What should you do?
You have a file server that runs Windows Server 2008 R2.
You configure quotas on the server.
You need to view each user’s quota usage on a per folder basis.
What should you do?
What should you do?
You have a server that runs Windows Server 2008 R2.
You create a new quota template. You apply quotas to 100 folders by using the quota template. You need to modify the quota settings for all 100 folders. You must achieve this goal by using the minimum amount of administrative effort.
What should you do?
What should you do?
Your company has a server named Server1 that runs Windows Server 2008 R2. The Windows Server Backup feature is installed on Server1.
Server1 fails. You install a new server named Server2 that runs Windows Server 2008 R2. You need to restore the company’s Windows SharePoint Services (WSS) site to Server2.
What should you do?
What should you do on the server?
You manage a server that runs Windows Server 2008 R2.
The D:Payroll folder is corrupted. The most recent backup version is 10/29/2007-09:00. You need to restore all the files in the D:Payroll folder back to the most recent backup version without affecting other folders on the server.
What should you do on the server?
What should you do?
Your company has a domain with multiple sites. You have a domain-based DFS namespace called contoso.comManagement.
The contoso.comManagement namespace hierarchy is updated frequently. You need to configure the contoso.comManagement namespace to reduce the workload of the PDC emulator.
What should you do?
What should you do?
Your company has a server named FS1. FS1 hosts the domain-based DFS namespace named contoso.comdfs. All domain users store their data in subfolders within the DFS namespace. You need to prevent all users, except administrators, from creating new folders or new files at the root of the contoso.comdfs share.
What should you do?
What should you do?
You work as a developer at Company.com. You are developing an application to create a new file on the local file system. You need to define specific security settings for the file. You must deny the file inheritance of any default security settings. What should you do?
exhibit
What should you do?
Your company has deployed Network Access Protection (NAP). You configure secure wireless access to the network by using 802.1X authentication from any access point.
You need to ensure that all client computers that access the network are evaluated by NAP.
What should you do?
What should you do?
Your company has deployed Network Access Protection (NAP) enforcement for VPNs. You need to ensure that the health of all clients can be monitored and reported.
What should you do?
What should you do?
You work as a developer at Company.com. You are creating an application that provides information about the local computer. The application contains a form that lists each logical drive with the drive properties, such as type, volume label, and capacity. You are required to write a procedure that retrieves properties of each logical drive on the local computer. What should you do? Arrange the appropriate actions in the correct order.
exhibit