Microsoft Certified IT Professional MCITP Certification 70-414 Practice Exams

Online Marketing Tipz

Get all details of Microsoft Certified IT Professional MCITP Certification 70-414 Practice Exams. Get Microsoft Certified IT Professional Now.



Question : 30

You install the Service Manager Self-Service Portal on a server named CONTOSOSSP1. Users report that they receive access denied messages when they try to connect to the portal. You must grant users the minimum required permissions. You need to ensure that all users in the Contoso domain can access the Service Manager Self- Service Portal.
What should you do?

A. In Active Directory, create a new group named PortalUsers. Add the PortalUsers group to the Contoso\Domain Users group, and then add the group to the local users group on CONTOSOSSP1.
B. Using the account that you used to install the Self-Service portal, grant the Contoso\Domain Users group Read permissions to the portal.
C. In Service Manager, create a new user role named PortalUsers. Grant the PortalUsers role rights to all catalog items, and then add the Contoso\Domain Users Active Directory Domain Services group to the PortalUsers role.
D. Using the account that you used to install the Self-Serviceportal, grant the Contoso\Domain Users group Contribute permissions to the portal.

Answer: D


Question : 29

You are evaluating the deployment of a multi-site Hyper-V failover cluster in the Miami office and the Seattle office to host App2.You need to identify which changes must be made to support the use of the multi-site cluster. Which changes should you identify?

A. Purchase a storage solution that replicates the virtual machines.Configure all of the virtual machines to use dynamic memory.
B. Upgrade the WAN link between the Miami and Seattle offices.Purchase a storage solution that replicates the virtual machines.
C. Configure all of the virtual machines to use dynamic memory.Implement Distributed File System (DFS) Replication and store the virtual machine files in a replicated folder.
D. Implement Distributed File System (DFS) Replication and store the virtual machine files in a replicated folder. Upgrade the WAN link between the Miami and Seattle offices.

Answer : B


Question : 28

You have a Windows Server 2012 R2 failover cluster that contains four nodes. The cluster has Dynamic Optimization enabled.You deploy three highly available virtual machines to the cluster by using System Center 2012 R2 Virtual Machine Manager (VMM). You need to prevent Dynamic Optimization from placing any of the three virtual machines in the same node.What should you do?

A. From the Virtual Machine Manager console, modify the Compatibility settings in the Hardware Configuration properties of the virtual machines.
B. Set the Priority property of the virtual machine cluster role.
C. From the Virtual Machine Manager console, modify the Servicing Windows settings of the virtual machines.
D. From the Virtual Machine Manager console, modify the Availability settings in the Hardware Configuration properties of the virtual machines.

Answer : A


Question : 18

(NLB) for the front-end servers used by Appl. You need to recommend which component must be added to the service template. What should you recommend?

A. Guest OS profile
B. A host profile
C. A capability profile
D. A VIP template

Answer : D


Question : 17

You need to recommend which Certificate Services role service must be deployed to the perimeter network. The solution must meet the technical requirements. Which Certificate Services role services should you recommend?

A. Certificate Enrollment Web Service and Certificate Enrollment Policy Web Service
B. Certificate Enrollment Policy Web Service and Certification Authority Web Enrollment
C. Online Responder and Network Device Enrollment Service
D. Online Responder and Certificate Enrollment Web Service

Answer : A


Question : 16

You need to recommend a solution that meets the security requirements for Group1. To which System Center 2012 Virtual Machine Manager (VMM) group should you assign Group1?

A. Read-Only Administrator
B. Administrators
C. Delegated Administrator
D. Self-Service User

Answer : D


Question : 15

You need to recommend a solution to maintain a copy of App2. The solution must meet the application requirements and must minimize additional hardware purchases. What should you include in the recommendation?

A. Multi-site Failover Clustering
B. Hyper-V replicas
C. Single-site Failover Clustering
D. Distributed File System (DFS) Replication

Answer : B


Question : 16

You need to recommend a solution that meets the notification requirements. Which System Center 2012 components should you include in the recommendation?

