PrepAway - Latest Free Exam Questions & Answers

Tag: Exam 70-647 (update November 6th, 2015)

Exam 70-647: Pro: Windows Server 2008, Enterprise Administrator (update November 6th, 2015)

What should you include in the recommendation?

###BeginCaseStudy###
Case Study: 8
Blue yonder Airlines
COMPANY OVERVIEW
Blue Yonder Airlines has a main office and four branch offices.
PLANNED CHANGES
Blue Yonder Airlines plans to implement the following changes:
• Upgrade all client computers to Windows 7.
• Deploy a virtualization solution for the company’s developers.
• Implement coexistence between the users in Fabrikam and the users in Blue Yonder Airlines.
EXISTING ENVIRONMENT

One user in each office runs a point-of-sale (POS) application named Appl. App 1 requires access to a
local USB device and only runs on Windows XP Service Pack 3 (SP3).
Blue Yonder Airlines has a finance department.
Business Goals
Blue Yonder Airlines plans to acquire a company named Fabrikam, Inc. Fabrikam has an Active
Directory forest named fabrikam.com. Fabrikam.com contains only domain controllers that run
Windows Server 2003 Service Pack 2 (SP2).
Fabrikam.com contains multiple Web servers that are secured by using certificates. All server
certificates are issued by the internal CA of Fabrikam.
Existing Active Directory Environment

The network contains an Active Directory forest named blueyonderairlines.com. The forest contains
a single domain.
The domain contains domain controllers that run Windows Server 2008. The domain controllers are
configured as shown in the following table.
The forest contains a single Active Directory site. A subnet object is defined for each office.
The forest contains a certification authority (CA).
Existing Network Infrastructure
Each office has a file server and a print server.
The main office has a file server named Server1. The shared folders on Server1 are configured as
shown in the following table.

Blueyonderairlines.com has a standalone DFS root named \\serverl\corp that contains a link named
sales. Replicas of \\serverl\corp\sales are deployed in each office.
Current Administration Model
Administrators manage the Active Directory objects by using the Active Directory module for
Windows Power Shell.
TECHNICAL REQUIREMENTS
Blue Yonder Airlines must meet the following requirements for coexistence between Blue Yonder
Airlines and Fabrikam:

• Only specific users in Fabrikam must be allowed to access specific shares in
blueyonderairlines.com.
• Users in Blue Yonder Airlines must be able to access the secure Web servers in fabrikam.com
without receiving a warning message about the certificate.
• All administrators in Blue Yonder Airlines must be able to administer Active Directory objects
in fabrikam.com by using their default administrative tools.
The corporate security policy states that when a domain controller fails, all references to the domain
controller must be permanently removed from the domain before the domain controller is replaced.
Blue Yonder Airlines must meet the following virtualization requirements:
• Ensure that each developer can create and manage his own virtual machine (VM).
• Prevent the developers from configuring the settings of other developers’ VMs.
• Prevent the developers from creating VMs that use more than 2 GB of memory,
• Minimize the amount of bandwidth used when users access files over WAN links.

###EndCaseStudy###

You need to recommend a strategy to recover Active Directory if DC1 fails.
What should you include in the recommendation? (Each correct answer presents part of the
solution. Choose two.)

Which trust relationship configuration should you recommend in the blueyonderairlines.com forest?

###BeginCaseStudy###
Case Study: 8
Blue yonder Airlines
COMPANY OVERVIEW
Blue Yonder Airlines has a main office and four branch offices.
PLANNED CHANGES
Blue Yonder Airlines plans to implement the following changes:
• Upgrade all client computers to Windows 7.
• Deploy a virtualization solution for the company’s developers.
• Implement coexistence between the users in Fabrikam and the users in Blue Yonder Airlines.
EXISTING ENVIRONMENT

One user in each office runs a point-of-sale (POS) application named Appl. App 1 requires access to a
local USB device and only runs on Windows XP Service Pack 3 (SP3).
Blue Yonder Airlines has a finance department.
Business Goals
Blue Yonder Airlines plans to acquire a company named Fabrikam, Inc. Fabrikam has an Active
Directory forest named fabrikam.com. Fabrikam.com contains only domain controllers that run
Windows Server 2003 Service Pack 2 (SP2).
Fabrikam.com contains multiple Web servers that are secured by using certificates. All server
certificates are issued by the internal CA of Fabrikam.
Existing Active Directory Environment

