Q101. DRAG DROP - (Topic 7) 

You need to prepare the required Hyper-V virtual network components for Customer2. 

Which four objects should you create and configure in sequence? To answer, move the appropriate objects from the list of objects to the answer area and arrange them in the correct order. 

Answer: 


Q102. - (Topic 9) 

You have a server named Server1 that runs Windows Server 2012. 

You have a 3-TB database that will be moved to Server1. 

Server1 has the following physical disks: 

. Three 2-TB SATA disks that are attached to a single IDE controller 

. One 1-TB SATA disk that is attached to a single IDE controller 

You need to recommend a solution to ensure that the database can be moved to Server1. The solution must ensure that the database is available if a single disk fails. 

What should you include in the recommendation? 

A. Add each disk to a separate storage pool. Create a mirrored virtual disk. 

B. Add two disks to a storage pool. Add the other disk to another storage pool. Create a mirrored virtual disk. 

C. Add all of the disks to a single storage pool, and then create two simple virtual disks. 

D. Add all of the disks to a single storage pool, and then create a parity virtual disk. 

Answer:

Explanation: 

http://blogs.technet.com/b/askpfeplat/archive/2012/10/10/windows-server-2012-storage-spaces-is-it-foryoucould-be. http://winsvr.wordpress.com/2013/01/22/storage-space-virtual-disk/ Parity A parity virtual disk is similar to a hardware Redundant Array of Inexpensive Disks (RAID5). Data, along with parity information, is striped across multiple physical disks. Parity enables Storage Spaces to continue to service read and write requests even when a drive has failed. A minimum of three physical disks is required for a parity virtual disk. Note that a parity disk cannot be used in a failover cluster. 


Q103. - (Topic 9) 

Your network contains an Active Directory domain named contoso.com. All servers run either Windows Server 2008 R2 or Windows Server 2012. 

Your company uses IP Address Management (IPAM) to manage multiple DHCP servers. A user named User1 is a member of the IPAM Users group and is a member of the local Administrators group on each DHCP server. 

When User1 edits a DHCP scope by using IPAM, the user receives the error message 

shown in the exhibit. (Click the Exhibit button.) 

You need to prevent User1 from receiving the error message when editing DHCP scopes by using IPAM. 

What should you do? 

A. Add User1 to the DHCP Administrators group on each DHCP server. 

B. Add User1 to the IPAM Administrators group. 

C. Run the Set-IpamServerConfig cmdlet. 

D. Run the Invoke-IpamGpoProvisioning cmdlet. 

Answer:

Explanation: 

http://technet.microsoft.com/en-us/library/hh831622.aspx IPAM Administrators: IPAM Administrators have the privileges to view all IPAM data and perform all IPAM tasks. 


Q104. DRAG DROP - (Topic 9) 

Your network contains an Active Directory domain named contoso.com. The domain contains an IP Address Management (IPAM) server. 

You plan to delegate the administration of IPAM as shown in the following table. 

You need to recommend which IPAM security group must be used for each department. The solution must minimize the number of permissions assigned to each group. 

What should you recommend? 

To answer, drag the appropriate group to the correct department in the answer area. Each group may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content. 

Answer: 


Q105. - (Topic 9) 

Your network contains multiple servers that run Windows Server 2012. All client computers run Windows 8. 

You need to recommend a centralized solution to download the latest antivirus definitions for Windows Defender. 

What should you include in the recommendation? 

A. Microsoft System Center 2012 Endpoint Protection 

B. Network Access Protection (NAP) 

C. Microsoft System Center Essentials 

D. Windows Server Update Services (WSUS) 

Answer: D Explanation: 

For those who actually doubt this Answer: 

http://support.microsoft.com/kb/919772 

To use WSUS to deploy Windows Defender definition updates to client computers, follow 

these steps: 

1. Open the WSUS Administrator console, and then click Options at the top of the console. 

2. Click Synchronization Options. 

3. Under Products and Classifications, click Change under Products. 

4. Verify that the Windows Defender check box is selected, and then click OK. 

5. Under Products and Classifications, click Change under Update Classifications. 

6. Verify that the Definition Updates check box is selected, and then click OK. 

7. Optional Update the automatic approval rule. To do this, follow these steps: 

a. At the top of the console, click Options. 

b. Click Automatic Approval Options. 

c. Make sure that the Automatically approve updates for installation by using the following rule check box is selected. 

d. Under Approve for Installation, click Add/Remove Classification. 

e. Verify that the Definition Updates check box is selected, and then click OK. 