A. Operations Manager, Service Manager and Orchestrator
B. Configuration Manager, Service Manager and Orchestrator
C. App Controller, Configuration Manager and Operations Manager
D. Service Manager, Orchestrator and App Controller

Answer : A


Question : 15

You are configuring the Certification Authority role service. From the Certification Authority console,you enable logging. You need to ensure that configuration changes to the certification authority (CA) are logged. Which audit policy should you configure?

A. Audit policy change
B. Audit privilege use
C. Audit system events
D. Audit object access

Answer : D


Question : 14

You need to recommend which type of clustered file server and which type of file share must be used in the Hyper-V cluster that hosts App2. The solution must meet the technical requirements and the security requirements. What should you recommend?

A. A scale-out file server that uses an NFS share
B. A file server that uses an SMB share
C. A scale-out file server that uses an SMB share
D. A file server that uses an NFS share

Answer: C


Question : 13

In adatum.com, you install and configure a server that has the Active Directory Federation Services server role and all of the AD FS role services installed. You need to recommend which AD FS configurations must be performed m adatum.com to meet the security requirements. Which configurations should you recommend before creating a trust policy?

A. Export the server authentication certificate and provide the certificate to Trey Research. Import the token-signing certificate from Trey Research.
B. Export the server authentication certificate and provide the certificate to Trey Research. Import the server authentication certificate from Trey Research.
C. Export the token-signing certificate and provide the certificate to Trey Research. Import the server authentication certificate from Trey Research.
D. Export the token-signing certificate and provide the certificate to Trey Research. Import the token-signing certificate from Trey Research.

Answer: B


Question : 12

Your Active Directory currently contains five virtualized domain controllers that run Windows Server 2012 R2.The system state of each domain controller is backed up daily. The backups are shipped to a remote location weekly.Yourcompany recently implemented a disaster recovery site that contains several servers. The servers run Windows Server 2012 R2 and have the Hyper-V server role installed. The disaster recovery site has a high-speed WAN link to the main office.You need to create an Active Directory recovery plan that meets the following requirements:-Restores the Active Directory if a catastrophe prevents all access to the main office.-Minimizes data loss.What should you include in the plan?

A. Hyper-V replicas
B. Live migration
C. Virtual machine checkpoints
D. System state restores

Answer : A


Question : 11

You have a Windows Server 2012 R2 failover cluster that contains four nodes. The cluster has Dynamic Optimization enabled. You deploy three highly available virtual machines to the cluster by using System Center 2012 R2 Virtual Machine Manager (VMM). You need to prevent Dynamic Optimization from placing any of the three virtual machines in the same node.What should you do?

A. From the Virtual Machine Manager console, modify the Compatibility settings in the Hardware Configuration properties of the virtual machines.
B. Set the Priority property of the virtual machine cluster role.
C. From the Virtual Machine Manager console, modify the Servicing Windows settings of the virtual machines.
D. From the Virtual Machine Manager console, modify the Availability settings in the Hardware Configuration properties of the virtual machines.

Answer : A


Question : 10

ABC Industries recently created several Virtual Hard Disk (VHD) files which are utilized by instances of the ABCProducts and ABCPartners applications. ABC Industries wants you to implement a storage solution for the Virtual Hard Disk (VHD) files which ensures maintenance is minimized if any Hyper-V host should fail.How would you accomplish this?

A. You should consider including clustered Network Load Balancing.

B. You should consider including a clustered File Server of the general use type.

C. You should consider including an Asymmetric clustered File server.

D. You should consider including a Failover data tier clustered File servers.

Answer: B


Question : 9

ABC Industries wants configuration modifications of the Certification Authority role service to belogged.How would you implement this?

A. You should consider enabling auditing of system events.

B. You should consider enabling logging.

C. You should consider enabling auditing of object access.

D. You should consider enabling auditing of privilege use.

E. You should consider enabling auditing of process tracking.

Answer: B,C

Microsoft Certified IT Professional MCITP Certification 70-413 Questions

Online Marketing Tipz

Get all details of Microsoft Certified IT Professional MCITP Certification 70-413-questions. Get Microsoft Certified IT Professional Now.


Question: 32

You need to ensure that NAP meets the technical requirements.
Which role services should you install?