The network contains an Active Directory forest named blueyonderairlines.com. The forest contains
a single domain.
The domain contains domain controllers that run Windows Server 2008. The domain controllers are
configured as shown in the following table.
The forest contains a single Active Directory site. A subnet object is defined for each office.
The forest contains a certification authority (CA).
Existing Network Infrastructure
Each office has a file server and a print server.
The main office has a file server named Server1. The shared folders on Server1 are configured as
shown in the following table.

Blueyonderairlines.com has a standalone DFS root named \\serverl\corp that contains a link named
sales. Replicas of \\serverl\corp\sales are deployed in each office.
Current Administration Model
Administrators manage the Active Directory objects by using the Active Directory module for
Windows Power Shell.
TECHNICAL REQUIREMENTS
Blue Yonder Airlines must meet the following requirements for coexistence between Blue Yonder
Airlines and Fabrikam:

• Only specific users in Fabrikam must be allowed to access specific shares in
blueyonderairlines.com.
• Users in Blue Yonder Airlines must be able to access the secure Web servers in fabrikam.com
without receiving a warning message about the certificate.
• All administrators in Blue Yonder Airlines must be able to administer Active Directory objects
in fabrikam.com by using their default administrative tools.
The corporate security policy states that when a domain controller fails, all references to the domain
controller must be permanently removed from the domain before the domain controller is replaced.
Blue Yonder Airlines must meet the following virtualization requirements:
• Ensure that each developer can create and manage his own virtual machine (VM).
• Prevent the developers from configuring the settings of other developers’ VMs.
• Prevent the developers from creating VMs that use more than 2 GB of memory,
• Minimize the amount of bandwidth used when users access files over WAN links.

###EndCaseStudy###

You need to recommend the configuration for a trust relationship that meets the company’s
technical requirements.
Which trust relationship configuration should you recommend in the blueyonderairlines.com forest?

What should you include in the recommendation?

###BeginCaseStudy###
Case Study: 8
Blue yonder Airlines
COMPANY OVERVIEW
Blue Yonder Airlines has a main office and four branch offices.
PLANNED CHANGES
Blue Yonder Airlines plans to implement the following changes:
• Upgrade all client computers to Windows 7.
• Deploy a virtualization solution for the company’s developers.
• Implement coexistence between the users in Fabrikam and the users in Blue Yonder Airlines.
EXISTING ENVIRONMENT

One user in each office runs a point-of-sale (POS) application named Appl. App 1 requires access to a
local USB device and only runs on Windows XP Service Pack 3 (SP3).
Blue Yonder Airlines has a finance department.
Business Goals
Blue Yonder Airlines plans to acquire a company named Fabrikam, Inc. Fabrikam has an Active
Directory forest named fabrikam.com. Fabrikam.com contains only domain controllers that run
Windows Server 2003 Service Pack 2 (SP2).
Fabrikam.com contains multiple Web servers that are secured by using certificates. All server
certificates are issued by the internal CA of Fabrikam.
Existing Active Directory Environment

The network contains an Active Directory forest named blueyonderairlines.com. The forest contains
a single domain.
The domain contains domain controllers that run Windows Server 2008. The domain controllers are
configured as shown in the following table.
The forest contains a single Active Directory site. A subnet object is defined for each office.
The forest contains a certification authority (CA).
Existing Network Infrastructure
Each office has a file server and a print server.
The main office has a file server named Server1. The shared folders on Server1 are configured as
shown in the following table.

