getcertified4sure.com

What to do with 70 980 dump




Q71. - (Topic 8) 

You need to recommend which type of clustered file server and which type of file share must be used in the Hyper-V cluster that hosts App2. The solution must meet the technical requirements and the security requirements. 

Solution: You recommend a scale-out file server that uses an NFS share. 

Does this meet the goal? 

A. Yes 

B. No 

Answer:


Q72. - (Topic 10) 

Your company has a main office and a branch office. Each office contains several hundred computers that run Windows 2012. 

You plan to deploy two Windows Server Update Services (WSUS) servers. The WSUS servers will be configured as shown in the following table. 

You need to implement the WSUS infrastructure to meet the following requirements: 

. All updates must be approved from a server in the main office. 

. All client computers must connect to a WSUS server in their local office. 

What should you do? (Each correct answer presents part of the solution. Choose all that apply. 

A. Deploy a Group Policy object (GPO) that has the update location set to Server1. 

B. On Server2, configure WSUS in Replica mode. 

C. On Server1, configure WSUS in Replica mode. 

D. On Server2, configure WSUS in Autonomous mode. 

E. Deploy a Group Policy object (GPO) that has the update location set to Server2. 

F. On Server1, configure WSUS in Autonomous mode. 

Answer: A,B,E,F 


Q73. - (Topic 10) 

Your network contains an Active Directory domain named contoso.com. 

The corporate security policy states that when new user accounts, computer accounts, and contacts are added to an organizational unit (OU) named Secure, the addition must be audited. 

You need to recommend an auditing solution to meet the security policy. 

What should you include in the recommendation? (Each answer presents part of the solution. Choose all that apply.) 

A. From the Default Domain Controllers Policy, enable the Audit directory services setting. 

B. Create a new Group Policy object (GPO) that is linked to the Secure OU, and then modify the Audit directory services setting. 

C. From the Secure OU, modify the Auditing settings. 

D. From the Default Domain Controllers Policy, enable the Audit object access setting. 

E. From the Secure OU, modify the Permissions settings. 

F. Create a new Group Policy object (GPO) that is linked to the Secure OU, and then modify the Audit object access setting. 

Answer: A,C 

Explanation: 

Creating a New Object: Resulting in multiple Event ID 5137 entries containing all attributes provided explicitly by the security principal that invoked the operation (but not those automatically generated by the system). Note that similar information also gets recorded if audit of User Account Management or Directory Service Access is enabled. 


Q74. - (Topic 2) 

You need to recommend a solution for the RODC 

Which attribute should you include in the recommendation? 

A. systemFlags 

B. searchFlags 

C. policy-Replication-Flags 

D. flags 

Answer:


Q75. - (Topic 3) 

You need to recommend an IPAM management solution for the Operators groups. The solution must meet the technical requirements. 

What should you include in the recommendation? 

A. Run the Invoke-IpamGpoProvisioningcmdlet in all three domains. Add the computers used by the members of the Operators group to the IPAM server. 

B. Modify the membership of the IPAM Administrators group and the WinRMRemoteWMIUsers_ group on the IPAM server. 

C. Run the Set-IpamConfigurationcmdlet and modify the membership of the WinRMRemoteWMRJsers_ group on the IPAM server. 

D. Run the Set-IpamConfigurationcmdlet on the IPAM server. Run the Invoke-IpamGpoProvisioningcmdlet in all three domains. 

Answer:

Explanation: 

D:\Documents and Settings\useralbo\Desktop\1.jpg 


Q76. DRAG DROP - (Topic 7) 

You need to implement a Hyper-V Recovery Manager solution in the hosting environment of Northwind Traders. 

Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. 

Answer: 

Topic 8, A.Datum Corporation 

Overview 

A. Datum Corporation is an accounting company. 

The company has a main office and two branch offices. The main office is located in Miami. 

The branch offices are located in New York and Seattle. 