A. Network Policy Server, Health Registration Authority and Host Credential Authorization Protocol
B. Health Registration Authority, Host Credential Authorization Protocol and Online Responder
C. Certification Authority, Network Policy Server and Health Registration Authority
D. Online Responder, Certification Authority and Network Policy Server

Answer: C

Explanation
Explanation/Reference:
Explanation:
* Scenario:
Implement Network Access Protection (NAP).
Ensure that NAP with IPSec enforcement can be configured.
* Health Registration Authority Applies To: Windows Server 2008 R2, Windows Server 2012 Health Registration Authority (HRA) is a component of a Network Access Protection (NAP) infrastructure that plays a central role in NAP Internet Protocol security (IPsec) enforcement. HRA obtains health certificates on behalf of NAP clients when they are compliant with network health requirements. These health certificates authenticate NAP clients for IPsec-protected communications with other NAP clients on an intranet. If a NAP client does not have a health certificate, the IP sec peer authentication fails and the NAP client cannot initiate communication with other IPsecprotected computers on the network. HRA is installed on a computer that is also running Network Policy Server (NPS) and Internet Information Services (IIS). If they are not already installed, these services will be added when you install HRA.
Reference: Health Registration Authority


Question : 31

After the planned upgrade to Windows Server 2012, you restore a user account from the Active Directory Recycle Bin.You need to replicate the restored user account as quickly as possible.Which cmdlets should you run?

A. Get-ADReplicationSite and Set-ADReplicationConnection
B. Get-ADReplicationAttributeMetadata and Compare-Object
C. Get-ADReplicationUpToDatenessVectorTable and Set-ADReplicationSite
D. Get ADDomainController and Sync-ADObject

Answer : D


Question : 30

You need to recommend a solution for DHCP logging. The solution must meet the technical requirement.What should you include in the recommendation?

A. Event subscriptions
B. IP Address Management (IPAM)
C. DHCP audit logging
D. DHCP filtering

Answer : B


Question : 21

You implement and authorize the new DHCP servers. You import the server configurations and the scope configurations from PA1 and AM1.You need to ensure that clients can obtain DHCP address assignments after you shut down PA1 and AM1.The solution must meet the technical requirements.What should you do?

A. Run the Get-DhcpServerv4Lease cmdlet and the Remove-DhcpServerv4Lease cmdlet. Run the Windows Server Migration Tools.
B. Run the Get-DhcpServerv4Lease cmdlet and the Add-DhcpServerv4Lease cmdlet. Activate the scopes.
C. Run the Get-DhcpServerv4FreeIPAddress cmdlet and the Invoke- DhcpServerv4FailoverReplication cmdlet. Run the Windows Server Migration Tools.
D. Run the Get-DhcpServerv4FreeIPAddress cmdlet and the Invoke- DhcpServerv4FailoverReplication cmdlet Activate the scopes.

Answer : B


Question : 20

You plan to deploy multiple servers in a test environment by using Windows Deployment Services (WDS).You need to identify which network services must be available in the test environment to deploy the servers. Which network services should you identify?(Each correct answer presents part of the solution.Choose ail that apply.)

A. DHCP
B. Active Directory Domain Services (AD DS)
C. DNS
D. Active Directory Lightweight Directory Services (AD LDS)
E. WINS
F. Network Policy Server (NPS)

Answer : AC


Question : 19

Your network contains an Active Directory forest named contoso.com.You plan to deploy 200 Hyper-V hosts by using Microsoft System Center 2012 Virtual Machine Manager (VMM) Service Pack 1 (SP1).You add a PXE server to the fabric.You need to identify which objects must be added to the VMM library for the planned deployment.What should you identify? (Each correct answer presents part of the solution. Choose all that apply.)

A. A host profile
B. A capability profile
C. A hardware profile
D. A generalized image
E. A service template

Answer : AD


Question : 18

Your network contains an Active Directory domain named contoso.com.The domain contains multiple sites.You plan to deploy DirectAccess. The network security policy states that when client computers connect to the corporate network from the Internet, all of the traffic destined for the Internet must be routed through the corporate network.You need to recommend a solution for the planned DirectAccess deployment that meets the security policy requirement.What should you include in the recommendation?