Blueyonderairlines.com has a standalone DFS root named \\serverl\corp that contains a link named
sales. Replicas of \\serverl\corp\sales are deployed in each office.
Current Administration Model
Administrators manage the Active Directory objects by using the Active Directory module for
Windows Power Shell.
TECHNICAL REQUIREMENTS
Blue Yonder Airlines must meet the following requirements for coexistence between Blue Yonder
Airlines and Fabrikam:

• Only specific users in Fabrikam must be allowed to access specific shares in
blueyonderairlines.com.
• Users in Blue Yonder Airlines must be able to access the secure Web servers in fabrikam.com
without receiving a warning message about the certificate.
• All administrators in Blue Yonder Airlines must be able to administer Active Directory objects
in fabrikam.com by using their default administrative tools.
The corporate security policy states that when a domain controller fails, all references to the domain
controller must be permanently removed from the domain before the domain controller is replaced.
Blue Yonder Airlines must meet the following virtualization requirements:
• Ensure that each developer can create and manage his own virtual machine (VM).
• Prevent the developers from configuring the settings of other developers’ VMs.
• Prevent the developers from creating VMs that use more than 2 GB of memory,
• Minimize the amount of bandwidth used when users access files over WAN links.

###EndCaseStudy###

You need to recommend changes to the Active Directory infrastructure to ensure that each user is
redirected to file replicas in his or her local office.
What should you include in the recommendation?

What should you recommend?

###BeginCaseStudy###
Case Study: 8
Blue yonder Airlines
COMPANY OVERVIEW
Blue Yonder Airlines has a main office and four branch offices.
PLANNED CHANGES
Blue Yonder Airlines plans to implement the following changes:
• Upgrade all client computers to Windows 7.
• Deploy a virtualization solution for the company’s developers.
• Implement coexistence between the users in Fabrikam and the users in Blue Yonder Airlines.
EXISTING ENVIRONMENT

One user in each office runs a point-of-sale (POS) application named Appl. App 1 requires access to a
local USB device and only runs on Windows XP Service Pack 3 (SP3).
Blue Yonder Airlines has a finance department.
Business Goals
Blue Yonder Airlines plans to acquire a company named Fabrikam, Inc. Fabrikam has an Active
Directory forest named fabrikam.com. Fabrikam.com contains only domain controllers that run
Windows Server 2003 Service Pack 2 (SP2).
Fabrikam.com contains multiple Web servers that are secured by using certificates. All server
certificates are issued by the internal CA of Fabrikam.
Existing Active Directory Environment

The network contains an Active Directory forest named blueyonderairlines.com. The forest contains
a single domain.
The domain contains domain controllers that run Windows Server 2008. The domain controllers are
configured as shown in the following table.
The forest contains a single Active Directory site. A subnet object is defined for each office.
The forest contains a certification authority (CA).
Existing Network Infrastructure
Each office has a file server and a print server.
The main office has a file server named Server1. The shared folders on Server1 are configured as
shown in the following table.

Blueyonderairlines.com has a standalone DFS root named \\serverl\corp that contains a link named
sales. Replicas of \\serverl\corp\sales are deployed in each office.
Current Administration Model
Administrators manage the Active Directory objects by using the Active Directory module for
Windows Power Shell.
TECHNICAL REQUIREMENTS
Blue Yonder Airlines must meet the following requirements for coexistence between Blue Yonder
Airlines and Fabrikam:

• Only specific users in Fabrikam must be allowed to access specific shares in
blueyonderairlines.com.
• Users in Blue Yonder Airlines must be able to access the secure Web servers in fabrikam.com
without receiving a warning message about the certificate.
• All administrators in Blue Yonder Airlines must be able to administer Active Directory objects
in fabrikam.com by using their default administrative tools.
The corporate security policy states that when a domain controller fails, all references to the domain
controller must be permanently removed from the domain before the domain controller is replaced.
Blue Yonder Airlines must meet the following virtualization requirements:
• Ensure that each developer can create and manage his own virtual machine (VM).
• Prevent the developers from configuring the settings of other developers’ VMs.
• Prevent the developers from creating VMs that use more than 2 GB of memory,
• Minimize the amount of bandwidth used when users access files over WAN links.

###EndCaseStudy###

You need to recommend a certificate strategy that meets the company’s technical requirements.
What should you recommend?

