Which actions should you perform in sequence?
DRAG DROP
A company has a print server that runs Windows Server 2003 R2 Enterprise (x86). The print server is
configured with 2S0 print queues. You are planning to migrate the print server to a new server that
runs Windows Server 2008 R2 Enterprise. The destination server has the Print and Document
Services role installed. You need to ensure that printer queues migrate successfully. Which actions
should you perform in sequence?
To answer, move the appropriate actions from the list of actions to the answer area and arrange
them in the correct order, (use only actions that Apply.)
Which User Rights Assignment policy should you configure?
HOTSPOT
You are designing a monitoring solution to log performance for servers that run Windows Server
2008 R2. The monitoring solution must allow members of the Performance Log Users group to
create and modify Data Collector Sets. You need to grant members of the Performance Log Users
group the necessary permissions. Which User Rights Assignment policy should you configure?
To answer, select the appropriate User Rights Assignment policy in the answer area.
What should you recommend?
A company has a single Active Directory Domain Services (AD DS) domain. Each department within
the company has its own organizational unit (OU). All client computers run Windows 7 Enterprise
Edition and Microsoft Office 2010. The company wants to restrict access to some Office 2010
features. They develop a standard list of corporate restrictions. You have the following
requirements:
• Apply the corporate restrictions to all existing and future departments.
• Ensure that specific restrictions can be added or removed for individual departments.
• Ensure that the corporate restrictions are not App1ied to users and computers in the built-in
Active Directory containers.
• Minimize administrative effort for Applying restrictions to future departments.
You need to recommend a Group Policy object (GPO) deployment that meets the requirements.
What should you recommend? (More than one answer choice may achieve the goal. Select the BEST
answer.)
What should you recommend?
You are designing a recovery solution for file servers that run Windows Server 2008 R2. File servers
have the operating system and settings on volume C and shared data on other volumes. The
recovery solution must meet the following requirements:
• Create restorable point-in-time copies of files stored in shared folders on the file servers.
• Provide users the ability to compare versions of an open file.
You need to design a recovery solution that meets the requirements. What should you recommend?
(More than one answer choice may achieve the goal. Select the BEST answer.)
What should you recommend?
A company has file servers that run a Server Core installation of Windows Server 2008. You are
designing the migration of the file servers to Windows Server 2008 R2. After the migration, you will
install the Remote Desktop Services server role on the file servers. You need to ensure that shared
resources on the file servers are available after the migration, and minimize administrative effort.
What should you recommend? (More than one answer choice may achieve the goal. Select the BEST
answer.)
Which actions should you perform in sequence?
DRAG DROP
A company’s file servers are running out of disk space. The company uses folder redirection policies
to redirect user profile folders to 50 dedicated file servers. The files stored on the file servers include
the following types of files that should not be stored in user profile folders:
• Audio and video files
• Files created by a computer-aided drafting (CAD) Application
You decide to implement File Server Resource Manager (FSRM) on the dedicated file servers. You
have the following requirements:
• Prevent users from saving audio and video files to their user profile folders.
• Prevent users from saving CAD files to their user profile folders.
• Notify users by e-mail if they attempt to save files of a blocked file type.
You need to configure FSRM with the least amount of administrative effort. Which actions should
you perform in sequence?
To answer, move the appropriate actions from the list of actions to the answer area and arrange
them in the correct order. (Use only actions that Apply.)
Which actions should you perform in sequence?
DRAG DROP
A company has offices in New York and Seattle. Project managers from each office are in the
NewYork_PM and Seattle_PM Active Directory security groups, respectively. You are planning to
store all active IT project resources for the Project Management Office in branch-specific folders in a
namespace. You need to ensure that project managers from each branch can see only folders from
that branch in the namespace. Which actions should you perform in sequence?
To answer, move the appropriate actions from the list of actions to the answer area and arrange
them in the correct order. (Use only actions that Apply.)
Which actions should you perform in sequence?
DRAG DROP
A company has client computers that run Windows 7 and Windows Vista. The company has a single
domain Active Directory Domain Services (AD DS) forest with domain controllers that run Windows
Server 2008 R2. An Application must be installed on the windows 7 client computers when users log
on to the computers. You need to design an Application deployment solution. Which actions should
you perform in sequence?