A. Set the ISATAP State to state enabled.
B. Enable split tunneling.
C. Set the ISATAP State to state disabled.
D. Enable force tunneling.

Answer : D


Question : 17

Your network contains an Active Directory domain named contoso.com. On several organizational units (OUs), an administrator named Admin1 plans to delegate control of custom tasks.You need to ensure that Admin1 can delegate a custom task named Task1 by using the Delegation of Control Wizard.What should you do?

A. Add a new class to the Active Directory schema.
B. Configure a custom MMC console.
C. Modify the Delegwiz.inf file.
D. Configure a new authorization store by using Authorization Manager.

Answer : C


Question : 16

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. The forest functional level is Windows Server 2012.Your company plans to deploy an application that will provide a search interface to users in the company. The application will query the global catalog for the Employee-Number attribute.You need to recommend a solution to ensure that the application can retrieve the Employee-Number value from the global catalog.What should you include in the recommendation?

A. the Dsmod command
B. the Ldifde command
C. the Enable-ADOptionalFeaturecmdlet
D. the Csvde command

Answer : B


Question : 15

Your network contains a server named Server1 that runs Windows Server 2012. Server1 has the DHCP Server server role installed. All of the client computers that are in a subnet named Subnet1 receive their IP address configurations from Server1.You plan to add another DHCP server named Server2 to Subnet1.You need to recommend changes to the DHCP infrastructure to ensure that the client computers continue to receive IP addressing information if a single DHCP server fails.What should you do?

A. Create a Network Load Balancing (NLB) cluster.
B. Configure Failover for the scope.
C. Create a DHCP failover cluster.
D. Create a split scope.

Answer : B


Question : 14

You have a System Center 2012 R2 Virtual Machine Manager (VMM) infrastructure that manages five Hyper-V hosts. The Hyper-V hosts are not clustered.You have a virtual machine template that deploys a base image of Windows Server 2012 R2.No role services or features are enabled in the base image.You need to deploy a virtual machine named VM1 that is based on the virtual machine template.VM1 will be deployed as part of a service.VM1 must have the Web Server (IIS) server role installed.The solution must not require modifications to the virtual machine template or the base image.What are two possible profile types that achieve the goal?Each correct answer presents a complete solution.

A. Capability
B. Application
C. Guest OS
D. Hardware
E. Physical Computer

Answer: BC


Question : 13

Your company plans to hire 100 sales representatives who will work remotely.Each sales representative will be given a laptop that will run Windows 7. A corporate image of Windows 7 will be applied to each laptop.While the laptops are connected to the corporate network, they will be joined to the domain. The sales representatives will not be local administrators.Once the laptops are configured, each laptop will be shipped by courier to a sales representative.The sales representative will use a VPN connection to connect to the corporate network.You need to recommend a solution to deploy the VPN settings for the sales representatives.The solution must meet the following requirements:Ensure that the VPN settings are the same for every sales representative. Ensure that when a user connects to the VPN, an application named App1 starts.What is the best approach to achieve the goal? More than one answer choice may achieve the goal. Select the BEST answer.

A. VPN auto triggering
B. The Add-VpnConnectioncmdlet
C. The Connection Manager Administration Kit (CMAK)
D. Group Policy preferences

Answer: C


Question : 12

Your network contains an Active Directory domain named contoso.com.Your company has an enterprise root certification authority (CA) named CA1.You plan to deploy Active Directory Federation Services (AD FS) to a server named Serverl. The company purchases a Microsoft Office 365 subscription.You plan register the compan y’s SMTP domain for Office 365 and to configure single sign-on for all users.You need to identify which certificate or certificates are required for the planned deployment.Which certificate or certificates should you identify?(Each correct answer presents a complete solution. Choose all that apply.)

