PrepAway - Latest Free Exam Questions & Answers

Tag: Exam 70-647 (update November 6th, 2015)

Exam 70-647: Pro: Windows Server 2008, Enterprise Administrator (update November 6th, 2015)

What should you include in the recommendation?

###BeginCaseStudy###
Case Study: 17
Graphics Design Institute
COMPANY OVERVIEW
Graphics Design Institute is a training company that has four offices.
Graphics Design Institute recently purchased another company named Proseware, Inc.
PLANNED CHANGES
Graphics Design Institute plans to transition the internal IPv4 network to IPv6. IPv4 will be used to
connect to the Internet. Only private IPv6 addresses will be used on the internal network.
Graphics Design Institute plans to deploy a remote access solution for all client computers.
Graphics Design Institute plans to deploy 10 public computers that run Windows Vista Service Pack 2
(SP2). All Windows Vista public computers will run an application named Appl.
Graphics Design Institute plans to deploy 10 public computers that run Windows 7 Professional. All
windows 7 public computers will run an application named App2.
You plan to deploy a virtualization solution that will host 120 virtual machines (VMs). You run
performance tests and verify that you can host 20 VMs per server and still maintain adequate
performance.
EXISTING ENVIRONMENT
All client computers run Windows 7 Enterprise and are joined to the Active Directory domain. All of
the client computers use wireless WAN (WWAN) network adapters to maintain permanent
connections to the Internet.
An application named BusinessApp is installed on a server in graphicdesigninstitute.com.
BusinessApp only supports Kerberos authentication. Only users in graphicdesigninstitute.com
currently use BusinessApp.
Existing Network Infrastructure
The network contains four IPv4 subnets.
REQUIREMENTS
Technical Requirements
All of the client computers that use IPv4 must be able to communicate with the client computers
that use IPv6.
Administrators must be able to remotely manage the client computers when users work either from
the office or remotely. Administrators must be able to remotely manage the client computers if the
users are not logged on to their computers.
Administrators must ensure that only Appl and App2 run on the public computers.
Graphics Design Institute must meet the following visualization requirements:
Support Hyper-V live migration.
Minimize hardware and software costs.
Ensure that all of the VMs are available if a single server fails.
Prevent any impact on the performance of the VMs if a single server fails.
Minimize the amount of administrative effort required to manage a storage solution for the Hyper-V
servers.
Security Requirements

The corporate security policy states that when an administrator modifies the permissions assigned
to the members of a group named Group1, the permissions must be restored to their default
settings.
###EndCaseStudy###

You need to recommend a solution for the public computers that meets the company’s technical
requirements.
What should you include in the recommendation?

What should you include in the recommendation?

###BeginCaseStudy###
Case Study: 17
Graphics Design Institute
COMPANY OVERVIEW
Graphics Design Institute is a training company that has four offices.
Graphics Design Institute recently purchased another company named Proseware, Inc.
PLANNED CHANGES
Graphics Design Institute plans to transition the internal IPv4 network to IPv6. IPv4 will be used to
connect to the Internet. Only private IPv6 addresses will be used on the internal network.
Graphics Design Institute plans to deploy a remote access solution for all client computers.
Graphics Design Institute plans to deploy 10 public computers that run Windows Vista Service Pack 2
(SP2). All Windows Vista public computers will run an application named Appl.
Graphics Design Institute plans to deploy 10 public computers that run Windows 7 Professional. All
windows 7 public computers will run an application named App2.
You plan to deploy a virtualization solution that will host 120 virtual machines (VMs). You run
performance tests and verify that you can host 20 VMs per server and still maintain adequate
performance.
EXISTING ENVIRONMENT
All client computers run Windows 7 Enterprise and are joined to the Active Directory domain. All of
the client computers use wireless WAN (WWAN) network adapters to maintain permanent
connections to the Internet.
An application named BusinessApp is installed on a server in graphicdesigninstitute.com.
BusinessApp only supports Kerberos authentication. Only users in graphicdesigninstitute.com
currently use BusinessApp.
Existing Network Infrastructure
The network contains four IPv4 subnets.
REQUIREMENTS
Technical Requirements
All of the client computers that use IPv4 must be able to communicate with the client computers
that use IPv6.
Administrators must be able to remotely manage the client computers when users work either from
the office or remotely. Administrators must be able to remotely manage the client computers if the
users are not logged on to their computers.
Administrators must ensure that only Appl and App2 run on the public computers.
Graphics Design Institute must meet the following visualization requirements:
Support Hyper-V live migration.
Minimize hardware and software costs.
Ensure that all of the VMs are available if a single server fails.
Prevent any impact on the performance of the VMs if a single server fails.
Minimize the amount of administrative effort required to manage a storage solution for the Hyper-V
servers.
Security Requirements

The corporate security policy states that when an administrator modifies the permissions assigned
to the members of a group named Group1, the permissions must be restored to their default
settings.
###EndCaseStudy###

You need to recommend a storage solution for the VMs that meets the company’s technical
requirements.
What should you include in the recommendation?

Which transition technology should you recommend?

###BeginCaseStudy###
Case Study: 17
Graphics Design Institute
COMPANY OVERVIEW
Graphics Design Institute is a training company that has four offices.
Graphics Design Institute recently purchased another company named Proseware, Inc.
PLANNED CHANGES
Graphics Design Institute plans to transition the internal IPv4 network to IPv6. IPv4 will be used to
connect to the Internet. Only private IPv6 addresses will be used on the internal network.
Graphics Design Institute plans to deploy a remote access solution for all client computers.
Graphics Design Institute plans to deploy 10 public computers that run Windows Vista Service Pack 2
(SP2). All Windows Vista public computers will run an application named Appl.
Graphics Design Institute plans to deploy 10 public computers that run Windows 7 Professional. All
windows 7 public computers will run an application named App2.
You plan to deploy a virtualization solution that will host 120 virtual machines (VMs). You run
performance tests and verify that you can host 20 VMs per server and still maintain adequate
performance.
EXISTING ENVIRONMENT
All client computers run Windows 7 Enterprise and are joined to the Active Directory domain. All of
the client computers use wireless WAN (WWAN) network adapters to maintain permanent
connections to the Internet.
An application named BusinessApp is installed on a server in graphicdesigninstitute.com.
BusinessApp only supports Kerberos authentication. Only users in graphicdesigninstitute.com
currently use BusinessApp.
Existing Network Infrastructure
The network contains four IPv4 subnets.
REQUIREMENTS
Technical Requirements
All of the client computers that use IPv4 must be able to communicate with the client computers
that use IPv6.
Administrators must be able to remotely manage the client computers when users work either from
the office or remotely. Administrators must be able to remotely manage the client computers if the
users are not logged on to their computers.
Administrators must ensure that only Appl and App2 run on the public computers.
Graphics Design Institute must meet the following visualization requirements:
Support Hyper-V live migration.
Minimize hardware and software costs.
Ensure that all of the VMs are available if a single server fails.
Prevent any impact on the performance of the VMs if a single server fails.
Minimize the amount of administrative effort required to manage a storage solution for the Hyper-V
servers.
Security Requirements

The corporate security policy states that when an administrator modifies the permissions assigned
to the members of a group named Group1, the permissions must be restored to their default
settings.
###EndCaseStudy###

You need to recommend a technology to transition the company from IPv4 to IPv6. The technology
must meet the company’s technical requirements.
Which transition technology should you recommend?

You need to ensure that the users in the proseware.com forest can use BusinessApp

