Which tool should you use to test the certificate with AD LDS?
ABC.com has a network that is comprise of a single Active Directory Domain.
As an administrator at ABC.com, you install Active Directory Lightweight Directory Services
(AD LDS) on a server that runs Windows Server 2008. To enable Secure Sockets Layer
(SSL) based connections to the AD LDS server, you install certificates from a trusted
Certification Authority (CA) on the AD LDS server and client computers.
Which tool should you use to test the certificate with AD LDS?
What should you do to make sure that the cached credentials for user accounts are only stored in their local b
ABC.com boasts a main office and 20 branch offices. Configured as a separate site, each
branch office has a Read-Only Domain Controller (RODC) server installed.
Users in remote offices complain that they are unable to log on to their accounts. What
should you do to make sure that the cached credentials for user accounts are only stored in
their local branch office RODC server?
Which of the following actions would you perform to configure the event collection and event forwarding on the
The corporate network of Company consists of a Windows Server 2008 single Active
Directory domain. The domain has two servers named Company 1 and Company 2.
To ensure central monitoring of events you decided to collect all the events on one server, to
collect events from Company, and transfer them to Company 1.
You configure the required event subscriptions.
You selected the Normal option for the Event delivery optimization setting by using the HTTP
protocol.
However, you discovered that none of the subscriptions work.
Which of the following actions would you perform to configure the event collection and event
forwarding on the two servers? (Select three. Each answer is a part of the complete
solution).
Which utility should you use?
Your company has a main office and 40 branch offices. Each branch office is configured as
a separate Active Directory site that has a dedicated read-only domain controller (RODC).
An RODC server is stolen from one of the branch offices.
You need to identify the user accounts that were cached on the stolen RODC server.
Which utility should you use?
Which two actions should you perform to achieve this task?
ABC.com has a software evaluation lab. There is a server in the evaluation lab named as
CKT. CKT runs Windows Server 2008 and Microsoft Virtual Server 2005 R2. CKT has 200
virtual servers running on an isolated virtual segment to evaluate software. To connect to the
internet, it uses physical network interface card.
ABC.com requires every server in the company to access Internet. ABC.com security policy
dictates that the IP address space used by software evaluation lab must not be used by
other networks. Similarly, it states the IP address space used by other networks should not
be used by the evaluation lab network.
As an administrator you find you that the applications tested in the software evaluation lab
need to access normal network to connect to the vendors update servers on the internet.
You need to configure all virtual servers on the CKT server to access the internet. You also
need to comply with company’s security policy.
Which two actions should you perform to achieve this task? (Choose two answers. Each
answer is a part of the complete solution)
You need to change the domain security settings to trace the shutdowns and identify the cause of it
You are an administrator at ABC.com. Company has a network of 5 member servers acting
as file servers. It has an Active Directory domain.
You have installed a software application on the servers. As soon as the application is
installed, one of the member servers shuts down itself. To trace and rectify the problem, you
create a Group Policy Object (GPO).
You need to change the domain security settings to trace the shutdowns and identify the
cause of it.
What should you do to perform this task?
Which backup should you use to perform non- authoritative restore of Active Directory Domain Services (AD DS)
ABC.com has a network that consists of a single Active Directory domain. A technician has
accidently deleted an Organizational unit (OU) on the domain controller. As an administrator
of ABC.com, you are in process of restoring the OU.
You need to execute a non-authoritative restore before an authoritative restore of the OU.
Which backup should you use to perform non- authoritative restore of Active Directory
Domain Services (AD DS) without disturbing other data stored on domain controller?
What should you do to achieve this task?
ABC.com has a network that consists of a single Active Directory domain.Windows Server
2008 is installed on all domain controllers in the network.
You are instructed to capture all replication errors from all domain controllers to a central
location.
What should you do to achieve this task?
you need to configure, in order to complete the deployment of AD RMS?
Company has a single domain network with Windows 2000, Windows 2003, and Windows
2008 servers. Client computers running Windows XP and Windows Vist
a. All domain controllers are running Windows server 2008.
You need to deploy Active Directory Rights Management System (AD RMS) to secure all
documents, spreadsheets and to provide user authentication.
What do you need to configure, in order to complete the deployment of AD RMS?
What should you do to accomplish this task?
You are formulating the backup strategy for Active Directory Lightweight Directory Services
(AD LDS) to ensure that data and log files are backed up regularly. This will also ensure the
continued availability of data to applications and users in the event of a system failure.
Because you have limited media resources, you decided to backup only specific ADLDS
instance instead of taking backup of the entire volume.
What should you do to accomplish this task?