Question Set 1
QUESTION 1
Your network contains two servers named Server1 and Server2 that run Windows Server 2012. Server1 and Server2 have the Hyper-V server role installed and are
part of a host group named Group1 in Microsoft System Center 2012 Virtual Machine Manager (VMM).
Server1 and Server2 have identical hardware, software, and settings.
You configure VMM to migrate virtual machines if the CPU utilization on a host exceeds 65 percent. The current load on the servers is shown following table.
QUESTION 1
Your network contains two servers named Server1 and Server2 that run Windows Server 2012. Server1 and Server2 have the Hyper-V server role installed and are
part of a host group named Group1 in Microsoft System Center 2012 Virtual Machine Manager (VMM).
Server1 and Server2 have identical hardware, software, and settings.
You configure VMM to migrate virtual machines if the CPU utilization on a host exceeds 65 percent. The current load on the servers is shown following table.

You start a new virtual machine on Server2 named VM8. VM8 has a CPU utilization of 20 percent.
You discover that none of the virtual machines hosted on Server2 are migrated to Server1.
You need to ensure that the virtual machines hosted on Server2 are migrated to Server1.
What should you modify from the Dynamic Optimization configuration?
A. The Host Reserve threshold
B. The Power Optimization threshold
C. The Aggressiveness level
D. The Dynamic Optimization threshold
Correct Answer: C
Section: [none]
Explanation
Explanation/Reference:
QUESTION 2
Your network contains an Active Directory domain. The domain contains 10 file servers. The file servers connect to a Fibre Channel SAN. You plan to implement 20
Hyper-V hosts in a failover cluster.
The Hyper-V hosts will not have host bus adapters (HBAs).
You need to recommend a solution for the planned implementation that meets the following requirements:
The virtual machines must support live migration.
The virtual hard disks (VHDs) must be stored on the file servers.
Which two technologies achieve the goal? Each correct answer presents a complete solution.
A. Cluster Shared Volume (CSV)
B. An NFS share
C. Storage pools
D. SMB 3.0 shares
Correct Answer: CD
Section: [none]
Explanation
Explanation/Reference:
QUESTION 3
Your network contains two data centers named DataCenter1 and DataCenter2. The two data centers are connected by using a low-latency high-speed WAN link.
Each data center contains multiple Hyper-V hosts that run Windows Server 2012. All servers connect to a Storage Area Network (SAN) in their local data center.
You plan to implement 20 virtual machines that will be hosted on the Hyper-V hosts.
You need to recommend a hosting solution for the virtual machines.
The solution must meet the following requirements:
Virtual machines must be available automatically on the network if a single Hyper-V host fails.
Virtual machines must be available automatically on the network if a single data center fails.
What should you recommend?
A. One failover cluster in DataCenter1 and Hyper-V replicas to DataCenter2
B. One failover cluster in DataCenter2 and one DFS Replication group in DataCenter1
C. One failover cluster that spans both data centers and SAN replication between the data centers
D. One failover cluster and one Distributed File System (DFS) Replication group in each data center
Correct Answer: C
Section: [none]
Explanation
Explanation/Reference:
QUESTION 4
You have a Hyper-V host named Hyper1 that has Windows Server 2012 installed. Hyper1 hosts 20 virtual machines.
Hyper1 has one physical network adapter.
You need to implement a networking solution that evenly distributes the available bandwidth on Hyper1 to all of the virtual machines.
What should you modify?
A. The settings of the virtual switch
B. The settings of the virtual network adapter
C. The Quality of Service (QoS) Packet Scheduler settings of the physical network adapter
D. The settings of the legacy network adapter
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
QUESTION 5
HOTSPOT
You plan to implement a virtualization solution to host 10 virtual machines. All of the virtual machines will be hosted on servers that run Windows Server 2012.
You need to identify which servers must be deployed for the planned virtualization solution.
The solution must meet the following requirements:
• Minimize the number of servers.
• Ensure that live migration can be used between the hosts.
Which servers should you identify?
To answer, select the appropriate servers in the answer area.
Hot Area:
You discover that none of the virtual machines hosted on Server2 are migrated to Server1.
You need to ensure that the virtual machines hosted on Server2 are migrated to Server1.
What should you modify from the Dynamic Optimization configuration?
A. The Host Reserve threshold
B. The Power Optimization threshold
C. The Aggressiveness level
D. The Dynamic Optimization threshold
Correct Answer: C
Section: [none]
Explanation
Explanation/Reference:
QUESTION 2
Your network contains an Active Directory domain. The domain contains 10 file servers. The file servers connect to a Fibre Channel SAN. You plan to implement 20
Hyper-V hosts in a failover cluster.
The Hyper-V hosts will not have host bus adapters (HBAs).
You need to recommend a solution for the planned implementation that meets the following requirements:
The virtual machines must support live migration.
The virtual hard disks (VHDs) must be stored on the file servers.
Which two technologies achieve the goal? Each correct answer presents a complete solution.
A. Cluster Shared Volume (CSV)
B. An NFS share
C. Storage pools
D. SMB 3.0 shares
Correct Answer: CD
Section: [none]
Explanation
Explanation/Reference:
QUESTION 3
Your network contains two data centers named DataCenter1 and DataCenter2. The two data centers are connected by using a low-latency high-speed WAN link.
Each data center contains multiple Hyper-V hosts that run Windows Server 2012. All servers connect to a Storage Area Network (SAN) in their local data center.
You plan to implement 20 virtual machines that will be hosted on the Hyper-V hosts.
You need to recommend a hosting solution for the virtual machines.
The solution must meet the following requirements:
Virtual machines must be available automatically on the network if a single Hyper-V host fails.
Virtual machines must be available automatically on the network if a single data center fails.
What should you recommend?
A. One failover cluster in DataCenter1 and Hyper-V replicas to DataCenter2
B. One failover cluster in DataCenter2 and one DFS Replication group in DataCenter1
C. One failover cluster that spans both data centers and SAN replication between the data centers
D. One failover cluster and one Distributed File System (DFS) Replication group in each data center
Correct Answer: C
Section: [none]
Explanation
Explanation/Reference:
QUESTION 4
You have a Hyper-V host named Hyper1 that has Windows Server 2012 installed. Hyper1 hosts 20 virtual machines.
Hyper1 has one physical network adapter.
You need to implement a networking solution that evenly distributes the available bandwidth on Hyper1 to all of the virtual machines.
What should you modify?
A. The settings of the virtual switch
B. The settings of the virtual network adapter
C. The Quality of Service (QoS) Packet Scheduler settings of the physical network adapter
D. The settings of the legacy network adapter
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
QUESTION 5
HOTSPOT
You plan to implement a virtualization solution to host 10 virtual machines. All of the virtual machines will be hosted on servers that run Windows Server 2012.
You need to identify which servers must be deployed for the planned virtualization solution.
The solution must meet the following requirements:
• Minimize the number of servers.
• Ensure that live migration can be used between the hosts.
Which servers should you identify?
To answer, select the appropriate servers in the answer area.
Hot Area:

Correct Answer:

Section: [none]
Explanation
Explanation/Reference:
Explanation:
Just two server with Hyper-V installed is enough to perform a Live Migration. (Minimize the number of servers)
QUESTION 6
Your network contains a Hyper-V cluster named Cluster1.
You install Microsoft System Center 2012 Virtual Machine Manager (VMM).
You create a user account for another administrator named User1.
You plan to provide User1 with the ability to manage only the virtual machines that User1 creates.
You need to identify what must be created before you delegate the required permissions.
What should you identify?
A. A service template
B. A Delegated Administrator
C. A cloud
D. A host group
Correct Answer: D
Section: [none]
Explanation
Explanation/Reference:
QUESTION 7
Your network contains an Active Directory domain named contoso.com. The domain contains a Microsoft System Center 2012 infrastructure.
You deploy a second System Center 2012 infrastructure in a test environment.
You create a service template named Template1 in both System Center 2012 infrastructures.
For self-service users, you create a service offering for Template1. The users create 20 instances of Template1.
You modify Template1 in the test environment. You export the service template to a file named Template1.xml.
You need to ensure that the changes to Template1 can be applied to the existing instances in the production environment.
What should you do when you import the template?
A. Overwrite the current service template.
B. Change the name of the service template.
C. Create a new service template.
D. Change the release number of the service template.
Correct Answer: D
Section: [none]
Explanation
Explanation/Reference:
QUESTION 8
Your network contains an Active Directory domain named contoso.com. The domain contains four servers on a test network. The servers are configured as shown
in the following table.
Explanation
Explanation/Reference:
Explanation:
Just two server with Hyper-V installed is enough to perform a Live Migration. (Minimize the number of servers)
QUESTION 6
Your network contains a Hyper-V cluster named Cluster1.
You install Microsoft System Center 2012 Virtual Machine Manager (VMM).
You create a user account for another administrator named User1.
You plan to provide User1 with the ability to manage only the virtual machines that User1 creates.
You need to identify what must be created before you delegate the required permissions.
What should you identify?
A. A service template
B. A Delegated Administrator
C. A cloud
D. A host group
Correct Answer: D
Section: [none]
Explanation
Explanation/Reference:
QUESTION 7
Your network contains an Active Directory domain named contoso.com. The domain contains a Microsoft System Center 2012 infrastructure.
You deploy a second System Center 2012 infrastructure in a test environment.
You create a service template named Template1 in both System Center 2012 infrastructures.
For self-service users, you create a service offering for Template1. The users create 20 instances of Template1.
You modify Template1 in the test environment. You export the service template to a file named Template1.xml.
You need to ensure that the changes to Template1 can be applied to the existing instances in the production environment.
What should you do when you import the template?
A. Overwrite the current service template.
B. Change the name of the service template.
C. Create a new service template.
D. Change the release number of the service template.
Correct Answer: D
Section: [none]
Explanation
Explanation/Reference:
QUESTION 8
Your network contains an Active Directory domain named contoso.com. The domain contains four servers on a test network. The servers are configured as shown
in the following table.

Server1 uses the storage shown in the following table.

You perform the following tasks:
On Server2, you create an advanced SMB share named Share2A and an applications SMB share named Share2B.
On Server3, you create an advanced SMB share named Share3.
On Server4, you create an applications SMB share named Share4.
You add Server3 and Server4 to a new failover cluster named Clus1.
On Clus1, you configure the File Server for general use role, you create a quick SMB share named Share5A, and then you create an applications SMB share
named Share5B.
You plan to create a failover cluster of two virtual machines hosted on Server1. The clustered virtual machines will use shared .vhdx files.
You need to recommend a location to store the shared .vhdx files.
Where should you recommend placing the virtual hard disk (VHD)?
A. \\Server3\Share3
B. \\Server2\Share2B
C. \\Clus1\Share5B
D. \\Server4\Share4
Correct Answer: C
Section: [none]
Explanation
Explanation/Reference:
QUESTION 9
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. The network contains a System Center 2012 R2
Data Protection Manager (DPM) deployment.
The domain contains six servers. The servers are configured as shown in the following table.
On Server2, you create an advanced SMB share named Share2A and an applications SMB share named Share2B.
On Server3, you create an advanced SMB share named Share3.
On Server4, you create an applications SMB share named Share4.
You add Server3 and Server4 to a new failover cluster named Clus1.
On Clus1, you configure the File Server for general use role, you create a quick SMB share named Share5A, and then you create an applications SMB share
named Share5B.
You plan to create a failover cluster of two virtual machines hosted on Server1. The clustered virtual machines will use shared .vhdx files.
You need to recommend a location to store the shared .vhdx files.
Where should you recommend placing the virtual hard disk (VHD)?
A. \\Server3\Share3
B. \\Server2\Share2B
C. \\Clus1\Share5B
D. \\Server4\Share4
Correct Answer: C
Section: [none]
Explanation
Explanation/Reference:
QUESTION 9
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. The network contains a System Center 2012 R2
Data Protection Manager (DPM) deployment.
The domain contains six servers. The servers are configured as shown in the following table.