###BeginCaseStudy###
Case Study: 17
Graphics Design Institute
COMPANY OVERVIEW
Graphics Design Institute is a training company that has four offices.
Graphics Design Institute recently purchased another company named Proseware, Inc.
PLANNED CHANGES
Graphics Design Institute plans to transition the internal IPv4 network to IPv6. IPv4 will be used to
connect to the Internet. Only private IPv6 addresses will be used on the internal network.
Graphics Design Institute plans to deploy a remote access solution for all client computers.
Graphics Design Institute plans to deploy 10 public computers that run Windows Vista Service Pack 2
(SP2). All Windows Vista public computers will run an application named Appl.
Graphics Design Institute plans to deploy 10 public computers that run Windows 7 Professional. All
windows 7 public computers will run an application named App2.
You plan to deploy a virtualization solution that will host 120 virtual machines (VMs). You run
performance tests and verify that you can host 20 VMs per server and still maintain adequate
performance.
EXISTING ENVIRONMENT
All client computers run Windows 7 Enterprise and are joined to the Active Directory domain. All of
the client computers use wireless WAN (WWAN) network adapters to maintain permanent
connections to the Internet.
An application named BusinessApp is installed on a server in graphicdesigninstitute.com.
BusinessApp only supports Kerberos authentication. Only users in graphicdesigninstitute.com
currently use BusinessApp.
Existing Network Infrastructure
The network contains four IPv4 subnets.
REQUIREMENTS
Technical Requirements
All of the client computers that use IPv4 must be able to communicate with the client computers
that use IPv6.
Administrators must be able to remotely manage the client computers when users work either from
the office or remotely. Administrators must be able to remotely manage the client computers if the
users are not logged on to their computers.
Administrators must ensure that only Appl and App2 run on the public computers.
Graphics Design Institute must meet the following visualization requirements:
Support Hyper-V live migration.
Minimize hardware and software costs.
Ensure that all of the VMs are available if a single server fails.
Prevent any impact on the performance of the VMs if a single server fails.
Minimize the amount of administrative effort required to manage a storage solution for the Hyper-V
servers.
Security Requirements

The corporate security policy states that when an administrator modifies the permissions assigned
to the members of a group named Group1, the permissions must be restored to their default
settings.
###EndCaseStudy###

You need to ensure that the users in the proseware.com forest can use BusinessApp.
What should you do?

Which auditing requirement is met by deploying the Advanced Audit Policy Configuration settings?

###BeginCaseStudy###
Case Study: 18
Contoso, Ltd.
COMPANY OVERVIEW
Contoso, Ltd. is a financial institution that has 1,500 users.
PLANNED CHANGES
Contoso plans to deploy the following:
A Public Key Infrastructure (PKI)
An update strategy
Microsoft Office 2010 on all client computers
A Virtual Desktop Infrastructure (VDI) that uses Microsoft technologies
A Group Policy object (GPO) named GP1 on all of the client computers in contoso.com and
south.contoso.com only
EXISTING ENVIRONMENT
Business Goals
Contoso has the following business goals:
Minimize the cost of the software and hardware required to deploy an update strategy.
Minimize the amount of administrative effort required to deploy a Public Key Infrastructure (PKI).
Existing Active Directory Environment
The network contains an Active Directory forest named contoso.com. Contoso.com contains two
child domains named south.contoso.com and north.contoso.com.
All of the client computers in contoso.com are in an Active Directory site named Sitel. All of the
client computers in north.contoso.com and south.contoso.com are in an Active Directory site named
Site2.
The relevant organizational units (OUs) are configured as shown in the following table.

Existing Environment
The network contains five Hyper-V servers that run Windows Server 2008 R2. The network contains
2,000 client computers.
REQUIREMENTS
Technical Requirements
Contoso must meet the following technical requirements:
All client computers must schedule the installation of Windows updates.
All Office 2010 applications must be available from the Start menu.
The amount of CPU resources used on the client computers must be minimized.
Administrators must approve each application that a user can run on a virtual desktop.

All of the client computers in each of the domains must automatically receive IPSec certificates.
Administrators must be able to upgrade Office by using the minimum amount of administrative
effort.
When a user logs off of a virtual desktop, the default settings for the virtual desktop must be
restored.
Administrators must be able to apply Windows updates to all client computers and personal virtual
desktops.
Administrators must be able to confirm whether Windows updates are installed correctly on the
client computers.
The amount of time it takes for the users in south.contoso.com to log on to their client computers
must be minimized.
Auditing Requirements
Contoso must meet the following auditing requirements:
Audit each logon to the domain.
Store all auditing events in a central location.
Audit each successful access to the shared folders on the file servers.
Audit each modification to the password of the default Administrator account.
###EndCaseStudy###

You plan to deploy Advanced Audit Policy Configuration settings to the Servers OU.
Which auditing requirement is met by deploying the Advanced Audit Policy Configuration settings?

