Q1. - (Topic 5)
You need to recommend a solution that manages the security events. The solution must meet the technical requirements.
Which configuration should you include in the recommendation?
A. Object access auditing by using a Group Policy object (GPO)
B. Event rules by using System Center 2012 Operations Manager
C. Event forwarding by using Event Viewer
D. Audit Collection Services (ACS) by using System Center 2012
Answer: D
Q2. DRAG DROP - (Topic 10)
Your network contains multiple servers that run Windows Server 2012.
You plan to implement three virtual disks. The virtual disks will be configured as shown in the following table.
You need to identify the minimum number of physical disks required for each virtual disk.
How many disks should you identify?
To answer, drag the appropriate number of disks to the correct virtual disk in the answer area. Each number of disks may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content.
Answer:
Q3. HOTSPOT - (Topic 10)
You have a System Center 2012 R2 Virtual Machine Manager (VMM) deployment.
You implement Hyper-V Recovery Manager for the deployment.
You create two new clouds named Cloud1 and Cloud2. Metadata for both clouds is uploaded to Windows Azure.
You need to ensure that the virtual machines in Cloud1 are protected by using replicas in Cloud2.
Where should you perform each action? To answer, select the appropriate tool for each action in the answer area.
Answer:
Q4. DRAG DROP - (Topic 6)
You need to recommend a monitoring solution for Proseware.
Which three actions should you recommend performing in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Answer:
Q5. - (Topic 10)
Your network contains an Active Directory domain named contoso.com. The network contains a server named Server1 that runs Windows Server 2012. Server1 has the Active Directory Certificate Services server role installed. Server1 is configured as an offline standalone root certification authority (CA).
You install the Active Directory Certificate Services server role on Server2 and configure the server as an enterprise subordinate CA.
You need to ensure that the certificate issued to Server2 is valid for 10 years.
What should you do first?
A. Modify the subordinate CA certificate template.
B. Modify the registry on Server2.
C. Modify the registry on Server1.
D. Modify the CAPolicy.inf file on Server2.
E. Modify the CAPolicy.inf file on Server1.
Answer: C
Q6. - (Topic 10)
Your network contains 20 servers that run Windows Server 2012. The servers have the Hyper-V server role installed.
You plan to deploy a management solution.
You need to recommend which Microsoft System Center 2012 roles must be deployed to meet the following requirements:
. An administrator must be notified when an incident occurs, such as a serious error in the event log, on a Hyper-V host, or on a virtual machine.
. An administrator must be able to assign an incident to a specific administrator for resolution.
. An incident that remains unresolved for more than 10 hours must be escalated automatically to another administrator.
. Administrators must be able to generate reports that contain the details of incidents and escalations.
Which System Center 2012 roles should you recommend?
More than one answer choice may achieve the goal. Select the BEST answer.
A. Operations Manager and Orchestrator
B. Operations Manager and Service Manager
C. Configuration Manager and Service Manager
D. Service Manager and Virtual Machine Manager (VMM)
Answer: B
Q7. - (Topic 9)
Your company plans to hire 100 sales representatives who will work remotely.
Each sales representative will be given a laptop that will run Windows 7. A corporate image of Windows 7 will be applied to each laptop.
While the laptops are connected to the corporate network, they will be joined to the domain. The sales representatives will not be local administrators.
Once the laptops are configured, each laptop will be shipped by courier to a sales representative.
The sales representative will use a VPN connection to connect to the corporate network.
You need to recommend a solution to deploy the VPN settings for the sales representatives. The solution must meet the following requirements:
. Ensure that the VPN settings are the same for every sales representative.
. Ensure that when a user connects to the VPN, an application named App1 starts.
What is the best approach to achieve the goal? More than one answer choice may achieve the goal. Select the BEST answer.
A. VPN auto triggering
B. The Add-VpnConnectioncmdlet
C. The Connection Manager Administration Kit (CMAK)
D. Group Policy preferences
Answer: C
Q8. - (Topic 10)
Your company has three main offices named Main1, Main2, and Main3.
The network contains an Active Directory domain named contoso.com.
Each office contains a help desk group.
You plan to deploy Microsoft System Center 2012 Configuration Manager to meet the following requirements:
. The members of the Domain Admins group must be able to manage all of the Configuration Manager settings.
. The help desk groups must be able to manage only the client computers in their respective office by using Configuration Manager.
You need to recommend a Configuration Manager infrastructure to meet the requirements.
Which infrastructure should you recommend? More than one answer choice may achieve the goal. Select the BEST answer.
A. Three sites that contain one collection for each office
B. One site that contains one collection
C. Three sites that each contain one collection
D. One site that contains a collection for each office
Answer: D
Q9. - (Topic 2)
You run the Get-DNSServercmdlet on DC01 and receive the following output:
You need to recommend changes to DC01. Which attribute should you recommend modifying?
A. EnablePollutionProtection
B. isReadOnly
C. Locking Percent
D. ZoneType
Answer: C
Q10. HOTSPOT - (Topic 10)
Your network contains an Active Directory forest named contoso.com. All servers run Windows Server 2012 R2. The forest contains two servers.
The servers are configured as shown in the following table.
You prepare the forest to support Workplace Join and you enable the Device Registration Service (DRS) on Server1.
You need to ensure that Workplace Join meets the following requirements:
. Application access must be based on device claims. . Users who attempt to join their device to the workplace through Server2 must be prevented from locking out their Active Directory account due to invalid credentials.
Which cmdlet should you run to achieve each requirement? To answer, select the cmdlet for each requirement in the answer area.
Answer: