What should you do?
Your network contains a server named Server1 that has the Hyper-V server role installed. Server1 has two network adapters.
You need to configure Server1 to meet the following requirements:
All virtual machines (VMs) on Server1 must be able to communicate with other computers on the
network.
The number of virtual network connections must be minimized.
What should you do?
Which firewall rule should you enable on Server2?
Your network contains a server named Server1. Server1 has the Volume Activation Management Tool (VAMT) installed.
You need to activate Windows on a server named Server2 by using VAMT.
Which firewall rule should you enable on Server2?
What should you do first?
Your network contains a server named Server1 that runs Windows Server 2008 R2. You need to configure Server1 as a Key Management Service (KMS) host.
What should you do first?
Which SRV record should you create?
You need to manually create a service location (SRV) record for a server that has the Key Management Service (KMS) installed.
Which SRV record should you create?
What should you do?
You have a test lab that contains 20 client computers and a server named Server1. The client computers run Windows 7. Server1 runs Windows Server 2008 Service Pack 2 (SP2). You install the Key Management Service (KMS) on Server1. You need to ensure that the client computers can successfully activate by using Server1.
What should you do?
What are two possible ways to achieve this goal?
You have a server that runs Windows Server 2008 R2. The server has the Web Server (IIS) server role and the FTP Service role service installed.
You add a new FTP site to the server.
You need to ensure that the new FTP site is available. What are two possible ways to achieve this goal? (Each correct answer presents a complete solution.
Choose two.)
Which Web site feature should you configure?
You have a server that runs Windows Server 2008 R2. The server has the Web Server (IIS) server role installed.
The server contains a Web site that is configured to use only Windows Authentication. You have a security group named Group1 that contains several user accounts. You need to prevent the members of Group1 from accessing a Web site. You must not prevent other users from accessing the Web site.
Which Web site feature should you configure?
Which Web site feature should you configure?
You have a Windows Server 2008 R2 server that has the Web Server (IIS) server role installed. The server contains a Web site.
You need to ensure that the cookies sent from the Web site are encrypted on users’ computers.
Which Web site feature should you configure?
What should you do?
You install the Web Server (IIS) on a server that runs Windows Server 2008 R2. You install a Microsoft .NET Framework application on a Web site that is hosted on the server in a folder named wwwroot.
The .NET Framework application must write to a log file that resides in the Program FilesWebApp folder.
You need to configure the .NET Framework trust level setting for the Web site so that the application can write to the log file.
What should you do?
What should you do?
You install the Web Server (IIS) server role on a new server that runs Windows Server 2008 R2. You install a Microsoft .NET Framework application on a Web site on the Web server. The application launches a process that presents a real-time graphical report to the Web browser and creates a text report file on the hard disk drive.
The company security policy states that the application must not perform any of the following tasks:
Write to the event log.
Access Open Database Connectivity (ODBC) data sources.
Make network or Web service calls.
You need to configure the Web site so that the application can be executed. You must ensure that the application meets the outlined security requirements.
What should you do?