What are two possible ways to achieve this goal?
You need to relocate the existing user and computer objects in your company to different organizational units.
What are two possible ways to achieve this goal? (Each correct answer presents a complete solution.
Choose two.)
What should you do?
Your company hires 10 new employees. You want the new employees to connect to the main office through a VPN connection. You create new user accounts and grant the new employees the Allow Read and Allow Execute permissions to shared resources in the main office. The new employees are unable to access shared resources in the main office. You need to ensure that users are able to establish a VPN connection to the main office.
What should you do?
What should you do?
Your company’s security policy requires complex passwords. You have a comma delimited file named import.csv that contains user account information. You need to create user accounts in the domain by using the import.csv file. You also need to ensure that the new user accounts are set to use default passwords and are disabled.
What should you do?
What should you do?
A user in a branch office of your company attempts to join a computer to the domain, but the attempt fails.
You need to enable the user to join a single computer to the domain. You must ensure that the user is denied any additional rights beyond those required to complete the task.
What should you do?
What should you do?
Your company has an Active Directory forest that contains a single domain. The domain member server has an Active Directory Federation Services (AD?FS) server role installed. You need to configure AD?FS to ensure that AD?FS tokens contain information from the Active Directory domain.
What should you do?
Which utility should you use?
Your company has a main office and 40 branch offices. Each branch office is configured as a separate Active Directory site that has a dedicated read-only domain controller (RODC). An RODC server is stolen from one of the branch offices. You need to identify the user accounts that were cached on the stolen RODC server.
Which utility should you use?
What should you do?
Your company has an Active Directory Rights Management Services (AD?RMS) server. Users have Windows Vista computers. An Active Directory domain is configured at the Windows Server 2003 functional level.
You need to configure AD?RMS so that users are able to protect their documents.
What should you do?
What should you do?
Your company has a server that runs Windows Server 2008 R2. The server runs an instance of Active Directory Lightweight Directory Services (AD?LDS).
You need to replicate the AD?LDS instance on a test computer that is located on the network.
What should you do?
What should you do?
Your company has a server that runs an instance of Active Directory Lightweight Directory Services (AD LDS).
You need to create new organizational units in the AD LDS application directory partition.
What should you do?
Which two roles should you transfer?
You are decommissioning domain controllers that hold all forest-wide operations master roles. You need to transfer all forest-wide operations master roles to another domain controller. Which two roles should you transfer? (Each correct answer presents part of the solution. Choose two.)