A.a server authentication certificate that is issued by a trusted third-party root CA and that contains the subject name serverl.contoso.com
B.a server authentication certificate that is issued by CA1 and that contains the subject name Server1
C.a server authentication certificate that is issued by a trusted third-party root CA and thatcontains the subject name Server1
D.a server authentication certificate that is issued by CA1 and that contains the subject name serverl.contoso.com
E.self-signed server authentication certificates for serverl.contoso.com

Answer:DE


Question : 11

Your network contains 50 servers that run Windows Server 2003 and 50 servers that run Windows Server 2008.You plan to implement Windows Server 2012 R2.You need to create a report that includes the following information:The servers that run applications and services that can be moved to Windows Server 2012 R2 The servers that have hardware that can run Windows Server 2012 R2 The servers that are suitable to be converted to virtual machines hosted on Hyper-V hosts that run Windows Server 2012 R2 Solution: You install Windows Server 2012 R2 on a new server, and then you run Microsoft Deployment Toolkit (MDT) 2012. Does this meet the goal?

A. Yes
B. No

Answer : B

 
Question : 10

Your network contains a server named Server1 that runs Windows Server 2012. Server1 has the Network Policy Server server rote installed.You configure Server1 as part of a Network Access Protection (NAP) solution that uses the 802.lx enforcement method.You add a new switch to the network and you configure the switch to use 802.lx authentication.You need to ensure that only compliant client computers can access network resources through the new switch.What should you do on Server1?

A. Add the IP address of each new switch to the list of RADIUS clients.
B. Add the IP address of each new switch to a connection request policy as an Access Client IPv4 Address.
C. Add the IP address of each new switch to a remote RADIUS server group.
D. Add the IP address of each new switch to a remediation server group.

Answer: A


Microsoft Certified IT Professional MCITP Certification 70-412 Dumps

Online Marketing Tipz

Get all details of Microsoft Certified IT Professional MCITP Certification 70-412 Dumps. Get Microsoft Certified IT Professional Now.


Question: 32

Your company has offices in Montreal, New York, and Amsterdam.
The network contains an Active Directory forest named contoso.com.
An Active Directory site exists for each office. All of the sites connect to each other by using the DEFAULTIPSITELINK site link.
You need to ensure that only between 20:00 and 08:00, the domain controllers in the Montreal office replicate the Active Directory changes to the domain controllers in the Amsterdam office.
The solution must ensure that the domain controllers in the Montreal and the New York offices can replicate the Active Directory changes any time of day.
What should you do?

A. Create a new site link that contains Montreal and Amsterdam.
Remove Amsterdam from DEFAULTIPSITELINK.
Modify the schedule of DEFAULTIPSITELINK.
B. Create a new site link that contains Montreal and Amsterdam.
Create a new site link bridge.
Modify the schedule of DEFAU LTIPSITELINK.
C. Create a new site link that contains Montreal and Amsterdam.
Remove Amsterdam from DEFAULTIPSITELINK.
Modify the schedule of the new site link.
D. Create a new site link that contains Montreal and Amsterdam.
Create a new site link bridge.
Modify the schedule of the new site link.

Answer: C

Section: Configure the Active Directory infrastructure (15-20%)
Explanation
Explanation/Reference:
Explanation:
Very Smartly reworded with same 3 offices. In the exam correct answer is “Create a new site link that contains Newyork to Montreal.
Remove Montreal from DEFAULTIPSITELINK.Modify the schedule of the new site link”.
http://technet.microsoft.com/en-us/library/cc755994(v=ws.10).aspx


Question : 31

Your network contains an Active Directory forest named contoso.com.Users frequently access the website of an external partner company. The URL of the website is http://partners.adatum.com.The partner company informs you that it will perform maintenance on its Web server and that the IP addresses of the Web server will change.After the change is complete, the users on your internal network report that they fail to access the website.However, some users who work from home report that they can access the website.You need to ensure that your DNS servers can resolve partners.adatum.com to the correct IP address immediately.What should you do?

A. Run dnscmd and specify the CacheLockingPercent parameter.
B. Run Set-DnsServerGlobalQueryBlockList.
C. Run ipconfig and specify the Renew parameter.
D. Run Set-DnsServerCache.

Answer : D


Question : 30

Your network contains two DNS servers named DN51 and DNS2 that run Windows Server 2012 R2.DNS1 has a primary zone named contoso.com. DNS2 has a secondary copy of the contoso.com zone.You need to log the zone transfer packets sent between DNS1 and DNS2.What should you configure?

