What should you do to implement an authentication solution to meet the following requirements?
Your network consists of two Active Directory forests. The Active Directory forests are configured as shown in the following table:
The servers in both forests run Windows Server 2008.
A forest trust exists between the fabrikam.com forest and the contoso.com forest.
Fabrikam.com has a server named server1.fabrikam.com.
Contoso.com has a global group named ContosoSales.
Users in the ContosoSales global group access an application on server1.fabrikam.com.
You discover that users from other groups in the contoso.com domain can log on to servers in the fabrikam.com domain.
You need to implement an authentication solution to meet the following requirements:
– Users in the ContosoSales global group must be able to access server1.fabrikam.com.
– Users in the ContosoSales global group must be denied access to all other servers in the fabrikam.com forest.
– All other users in the contoso.com domain must be able to access only resources in the contoso.com forest.
exhibit What should you do?
What should you do to prepare the environment to allow users to access resources in all domains from both fore
Your network consists of two Active Directory forests.
The Active Directory forests are configured as shown in the following table:
You need to prepare the environment to allow users to access resources in all domains from both forests. The solution must require the minimum amount of administrative effort.
exhibit What should you do first?
What should you include in your plan the management of all users on the network?
Your network consists of one Active directory domain.
The functional level of the domain is Windows Server 2008.
The organizational units (OUs) are configured as shown in the exhibit.
The Human Resources OU does not contain user accounts. Help desk technicians respond to all user service requests.
You need to plan the management of all users on the network.
The solution must meet the following requirements:
– Help desk technicians must have only the minimum number of required rights in the domain.
– Help desk technicians must be able to reset all user passwords except IT administrator passwords and manager passwords.
What should you include in your plan?
Exhibit:
What should you do to ensure that domain controllers in the spoke sites can replicate with domain controllers
Your network consists of one Active Directory domain.
The functional level of the forest is Windows Server 2003.
All domain controllers run Windows Server 2003.
The relevant portion of the network is configured as shown in the exhibit.
The Bridge all site links option is enabled.
You need to ensure that domain controllers in the spoke sites can replicate with domain controllers in only the hub sites. The solution must ensure that domain controllers can replicate if a server fails in one of the hub sites.
What should you do?
Exhibit:
What should you do to prepare the environment to provide users access to the applications?
Your network consists of one Active Directory domain. The domain contains servers that run Windows Server 2008.
The relevant servers are configured as shown in the following table:
All client computers run Windows Vista.
Remote users connect to the network from the Internet by using virtual private network (VPN) connections.
You plan to enable remote users to run Terminal Services RemoteApp (TS RemoteApp) applications on Server2.
You need to prepare the environment to provide users access to the applications. The solution must provide a custom Web page that contains shortcuts to authorized applications for each user.
exhibit What should you do?
What should you include in your plan a solution to manage all VPN connections to the network?
Your network consists of one Active Directory domain. The domain contains servers that run Windows Server 2008.
The servers are configured as shown in the following table:
Server2 and Server3 are configured as RADIUS clients.
You need to plan a solution to manage all VPN connections to the network.
The solution must meet the following requirements:
– Specify the allowed VPN connection protocols.
– Specify the allowed VPN client authentication mechanisms.
– Specify VPN client access rights based on group membership.
exhibit What should you include in your plan?
What should you do to ensure that only computers that are joined to the domain can access network resources on
Your network consists of one Active Directory domain and one IP subnet.
All servers run Windows Server 2008. All client computers run Windows Vista, Windows XP Professional, and Windows 2000 Professional.
The servers are configured as shown in the following table:
Server2 is configured to support Network Access Protection (NAP) by using IPsec, DHCP, and 802.1x enforcement methods.
Users from a partner company have computers that are not joined to the domain. The computers successfully connect to the network.
You need to ensure that only computers that are joined to the domain can access network resources on the domain.
exhibit What should you do?
What should you recommend to recommend a solution to control the distribution of user requests made to Server1
Your network consists of one Active Directory forest.
You have two servers named Server1 and Server2. Both servers run Windows Server 2008.
All client computers run Windows Vista.
Hardware on the servers is installed as shown in the following table:
Client computers use the Remote Desktop client to connect to Server1 and Server2.
You need to recommend a solution to control the distribution of user requests made to Server1 and Server2. The solution must enable administrators to distribute the traffic based on the server hardware.
exhibit What should you recommend?
What should you recommend to recommend a solution that enables the two Java-based applications to run on all c
Your network consists of one Active Directory domain. The domain contains servers that run Windows Server 2008.
The relevant servers are configured as shown in the following table:
All client computers run Windows Vista. You plan to deploy two Java-based applications on all client computers.
The two applications each require a different version of the Java Runtime Environment (JRE).
After testing, you notice that the two JREs prevent the applications from running on the same computer.
You need to recommend a solution that enables the two Java-based applications to run on all client computers.
exhibit What should you recommend?
What should you recommend to recommend a solution that enables administrators to monitor the child virtual mac
Your network contains two servers named Server1 and Server2 that run Windows Server 2008.
Microsoft System Center Operations Manager (SCOM) 2007 is installed on Server2.
The Hyper-V role is installed on Server1.
Server1 hosts five child virtual machines that run Windows Server 2003.
You need to recommend a solution that enables administrators to monitor the child virtual machines.
The solution must gather the following data from the virtual machines:
– Performance statistics
– Event data from the application log
What should you recommend?