You need to ensure that all of the client computers can use certificates issued by Server5 if Server5 fails

###BeginCaseStudy###
Case Study: 9
Humongous Insurance
COMPANY OVERVIEW
Humongous Insurance has a main office and 20 branch offices. The main office is located in New
York. The branch offices are located throughout North America. The main office has 8,000 users.
Each branch office has 2 to 250 users.
PLANNED CHANGES
Humongous Insurance plans to implement the following changes:
• Deploy one Read-only Domain Controller (RODC) to Site3 and one RODC to Site4.
• Issue certificates to the users in Contoso. The certificates will be based on custom certificate
templates.
• Deploy a Remote Desktop Services (RDS) infrastructure that will contain 10 Remote Desktop
servers. Users will connect to all Remote Desktop servers from the Internet by using port 443.
EXISTING ENVIRONMENT
The network contains the servers configured as shown in the following table.

Business Goals
All of the strategies for deploying physical servers and virtual servers must meet the Microsoft
guidelines for product support.
Existing Active Directory Environment
The network contains a single Active Directory forest named humongousinsurance.com. The
functional level of the forest is Windows Server 2008 R2.
The Active Directory sites are shown in the exhibit. (Click the Case Study Exhibit button.)
Existing Network Infrastructure
Humongous Insurance issues smart cards to administrators. Smart cards are not required for logon.
Humongous Insurance acquires a company named Contoso, Ltd.
REQUIREMENTS
Technical Requirements
All of the users in Contoso must be able to enroll for certificates by using the Public Key
Infrastructure (PKI) of Humongous Insurance.
Humongous Insurance must meet the following requirements for managing Group Policy objects
(GPOs):
• Minimize administrative effort.
• Support offline editing of the GPOs.
• Retain multiple versions of the GPOs.
Security Requirements
Only administrators who log on by using smart cards must be able to manage objects in Active
Directory.
The corporate security policy states that a forest trust to any other forest must not exist.
CASE STUDY EXHIBIT
Click the case study exhibit button to view the exhibit.

###EndCaseStudy###

You need to ensure that all of the client computers can use certificates issued by Server5 if Server5
fails. What should you do?

What should you include in the recommendation?

###BeginCaseStudy###
Case Study: 9
Humongous Insurance
COMPANY OVERVIEW
Humongous Insurance has a main office and 20 branch offices. The main office is located in New
York. The branch offices are located throughout North America. The main office has 8,000 users.
Each branch office has 2 to 250 users.
PLANNED CHANGES
Humongous Insurance plans to implement the following changes:
• Deploy one Read-only Domain Controller (RODC) to Site3 and one RODC to Site4.
• Issue certificates to the users in Contoso. The certificates will be based on custom certificate
templates.
• Deploy a Remote Desktop Services (RDS) infrastructure that will contain 10 Remote Desktop
servers. Users will connect to all Remote Desktop servers from the Internet by using port 443.
EXISTING ENVIRONMENT
The network contains the servers configured as shown in the following table.

Business Goals
All of the strategies for deploying physical servers and virtual servers must meet the Microsoft
guidelines for product support.
Existing Active Directory Environment
The network contains a single Active Directory forest named humongousinsurance.com. The
functional level of the forest is Windows Server 2008 R2.
The Active Directory sites are shown in the exhibit. (Click the Case Study Exhibit button.)
Existing Network Infrastructure
Humongous Insurance issues smart cards to administrators. Smart cards are not required for logon.
Humongous Insurance acquires a company named Contoso, Ltd.
REQUIREMENTS
Technical Requirements
All of the users in Contoso must be able to enroll for certificates by using the Public Key
Infrastructure (PKI) of Humongous Insurance.
Humongous Insurance must meet the following requirements for managing Group Policy objects
(GPOs):
• Minimize administrative effort.
• Support offline editing of the GPOs.
• Retain multiple versions of the GPOs.
Security Requirements
Only administrators who log on by using smart cards must be able to manage objects in Active
Directory.
The corporate security policy states that a forest trust to any other forest must not exist.
CASE STUDY EXHIBIT
Click the case study exhibit button to view the exhibit.

###EndCaseStudy###

You need to recommend a PKI strategy for Contoso that meets the company’s technical
requirements.
What should you include in the recommendation?

Which two servers should you identify?

