Q1. - (Topic 10)
Your network contains an Active Directory domain named contoso.com.
You plan to implement Network Load Balancing (NLB).
You need to identify which network services and applications can be load balanced by using NLB.
Which services and applications should you identify?
A. Microsoft SQL Server 2012 Reporting Services
B. A failover cluster
C. A DHCP server
D. A Microsoft Exchange Server 2010 Mailbox server
E. A file server
F. A Microsoft SharePoint Server 2010 front-end Web server
Answer: A,F
Q2. - (Topic 2)
You need to recommend a trust model.
What should you include in the recommendation?
A. A one-way, forest trust that has selective authentication.
B. A one-way, external trust
C. A two-way, external trust
D. A one-way, forest trust that has domain-wide authentication.
Answer: A
Explanation:
From case study:
Users in the Montreal office must only be allowed to access shares that are located on
File01 and File02. The Montreal users must be prevented from accessing any other servers
in the proseware.com forest regardless of the permissions on the resources.
Q3. - (Topic 9)
Your network contains an Active Directory domain named contoso.com. The domain contains three VLANs. The VLANs are configured as shown in the following table.
All client computers run either Windows 7 or Windows 8.
The corporate security policy states that all of the client computers must have the latest
security updates installed.
You need to implement a solution to ensure that only the client computers that have all of
the required security updates installed can connect to VLAN 1. The solution must ensure
that all other client computers connect to VLAN 3.
Solution: You implement the VPN enforcement method.
Does this meet the goal?
A. Yes
B. No
Answer: B
Q4. HOTSPOT - (Topic 7)
You need to recommend a network configuration for the newly deployed Hyper-V hosts used by Customer1.
On which network adapter should you recommend performing each configuration? To answer, select the appropriate network adapter for each configuration in the answer area.
Answer:
Q5. - (Topic 9)
Your company has a main office and a branch office.
The network contains an Active Directory domain named contoso.com. The domain contains three domain controllers. The domain controllers are configured as shown in the following table.
The domain contains two global groups. The groups are configured as shown in the following table.
You need to ensure that the RODC is configured to meet the following requirements: . Cache passwords for all of the members of Branch1Users. . Prevent the caching of passwords for the members of Helpdesk. What should you do?
A. Modify the password replication policy of RODC1.
B. Modify the delegation settings of RODC1.
C. Modify the membership of the Allowed RODC Password Replication group.
D. Modify the membership of the Denied RODC Password Replication group.
E. Modify the delegation settings of DC1 and DC2.
F. Install the BranchCache feature on RODC1.
G. Create a Password Settings object (PSO) for the Helpdesk group.
H. Create a Password Settings object (PSO) for the Branch1Users group.
Answer: A
Q6. DRAG DROP - (Topic 9)
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012. Server1 resides in the perimeter network and has the Remote Access server role installed.
Some users have laptop computers that run Windows 7 and are joined to the domain. Some users work from home by using their home computers. The home computers run either Windows XP, Windows Vista/ Windows 7, or Windows 8.
You need to configure the computers for remote access.
Which three actions should you perform?
To answer, move the three appropriate actions from the list of actions to the answer area
and arrange them in the correct order.
Answer:
Q7. DRAG DROP - (Topic 2)
You need to recommend the VPN protocols for Proseware.
What should you recommend? To answer, drag the appropriate VPN protocols to the correct offices. Each protocol may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content,
Answer:
Q8. - (Topic 10)
Your network contains an Active Directory domain named contoso.com. The domain contains 200 servers that run either Windows Server 2012 R2, Windows Server 2012, or Windows Server 2008 R2. The servers run the following enterprise applications:
. Microsoft Exchange Server 2013
. Microsoft SQL Server 2014
System Center 2012 R2 Operations Manager is deployed to the domain. Operations Manager monitors all of the servers in the domain. Audit Collection Services (ACS) is installed.
You need to recommend a monitoring strategy for the domain that meets the following requirements:
. A group of administrators must be notified when an error is written to the System log on the servers that run Exchange Server 2013.
. A group of administrators must be notified when a specific event is written to The Application log on the servers that run SQL Server 2014.
What is the best approach to achieve the goal? More than one answer choice may achieve the goal. Select the BEST answer.
A. From Operations Manager, enable audit collection.
B. From Operations Manager, implement two monitors.
C. From Computer Management, implement one event subscription.
D. From Operations Manager, implement two rules.
Answer: D
Q9. - (Topic 9)
Your network contains an Active Directory forest named contoso.com. The forest is managed by using Microsoft System Center 2012.
Web developers must be able to use a self-service portal to request the deployment of virtual machines based on predefined templates. The requests must be approved by an administrator before the virtual machines are deployed.
You need to recommend a solution to deploy the virtual machines.
What should you include in the recommendation?
More than one answer choice may achieve the goal. Select the BEST answer.
A. A Virtual Machine Manager (VMM) service template, an Operations Manager dashboard, and an Orchestrator runbook
B. A Service Manager service offering, an Orchestrator runbook, and an Operations Manager dashboard
C. A Virtual Machine Manager (VMM) service template, a Service Manager service offering, and an Orchestrator runbook
D. A Service Manager service offering, an Orchestrator runbook, and Configuration Managerpackages
Answer: C
Q10. - (Topic 4)
You need to recommend a solution for the replication of Active Directory.
What should you recommend modifying?
A. The Active Directory Schema
B. The properties of Site1
C. The RODC1 computer account
D. The properties of Site2
Answer: A