Which tool should you use?
Your network contains an Active Directory domain named contoso.com.
All servers run Windows Server 2012 R2.
The domain contains a domain controller named DC1 that is configured as an enterprise root
certification authority (CA).
All users in the domain are issued a smart card and are required to log on to their domain- joined
client computer by using their smart card.
A user named User1 resigned and started to work for a competing company.
You need to prevent User1 immediately from logging on to any computer in the domain.
The solution must not prevent other users from logging on to the domain.
Which tool should you use?
Which two configurations should you perform from DNS Manager?
Your network contains an Active Directory domain named contoso.com.
The domain contains a domain controller named DC1 that runs Windows Server 2012 R2. DC1
has the DNS Server server role installed.
The network contains client computers that run either Linux, Windows 7, or Windows 8.
You have a zone named adatum.com as shown in the exhibit. (Click the Exhibit button.)
You plan to configure Name Protection on all of the DHCP servers.
You need to configure the adatum.com zone to support Name Protection.
Which two configurations should you perform from DNS Manager? (Each correct answer presents
part of the solution. Choose two.)
You need to move all of the applications and the services from Cluster1 to Cluster2
Your network contains two servers named Server1 and Server2 that run Windows Server 2008 R2.
Server1 and Server2 are nodes in a failover cluster named Cluster1.
The network contains two servers named Server3 and Server4 that run Windows Server 2012 R2.
Server3 and Server4 are nodes in a failover cluster named Cluster2.
You need to move all of the applications and the services from Cluster1 to Cluster2.
What should you do first from Failover Cluster Manager?
What should you configure?
Your network contains an Active Directory domain named adatum.com.
The domain contains a file server named FS1 that runs Windows Server 2012 R2 and has the
File Server Resource Manager role service installed.
All client computers run Windows 8.
File classification and Access-Denied Assistance are enabled on FS1.
You need to ensure that if users receive an Access Denied message, they can request
assistance by email from the Access Denied dialog box.
What should you configure?
Which security groups must a user account be a member of to modify the AD RMS SCP?
Which security groups must a user account be a member of to modify the AD RMS SCP?
(Choose two answers. Each answer forms part of a complete solution.)
Which of the following would you configure if you wanted to block computers running Windows 7 and earlier oper
Which of the following would you configure if you wanted to block computers running Windows 7
and earlier operating systems from consuming AD RMS-protected content?
Which of the following must you back up or have a copy of to be able to ensure that you can restore an AD RMS
Which of the following must you back up or have a copy of to be able to ensure that you can
restore an AD RMS cluster in the event that a single server hosting all AD RMS components
suffers complete data loss? (Choose three answers.)
You want to enable key archiving on a C
You want to enable key archiving on a CA.
You need to issue a certificate from a specific template to the user who will recover private keys.
Which certificate template will you use as the basis for this certificate?
Which group policy item should you configure to enable automatic reenrollment of certificates?
Which group policy item should you configure to enable automatic reenrollment of certificates?
Which of the following should you configure to accomplish this goal?
You need to ensure that clients will check at least every 30 minutes as to whether a certificate
has been revoked. Which of the following should you configure to accomplish this goal?