###BeginCaseStudy###
Case Study: 9
Humongous Insurance
COMPANY OVERVIEW
Humongous Insurance has a main office and 20 branch offices. The main office is located in New
York. The branch offices are located throughout North America. The main office has 8,000 users.
Each branch office has 2 to 250 users.
PLANNED CHANGES
Humongous Insurance plans to implement the following changes:
• Deploy one Read-only Domain Controller (RODC) to Site3 and one RODC to Site4.
• Issue certificates to the users in Contoso. The certificates will be based on custom certificate
templates.
• Deploy a Remote Desktop Services (RDS) infrastructure that will contain 10 Remote Desktop
servers. Users will connect to all Remote Desktop servers from the Internet by using port 443.
EXISTING ENVIRONMENT
The network contains the servers configured as shown in the following table.

Business Goals
All of the strategies for deploying physical servers and virtual servers must meet the Microsoft
guidelines for product support.
Existing Active Directory Environment
The network contains a single Active Directory forest named humongousinsurance.com. The
functional level of the forest is Windows Server 2008 R2.
The Active Directory sites are shown in the exhibit. (Click the Case Study Exhibit button.)
Existing Network Infrastructure
Humongous Insurance issues smart cards to administrators. Smart cards are not required for logon.
Humongous Insurance acquires a company named Contoso, Ltd.
REQUIREMENTS
Technical Requirements
All of the users in Contoso must be able to enroll for certificates by using the Public Key
Infrastructure (PKI) of Humongous Insurance.
Humongous Insurance must meet the following requirements for managing Group Policy objects
(GPOs):
• Minimize administrative effort.
• Support offline editing of the GPOs.
• Retain multiple versions of the GPOs.
Security Requirements
Only administrators who log on by using smart cards must be able to manage objects in Active
Directory.
The corporate security policy states that a forest trust to any other forest must not exist.
CASE STUDY EXHIBIT
Click the case study exhibit button to view the exhibit.

###EndCaseStudy###

You are evaluating whether to implement a virtualization solution.
You need to identify which physical servers can be converted to VMs by using a physical-to-virtual
machine (P2V) conversion.
Which two servers should you identify? (Each correct answer presents part of the solution. Choose
two.)

Which role service should you include in the recommendation?

###BeginCaseStudy###
Case Study: 9
Humongous Insurance
COMPANY OVERVIEW
Humongous Insurance has a main office and 20 branch offices. The main office is located in New
York. The branch offices are located throughout North America. The main office has 8,000 users.
Each branch office has 2 to 250 users.
PLANNED CHANGES
Humongous Insurance plans to implement the following changes:
• Deploy one Read-only Domain Controller (RODC) to Site3 and one RODC to Site4.
• Issue certificates to the users in Contoso. The certificates will be based on custom certificate
templates.
• Deploy a Remote Desktop Services (RDS) infrastructure that will contain 10 Remote Desktop
servers. Users will connect to all Remote Desktop servers from the Internet by using port 443.
EXISTING ENVIRONMENT
The network contains the servers configured as shown in the following table.

Business Goals
All of the strategies for deploying physical servers and virtual servers must meet the Microsoft
guidelines for product support.
Existing Active Directory Environment
The network contains a single Active Directory forest named humongousinsurance.com. The
functional level of the forest is Windows Server 2008 R2.
The Active Directory sites are shown in the exhibit. (Click the Case Study Exhibit button.)
Existing Network Infrastructure
Humongous Insurance issues smart cards to administrators. Smart cards are not required for logon.
Humongous Insurance acquires a company named Contoso, Ltd.
REQUIREMENTS
Technical Requirements
All of the users in Contoso must be able to enroll for certificates by using the Public Key
Infrastructure (PKI) of Humongous Insurance.
Humongous Insurance must meet the following requirements for managing Group Policy objects
(GPOs):
• Minimize administrative effort.
• Support offline editing of the GPOs.
• Retain multiple versions of the GPOs.
Security Requirements
Only administrators who log on by using smart cards must be able to manage objects in Active
Directory.
The corporate security policy states that a forest trust to any other forest must not exist.
CASE STUDY EXHIBIT
Click the case study exhibit button to view the exhibit.

###EndCaseStudy###

You need to recommend RDS solution that supports the company’s planned changes.
Which role service should you include in the recommendation?

What are two possible ways to achieve this goal?

