certificate Services role and is configured as an Enterprise
Certification Authority (CA) for the domain.
A new company security policy states that all users should encrypt the files on their computers.
Company managers must be able to decrypt the files on any user’s computer.
You deploy Encrypting File System (EFS) to enable users to encrypt their files.
How can you ensure that managers can decrypt the files?
How can you ensure that the new custom image is selected automatically?
Your role of Network Administrator at ABC.com includes the management of the Active Directory
Domain Services (AD DS) domain named ABC.com. The network includes servers that run
Windows Server 2012.
The company has 500 client computers. The client computers run Windows XP Professional,
Windows 7 or Windows 8. Some client computers are 32-bit (x86) and some are 64-bit (x64).
You use Windows Deployment Services (WDS) for operating system deployment. A Windows
Server 2012 server named TK-WDS1 runs the WDS server role.
TK-WDS1 hosts multiple operating system images.
The company purchases 50 new client computers. The new computers are PXE capable. You
plan to use WDS to deploy Windows 8 to the new computers.
You have configured a new custom Windows 8 image and uploaded it to TK-WDS1.
You need to ensure that the new custom image is selected automatically when you start the new
client computers.
How can you ensure that the new custom image is selected automatically?
How should you modify the unattended file?
Your role of Network Administrator at ABC.com includes the management of the Active Directory
Domain Services (AD DS) domain named ABC.com. The network includes servers that run
Windows Server 2012.
All client computers run Windows 8.
The company plans to purchase some new client computers. You need to deploy Windows 8 to
the new computers.
You have a generalized Windows 8 image and an unattended file.
You need to modify the unattended file to ensure that boot-critical drivers are loaded when you
boot the new computers.
How should you modify the unattended file?
How should you modify the unattended file?
Your role of Network Administrator at ABC.com includes the management of the Active Directory
Domain Services (AD DS) domain named ABC.com. The network includes servers that run
Windows Server 2012.
All client computers run Windows 8.
The company plans to purchase some new client computers. You need to deploy Windows 8 to
the new computers.
You have a generalized Windows 8 image and an unattended file.
You need to modify the unattended file to ensure that the computer logs on as the local
administrator and an application is installed when you start a new computer. The computer must
remain generalized when the process completes.
How should you modify the unattended file?
Which of the following is the best solution?
The ABC.com network consists of an Active Directory Domain Services (AD DS) domain named
ABC.com. The network includes servers that run Windows Server 2012.
You have been hired by ABC.com to deploy and manage a highly available Remote Desktop
Services (RDS) infrastructure.
The RDS infrastructure will consist of several Remote Desktop Session Host (RD Session Host)
servers, two servers running Remote Desktop Connection Broker (RD Connection Broker), two
servers running Remote Desktop Web Access (RD Web Access) and two servers running Remote
Desktop Gateway (RD Gateway).
You need to ensure that in the event of a failure of a single RD Web Access server failure, users
can still access RD Web Access using the same URL. The solution must minimize costs.
Which of the following is the best solution?
Which server or servers should you add to the server pool?
Your role of Network Administrator at ABC.com includes the management of the Active Directory
Domain Services (AD DS) domain named ABC.com. The network includes servers that run
Windows Server 2012.
You have recently installed a Remote Desktop Services (RDS) infrastructure. The RDS
infrastructure includes a Remote Desktop Web Access (RD Web Access) server, a Remote
Desktop Connection Broker (RD Connection Broker) and a Remote Desktop Virtualization Host
(RD Virtualization Host) server.
You plan to add a Remote Desktop Gateway (RD Gateway) server to the RDS infrastructure.
You obtain a third-party certificate to secure connections to the RD Gateway server.
You need to configure the RDS infrastructure to use the RD Gateway server and the third-party
certificate.
Which server or servers should you add to the server pool?
Which of the following are requirements for primary computers?
Your role of Network Administrator at ABC.com includes the management of the Active Directory
Domain Services (AD DS) domain named ABC.com. All servers run Windows Server 2008 R2.
Each user has a laptop computer that runs Windows 7. Some users also have desktop computers
that run Windows 7. Users sometimes log on to other computers.
Roaming User Profiles and Folder Redirection have been configured for all users. A Windows
Server 2008 R2 server named TK-File1 is configured as a file server and hosts a shared folder
used to store the roaming user profiles and redirected folders.
You want to implement primary computers for folder redirection and roaming user profiles.
You need to recommend changes to the environment to support the implementation of primary
computers.
Which of the following are requirements for primary computers?