Q91. - (Topic 9) 

You have a server named Server1 that runs Windows Server 2012. 

You have a 3-TB database that will be moved to Server1. 

Server1 has the following physical disks: 

. Three 2-TB SATA disks that are attached to a single IDE controller 

. One 1-TB SATA disk that is attached to a single IDE controller 

You need to recommend a solution to ensure that the database can be moved to Server1. The solution must ensure that the database is available if a single disk fails. 

What should you include in the recommendation? 

A. Add each disk to a separate storage pool. Create a mirrored virtual disk. 

B. Add two disks to a storage pool. Add the other disk to another storage pool. Create a mirrored virtual disk. 

C. Add all of the disks to a single storage pool, and then create two simple virtual disks. 

D. Add all of the disks to a single storage pool, and then create a parity virtual disk. 

Answer:

Explanation: 

http://blogs.technet.com/b/askpfeplat/archive/2012/10/10/windows-server-2012-storage-spaces-is-it-foryoucould-be. http://winsvr.wordpress.com/2013/01/22/storage-space-virtual-disk/ Parity A parity virtual disk is similar to a hardware Redundant Array of Inexpensive Disks (RAID5). Data, along with parity information, is striped across multiple physical disks. Parity enables Storage Spaces to continue to service read and write requests even when a drive has failed. A minimum of three physical disks is required for a parity virtual disk. Note that a parity disk cannot be used in a failover cluster. 


Q92. - (Topic 9) 

Your network contains a server named Server1 that runs Windows Server 2012. Server1 has the DHCP Server server role installed. 

All of the client computers that are in a subnet named Subnet1 receive their IP address configurations from Server1. 

You plan to add another DHCP server named Server2 to Subnet1. 

You need to recommend changes to the DHCP infrastructure to ensure that the client computers continue to receive IP addressing information if a single DHCP server fails. 

What should you do? 

More than one answer choice may achieve the goal. Select the BEST answer. 

A. Create a Network Load Balancing (NLB) cluster. 

B. Configure Failover for the scope. 

C. Create a DHCP failover cluster. 

D. Create a split scope. 

Answer:

Explanation: 

http://blogs.technet.com/b/keithmayer/archive/2012/10/28/step-by-step-scoping-out-the-new-dhcpfailover-inwindows-server-2012-31-days-of-favorite-features-part-28-of-31.aspx#.UQhW-b-jbK0 

D:\Documents and Settings\useralbo\Desktop\1.jpg 


Q93. - (Topic 9) 

A new company registers the domain name of contoso.com. The company has a web presence on the Internet. All Internet resources have names that use a DNS suffix of contoso.com. 

A third-party hosts the Internet resources and is responsible for managing the contoso.com DNS zone on the Internet. The zone contains several hundred records. 

The company plans to deploy an Active Directory forest. 

You need to recommend an Active Directory forest infrastructure to meet the following requirements: 

. Ensure that users on the internal network can resolve the names of the company's Internet resources. 

. Minimize the amount of administrative effort associated with the addition of new Internet servers. 

What should you recommend? 

A. A forest that contains a single domain named contoso.local 

B. A forest that contains a root domain named contoso.com and another domain named contoso.local 

C. A forest that contains a root domain named contoso.com and another domain named ad.contoso.com 

D. A forest that contains a single domain named contoso.com 

Answer:


Q94. - (Topic 9) 

Your network contains an Active Directory domain named contoso.com. All servers run either Windows Server 2008 R2 or Windows Server 2012. 

Your company uses IP Address Management (IPAM) to manage multiple DHCP servers. A user named User1 is a member of the IPAM Users group and is a member of the local Administrators group on each DHCP server. 

When User1 edits a DHCP scope by using IPAM, the user receives the error message 

shown in the exhibit. (Click the Exhibit button.) 

You need to prevent User1 from receiving the error message when editing DHCP scopes by using IPAM. 

What should you do? 

A. Add User1 to the DHCP Administrators group on each DHCP server. 

B. Add User1 to the IPAM Administrators group. 

C. Run the Set-IpamServerConfig cmdlet. 

D. Run the Invoke-IpamGpoProvisioning cmdlet. 

Answer:

Explanation: 

http://technet.microsoft.com/en-us/library/hh831622.aspx IPAM Administrators: IPAM Administrators have the privileges to view all IPAM data and perform all IPAM tasks. 


Q95. - (Topic 9) 

Your network contains an Active Directory domain. 

You plan to implement a remote access solution that will contain three servers that run 

Windows Server 2012. The servers will be configured as shown in the following table. 

Server1 will support up to 200 concurrent VPN connections. 

You need to ensure that all VPN connection requests are authenticated and authorized by either Server2 or Server3. The solution must ensure that the VPN connections can be authenticated if either Server2 or Server3 fails. 

What should you do? 

A. On Server1, configure a RADIUS proxy. On Server2 and Server3, add a RADIUS client. 

B. On Server2 and Server3, add a RADIUS client. On Server1, modify the Authentication settings. 

C. On Server1, configure a RADIUS proxy. Add Server2 and Server3 to a failover cluster. 

D. Add Server2 and Server3 to a Network Load Balancing (NLB) cluster. On Server1, modify the Authentication settings. 

Answer:

Explanation: 

http://technet.microsoft.com/en-us/library/cc754033.aspx 


Q96. - (Topic 9) 

Your company is a hosting provider that provides cloud-based services to multiple customers. 

Each customer has its own Active Directory forest located in your company's datacenter. 

You plan to provide VPN access to each customer. The VPN solution will use RADIUS for authentication services and accounting services. 

You need to recommend a solution to forward authentication and accounting messages from the perimeter network to the Active Directory forest of each customer. 

What should you recommend? 

More than one answer choice may achieve the goal. Select the BEST answer. 

A. One RADIUS proxy for each customer and Active Directory Federation Services (AD FS) 

B. A RADIUS server for each customer and one RADIUS proxy 

C. One RADIUS proxy and one Active Directory Lightweight Directory Services (AD LDS) instance for each customer 

D. A RADIUS server for each customer and a RADIUS proxy for each customer 

Answer:


Q97. - (Topic 9) 

Your network contains a Hyper-V host named Host1 that runs Windows Server 2012. Host1 contains a virtual machine named DC1. DC1 is a domain controller that runs Windows Server 2012. 

You plan to clone DC1. 

You need to recommend which steps are required to prepare DC1 to be cloned. 

What should you include in the recommendation? (Each correct answer presents part of the solution. Choose all that apply.) 

A. Run dcpromo.exe /adv. 

B. Create a file named Dccloneconfig.xml. 

C. Add DC1 to the Cloneable Domain Controllers group. 

D. Run sysprep.exe /oobe. 

E. Run New-VirtualDiskClone. 

Answer: B,C 

Explanation: 

http://blogs.technet.com/b/askpfeplat/archive/2012/10/01/virtual-domain-controller-cloning-in-windowsserver-2012.aspx DCCloneConfig.xml is an XML configuration file that contains all of the settings the cloned DC will take when it boots. This includes network settings, DNS, WINS, AD site name, new DC name and more. This file can be generated in a few different ways. There's a new group in town. It's called Cloneable Domain Controllers and you can find it in the Users container. Membership in this group dictates whether a DC can or cannot be cloned. This group has some permissions set on the domain head that should not be removed. Removing these permissions will cause cloning to fail. Also, as a best practice, DCs shouldn't be added to the group until you plan to clone and DCs should be removed from the group once cloning is complete. Cloned DCs will also end up in the Cloneable Domain Controllers group. Make sure to remove those as well 


Q98. - (Topic 3) 

You need to recommend a remote access solution that meets the VPN requirements. 

Which role service should you include in the recommendation? 

A. Routing 

B. Network Policy Server 

C. DirectAccess and VPN (RAS) 

D. Host Credential Authorization Protocol 

Answer:

Explanation: 

D:\Documents and Settings\useralbo\Desktop\1.jpg 

Updated: March 29, 2012 Applies To: Windows Server 2008 R2, Windows Server 2012 Network Policy Server Network Policy Server (NPS) allows you to create and enforce organization-wide network access policies for client health, connection request authentication, and connection request authorization. In addition, you can use NPS as a Remote Authentication Dial-In User Service (RADIUS) proxy to forward connection requests to a server running NPS or other RADIUS servers that you configure in remote RADIUS server groups. NPS allows you to centrally configure and manage network access authentication, authorization, are client health policies with the following three features: RADIUS server. NPS performs centralized authorization, authorization, and accounting for wireless, authenticating switch, remote access dial-up and virtual private network (VNP) connections. When you use NPS as a RADIUS server, you configure network access servers, such as wireless access points and VPN servers, as RADIUS clients in NPS. You also configure network policies that NPS uses to authorize connection requests, and you can configure RADIUS accounting so that NPS logs accounting information to log files on the local hard disk or in a Microsoft SQL Server database. For more information, see RADIUS Server. http://technet.microsoft.com/en-us/library/cc732912.aspx 


Q99. - (Topic 10) 

Your network contains an Active Directory domain named contoso.com. The domain contains a Microsoft System Center 2012 infrastructure. 

You deploy a service named Service1 by using a service template. Service1 contains two virtual machines. The virtual machines are configured as shown in the following table. 

You need to recommend a monitoring solution to ensure that an administrator can review the availability information of Service1. 

You need to recommend a monitoring solution to ensure that an administrator can review the availability information of Service1. 

Solution: From Configuration Manager, you create a Collection and a Desired Configuration Management baseline. 

Does this meet the goal? 

A. Yes 

B. No 

Answer:


Q100. DRAG DROP - (Topic 9) 

Your network contains an Active Directory domain named contoso.com. The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2008 R2. 

You plan to replace the domain controllers with new servers that run Windows Server 2012. The new servers will be named DC3 and DC4. 

You need to recommend a strategy to replace DC1 and DC2 with DC3 and DC4. The solution must minimize the amount of disruption to the users. 

Which three actions should you recommend? 

To answer, move the appropriate three actions from the list of actions to the answer area and arrange them in the correct order. 

Answer: