Does this meet the goal?
Your network contains an Active Directory domain named contoso.com. The network has an Active
Directory Certificate Services (AD CS) infrastructure.
You need to issue a certificate to users to meet the following requirements:
Ensure that the users can encrypt files by using Encrypting File System (EFS).
Ensure that all of the users reenroll for their certificate every six months.
Solution: You create a copy of the Basic EFS certificate template, and then you modify the validity period
of the copy.
Does this meet the goal?
Does this meet the goal?
Your network contains an Active Directory domain named contoso.com. The network has an Active
Directory Certificate Services (AD CS) infrastructure.
You need to issue a certificate to users to meet the following requirements:
Ensure that the users can encrypt files by using Encrypting File System (EFS).
Ensure that all of the users reenroll for their certificate every six months.
Solution: From the properties of the User certificate template, you assign the Allow – Enroll permission
to the Authenticated Users group.
Does this meet the goal?
What should you include in the recommendation?
Your network contains an Active Directory forest named contoso.com. The forest contains multiple
servers that run Windows Server 2012. The network contains 1,000 client computers that run Windows
7. Two hundred remote users have laptop computers and only work from home.
The network does not provide remote access to users.
You need to recommend a monitoring solution to meet the following requirements:
Generate a list of updates that are applied successfully to all computers.
Minimize the amount of bandwidth used to download updates.
An administrator must approve the installation of an update on any client computer.
What should you include in the recommendation? (Each correct answer presents part of the solution.
Choose all that apply.)
You need to automate the remediation of non-compliant Hyper-V hosts
Your network contains a Microsoft System Center 2012 infrastructure.
You use Virtual Machine Manager (VMM) to manage 20 Hyper-V hosts.
You deploy a Windows Server Update Services (WSUS) server.
You need to automate the remediation of non-compliant Hyper-V hosts. The solution must minimize the
amount of time that virtual machines are unavailable.
What should you do first?
Which technology best achieves the goal?
Your network contains an Active Directory domain named contoso.com. The domain contains a System
Center 2012 R2 Virtual Machine Manager (VMM) deployment.
The domain contains 20 Hyper-V hosts that run Windows Server 2012 R2. Currently, the computer
accounts of all of the Hyper-V hosts are in organizational unit (OU) named Virtualization.
You plan to create two private clouds by using VMM named Cloud1 and Cloud2. The virtual machines for
Cloud1 will be hosted on two Hyper-V hosts named Server1 and Server2. The virtual machines for
Cloud2 will be hosted on two Hyper-V hosts named Server3 and Server4.
You need to recommend an administrative model for Cloud1 and Cloud2.
Which technology best achieves the goal? More than one answer choice may achieve the goal. Select
the BEST answer.
What should you identify?
Your network contains an internal network and a perimeter network. The internal network contains an
Active Directory domain named contoso.com. All client computers in the perimeter network are part of a
workgroup.
The internal network contains a Microsoft System Center 2012 infrastructure.
You plan to implement an update infrastructure to update the following:
Windows Server 2012
System Center 2012
Windows Server 2003
Microsoft SQL Server 2012
Third-party virtualization hosts
Microsoft SharePoint Server 2010
Another administrator recommends implementing a single WSUS server to manage all of the updates.
You need to identify which updates can be applied by using the recommended deployment of WSUS.
What should you identify? (Each correct answer presents part of the solution. Choose all that apply.)
What should you include in the recommendation?
Your company has three offices. The offices are located in Seattle, London, and Tokyo.The network contains an Active Directory domain named northwindtraders.com. Each office is
configured as an Active Directory site.
System Center 2012 R2 Operations Manager is deployed to the domain. The servers in all three sites are
monitored by using Operations Manager.
The company has a web site for its customers. The web site requires users to sign-in.
You need to recommend a solution to monitor the web site.
The solution must meet the following requirements:
Monitor the availability of the web site from locations in North America, Europe, Asia, and
Australia.
Monitor multi-step requests to the web site.
Use a central console for monitoring.
What should you include in the recommendation?
Which System Center 2012 roles should you identify?
Your network contains an Active Directory domain named contoso.com.
You plan to implement Microsoft System Center 2012.
You need to identify which solution automates the membership of security groups for contoso.com. The
solution must use workflows that provide administrators with the ability to approve the addition of
members to the security groups.
Which System Center 2012 roles should you identify?
What should you include in the recommendation?
Your network contains an Active Directory domain named contoso.com.
The corporate security policy states that when new user accounts, computer accounts, and contacts are
added to an organizational unit (OU) named Secure, the addition must be audited.
You need to recommend an auditing solution to meet the security policy.
What should you include in the recommendation? (Each answer presents part of the solution. Choose all
that apply.)
What is the best approach to achieve the goal?
You have a System Center 2012 R2 Configuration Manager deployment.
All users have client computers that run Windows 8.1. The users log on to their client computers as
standard users.
An application named App1 is deployed to the client computers by using System Center.
You need to recommend a solution to validate a registry key used by App1. If the registry key has an
incorrect value, the value must be changed. The registry key must be validated every day. The solution
must generate a report on non-compliant computers.What is the best approach to achieve the goal? More than one answer choice may achieve the goal.
Select the BEST answer.