A. Monitoring from DNS Manager
B. Logging from Windows Firewall with Advanced Security
C. A Data Collector Set (DCS) from Performance Monitor
D. Debug logging from DNS Manager

Answer : D


Question : 18

Your network contains two Active Directory forests named contoso.com and adatum.com. Contoso.com contains one domain. Adatum.com contains a child domain named child.adatum.com.Contoso.com has a one-way forest trust to adatum.com. Selective authentication is enabled on the forest trust.Several user accounts are migrated from child.adatum.com to adatum.com. Users report that after the migration, they fail to access resources in contoso.com. The users successfully accessed the resources in contoso.com before the accounts were migrated.You need to ensure that the migrated users can access the resources in contoso.com.What should you do?

A. Replace the existing forest trust with an external trust.
B. Run netdom and specify the /quarantine attribute.
C. Disable SID filtering on the existing forest trust.
D. Disable selective authentication on the existing forest trust.

Answer : C


Question : 17

Your company recently deployed a new Active Directory forest named contoso.com. The first domain controller in the forest runs Windows Server 2012 R2.You need to identify the time-to-live (TTL) value for domain referrals to the NETLOGON and SYSVOL shared folders.Which tool should you use?

A. Ultrasound
B. Replmon
C. Dfsdiag
D. Frsutil

Answer : C


Question : 16

Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Active Directory Certificate Services server role installed and is configured as a standalone certification authority (CA). You install a second server named Server2. You install the Online Responder role service on Server2. You need to ensure that Server1 can issue an Online Certificate Status Protocol (OCSP) Response Signing certificate to Server2. What should you do?

A. On Server1, run the certutil.exe command and specify the -setreg parameter.
B. On Server2, run the certutil.exe command and specify the -policy parameter.
C. On Server1, configure Security for the OCSP Response Signing certificate template.
D. On Server2, configure Issuance Requirements for the OCSP Response Signing certificate template.

Answer : C


Question : 15

You have a DHCP server named Server1. Server1 has one network adapter. Server1 is located on a subnet named Subnet1. Server1 has scope named Scope1. Scope1 contains IP addresses for the 192.168.1.0/24 network. Your company is migrating the IP addresses on Subnet1 to use a network ID of 10.10.0.0/16. On Server11 you create a scope named Scope2. Scope2 contains IP addresses for the 10.10.0.0/16 network. You need to ensure that clients on Subnet1 can receive IP addresses from either scope. What should you create on Server1?

A. A multicast scope
B. A scope
C. A superscope
D. A split-scope

Answer : C


Question : 14

Your network contains two Active Directory forests named contoso.com and adatum.com. Contoso.com contains one domain. Adatum.com contains a child domain named child.adatum.com. Contoso.com has a one-way forest trust to adatum.com. Selective authentication is enabled on the forest trust. Several user accounts are migrated from child.adatum.com to adatum.com. Users report that after the migration, they fail to access resources in contoso.com. The users successfully accessed the resources in contoso.com before the accounts were migrated. You need to ensure that the migrated users can access the resources in contoso.com. What should you do?

A. Replace the existing forest trust with an external trust.
B. Run netdom and specify the /quarantine attribute.
C. Disable SID filtering on the existing forest trust.
D. Disable selective authentication on the existing forest trust.

Answer: C


Question : 13

Your network contains an Active Directory domain named contoso.com. The domain contains two sites named Site1 and Site2 and two domain controllers named DC1 and DC2. Both domain controllers are located in Site1. You install an additional domain controller named DC3 in Site1 and you ship DC3 to Site2. A technician connects DC3 to Site2. You discover that users in Site2 are authenticated by all three domain controllers. You need to ensure that the users in Site2 are authenticated by DC1 or DC2 only if DC3 is unavailable. What should you do?

A. From Network Connections, modify the IP address of DC3.
B. In Active Directory Sites and Services, modify the Query Policy of DC3.
C. From Active Directory Sites and Services, move DC3.
D. In Active Directory Users and Computers, configure the insDS-PrimaryComputer attribute for the users in Site2.