8. At the top of the console, click Options. 

9. Click Synchronization Options. 

10. On the taskbar on the left, click Synchronize now. 

11. At the top of the console, click Updates. 

12. Approve any Windows Defender updates that WSUS should deploy. 


Q106. - (Topic 9) 

Your company, which is named Contoso, Ltd., has a main office and two branch offices. The main office is located in North America. The branch offices are located in Asia and Europe. 

You plan to design an Active Directory forest and domain infrastructure. 

You need to recommend an Active Directory design to meet the following requirements: 

. The contact information of all the users in the Europe office must not be visible to the users in the other offices. 

. The administrators in each office must be able to control the user settings and the computer settings of the users in their respective office. 

The solution must use the least amount of administrative effort. 

What should you include in the recommendation? 

A. One forest that contains three domains 

B. Three forests that each contain one domain 

C. Two forests that each contain one domain 

D. One forest that contains one domain 

Answer:

Explanation: Answer: B http://www.informit.com/articles/article.aspx?p=32080&seqNum=5 


Q107. HOTSPOT - (Topic 10) 

You have a System Center 2012 R2 Virtual Machine Manager (VMM) deployment. 

You implement Hyper-V Recovery Manager for the deployment. 

You create two new clouds named Cloud1 and Cloud2. Metadata for both clouds is uploaded to Windows Azure. 

You need to ensure that the virtual machines in Cloud1 are protected by using replicas in Cloud2. 

Where should you perform each action? To answer, select the appropriate tool for each action in the answer area. 

Answer: 


Q108. - (Topic 8) 

You are evaluating the deployment of a multi-site Hyper-V failover cluster in the Miami office and the Seattle office to host App2. 

You need to identify which changes must be made to support the use of the multi-site cluster. 

Which changes should you identify? 

A. Configure all of the virtual machines to use dynamic memory. Implement Distributed File System (DFS) Replication and store the virtual machine files in a replicated folder. 

B. Implement Distributed File System (DFS) Replication and store the virtual machine files in a replicated folder. Upgrade the WAN link between the Miami and Seattle offices. 

C. Purchase a storage solution that replicates the virtual machines. Configure all of the virtual machines to use dynamic memory. 

D. Upgrade the WAN link between the Miami and Seattle offices. Purchase a storage solution that replicates the virtual machines. 

Answer:


Q109. - (Topic 7) 

You plan to implement a solution that meets the certificate requirements of Customer1. You need to identify which role services must be deployed to the hosting environment. 

Which two role services should you identify? Each correct answer presents part of the solution. 

A. Certification Authority Web Enrollment 

B. Online Responder 

C. Certificate Enrollment Policy Web Service 

D. Certificate Enrollment Web Service 

Answer: C,D 


Q110. - (Topic 9) 

Your network contains an Active Directory domain named contoso.com. The domain contains multiple sites. You plan to deploy DirectAccess. 

The network security policy states that when client computers connect to the corporate network from the Internet, all of the traffic destined for the Internet must be routed through the corporate network. 

You need to recommend a solution for the planned DirectAccess deployment that meets the security policy requirement. 

What should you include in the recommendation? 

A. Set the ISATAP State to state enabled. 

B. Enable split tunneling. 

C. Set the ISATAP State to state disabled. 

D. Enable force tunneling. 

Answer:

Explanation: 

http://blogs.technet.com/b/csstwplatform/archive/2009/12/15/directaccess-how-to-configure-forcetunneling-forda-so-that-client-are-forced-to-use-ip-https.aspx You can configure DirectAccess clients to send all of their traffic through the tunnels to the DirectAccess server with force tunneling. When force tunneling is configured, DirectAccess clients that detect that they are on the Internet modify their IPv4 default route so that default route IPv4 traffic is not sent. With the exception of local subnet traffic, all traffic sent by the DirectAccess client is IPv6 traffic that goes through tunnels to the DirectAccess server.