What should you include in the recommendation?

###BeginCaseStudy###
Case Study: 18
Contoso, Ltd.
COMPANY OVERVIEW
Contoso, Ltd. is a financial institution that has 1,500 users.
PLANNED CHANGES
Contoso plans to deploy the following:
A Public Key Infrastructure (PKI)
An update strategy
Microsoft Office 2010 on all client computers
A Virtual Desktop Infrastructure (VDI) that uses Microsoft technologies
A Group Policy object (GPO) named GP1 on all of the client computers in contoso.com and
south.contoso.com only
EXISTING ENVIRONMENT
Business Goals
Contoso has the following business goals:
Minimize the cost of the software and hardware required to deploy an update strategy.
Minimize the amount of administrative effort required to deploy a Public Key Infrastructure (PKI).
Existing Active Directory Environment
The network contains an Active Directory forest named contoso.com. Contoso.com contains two
child domains named south.contoso.com and north.contoso.com.
All of the client computers in contoso.com are in an Active Directory site named Sitel. All of the
client computers in north.contoso.com and south.contoso.com are in an Active Directory site named
Site2.
The relevant organizational units (OUs) are configured as shown in the following table.

Existing Environment
The network contains five Hyper-V servers that run Windows Server 2008 R2. The network contains
2,000 client computers.
REQUIREMENTS
Technical Requirements
Contoso must meet the following technical requirements:
All client computers must schedule the installation of Windows updates.
All Office 2010 applications must be available from the Start menu.
The amount of CPU resources used on the client computers must be minimized.
Administrators must approve each application that a user can run on a virtual desktop.

All of the client computers in each of the domains must automatically receive IPSec certificates.
Administrators must be able to upgrade Office by using the minimum amount of administrative
effort.
When a user logs off of a virtual desktop, the default settings for the virtual desktop must be
restored.
Administrators must be able to apply Windows updates to all client computers and personal virtual
desktops.
Administrators must be able to confirm whether Windows updates are installed correctly on the
client computers.
The amount of time it takes for the users in south.contoso.com to log on to their client computers
must be minimized.
Auditing Requirements
Contoso must meet the following auditing requirements:
Audit each logon to the domain.
Store all auditing events in a central location.
Audit each successful access to the shared folders on the file servers.
Audit each modification to the password of the default Administrator account.
###EndCaseStudy###

You need to recommend a solution for the planned VDI that meets the company’ s technical
requirements.
What should you include in the recommendation?

Which role services should you recommend?

###BeginCaseStudy###
Case Study: 18
Contoso, Ltd.
COMPANY OVERVIEW
Contoso, Ltd. is a financial institution that has 1,500 users.
PLANNED CHANGES
Contoso plans to deploy the following:
A Public Key Infrastructure (PKI)
An update strategy
Microsoft Office 2010 on all client computers
A Virtual Desktop Infrastructure (VDI) that uses Microsoft technologies
A Group Policy object (GPO) named GP1 on all of the client computers in contoso.com and
south.contoso.com only
EXISTING ENVIRONMENT
Business Goals
Contoso has the following business goals:
Minimize the cost of the software and hardware required to deploy an update strategy.
Minimize the amount of administrative effort required to deploy a Public Key Infrastructure (PKI).
Existing Active Directory Environment
The network contains an Active Directory forest named contoso.com. Contoso.com contains two
child domains named south.contoso.com and north.contoso.com.
All of the client computers in contoso.com are in an Active Directory site named Sitel. All of the
client computers in north.contoso.com and south.contoso.com are in an Active Directory site named
Site2.
The relevant organizational units (OUs) are configured as shown in the following table.

Existing Environment
The network contains five Hyper-V servers that run Windows Server 2008 R2. The network contains
2,000 client computers.
REQUIREMENTS
Technical Requirements
Contoso must meet the following technical requirements:
All client computers must schedule the installation of Windows updates.
All Office 2010 applications must be available from the Start menu.
The amount of CPU resources used on the client computers must be minimized.
Administrators must approve each application that a user can run on a virtual desktop.

All of the client computers in each of the domains must automatically receive IPSec certificates.
Administrators must be able to upgrade Office by using the minimum amount of administrative
effort.
When a user logs off of a virtual desktop, the default settings for the virtual desktop must be
restored.
Administrators must be able to apply Windows updates to all client computers and personal virtual
desktops.
Administrators must be able to confirm whether Windows updates are installed correctly on the
client computers.
The amount of time it takes for the users in south.contoso.com to log on to their client computers
must be minimized.
Auditing Requirements
Contoso must meet the following auditing requirements:
Audit each logon to the domain.
Store all auditing events in a central location.
Audit each successful access to the shared folders on the file servers.
Audit each modification to the password of the default Administrator account.
###EndCaseStudy###

You need to recommend which role services must be deployed to support the planned VDI.
Which role services should you recommend?

What should you include in the recommendation?

###BeginCaseStudy###
Case Study: 18
Contoso, Ltd.
COMPANY OVERVIEW
Contoso, Ltd. is a financial institution that has 1,500 users.
PLANNED CHANGES
Contoso plans to deploy the following:
A Public Key Infrastructure (PKI)
An update strategy
Microsoft Office 2010 on all client computers
A Virtual Desktop Infrastructure (VDI) that uses Microsoft technologies
A Group Policy object (GPO) named GP1 on all of the client computers in contoso.com and
south.contoso.com only
EXISTING ENVIRONMENT
Business Goals
Contoso has the following business goals:
Minimize the cost of the software and hardware required to deploy an update strategy.
Minimize the amount of administrative effort required to deploy a Public Key Infrastructure (PKI).
Existing Active Directory Environment
The network contains an Active Directory forest named contoso.com. Contoso.com contains two
child domains named south.contoso.com and north.contoso.com.
All of the client computers in contoso.com are in an Active Directory site named Sitel. All of the
client computers in north.contoso.com and south.contoso.com are in an Active Directory site named
Site2.
The relevant organizational units (OUs) are configured as shown in the following table.

Existing Environment
The network contains five Hyper-V servers that run Windows Server 2008 R2. The network contains
2,000 client computers.
REQUIREMENTS
Technical Requirements
Contoso must meet the following technical requirements:
All client computers must schedule the installation of Windows updates.
All Office 2010 applications must be available from the Start menu.
The amount of CPU resources used on the client computers must be minimized.
Administrators must approve each application that a user can run on a virtual desktop.

All of the client computers in each of the domains must automatically receive IPSec certificates.
Administrators must be able to upgrade Office by using the minimum amount of administrative
effort.
When a user logs off of a virtual desktop, the default settings for the virtual desktop must be
restored.
Administrators must be able to apply Windows updates to all client computers and personal virtual
desktops.
Administrators must be able to confirm whether Windows updates are installed correctly on the
client computers.
The amount of time it takes for the users in south.contoso.com to log on to their client computers
must be minimized.
Auditing Requirements
Contoso must meet the following auditing requirements:
Audit each logon to the domain.
Store all auditing events in a central location.
Audit each successful access to the shared folders on the file servers.
Audit each modification to the password of the default Administrator account.
###EndCaseStudy###

You need to recommend an application delivery method for Office 2010 that meets the company’s
technical requirements.
What should you include in the recommendation?

What should you include in the recommendation?

###BeginCaseStudy###
Case Study: 18
Contoso, Ltd.
COMPANY OVERVIEW
Contoso, Ltd. is a financial institution that has 1,500 users.
PLANNED CHANGES
Contoso plans to deploy the following:
A Public Key Infrastructure (PKI)
An update strategy
Microsoft Office 2010 on all client computers
A Virtual Desktop Infrastructure (VDI) that uses Microsoft technologies
A Group Policy object (GPO) named GP1 on all of the client computers in contoso.com and
south.contoso.com only
EXISTING ENVIRONMENT
Business Goals
Contoso has the following business goals:
Minimize the cost of the software and hardware required to deploy an update strategy.
Minimize the amount of administrative effort required to deploy a Public Key Infrastructure (PKI).
Existing Active Directory Environment
The network contains an Active Directory forest named contoso.com. Contoso.com contains two
child domains named south.contoso.com and north.contoso.com.
All of the client computers in contoso.com are in an Active Directory site named Sitel. All of the
client computers in north.contoso.com and south.contoso.com are in an Active Directory site named
Site2.
The relevant organizational units (OUs) are configured as shown in the following table.

