You need to ensure that access to the file shares on Server1 is audited
Your network contains an Active Directory domain. The domain contains two file servers.
The file servers are configured as shown in the following table.
You create a Group Policy object (GPO) named GPO1 and you link GPO1 to OU1.
You configure the advanced audit policy as shown in the exhibit. (Click the Exhibit button.)
You discover that the settings are not applied to Server1. The settings are applied to
Server2.
You need to ensure that access to the file shares on Server1 is audited.
What should you do?
Which tool should you use?
A corporate network includes an Active Directory-integrated zone. All DNS servers that host
the zone are domain controllers.
You add multiple DNS records to the zone.
You need to ensure that the new records are available on all DNS servers as soon as
possible.
Which tool should you use?
You need to ensure that the contoso.com users can resolve names in the GlobalNames zone
Your network contains four domain controllers. The domain controllers are configured as
shown in the following table.
All of the domain controllers are configured to host an Active Directory-integrated zone for
their respective domain.
A GlobalNames zone is deployed in the fabrikam.com forest.
You add a canonical (CNAME) record named Server1 to the GlobalNames zone.
You discover that users in the contoso.com forest cannot resolve the name Server1. The
users in fabrikam.com can resolve the name Server1.
You need to ensure that the contoso.com users can resolve names in the GlobalNames
zone.
What should you do? (Each correct answer presents part of the solution. Choose two.)
Which tab should you use?
You need to ensure that the settings in GPO1 supersede the settings in GPO2
Your network contains an Active Directory domain named contoso.com.
You have an organizational unit (OU) named Sales and an OU named Engineering.
You have two Group Policy objects (GPOs) named GPO1 and GPO2. GPO1 and GPO2 are
linked to the Sales OU and contain multiple settings.
You discover that GPO2 has a setting that conflicts with a setting in GPO1. When the
policies are applied, the setting in GPO2 takes effect.
You need to ensure that the settings in GPO1 supersede the settings in GPO2. The solution
must ensure that all non-conflicting settings in both GPOs are applied.
What should you do?
What should you run from Windows PowerShell?
HOTSPOT
Your network contains an Active Directory domain named contoso.com.
You have a comma separated value (CSV) file named Users.txt. Users.txt contains the
information for 500 users and all of the attributes required to create user accounts.
You plan to automate the creation of user accounts by using the Users.txt file.
You need to identify which two cmdlets you must run. The solution must pipe the output from
the first cmdlet to the second cmdlet.
What should you run from Windows PowerShell? To answer, configure the appropriate
PowerShell command in the answer area.
You need to ensure that RODC1 has a copy of the DNS application directory partition of contoso.com
Your network contains an Active Directory forest named contoso.com. The functional level of
the forest is Windows Server 2008 R2.
The DNS zone for contoso.com is Active Directory-integrated.
You deploy a read-only domain controller (RODC) named RODC1.
You install the DNS Server server role on RODC1.
You discover that RODC1 does not have any DNS application directory partitions.
You need to ensure that RODC1 has a copy of the DNS application directory partition of
contoso.com.
What should you do?
Which tool should you use?
You have an Active Directory domain named contoso.com.
You need to view the account lockout threshold and duration for the domain.
Which tool should you use?
You need to ensure that the GPO is applied only to client computers that have sufficient free disk space
Your network contains an Active Directory domain. The domain is configured as shown in
the exhibit. (Click the Exhibit button.)
You have a Group Policy object (GPO) linked to the domain. The GPO is used to deploy a
number of software packages.
You need to ensure that the GPO is applied only to client computers that have sufficient free
disk space.
What should you do?
You need to identify all of the authentication requests that originate from client computers that are not asso
Your network contains an Active Directory forest named contoso.com. The functional level of
the forest is Windows Server 2008 R2.
You have four Active Directory sites. Each site has multiple Active Directory subnets.
You need to identify all of the authentication requests that originate from client computers
that are not associated to an Active Directory subnet.
What should you use?