Accreditation are classified as the proof of your talent, information as well as skill. They are crucial to get a substantial placed seating in every very well reputed business. Your qualifications provides you with the additional information and also the fundamental skills for that work that guide anyone to increase your employment. Should you have handed your certification examination, the will see that the requirements have elevated around. Your surveys established that the people whove more then one Ucertify Microsoft own far better wages the fact that people, the actual rise rate is also observed more than one other consumers.
Q91. - (Topic 8)
Your network contains an Active Directory domain named contoso.com. The domain contains three VLANs. The VLANs are configured as shown in the following table.
All client computers run either Windows 7 or Windows 8.
The corporate security policy states that all of the client computers must have the latest
security updates installed.
You need to implement a solution to ensure that only the client computers that have all of
the required security updates installed can connect to VLAN 1. The solution must ensure
that all other client computers connect to VLAN 3.
Solution: You implement the VPN enforcement method.
Does this meet the goal?
A. Yes
B. No
Answer: B
Explanation: VPN Enforcement need to be setup in connection with NAP (Network Access Protection).
Q92. - (Topic 8)
Your network contains an Active Directory forest named contoso.com.
You plan to automate the deployment of servers that run Windows Server 2012.
You identify the following requirements for the deployment:
Update the custom images that will be used for the deployment.
Add custom drivers to the images that will be used for the deployment.
Add software packages to the images that will be used for the deployment.
Perform a zero touch bare-metal installation that uses Wake On LAN.
A network consultant recommends using Windows Deployment Services (WDS) and the Windows Assessment and Deployment Kit (Windows ADK) to deploy the servers.
You need to identify which requirements are achieved by using the consultant's recommendations.
Which requirements should you identify? (Each correct answer presents part of the solution. Choose all that apply.)
A. Update the custom images used for the deployment.
B. Add software packages to the images used for the deployment.
C. Perform a zero touch bare-metal installation that uses Wake On LAN.
D. Add custom drivers to the images used for the deployment.
Answer: A,D
Explanation: Microsoft Deployment Toolkit 2010
MDT 2010 requires Windows AIK for Windows.
Manage your images, from adding/removing drivers to easily swapping out the operating
system you would like to deploy.
Incorrect:
Not C: System Center Configuration Manager (ConfigMgr)
ConfigMgr allows you to push an OSD to the computers of your choice at the time of your
choosing due to its built in Wake on LAN (WOL) feature.
Q93. DRAG DROP - (Topic 2)
You need to recommend changes for the Active Directory infrastructure.
What should you recommend? To answer, drag the appropriate domain and forest functional levels for proseware.com to the correct locations. Each functional level may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
Answer:
Q94. - (Topic 8)
Your network contains an Active Directory domain named contoso.com. All servers run either Windows Server 2008 R2 or Windows Server 2012.
Your company uses IP Address Management (IPAM) to manage multiple DHCP servers.
A user named User1 is a member of the IPAM Users group and is a member of the local Administrators group on each DHCP server.
When User1 edits a DHCP scope by using IPAM, the user receives the error message shown in the exhibit. (Click the Exhibit button.)
You need to prevent User1 from receiving the error message when editing DHCP scopes by using IPAM.
What should you do?
A. Add User1 to the DHCP Administrators group on each DHCP server.
B. Add User1 to the IPAM Administrators group.
C. Run the Set-IpamServerConfig cmdlet.
D. Run the Invoke-IpamGpoProvisioning cmdlet.
Answer: B
Explanation:
IPAM Administrators: IPAM Administrators have the privileges to view all IPAM data and perform all IPAM tasks.
Reference: Walkthrough: Demonstrate IPAM in Windows Server 2012
http://technet.microsoft.com/en-us/library/hh831622.aspx
Q95. - (Topic 8)
A company has offices in multiple geographic locations. The sites have high-latency, low-bandwidth connections. You need to implement a multisite Windows Deployment Services (WDS) topology for deploying standard client device images to all sites.