###BeginCaseStudy###
Case Study: 9
Humongous Insurance
COMPANY OVERVIEW
Humongous Insurance has a main office and 20 branch offices. The main office is located in New
York. The branch offices are located throughout North America. The main office has 8,000 users.
Each branch office has 2 to 250 users.
PLANNED CHANGES
Humongous Insurance plans to implement the following changes:
• Deploy one Read-only Domain Controller (RODC) to Site3 and one RODC to Site4.
• Issue certificates to the users in Contoso. The certificates will be based on custom certificate
templates.
• Deploy a Remote Desktop Services (RDS) infrastructure that will contain 10 Remote Desktop
servers. Users will connect to all Remote Desktop servers from the Internet by using port 443.
EXISTING ENVIRONMENT
The network contains the servers configured as shown in the following table.

Business Goals
All of the strategies for deploying physical servers and virtual servers must meet the Microsoft
guidelines for product support.
Existing Active Directory Environment
The network contains a single Active Directory forest named humongousinsurance.com. The
functional level of the forest is Windows Server 2008 R2.
The Active Directory sites are shown in the exhibit. (Click the Case Study Exhibit button.)
Existing Network Infrastructure
Humongous Insurance issues smart cards to administrators. Smart cards are not required for logon.
Humongous Insurance acquires a company named Contoso, Ltd.
REQUIREMENTS
Technical Requirements
All of the users in Contoso must be able to enroll for certificates by using the Public Key
Infrastructure (PKI) of Humongous Insurance.
Humongous Insurance must meet the following requirements for managing Group Policy objects
(GPOs):
• Minimize administrative effort.
• Support offline editing of the GPOs.
• Retain multiple versions of the GPOs.
Security Requirements
Only administrators who log on by using smart cards must be able to manage objects in Active
Directory.
The corporate security policy states that a forest trust to any other forest must not exist.
CASE STUDY EXHIBIT
Click the case study exhibit button to view the exhibit.

###EndCaseStudy###

You need to ensure that you can deploy the RODCs.
What are two possible ways to achieve this goal? (Each correct answer presents a complete solution.
Choose two,)

What should you include in the recommendation?

###BeginCaseStudy###
Case Study: 9
Humongous Insurance
COMPANY OVERVIEW
Humongous Insurance has a main office and 20 branch offices. The main office is located in New
York. The branch offices are located throughout North America. The main office has 8,000 users.
Each branch office has 2 to 250 users.
PLANNED CHANGES
Humongous Insurance plans to implement the following changes:
• Deploy one Read-only Domain Controller (RODC) to Site3 and one RODC to Site4.
• Issue certificates to the users in Contoso. The certificates will be based on custom certificate
templates.
• Deploy a Remote Desktop Services (RDS) infrastructure that will contain 10 Remote Desktop
servers. Users will connect to all Remote Desktop servers from the Internet by using port 443.
EXISTING ENVIRONMENT
The network contains the servers configured as shown in the following table.

Business Goals
All of the strategies for deploying physical servers and virtual servers must meet the Microsoft
guidelines for product support.
Existing Active Directory Environment
The network contains a single Active Directory forest named humongousinsurance.com. The
functional level of the forest is Windows Server 2008 R2.
The Active Directory sites are shown in the exhibit. (Click the Case Study Exhibit button.)
Existing Network Infrastructure
Humongous Insurance issues smart cards to administrators. Smart cards are not required for logon.
Humongous Insurance acquires a company named Contoso, Ltd.
REQUIREMENTS
Technical Requirements
All of the users in Contoso must be able to enroll for certificates by using the Public Key
Infrastructure (PKI) of Humongous Insurance.
Humongous Insurance must meet the following requirements for managing Group Policy objects
(GPOs):
• Minimize administrative effort.
• Support offline editing of the GPOs.
• Retain multiple versions of the GPOs.
Security Requirements
Only administrators who log on by using smart cards must be able to manage objects in Active
Directory.
The corporate security policy states that a forest trust to any other forest must not exist.
CASE STUDY EXHIBIT
Click the case study exhibit button to view the exhibit.

###EndCaseStudy###

You need to recommend a solution for managing Group Policy that meets the company’s technical
requirements.
What should you include in the recommendation?


Page 26 of 34« First...1020...2425262728...Last »