Existing Environment 

Network Infrastructure 

The network contains an Active Directory domain named adatum.com. All servers run Windows Server 2008 R2. The main office has the following servers and client computers: 

Two domain controllers configured as DNS servers and DHCP servers 

One file server that has multiples shares 

One thousand client computers that run Windows 7 

Each branch office has the following servers and client computers: 

One domain controller configured as a DNS server and a DHCP server 

Five hundred to 800 client computers that run Windows XP 

Each office has multiple subnets. The network speed of the local area network (LAN) is 1 gigabit per second. The offices connect to each other by using a WAN link. The main office is connected to the Internet. 

Current Issues 

The WAN link between the Miami office and the Seattle office is a low bandwidth link with high latency. The link will not be replaced for another year. 

Requirements 

Application Requirements 

The company is developing an application named App1. App1 is a multi-tier application that will be sold as a service to customers. 

Each instance of App1 is comprised of the following three tiers: 

A web front end 

A middle tier that uses Windows Communication Foundation (WCF) 

A Microsoft SQL Server 2008 R2 database on the back end 

Each tier will be hosted on one or more virtual machines. Multiple tiers cannot coexist on the same virtual machine. 

When customers purchase App1, they can select from one of the following service levels: 

Standard: Uses a single instance of each virtual machine required by App1. If a virtual machine becomes unresponsive, the virtual machine must be restarted. Enterprise: Uses multiple instances of each virtual machine required by App1 to provide high-availability and fault tolerance. 

All virtual hard disk (VHD) files for App1 will be stored in a file share. The VHDs must be available if a server fails. 

You plan to deploy an application named App2. App2 is comprised of the following two tiers: 

A web front end 

A dedicated SQL Server 2008 R2 database on the back end 

App2 will be hosted on a set of virtual machines in a Hyper-V cluster in the Miami office. The virtual machines will use dynamic IP addresses. A copy of the App2 virtual machines will be maintained in the Seattle office. 

App2 will be used by users from a partner company named Trey Research. Trey Research has a single Active Directory domain named treyresearch.com. Treyresearch.com contains a server that has the Active Directory Federation Services server role and all of the Active Directory Federation Services (AD FS) role services installed. 

Planned Changes 

A. Datum plans to implement the following changes: 

Replace all of the servers with new servers that run Windows Server 2012. 

Implement a private cloud by using Microsoft System Center 2012 to host instances of App1. 

In the Miami office, deploy four new Hyper-V hosts to the perimeter network. 

In the Miami office, deploy two new Hyper-V hosts to the local network. 

In the Seattle office, deploy two new Hyper-V hosts. 

In the Miami office, implement a System Center 2012 Configuration Manager primary site that has all of the system roles installed. 

Implement a public key infrastructure (PKI). 

Notification Requirements 

A. Datum identifies the following notification requirements: 

Help desk tickets must be created and assigned automatically when an instance of App1 becomes unresponsive. Customers who select the Enterprise service level must receive an email notification each time a help desk ticket for their instance of App1 is opened or closed. 

Technical Requirements 

A. Datum identifies the following technical requirements: 

Minimize costs whenever possible. 

Minimize the amount of WAN traffic 

Minimize the amount of administrative effort whenever possible. 

Provide the fastest possible failover for the virtual machines hosting App2. 

Ensure that administrators can view a consolidated report about the software updates in all of the offices. 

Ensure that administrators in the Miami office can approve updates for the client computers in all of the offices. 

Security Requirements 

A. Datum identifies the following security requirements: 

An offline root certification authority (CA) must be configured. 

Client computers must be issued certificates by a server in their local office. 

Changes to the CA configuration settings and the CA security settings must be logged. 

Client computers must be able to renew certificates automatically over the Internet. 

The number of permissions and privileges assigned to users must be minimized whenever possible. 

. Users from a group named Group1 must be able to create new instances of App1 in the private cloud. 

. Client computers must be issued new certificates when the computers are connected to the local network only. 