To answer, move the appropriate actions from the list of actions to the answer area and arrange
them in the correct order. (Use only actions that Apply.)
Which technologies should you recommend to achieve the indicated goals?
DRAG DROP
A company has client computers that run Windows 7. Each client computer is deployed with
Microsoft Office 2010 pre-installed. The company is adding three line-of-business-Applications that
require access to Office functionality. None of the line-of-business Applications can co-exist with the
others on the same client computer. You are designing a solution that must meet the following
requirements:
• Allow the use of all the line-of-business Applications on each client computer.
• Maintain a central inventory of all Applications.
• Centralize the process of deploying, streaming, updating and reporting on all Applications.
You need to recommend a solution that meets the requirements. Which technologies should you
recommend to achieve the indicated goals?
To answer, drag the appropriate technologies in the correct location or locations in the answer area.
Which recovery method should you recommend?
###BeginCaseStudy###
Case Study: 1
Humongous Insurance
Scenario:
COMPANY OVERVIEW
Humongous Insurance has a main office and 20 branch offices. The main office is located in
New York. The branch offices are located throughout North America. The main office has
8,000 users. Each branch office has 2 to 250 users.
PLANNED CHANGES
Humongous Insurance plans to implement Windows BitLocker Drive Encryption (BitLocker)
on all servers.
EXISTING ENVIRONMENT
The network contains servers that run either Windows Server 2003, Windows Server 2008, or
Windows Server 2008 R2. All client computers run either Windows 7 Enterprise or Windows
Vista Enterprise.
Business Goals
Humongous Insurance wants to minimize costs whenever possible.
Existing Active Directory/Directory Services
The network contains a single Active Directory forest named humongousinsurance.com. The
forest contains two child domains named north.humongousinsurance.com and
south.humongousinsurance.com. The functional level of the forest is Windows Server 2008
R2.
Existing Network Infrastructure
Each child domain contains a Web server that has Internet Information Services (IIS)
installed. The forest root domain contains three Web servers that have IIS installed. The Web
servers in the forest root domain are configured in a Network Load Balancing (NLB) cluster.
Currently, all of the Web servers use a single domain user account as a service account.
Windows Server Update Services (WSUS) is used for company-wide patch management. The
WSUS servers do not store updates locally. The network contains Remote Desktop servers
that run Windows Server 2008 R2. Users in the sales department access a line-of-business
Application by using Remote Desktop. Managers in the sales department use the Application
to generate reports. Generating the reports is CPU intensive. The sales managers report that
when many users are connected to the servers, the reports take a long time to process.
Humongous Insurance has the following standard server builds:
• Class 1 – Dual x64 CPUs, 4-GB RAM, Windows Web Server 2008 R2
• Class 2 – Dual x64 CPUs, 4-GB RAM, Windows Server 2008 R2 Standard
• Class 3 – Quad x64 CPUs, 8-GB RAM, Windows Server 2008 R2 Standard
• Class 4 – Quad x64 CPUs, 8-GB RAM, Windows Server 2008 R2 Enterprise
Current Administration Model
Humongous Insurance currently uses the following technologies to manage the network:
• Microsoft Desktop Optimization Pack
• Microsoft Forefront EndPoint Protection
• Microsoft System Center Operations Manager
• Microsoft System Center Configuration Manager
TECHNICAL REQUIREMENTS
Humongous Insurance must meet the following technical requirements:
• A certificate must be required to recover BitLocker-protected drives.
• Newly implemented technologies must minimize the impact on LAN traffic.
• Newly implemented technologies must minimize the storage requirements.
• The management of disk volumes and shared folders must be performed remotely
whenever possible.
• Newly implemented technologies must minimize the amount of bandwidth used on
Internet connections.
• All patches and updates must be tested in a non-production environment before they
are App1ied to production servers.
• Multiple versions of a Group Policy object (GPO) must be maintained in a central
archive to facilitate a rol required.
The management of passwords and service principal names (SPNs) for all service accounts
must be automated whenever possible.
###EndCaseStudy###
You need to recommend a BitLocker recovery method that meets the company’s technical
requirements. Which recovery method should you recommend?