Answer: C


Question : 12

Your network contains an Active Directory domain named adatum.com. The domain contains a server named CA1 that runs Windows Server 2012 R2. CA1 has the Active Directory Certificate Services server role installed and is configured to support key archival and recovery. You need to ensure that a user named User1 can decrypt private keys archived in the Active Directory Certificate Services (AD CS) database. The solution must prevent User1 from retrieving the private keys from the AD CS database. What should you do?

A. Assign User1 the Issue and Manage Certificates permission to Server1.
B. Assign User1 the Read permission and the Write permission to all certificate templates.
C. Provide User1 with access to a Key Recovery Agent certificate and a private key.
D. Assign User1 the Manage CA permission to Server1.

Answer: C


Question : 11

Your network contains a server named Server1 that runs Windows Server 2012 R2.Server1 has the Active Directory Certificate Services server role installed and is configured as a standalone certification authority (CA).You install a second server named Server2.You install the Online Responder role service on Server2.You need to ensure that Server1 can issue an Online Certificate Status Protocol (OCSP) Response Signing certificate to Server2.What should you do?

A. On Server1,run the certutil.exe command and specify the-setreg parameter.
B. On Server2,run the certutil.exe command and specify the-policy parameter.
C. On Server1,configure Security for the OCSP Response Signing certificate template.
D. On Server2,configure Issuance Requirements for the OCSP Response Signing certificate template.

Answer: C


Question : 10

You are employed as a senior network administrator at ABC.com. ABC.com has an Active Directory domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 installed.You are running a training exercise for junior network administrators. You are currently discussing the use of a Scale-Out File Server in cluster environment.Which of the following should be installed prior to configuring a Scale-Out File Server? (Choose two.)

A. You should consider installing the File Server role service.

B. You should consider configuring the Quorum settings.

C. You should consider installing the Failover Clustering.

D. You should consider installing the Active Directory Certificate Services server role.

Answer: A,C


Question : 9

You are employed as a network administrator at ABC.com. ABC.com has an Active Directory domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 installed.ABC.com has a server, named ABC-SR07, which is configured as a DHCP server. You have created a superscope on ABC-SR07.Which of the following describes a reason for creating a superscope? (Choose all that apply.)

A. To support DHCP clients on a single physical network segment where multiple logical IP networks are used.

B. To allow for the sending of network traffic to a group of endpointsdestination hosts.

C. To support remote DHCP clients located on the far side of DHCP and BOOTP relay agents.

D. To provide fault tolerance.

Answer: A,C


Question : 8

You are employed as a network administrator at ABC.com. ABC.com has an Active Directory domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 installed.A ABC.com server, named ABC-SR13, which has a Server Core Installation of Windows Server 2012 installed and is configured as a file server. ABC-SR13 hosts shared folders that are configured to store previous versions.You have been instructed to make sure that the Previous Versions tab can be used by ABC.com’s users to open previous versions of the shared folders.Which of the following actions should you take?

A. You should consider making use of Diskcopy.

B. You should consider making use of Fsutil.

C. You should consider making use of Vssadmin.

D. You should consider making use of Filescrn.

E. You should consider making use of Wevtutil.

Answer: C


Question : 7

You are employed as a network administrator at ABC.com. ABC.com has two Active Directory forests, named uk.ABC.com and us.ABC.com. All servers on the ABC.com network have Windows Server 2012 installed.A one-way forest trust has been configured from the us.ABC.com and the uk.ABC.com forests. A server, named ABC-SR13, in the us.ABC.com forest hosts a shared folder. This shared folder needs to be accessed by a user, named Mia Hamm.You have confirmed that the Read permission has been granted to the Authenticated Users group.You now need to make sure that Mia Hamm has access to the shared folder.Which of the following actions should you take?

A. You should consider altering the permissions for ABC-SR’s computer object in Active Directory.

B. You should consider granting Mia Hamm’s user account the necessary permissions.

C. You should consider altering the permissions for ABC-SR’s user object in Active Directory.

D. You should consider adding Mia Hamm’s user account to the Globl Administrators group.

Answer: A

MicroSoft Updates

MicroSoft Updates

MicroSoft Dynamic

MicroSoft Dynamic