Existing Environment
The network contains five Hyper-V servers that run Windows Server 2008 R2. The network contains
2,000 client computers.
REQUIREMENTS
Technical Requirements
Contoso must meet the following technical requirements:
All client computers must schedule the installation of Windows updates.
All Office 2010 applications must be available from the Start menu.
The amount of CPU resources used on the client computers must be minimized.
Administrators must approve each application that a user can run on a virtual desktop.

All of the client computers in each of the domains must automatically receive IPSec certificates.
Administrators must be able to upgrade Office by using the minimum amount of administrative
effort.
When a user logs off of a virtual desktop, the default settings for the virtual desktop must be
restored.
Administrators must be able to apply Windows updates to all client computers and personal virtual
desktops.
Administrators must be able to confirm whether Windows updates are installed correctly on the
client computers.
The amount of time it takes for the users in south.contoso.com to log on to their client computers
must be minimized.
Auditing Requirements
Contoso must meet the following auditing requirements:
Audit each logon to the domain.
Store all auditing events in a central location.
Audit each successful access to the shared folders on the file servers.
Audit each modification to the password of the default Administrator account.
###EndCaseStudy###

You need to recommend a PKI strategy that meets the company’s technical requirements.
What should you include in the recommendation?

What should you include in the recommendation?

###BeginCaseStudy###
Case Study: 18
Contoso, Ltd.
COMPANY OVERVIEW
Contoso, Ltd. is a financial institution that has 1,500 users.
PLANNED CHANGES
Contoso plans to deploy the following:
A Public Key Infrastructure (PKI)
An update strategy
Microsoft Office 2010 on all client computers
A Virtual Desktop Infrastructure (VDI) that uses Microsoft technologies
A Group Policy object (GPO) named GP1 on all of the client computers in contoso.com and
south.contoso.com only
EXISTING ENVIRONMENT
Business Goals
Contoso has the following business goals:
Minimize the cost of the software and hardware required to deploy an update strategy.
Minimize the amount of administrative effort required to deploy a Public Key Infrastructure (PKI).
Existing Active Directory Environment
The network contains an Active Directory forest named contoso.com. Contoso.com contains two
child domains named south.contoso.com and north.contoso.com.
All of the client computers in contoso.com are in an Active Directory site named Sitel. All of the
client computers in north.contoso.com and south.contoso.com are in an Active Directory site named
Site2.
The relevant organizational units (OUs) are configured as shown in the following table.

Existing Environment
The network contains five Hyper-V servers that run Windows Server 2008 R2. The network contains
2,000 client computers.
REQUIREMENTS
Technical Requirements
Contoso must meet the following technical requirements:
All client computers must schedule the installation of Windows updates.
All Office 2010 applications must be available from the Start menu.
The amount of CPU resources used on the client computers must be minimized.
Administrators must approve each application that a user can run on a virtual desktop.

All of the client computers in each of the domains must automatically receive IPSec certificates.
Administrators must be able to upgrade Office by using the minimum amount of administrative
effort.
When a user logs off of a virtual desktop, the default settings for the virtual desktop must be
restored.
Administrators must be able to apply Windows updates to all client computers and personal virtual
desktops.
Administrators must be able to confirm whether Windows updates are installed correctly on the
client computers.
The amount of time it takes for the users in south.contoso.com to log on to their client computers
must be minimized.
Auditing Requirements
Contoso must meet the following auditing requirements:
Audit each logon to the domain.
Store all auditing events in a central location.
Audit each successful access to the shared folders on the file servers.
Audit each modification to the password of the default Administrator account.
###EndCaseStudy###

You need to recommend a solution for the planned VDI that meets the company’s technical
requirements.
What should you include in the recommendation?


Page 32 of 34« First...1020...3031323334