. The virtual machines used to host App2 must use BitLocker Drive Encryption (BitLocker). 

. Users from Trey Research must be able to access App2 by using their credentials from treyresearch.com. 


Q77. - (Topic 10) 

Your network contains two servers named Server1 and Server2 that run Windows Server 2012. Server1 and Server2 have the Hyper-V server role installed and are part of a host group named Group1 in Microsoft System Center 2012 Virtual Machine Manager (VMM). 

Server1 and Server2 have identical hardware, software, and settings. 

You configure VMM to migrate virtual machines if the CPU utilization on a host exceeds 65 percent. The current load on the servers is shown following table. 

You start a new virtual machine on Server2 named VM8. VM8 has a CPU utilization of 20 

percent. 

You discover that none of the virtual machines hosted on Server2 are migrated to Server1. 

You need to ensure that the virtual machines hosted on Server2 are migrated to Server1. 

What should you modify from the Dynamic Optimization configuration? 

A. The Host Reserve threshold 

B. The Power Optimization threshold 

C. The Aggressiveness level 

D. The Dynamic Optimization threshold 

Answer:


Q78. - (Topic 3) 

You need to recommend a solution that meets the security requirements. 

Which schema attribute properties should you recommend modifying? 

A. isIndexed 

B. searchFlags 

C. isCriticalSystemObject 

D. schemaFlagsEx 

Answer:

Explanation: 

D:\Documents and Settings\useralbo\Desktop\1.jpg 

Applies To: Windows Server 2008, Windows Server 2012 This topic includes procedures for adding an attribute to the filtered attribute set (FAS) for a readonly domain controller (RODC) and marking the attribute as confidential data. You can perform these procedures to exclude specific data from replicating to RODCs in the forest. Because the data is not replicated to any RODCs, you can be assured that the data will not be revealed to an attacker who manages to successfully compromise an RODC. In most cases, adding an attribute to the RODC FAS is completed by the developer of the application that added the attribute to the schema. 

. Determine and then modify the current searchFlags value of an attribute 

. Verify that an attribute is added to the RODC FAS 

-Determine and then modify the current searchFlags value of an attribute To add an attribute to an RODC FAS, you must first determine the current searchFlags value of the attribute that you want to add, and then set the following values for searchflags: 

. To add the attribute to the RODC FAS, set the 10th bit to 0x200. 

. To mark the attribute as confidential, set the 7th bit to 0x080. http://technet.microsoft.com/en-us/library/cc754794(v=ws.10).aspx 


Q79. DRAG DROP - (Topic 10) 

Your network contains an Active Directory domain named contoso.com. The domain contains two domain controllers named DC1 and DC2. The domain contains a server named Server1. 

Server1 is a certification authority (CA). All servers run Windows Server 2012 R2. 

You plan to deploy BitLocker Drive Encryption (BitLocker) to all client computers. The unique identifier for your organization is set to Contoso. 

You need to ensure that you can recover the BitLocker encrypted data by using a BitLocker data recovery agent. You must be able to perform the recovery from any administrative computer. 

Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. 

Answer: 


Q80. - (Topic 10) 

Your network contains an Active Directory forest named contoso.com. The forest contains multiple servers that run Windows Server 2012. The network contains 1,000 client computers that run Windows 7. Two hundred remote users have laptop computers and only work from home. 

The network does not provide remote access to users. 

You need to recommend a monitoring solution to meet the following requirements: 

Generate a list of updates that are applied successfully to all computers. 

Minimize the amount of bandwidth used to download updates. 

An administrator must approve the installation of an update on any client computer. 

What should you include in the recommendation? (Each correct answer presents part of the solution. Choose all that apply.) 

A. Microsoft Asset Inventory Service (AIS) 

B. Windows InTune 

C. Windows Server Update Services (WSUS) 

D. Active Directory Federation Services (AD FS) 

E. Microsoft System Center 2012 Service Manager 

Answer: A,B,C