You need to enable certificate authentication from the …
Your network contains an Active Directory forest named contoso com The forest contains a member server named Server1 that runs Windows Server 2016 Server1
is located in the perimeter network
You install the Active Directory Federation Services server role on Server1. You create an Active Directory Federation Services (ADFS) farm by using a certificate
that has a subject name of sts.contoso com
You need to enable certificate authentication from the Internet on Server1
Which two inbound TCP ports should you open on the firewall? Each correct answer presents part of the solution
Which command should you run?
HOTSPOT
You have a server named Server1 that runs Windows Server 2016 Server1 has the Windows Application proxy role service installed
You plan to deploy Remote Desktop Gateway (RD Gateway) services. Clients will connect to the RD Gateway services by using various types of devices including
Windows, iOS and Android devices.
You need to publish the RD Gateway services through the Web Application Proxy.
Which command should you run? To answer, select the appropriate options in the answer area.
Which cmdlets should you run?
HOTSPOT
Your network contains an Active Directory forest named contoso.com. The forest contains an Active Directory Federation Services (AD FS) farm.
You install Windows Server 2016 on a server named Server2
You need to configure Server2 as a node in the federation server farm
Which cmdlets should you run? To answer, select the appropriate options in the answer area
You need to deploy the first node cluster of a Network Controller cluster
DRAG DROP
You have a server named Server1 that runs Windows Server 2016.
You need to deploy the first node cluster of a Network Controller cluster
Which four cmdlets should you run in sequence? To answer, move the appropriate cmdlets from the list of cmdlets to the answer area and arrange them in the
correct order
You need to ensure that the traffic is distributed even…
You have an application named App1 App1 is distributed to multiple Hyper-V virtual machines in a multitenant environment You need to ensure that the traffic is
distributed evenly among the virtual machines that host App1 What should you include in the environment?
You need to asynchronously replicate volume F: from Ser…
Your network contains an Active Directory domain named contoso com. The domain contains two servers named Server1 and Server2 that have the samehardware
configuration
You need to asynchronously replicate volume F: from Server1 to Server2.
What should you do?
Which three actions should you perform in sequence?
DRAG DROP
You have a server named Server1 that runs Windows Server 2016.
You plan to deploy Internet Information Services (US) in a Windows container.
You need to prepare Server1 for the planned deployment
Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the
correct order
You need to ensure that containers that run on VM1 can …
You have a Hyper-V host named Served That runs Windows Server 2016
Server1 has a virtual machine named VM1 VM1 is configured to run the Docker daemon.
On VM1 you have a container network that uses transparent mode
You need to ensure that containers that run on VM1 can obtain IP addresses from DHCP.
What should you do?
Which cmdlets should you run?
HOTSPOT
Your network contains an Active Directory domain named contoso com. The domain contains a DNS server named Server1
You enable Response Rate Limiting on Server1.
You need to prevent Response Rate Limiting from applying to hosts that reside on the network of 10.0.0.0/24.
Which cmdlets should you run? To answer, select the appropriate options in the answer area
Which firewall rules should you create for each type of traffic?
DRAG DROP
You are deploying DirectAccess to a server named DA1.Da1 will be located behind a firewall and will have a single network adapter The intermediary network will be
IPv4.
You need to configure firewall to support DirectAccess.
Which firewall rules should you create for each type of traffic? To answer, drag the appropriate ports and protocols to the correct traffic types. Each port and
protocol may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content