Solution: At each site, you install a WDS Server. You apply the same configuration settings to each WDS Server. You configure Distributed File Server Replication (DFSR) to synchronize install images.
Does this meet the goal?
A. Yes
B. No
Answer: A
Q96. - (Topic 3)
You need to recommend changes to the Active Directory environment to support the virtualization requirements.
What should you include in the recommendation?
A. Raise the functional level of the domain and the forest.
B. Upgrade the domain controller that has the domain naming master role to Windows Server 2012.
C. Implement Administrator Role Separation.
D. Upgrade the domain controllers that have the PDC emulator master role to Windows Server 2012.
Answer: D
Explanation: From case study:
* Ensure that the additional domain controllers for the branch offices can be deployed by using domain controller cloning.
Q97. - (Topic 3)
You need to recommend an IPAM management solution for the Operators groups. The solution must meet the technical requirements.
What should you include in the recommendation?
A. Run the Invoke-IpamGpoProvisioningcmdlet in all three domains. Add the computers used by the members of the Operators group to the IPAM server.
B. Modify the membership of the IPAM Administrators group and the WinRMRemoteWMIUsers_ group on the IPAM server.
C. Run the Set-IpamConfigurationcmdlet and modify the membership of the WinRMRemoteWMRJsers_ group on the IPAM server.
D. Run the Set-IpamConfigurationcmdlet on the IPAM server. Run the Invoke-IpamGpoProvisioningcmdlet in all three domains.
Answer: B
Explanation:
Scenario: Ensure that the members of the Operators groups in all three domains can manage the IPAM server from their client computer.
Q98. DRAG DROP - (Topic 8)
Your network contains an Active Directory forest named contoso.com.
Your company merges with another company that has an Active Directory forest named
litwareinc.com.
Each forest has one domain.
You establish a two-way forest trust between the forests.
The network contains three servers. The servers are configured as shown in the following table.
You confirm that the client computers in each forest can resolve the names of the client computers in both forests.
On dc1.litwareinc.com, you create a zone named GlobalNames.
You need to recommend changes in both forests to ensure that the users in both forests can resolve single-label names by using the GlobalNames zone in litwareinc.com.
Which changes should you recommend?
To answer, drag the appropriate configuration to the correct server in the answer area. Each configuration may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content.
Answer:
Q99. - (Topic 8)
Your company has a main office and a branch office.
The network contains an Active Directory domain named contoso.com. The main office contains domain controllers that run Windows Server 2012. The branch office contains a read-only domain controller (RODC) that runs Windows Server 2012.
You need to recommend a solution to control which Active Directory attributes are replicated to the RODC.
What should you include in the recommendation?
A. The partial attribute set
B. The filtered attribute set
C. Application directory partitions
D. Constrained delegation
Answer: B
Explanation: RODC filtered attribute set
Some applications that use AD DS as a data store might have credential-like data (such as passwords, credentials, or encryption keys) that you do not want to be stored on an RODC in case the RODC is compromised. For these types of applications, you can dynamically configure a set of attributes in the schema for domain objects that will not replicate to an RODC. This set of attributes is called the RODC filtered attribute set. Attributes that are defined in the RODC filtered attribute set are not allowed to replicate to any RODCs in the forest.
Reference: AD DS: Read-Only Domain Controllers
Q100. - (Topic 8)
Your network contains an Active Directory domain named contoso.com.
All client computers run either Windows 7 or Windows 8.
Some users work from customer locations, hotels, and remote sites. The remote sites often
have firewalls that limit connectivity to the Internet.
You need to recommend a VPN solution for the users.
Which protocol should you include in the recommendation?
A. PPTP
B. SSTP
C. IKEv2
D. L2TP/IPSec
Answer: B
Explanation: Secure Socket Tunneling Protocol (SSTP) is a form of VPN tunnel that provides a mechanism to transport PPP or L2TP traffic through an SSL 3.0 channel. SSL provides transport-level security with key-negotiation, encryption and traffic integrity checking. The use of SSL over TCP port 443 allows SSTP to pass through virtually all firewalls and proxy servers except for authenticated web proxies.