You install System Center 2012 R2 Virtual Machine Manager (VMM) on the nodes in Cluster2.
You configure VMM to use a database in Cluster1. Server5 is the first node in the cluster.
You need to back up the VMM encryption key.
What should you back up?
A. A full system backup of Server1
B. A full system backup of Server3
C. A backup of the Windows\DigitalLocker folder on Server5
D. A backup of the Windows\DigitalLocker folder on Server1
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
QUESTION 10
You have a Windows Server 2012 R2 failover cluster that contains four nodes. The cluster has Dynamic Optimization enabled. You deploy three highly available
virtual machines to the cluster by using System Center 2012 R2 Virtual Machine Manager (VMM).
You need to prevent Dynamic Optimization from placing any of the three virtual machines in the same node.
What should you do?
A. From the Virtual Machine Manager console, modify the Compatibility settings in the Hardware Configuration properties of the virtual machines.
B. Set the Priority property of the virtual machine cluster role.
C. From the Virtual Machine Manager console, modify the Servicing Windows settings of the virtual machines.
D. From the Virtual Machine Manager console, modify the Availability settings in the Hardware Configuration properties of the virtual machines.
Correct Answer: D
Section: [none]
Explanation
Explanation/Reference:
QUESTION 11
Your network contains an Active Directory domain named contoso.com.
You currently have an intranet web site that is hosted by two Web servers named Web1 and Web2. Web1 and Web2 run Windows Server 2012.
Users use the name intranet.contoso.com to request the web site and use DNS round robin.
You plan to implement the Network Load Balancing (NLB) feature on Web1 and Web2.
You need to recommend changes to the DNS records for the planned implementation.
What should you recommend?
A. Create a service locator (SRV) record. Map the SRV record to Intranet.
B. Delete both host (A) records named Intranet. Create a pointer (PTR) record for each Web server.
C. Remove both host (A) records named Intranet. Create a new host (A) record named Intranet.
D. Delete both host (A) records named Intranet. Create two new alias (CNAME) records named Intranet. Map each CNAME record to a Web server name.
Correct Answer: C
Section: [none]
Explanation
Explanation/Reference:
QUESTION 12
Your company has a main office and a branch office.
You plan to implement a failover cluster named Cluster1 to host an application named App1. The data of App1 will replicate to all of the nodes in Cluster1.
Cluster1 will contain two servers. The servers will be configured as shown in the following table.
You configure VMM to use a database in Cluster1. Server5 is the first node in the cluster.
You need to back up the VMM encryption key.
What should you back up?
A. A full system backup of Server1
B. A full system backup of Server3
C. A backup of the Windows\DigitalLocker folder on Server5
D. A backup of the Windows\DigitalLocker folder on Server1
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
QUESTION 10
You have a Windows Server 2012 R2 failover cluster that contains four nodes. The cluster has Dynamic Optimization enabled. You deploy three highly available
virtual machines to the cluster by using System Center 2012 R2 Virtual Machine Manager (VMM).
You need to prevent Dynamic Optimization from placing any of the three virtual machines in the same node.
What should you do?
A. From the Virtual Machine Manager console, modify the Compatibility settings in the Hardware Configuration properties of the virtual machines.
B. Set the Priority property of the virtual machine cluster role.
C. From the Virtual Machine Manager console, modify the Servicing Windows settings of the virtual machines.
D. From the Virtual Machine Manager console, modify the Availability settings in the Hardware Configuration properties of the virtual machines.
Correct Answer: D
Section: [none]
Explanation
Explanation/Reference:
QUESTION 11
Your network contains an Active Directory domain named contoso.com.
You currently have an intranet web site that is hosted by two Web servers named Web1 and Web2. Web1 and Web2 run Windows Server 2012.
Users use the name intranet.contoso.com to request the web site and use DNS round robin.
You plan to implement the Network Load Balancing (NLB) feature on Web1 and Web2.
You need to recommend changes to the DNS records for the planned implementation.
What should you recommend?
A. Create a service locator (SRV) record. Map the SRV record to Intranet.
B. Delete both host (A) records named Intranet. Create a pointer (PTR) record for each Web server.
C. Remove both host (A) records named Intranet. Create a new host (A) record named Intranet.
D. Delete both host (A) records named Intranet. Create two new alias (CNAME) records named Intranet. Map each CNAME record to a Web server name.
Correct Answer: C
Section: [none]
Explanation
Explanation/Reference:
QUESTION 12
Your company has a main office and a branch office.
You plan to implement a failover cluster named Cluster1 to host an application named App1. The data of App1 will replicate to all of the nodes in Cluster1.
Cluster1 will contain two servers. The servers will be configured as shown in the following table.

The cluster nodes will not use shared storage.
The branch office contains two file servers named Server3 and Server4.
You need to ensure that App1 fails over automatically to another server if a single node in Cluster1 fails.
What should you do?
More than one answer choice may achieve the goal. Select the BEST answer.
A. Add Server3 as a node in Cluster1.
B. Add Server1, Server2, and Server3 to a Network Load Balancing (NLB) cluster.
C. Add Server3 and Server4 to a new failover cluster named Cluster2. Install App1 on Cluster2.
D. Add Server3 as a file share witness for Cluster1.
Correct Answer: D
Section: [none]
Explanation
Explanation/Reference:
QUESTION 13
DRAG DROP
Your network contains servers that run Windows Server 2012. The network contains two servers named Server1 and Server2 that are connected to a SAS storage
device. The device only supports two connected computers.
Server1 has the iSCSI Target Server role service installed. Ten application servers use their iSCSI Initiator to connect to virtual disks in the SAS storage device via
iSCSI targets on Server1.
Currently, Server2 is used only to run backup software.
You install the iSCSI Target Server role service on Server2.
You need to ensure that the iSCSI targets are available if Server1 fails.
Which five actions should you perform?
To answer, move the five appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Select and Place:
The branch office contains two file servers named Server3 and Server4.
You need to ensure that App1 fails over automatically to another server if a single node in Cluster1 fails.
What should you do?
More than one answer choice may achieve the goal. Select the BEST answer.
A. Add Server3 as a node in Cluster1.
B. Add Server1, Server2, and Server3 to a Network Load Balancing (NLB) cluster.
C. Add Server3 and Server4 to a new failover cluster named Cluster2. Install App1 on Cluster2.
D. Add Server3 as a file share witness for Cluster1.
Correct Answer: D
Section: [none]
Explanation
Explanation/Reference:
QUESTION 13
DRAG DROP
Your network contains servers that run Windows Server 2012. The network contains two servers named Server1 and Server2 that are connected to a SAS storage
device. The device only supports two connected computers.
Server1 has the iSCSI Target Server role service installed. Ten application servers use their iSCSI Initiator to connect to virtual disks in the SAS storage device via
iSCSI targets on Server1.
Currently, Server2 is used only to run backup software.
You install the iSCSI Target Server role service on Server2.
You need to ensure that the iSCSI targets are available if Server1 fails.
Which five actions should you perform?
To answer, move the five appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Select and Place:
Correct Answer:

Section: [none]
Explanation
Explanation/Reference:
Reference: http://blogs.msdn.com/b/clustering/archive/2012/05/01/10299698.aspx
QUESTION 14
DRAG DROP
Your network contains multiple servers that run Windows Server 2012.
You plan to implement three virtual disks. The virtual disks will be configured as shown in the following table.
Explanation
Explanation/Reference:
Reference: http://blogs.msdn.com/b/clustering/archive/2012/05/01/10299698.aspx
QUESTION 14
DRAG DROP
Your network contains multiple servers that run Windows Server 2012.
You plan to implement three virtual disks. The virtual disks will be configured as shown in the following table.

You need to identify the minimum number of physical disks required for each virtual disk.
How many disks should you identify?
To answer, drag the appropriate number of disks to the correct virtual disk in the answer area. Each number of disks may be used once, more than once, or not at
all. Additionally, you may need to drag the split bar between panes or scroll to view content.
Select and Place:
How many disks should you identify?
To answer, drag the appropriate number of disks to the correct virtual disk in the answer area. Each number of disks may be used once, more than once, or not at
all. Additionally, you may need to drag the split bar between panes or scroll to view content.
Select and Place:

Correct Answer:

Section: [none]
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/es-es/library/jj822938.aspx
They are not talking about Clusters, a single server only, so a standalone server.
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/es-es/library/jj822938.aspx
They are not talking about Clusters, a single server only, so a standalone server.


QUESTION 15
Your Active Directory currently contains five virtualized domain controllers that run Windows Server 2012 R2.
The system state of each domain controller is backed up daily. The backups are shipped to a remote location weekly.
Your company recently implemented a disaster recovery site that contains several servers. The servers run Windows Server 2012 R2 and have the Hyper-V server
role installed. The disaster recovery site has a high-speed WAN link to the main office.
You need to create an Active Directory recovery plan that meets the following requirements:
Restores the Active Directory if a catastrophe prevents all access to the main office.
Minimizes data loss.
What should you include in the plan?
A. Hyper-V replicas
B. Live migration
C. Virtual machine checkpoints
D. System state restores
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
QUESTION 16
Your network contains an Active Directory domain named contoso.com. The domain contains several domain controllers. The domain controllers run either
Windows Server 2012 or Windows Server 2008 R2.
The domain functional level is Windows Server 2008 R2. The forest functional level is Windows Server 2008.
The corporate compliance policy states that all items deleted from Active Directory must be recoverable from a Recycle Bin.
You need to recommend changes to the current environment to meet the compliance policy.
Which changes should you recommend? (Each correct answer presents part of the solution. Choose all that apply.)
A. Raise the forest functional level to Windows Server 2008 R2.
B. Run the Enable-ADOptionalFeature cmdlet.
C. Run the New-ADObject cmdlet.
D. Run the Set-Server cmdlet
E. Raise the domain functional level to Windows Server 2012.
Correct Answer: AB
Section: [none]
Explanation
Explanation/Reference:
Explanation:
You can enable Active Directory Recycle Bin only if the forest functional level of your environment is set to Windows Server 2008 R2.
B: Enabling Active Directory Recycle Bin
After the forest functional level of your environment is set to Windows Server 2008 R2, you can enable Active Directory Recycle Bin by using the following methods:
/ Enable-ADOptionalFeature Active Directory module cmdlet (This is the recommended method.)
/ Ldp.exe
Note: By default, Active Directory Recycle Bin in Windows Server 2008 R2 is disabled.
Reference: Enable Active Directory Recycle Bin
QUESTION 17
Your network contains 500 client computers that run Windows 7 and a custom application named App1. App1 uses data stored in a shared folder.
You have a failover cluster named Cluster1 that contains two servers named Server1 and Server2.
Server1 and Server2 run Windows Server 2012 and are connected to an iSCSI Storage Area Network (SAN).
You plan to move the shared folder to Cluster1.
You need to recommend which cluster resource must be created to ensure that the shared folder can be accessed from Cluster1.
What should you recommend?
More than one answer choice may achieve the goal. Select the BEST answer.
A. The Generic Application cluster role
B. The DFS Namespace Server cluster role
C. The clustered File Server role of the File Server for general use type
D. The clustered File Server role of the File Server for scale-out application data type
Correct Answer: C
Section: [none]
Explanation
Explanation/Reference:
QUESTION 18
HOTSPOT
Your company has four offices. The offices are located in Montreal, Seattle, New York, and Miami.
Users access all of the web-based resources by using web proxy servers. The IP addresses of the web proxies at each office are configured as shown in the
following table.
Your Active Directory currently contains five virtualized domain controllers that run Windows Server 2012 R2.
The system state of each domain controller is backed up daily. The backups are shipped to a remote location weekly.
Your company recently implemented a disaster recovery site that contains several servers. The servers run Windows Server 2012 R2 and have the Hyper-V server
role installed. The disaster recovery site has a high-speed WAN link to the main office.
You need to create an Active Directory recovery plan that meets the following requirements:
Restores the Active Directory if a catastrophe prevents all access to the main office.
Minimizes data loss.
What should you include in the plan?
A. Hyper-V replicas
B. Live migration
C. Virtual machine checkpoints
D. System state restores
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
QUESTION 16
Your network contains an Active Directory domain named contoso.com. The domain contains several domain controllers. The domain controllers run either
Windows Server 2012 or Windows Server 2008 R2.
The domain functional level is Windows Server 2008 R2. The forest functional level is Windows Server 2008.
The corporate compliance policy states that all items deleted from Active Directory must be recoverable from a Recycle Bin.
You need to recommend changes to the current environment to meet the compliance policy.
Which changes should you recommend? (Each correct answer presents part of the solution. Choose all that apply.)
A. Raise the forest functional level to Windows Server 2008 R2.
B. Run the Enable-ADOptionalFeature cmdlet.
C. Run the New-ADObject cmdlet.
D. Run the Set-Server cmdlet
E. Raise the domain functional level to Windows Server 2012.
Correct Answer: AB
Section: [none]
Explanation
Explanation/Reference:
Explanation:
You can enable Active Directory Recycle Bin only if the forest functional level of your environment is set to Windows Server 2008 R2.
B: Enabling Active Directory Recycle Bin
After the forest functional level of your environment is set to Windows Server 2008 R2, you can enable Active Directory Recycle Bin by using the following methods:
/ Enable-ADOptionalFeature Active Directory module cmdlet (This is the recommended method.)
/ Ldp.exe
Note: By default, Active Directory Recycle Bin in Windows Server 2008 R2 is disabled.
Reference: Enable Active Directory Recycle Bin
QUESTION 17
Your network contains 500 client computers that run Windows 7 and a custom application named App1. App1 uses data stored in a shared folder.
You have a failover cluster named Cluster1 that contains two servers named Server1 and Server2.
Server1 and Server2 run Windows Server 2012 and are connected to an iSCSI Storage Area Network (SAN).
You plan to move the shared folder to Cluster1.
You need to recommend which cluster resource must be created to ensure that the shared folder can be accessed from Cluster1.
What should you recommend?
More than one answer choice may achieve the goal. Select the BEST answer.
A. The Generic Application cluster role
B. The DFS Namespace Server cluster role
C. The clustered File Server role of the File Server for general use type
D. The clustered File Server role of the File Server for scale-out application data type
Correct Answer: C
Section: [none]
Explanation
Explanation/Reference:
QUESTION 18
HOTSPOT
Your company has four offices. The offices are located in Montreal, Seattle, New York, and Miami.
Users access all of the web-based resources by using web proxy servers. The IP addresses of the web proxies at each office are configured as shown in the
following table.

The connections to the web proxies are balanced by using round-robin DNS.
The company plans to deploy a new application. The new application has a farm of front-end web servers that connect to a back-end application server. When a
session to a web server is established, the web server stores data until the session closes. Once the session closes, the data is sent to the application server.
You need to ensure that the incoming sessions to the web server farm are distributed among the web servers. The solution must ensure that if a web server fails,
the users are NOT directed to the failed server.
Hot Area:
The company plans to deploy a new application. The new application has a farm of front-end web servers that connect to a back-end application server. When a
session to a web server is established, the web server stores data until the session closes. Once the session closes, the data is sent to the application server.
You need to ensure that the incoming sessions to the web server farm are distributed among the web servers. The solution must ensure that if a web server fails,
the users are NOT directed to the failed server.
Hot Area:

Correct Answer:

Section: [none]
Explanation
Explanation/Reference:
QUESTION 19
HOTSPOT
Your network contains an Active Directory domain named contoso.com. The domain contains a Network Load Balancing (NLB) cluster named Cluster1 that
contains four nodes. Cluster1 hosts a web application named App1. The session state information of App1 is stored in a Microsoft SQL Server 2012 database.
The network contains four subnets.
You discover that all of the users from a subnet named Subnet1 always connect to the same NLB node.
You need to ensure that all of the users from each of the subnets connect equally across all of the nodes in Cluster1.
What should you modify from the port settings?
To answer, select the appropriate setting in the answer area.
Hot Area:
Explanation
Explanation/Reference:
QUESTION 19
HOTSPOT
Your network contains an Active Directory domain named contoso.com. The domain contains a Network Load Balancing (NLB) cluster named Cluster1 that
contains four nodes. Cluster1 hosts a web application named App1. The session state information of App1 is stored in a Microsoft SQL Server 2012 database.
The network contains four subnets.
You discover that all of the users from a subnet named Subnet1 always connect to the same NLB node.
You need to ensure that all of the users from each of the subnets connect equally across all of the nodes in Cluster1.
What should you modify from the port settings?
To answer, select the appropriate setting in the answer area.
Hot Area:

Correct Answer:

Section: [none]
Explanation
Explanation/Reference:
QUESTION 20
Your network contains five servers that run Windows Server 2012 R2.
You install the Hyper-V server role on the servers. You create an external virtual network switch on each server.
You plan to deploy five virtual machines to each Hyper-V server. Each virtual machine will have a virtual network adapter that is connected to the external virtual
network switch and that has a VLAN identifier of 1.
Each virtual machine will run Windows Server 2012 R2. All of the virtual machines will run the identical web application.
You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each virtual machine to an NLB cluster. The cluster will be configured
to use unicast only.
You need to ensure that the NLB feature can distribute connections across all of the virtual machines.
Solution: From the properties of each virtual machine, you enable MAC address spoofing for the existing virtual network adapter.
Does this meet the goal?
A. Yes
B. No
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
QUESTION 21
Your network contains five servers that run Windows Server 2012 R2.
You install the Hyper-V server role on the servers. You create an external virtual network switch on each server.
You plan to deploy five virtual machines to each Hyper-V server. Each virtual machine will have a virtual network adapter that is connected to the external virtual
network switch and that has a VLAN identifier of 1.
Each virtual machine will run Windows Server 2012 R2. All of the virtual machines will run the identical web application.
You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each virtual machine to an NLB cluster. The cluster will be configured
to use unicast only.
You need to ensure that the NLB feature can distribute connections across all of the virtual machines.
Solution: On each Hyper-V server, you create a new external virtual network switch. From the properties of each virtual machine, you add a second virtual network
adapter and connect the new virtual network adapters to the new external virtual network switches.
Does this meet the goal?
A. Yes
B. No
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 22
Your network contains five servers that run Windows Server 2012 R2.
You install the Hyper-V server role on the servers. You create an external virtual network switch on each server.
You plan to deploy five virtual machines to each Hyper-V server. Each virtual machine will have a virtual network adapter that is connected to the external virtual
network switch and that has a VLAN identifier of 1.
Each virtual machine will run Windows Server 2012 R2. All of the virtual machines will run the identical web application.
You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each virtual machine to an NLB cluster. The cluster will be configured
to use unicast only.
You need to ensure that the NLB feature can distribute connections across all of the virtual machines.
Solution: On each Hyper-V server, you create a new private virtual network switch. From the properties of each virtual machine, you add a second virtual network
adapter and connect the new virtual network adapters to the new private virtual network switches.
Does this meet the goal?
A. Yes
B. No
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 23
Your network contains five servers that run Windows Server 2012 R2.
You install the Hyper-V server role on the servers. You create an external virtual network switch on each server.
You plan to deploy five virtual machines to each Hyper-V server. Each virtual machine will have a virtual network adapter that is connected to the external virtual
network switch and that has a VLAN identifier of 1.
Each virtual machine will run Windows Server 2012 R2. All of the virtual machines will run the identical web application.
You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each virtual machine to an NLB cluster. The cluster will be configured
to use unicast only.
You need to ensure that the NLB feature can distribute connections across all of the virtual machines.
Solution: From the properties of each virtual machine, you add a second virtual network adapter. You connect the new virtual network adapters to the external
virtual network switch and configure the new virtual network adapters to use a VLAN identifier of 2.
Does this meet the goal?
A. Yes
B. No
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 24
Your network contains an Active Directory domain named contoso.com. The domain contains a Microsoft System Center 2012 infrastructure.
You deploy a service named Service1 by using a service template. Service1 contains two virtual machines. The virtual machines are configured as shown in the
following table.
Explanation
Explanation/Reference:
QUESTION 20
Your network contains five servers that run Windows Server 2012 R2.
You install the Hyper-V server role on the servers. You create an external virtual network switch on each server.
You plan to deploy five virtual machines to each Hyper-V server. Each virtual machine will have a virtual network adapter that is connected to the external virtual
network switch and that has a VLAN identifier of 1.
Each virtual machine will run Windows Server 2012 R2. All of the virtual machines will run the identical web application.
You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each virtual machine to an NLB cluster. The cluster will be configured
to use unicast only.
You need to ensure that the NLB feature can distribute connections across all of the virtual machines.
Solution: From the properties of each virtual machine, you enable MAC address spoofing for the existing virtual network adapter.
Does this meet the goal?
A. Yes
B. No
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
QUESTION 21
Your network contains five servers that run Windows Server 2012 R2.
You install the Hyper-V server role on the servers. You create an external virtual network switch on each server.
You plan to deploy five virtual machines to each Hyper-V server. Each virtual machine will have a virtual network adapter that is connected to the external virtual
network switch and that has a VLAN identifier of 1.
Each virtual machine will run Windows Server 2012 R2. All of the virtual machines will run the identical web application.
You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each virtual machine to an NLB cluster. The cluster will be configured
to use unicast only.
You need to ensure that the NLB feature can distribute connections across all of the virtual machines.
Solution: On each Hyper-V server, you create a new external virtual network switch. From the properties of each virtual machine, you add a second virtual network
adapter and connect the new virtual network adapters to the new external virtual network switches.
Does this meet the goal?
A. Yes
B. No
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 22
Your network contains five servers that run Windows Server 2012 R2.
You install the Hyper-V server role on the servers. You create an external virtual network switch on each server.
You plan to deploy five virtual machines to each Hyper-V server. Each virtual machine will have a virtual network adapter that is connected to the external virtual
network switch and that has a VLAN identifier of 1.
Each virtual machine will run Windows Server 2012 R2. All of the virtual machines will run the identical web application.
You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each virtual machine to an NLB cluster. The cluster will be configured
to use unicast only.
You need to ensure that the NLB feature can distribute connections across all of the virtual machines.
Solution: On each Hyper-V server, you create a new private virtual network switch. From the properties of each virtual machine, you add a second virtual network
adapter and connect the new virtual network adapters to the new private virtual network switches.
Does this meet the goal?
A. Yes
B. No
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 23
Your network contains five servers that run Windows Server 2012 R2.
You install the Hyper-V server role on the servers. You create an external virtual network switch on each server.
You plan to deploy five virtual machines to each Hyper-V server. Each virtual machine will have a virtual network adapter that is connected to the external virtual
network switch and that has a VLAN identifier of 1.
Each virtual machine will run Windows Server 2012 R2. All of the virtual machines will run the identical web application.
You plan to install the Network Load Balancing (NLB) feature on each virtual machine and join each virtual machine to an NLB cluster. The cluster will be configured
to use unicast only.
You need to ensure that the NLB feature can distribute connections across all of the virtual machines.
Solution: From the properties of each virtual machine, you add a second virtual network adapter. You connect the new virtual network adapters to the external
virtual network switch and configure the new virtual network adapters to use a VLAN identifier of 2.
Does this meet the goal?
A. Yes
B. No
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 24
Your network contains an Active Directory domain named contoso.com. The domain contains a Microsoft System Center 2012 infrastructure.
You deploy a service named Service1 by using a service template. Service1 contains two virtual machines. The virtual machines are configured as shown in the
following table.

You need to recommend a monitoring solution to ensure that an administrator can review the availability information of Service1.
You need to recommend a monitoring solution to ensure that an administrator can review the availability information of Service1.
Solution: From Configuration Manager, you create a Collection and a Desired Configuration Management baseline.
Does this meet the goal?
A. Yes
B. No
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 25
Your network contains an Active Directory domain named contoso.com. The domain contains a Microsoft System Center 2012 infrastructure.
You deploy a service named Service1 by using a service template. Service1 contains two virtual machines. The virtual machines are configured as shown in the
following table.
You need to recommend a monitoring solution to ensure that an administrator can review the availability information of Service1.
Solution: From Configuration Manager, you create a Collection and a Desired Configuration Management baseline.
Does this meet the goal?
A. Yes
B. No
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 25
Your network contains an Active Directory domain named contoso.com. The domain contains a Microsoft System Center 2012 infrastructure.
You deploy a service named Service1 by using a service template. Service1 contains two virtual machines. The virtual machines are configured as shown in the
following table.

You need to recommend a monitoring solution to ensure that an administrator can review the availability information of Service1.
Solution: From Virtual Machine Manager (VMM), you modify the properties of the service template.
Does this meet the goal?
A. Yes
B. No
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 26
Your network contains an Active Directory domain named contoso.com. The domain contains a Microsoft System Center 2012 infrastructure.
You deploy a service named Service1 by using a service template. Service1 contains two virtual machines. The virtual machines are configured as shown in the
following table.
Solution: From Virtual Machine Manager (VMM), you modify the properties of the service template.
Does this meet the goal?
A. Yes
B. No
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 26
Your network contains an Active Directory domain named contoso.com. The domain contains a Microsoft System Center 2012 infrastructure.
You deploy a service named Service1 by using a service template. Service1 contains two virtual machines. The virtual machines are configured as shown in the
following table.

You need to recommend a monitoring solution to ensure that an administrator can review the availability information of Service1.
Solution: From Operations Manager, you create a Distributed Application and a Service Level Tracking object.
Does this meet the goal?
A. Yes
B. No
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
QUESTION 27
Your network contains an Active Directory domain named contoso.com. The domain contains a Microsoft System Center 2012 infrastructure.
You deploy a service named Service1 by using a service template. Service1 contains two virtual machines. The virtual machines are configured as shown in the
following table.
Solution: From Operations Manager, you create a Distributed Application and a Service Level Tracking object.
Does this meet the goal?
A. Yes
B. No
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
QUESTION 27
Your network contains an Active Directory domain named contoso.com. The domain contains a Microsoft System Center 2012 infrastructure.
You deploy a service named Service1 by using a service template. Service1 contains two virtual machines. The virtual machines are configured as shown in the
following table.

You need to recommend a monitoring solution to ensure that an administrator can review the availability information of Service1.
Solution: From Operations Manager, you create a Distributed Application and a Monitor Override.
Does this meet the goal?
A. Yes
B. No
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 28
Your network contains an Active Directory domain named contoso.com. The network has an Active Directory Certificate Services (AD CS) infrastructure.
You need to issue a certificate to users to meet the following requirements:
Ensure that the users can encrypt files by using Encrypting File System (EFS).
Ensure that all of the users reenroll for their certificate every six months.
Solution: You create a copy of the User certificate template, and then you modify the extensions of the copy.
Does this meet the goal?
A. Yes
B. No
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 29
Your network contains an Active Directory domain named contoso.com. The network has an Active Directory Certificate Services (AD CS) infrastructure.
You need to issue a certificate to users to meet the following requirements:
Ensure that the users can encrypt files by using Encrypting File System (EFS).
Ensure that all of the users reenroll for their certificate every six months.
Solution: From the properties of the Basic EFS template, you assign the Allow – Enroll permission to the Authenticated Users group.
Does this meet the goal?
A. Yes
B. No
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 30
Your network contains an Active Directory domain named contoso.com. The network has an Active Directory Certificate Services (AD CS) infrastructure.
You need to issue a certificate to users to meet the following requirements:
Ensure that the users can encrypt files by using Encrypting File System (EFS).
Ensure that all of the users reenroll for their certificate every six months.
Solution: You create a copy of the Basic EFS certificate template, and then you modify the validity period of the copy.
Does this meet the goal?
A. Yes
B. No
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
QUESTION 31
Your network contains an Active Directory domain named contoso.com. The network has an Active Directory Certificate Services (AD CS) infrastructure.
You need to issue a certificate to users to meet the following requirements:
Ensure that the users can encrypt files by using Encrypting File System (EFS).
Ensure that all of the users reenroll for their certificate every six months.
Solution: From the properties of the User certificate template, you assign the Allow – Enroll permission to the Authenticated Users group.
Does this meet the goal?
A. Yes
B. No
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 32
Your network contains an Active Directory forest named contoso.com. The forest contains multiple servers that run Windows Server 2012. The network contains
1,000 client computers that run Windows 7. Two hundred remote users have laptop computers and only work from home.
The network does not provide remote access to users.
You need to recommend a monitoring solution to meet the following requirements:
Generate a list of updates that are applied successfully to all computers.
Minimize the amount of bandwidth used to download updates.
An administrator must approve the installation of an update on any client computer.
What should you include in the recommendation? (Each correct answer presents part of the solution. Choose all that apply.)
A. Microsoft Asset Inventory Service (AIS)
B. Windows InTune
C. Windows Server Update Services (WSUS)
D. Active Directory Federation Services (AD FS)
E. Microsoft System Center 2012 Service Manager
Correct Answer: ABC
Section: [none]
Explanation
Explanation/Reference:
QUESTION 33
Your network contains a Microsoft System Center 2012 infrastructure.
You use Virtual Machine Manager (VMM) to manage 20 Hyper-V hosts.
You deploy a Windows Server Update Services (WSUS) server.
You need to automate the remediation of non-compliant Hyper-V hosts. The solution must minimize the amount of time that virtual machines are unavailable.
What should you do first?
A. Configure the Hyper-V hosts to download Windows updates from the WSUS server by using a Group Policy object (GPO).
B. Install the WSUS Administration console on the VMM server, and then add the WSUS server to the fabric.
C. Install the Virtual Machine Manager console on the WSUS server, and then add the WSUS server to the fabric.
D. Configure the Hyper-V hosts to download Windows updates from the VMM server by using a Group Policy object (GPO).
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 34
Your network contains an Active Directory domain named contoso.com. The domain contains a System Center 2012 R2 Virtual Machine Manager (VMM)
deployment.
The domain contains 20 Hyper-V hosts that run Windows Server 2012 R2. Currently, the computer accounts of all of the Hyper-V hosts are in organizational unit
(OU) named Virtualization.
You plan to create two private clouds by using VMM named Cloud1 and Cloud2. The virtual machines for Cloud1 will be hosted on two Hyper-V hosts named
Server1 and Server2. The virtual machines for Cloud2 will be hosted on two Hyper-V hosts named Server3 and Server4.
You need to recommend an administrative model for Cloud1 and Cloud2.
Which technology best achieves the goal? More than one answer choice may achieve the goal. Select the BEST answer.
A. Two sites and two Application Administrator (Self-Service User) user roles
B. Two host groups and two Application Administrator (Self-Service User) user roles
C. Two OUs and two Application Administrator (Self-Service User) user roles
D. Two logical units and two Tenant Administrator user roles
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 35
Your network contains an internal network and a perimeter network. The internal network contains an Active Directory domain named contoso.com. All client
computers in the perimeter network are part of a workgroup.
The internal network contains a Microsoft System Center 2012 infrastructure.
You plan to implement an update infrastructure to update the following:
Windows Server 2012
System Center 2012
Windows Server 2003
Microsoft SQL Server 2012
Third-party virtualization hosts
Microsoft SharePoint Server 2010
Another administrator recommends implementing a single WSUS server to manage all of the updates. You need to identify which updates can be applied by using
the recommended deployment of WSUS.
What should you identify? (Each correct answer presents part of the solution. Choose all that apply.)
A. SQL Server 2012
B. System Center 2012
C. SharePoint Server 2010
D. Windows Server 2012
E. Third-party virtualization hosts
F. Windows Server 2003
Correct Answer: BCDE
Section: [none]
Explanation
Explanation/Reference:
QUESTION 36
Your company has three offices. The offices are located in Seattle, London, and Tokyo.
The network contains an Active Directory domain named northwindtraders.com. Each office is configured as an Active Directory site.
System Center 2012 R2 Operations Manager is deployed to the domain. The servers in all three sites are monitored by using Operations Manager.
The company has a web site for its customers. The web site requires users to sign-in.
You need to recommend a solution to monitor the web site.
The solution must meet the following requirements:
Monitor the availability of the web site from locations in North America, Europe, Asia, and Australia.
Monitor multi-step requests to the web site.
Use a central console for monitoring.
What should you include in the recommendation?
A. Import the System Center Global Services Monitoring Management Pack and add the Web Application Availability Monitoring monitoring type.
B. Add the Web Application Transaction monitoring type and configure watcher nodes.
C. Add the TCP Port monitoring type and configure watcher nodes.
D. Import the System Center Global Services Monitor Management Pack and add the Visual Studio Web Test Monitoring monitoring type.
Correct Answer: D
Section: [none]
Explanation
Explanation/Reference:
QUESTION 37
Your network contains an Active Directory domain named contoso.com.
You plan to implement Microsoft System Center 2012.
You need to identify which solution automates the membership of security groups for contoso.com. The solution must use workflows that provide administrators
with the ability to approve the addition of members to the security groups.
Which System Center 2012 roles should you identify?
A. Configuration Manager and Orchestrator
B. Service Manager and Virtual Machine Manager (VMM)
C. Orchestrator and Service Manager
D. Operations Manager and Orchestrator
Correct Answer: C
Section: [none]
Explanation
Explanation/Reference:
QUESTION 38
Your network contains an Active Directory domain named contoso.com.
The corporate security policy states that when new user accounts, computer accounts, and contacts are added to an organizational unit (OU) named Secure, the
addition must be audited.
You need to recommend an auditing solution to meet the security policy.
What should you include in the recommendation? (Each answer presents part of the solution. Choose all that apply.)
A. From the Default Domain Controllers Policy, enable the Audit directory services setting.
B. Create a new Group Policy object (GPO) that is linked to the Secure OU, and then modify the Audit directory services setting.
C. From the Secure OU, modify the Auditing settings.
D. From the Default Domain Controllers Policy, enable the Audit object access setting.
E. From the Secure OU, modify the Permissions settings.
F. Create a new Group Policy object (GPO) that is linked to the Secure OU, and then modify the Audit object access setting.
Correct Answer: AB
Section: [none]
Explanation
Explanation/Reference:
QUESTION 39
You have a System Center 2012 R2 Configuration Manager deployment.
All users have client computers that run Windows 8.1. The users log on to their client computer as standard users.
An application named App1 is deployed to the client computers by using System Center.
You need to recommend a solution to validate a registry key used by App1. If the registry key has an incorrect value, the value must be changed. The registry key
must be validated every day. The solution must generate a report on non-compliant computers.
What is the best approach to achieve the goal? More than one answer choice may achieve the goal. Select the BEST answer.
A. Group Policy preferences
B. A desired configuration baseline
C. The Windows PowerShell Desired State Configuration (DSC) feature
D. The Microsoft Baseline Security Analyzer (MBSA)
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 40
Your network contains 20 servers that run Windows Server 2012. The servers have the Hyper-V server role installed.
You plan to deploy a management solution.
You need to recommend which Microsoft System Center 2012 roles must be deployed to meet the following requirements:
An administrator must be notified when an incident occurs, such as a serious error in the event log, on a Hyper-V host, or on a virtual machine.
An administrator must be able to assign an incident to a specific administrator for resolution.
An incident that remains unresolved for more than 10 hours must be escalated automatically to another administrator.
Administrators must be able to generate reports that contain the details of incidents and escalations.
Which System Center 2012 roles should you recommend? More than one answer choice may achieve the goal. Select the BEST answer.
A. Operations Manager and Orchestrator
B. Operations Manager and Service Manager
C. Configuration Manager and Service Manager
D. Service Manager and Virtual Machine Manager (VMM)
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 41
Your company has a main office and a branch office. Each office contains several hundred computers that run Windows 2012.
You plan to deploy two Windows Server Update Services (WSUS) servers. The WSUS servers will be configured as shown in the following table.
Solution: From Operations Manager, you create a Distributed Application and a Monitor Override.
Does this meet the goal?
A. Yes
B. No
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 28
Your network contains an Active Directory domain named contoso.com. The network has an Active Directory Certificate Services (AD CS) infrastructure.
You need to issue a certificate to users to meet the following requirements:
Ensure that the users can encrypt files by using Encrypting File System (EFS).
Ensure that all of the users reenroll for their certificate every six months.
Solution: You create a copy of the User certificate template, and then you modify the extensions of the copy.
Does this meet the goal?
A. Yes
B. No
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 29
Your network contains an Active Directory domain named contoso.com. The network has an Active Directory Certificate Services (AD CS) infrastructure.
You need to issue a certificate to users to meet the following requirements:
Ensure that the users can encrypt files by using Encrypting File System (EFS).
Ensure that all of the users reenroll for their certificate every six months.
Solution: From the properties of the Basic EFS template, you assign the Allow – Enroll permission to the Authenticated Users group.
Does this meet the goal?
A. Yes
B. No
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 30
Your network contains an Active Directory domain named contoso.com. The network has an Active Directory Certificate Services (AD CS) infrastructure.
You need to issue a certificate to users to meet the following requirements:
Ensure that the users can encrypt files by using Encrypting File System (EFS).
Ensure that all of the users reenroll for their certificate every six months.
Solution: You create a copy of the Basic EFS certificate template, and then you modify the validity period of the copy.
Does this meet the goal?
A. Yes
B. No
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
QUESTION 31
Your network contains an Active Directory domain named contoso.com. The network has an Active Directory Certificate Services (AD CS) infrastructure.
You need to issue a certificate to users to meet the following requirements:
Ensure that the users can encrypt files by using Encrypting File System (EFS).
Ensure that all of the users reenroll for their certificate every six months.
Solution: From the properties of the User certificate template, you assign the Allow – Enroll permission to the Authenticated Users group.
Does this meet the goal?
A. Yes
B. No
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 32
Your network contains an Active Directory forest named contoso.com. The forest contains multiple servers that run Windows Server 2012. The network contains
1,000 client computers that run Windows 7. Two hundred remote users have laptop computers and only work from home.
The network does not provide remote access to users.
You need to recommend a monitoring solution to meet the following requirements:
Generate a list of updates that are applied successfully to all computers.
Minimize the amount of bandwidth used to download updates.
An administrator must approve the installation of an update on any client computer.
What should you include in the recommendation? (Each correct answer presents part of the solution. Choose all that apply.)
A. Microsoft Asset Inventory Service (AIS)
B. Windows InTune
C. Windows Server Update Services (WSUS)
D. Active Directory Federation Services (AD FS)
E. Microsoft System Center 2012 Service Manager
Correct Answer: ABC
Section: [none]
Explanation
Explanation/Reference:
QUESTION 33
Your network contains a Microsoft System Center 2012 infrastructure.
You use Virtual Machine Manager (VMM) to manage 20 Hyper-V hosts.
You deploy a Windows Server Update Services (WSUS) server.
You need to automate the remediation of non-compliant Hyper-V hosts. The solution must minimize the amount of time that virtual machines are unavailable.
What should you do first?
A. Configure the Hyper-V hosts to download Windows updates from the WSUS server by using a Group Policy object (GPO).
B. Install the WSUS Administration console on the VMM server, and then add the WSUS server to the fabric.
C. Install the Virtual Machine Manager console on the WSUS server, and then add the WSUS server to the fabric.
D. Configure the Hyper-V hosts to download Windows updates from the VMM server by using a Group Policy object (GPO).
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 34
Your network contains an Active Directory domain named contoso.com. The domain contains a System Center 2012 R2 Virtual Machine Manager (VMM)
deployment.
The domain contains 20 Hyper-V hosts that run Windows Server 2012 R2. Currently, the computer accounts of all of the Hyper-V hosts are in organizational unit
(OU) named Virtualization.
You plan to create two private clouds by using VMM named Cloud1 and Cloud2. The virtual machines for Cloud1 will be hosted on two Hyper-V hosts named
Server1 and Server2. The virtual machines for Cloud2 will be hosted on two Hyper-V hosts named Server3 and Server4.
You need to recommend an administrative model for Cloud1 and Cloud2.
Which technology best achieves the goal? More than one answer choice may achieve the goal. Select the BEST answer.
A. Two sites and two Application Administrator (Self-Service User) user roles
B. Two host groups and two Application Administrator (Self-Service User) user roles
C. Two OUs and two Application Administrator (Self-Service User) user roles
D. Two logical units and two Tenant Administrator user roles
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 35
Your network contains an internal network and a perimeter network. The internal network contains an Active Directory domain named contoso.com. All client
computers in the perimeter network are part of a workgroup.
The internal network contains a Microsoft System Center 2012 infrastructure.
You plan to implement an update infrastructure to update the following:
Windows Server 2012
System Center 2012
Windows Server 2003
Microsoft SQL Server 2012
Third-party virtualization hosts
Microsoft SharePoint Server 2010
Another administrator recommends implementing a single WSUS server to manage all of the updates. You need to identify which updates can be applied by using
the recommended deployment of WSUS.
What should you identify? (Each correct answer presents part of the solution. Choose all that apply.)
A. SQL Server 2012
B. System Center 2012
C. SharePoint Server 2010
D. Windows Server 2012
E. Third-party virtualization hosts
F. Windows Server 2003
Correct Answer: BCDE
Section: [none]
Explanation
Explanation/Reference:
QUESTION 36
Your company has three offices. The offices are located in Seattle, London, and Tokyo.
The network contains an Active Directory domain named northwindtraders.com. Each office is configured as an Active Directory site.
System Center 2012 R2 Operations Manager is deployed to the domain. The servers in all three sites are monitored by using Operations Manager.
The company has a web site for its customers. The web site requires users to sign-in.
You need to recommend a solution to monitor the web site.
The solution must meet the following requirements:
Monitor the availability of the web site from locations in North America, Europe, Asia, and Australia.
Monitor multi-step requests to the web site.
Use a central console for monitoring.
What should you include in the recommendation?
A. Import the System Center Global Services Monitoring Management Pack and add the Web Application Availability Monitoring monitoring type.
B. Add the Web Application Transaction monitoring type and configure watcher nodes.
C. Add the TCP Port monitoring type and configure watcher nodes.
D. Import the System Center Global Services Monitor Management Pack and add the Visual Studio Web Test Monitoring monitoring type.
Correct Answer: D
Section: [none]
Explanation
Explanation/Reference:
QUESTION 37
Your network contains an Active Directory domain named contoso.com.
You plan to implement Microsoft System Center 2012.
You need to identify which solution automates the membership of security groups for contoso.com. The solution must use workflows that provide administrators
with the ability to approve the addition of members to the security groups.
Which System Center 2012 roles should you identify?
A. Configuration Manager and Orchestrator
B. Service Manager and Virtual Machine Manager (VMM)
C. Orchestrator and Service Manager
D. Operations Manager and Orchestrator
Correct Answer: C
Section: [none]
Explanation
Explanation/Reference:
QUESTION 38
Your network contains an Active Directory domain named contoso.com.
The corporate security policy states that when new user accounts, computer accounts, and contacts are added to an organizational unit (OU) named Secure, the
addition must be audited.
You need to recommend an auditing solution to meet the security policy.
What should you include in the recommendation? (Each answer presents part of the solution. Choose all that apply.)
A. From the Default Domain Controllers Policy, enable the Audit directory services setting.
B. Create a new Group Policy object (GPO) that is linked to the Secure OU, and then modify the Audit directory services setting.
C. From the Secure OU, modify the Auditing settings.
D. From the Default Domain Controllers Policy, enable the Audit object access setting.
E. From the Secure OU, modify the Permissions settings.
F. Create a new Group Policy object (GPO) that is linked to the Secure OU, and then modify the Audit object access setting.
Correct Answer: AB
Section: [none]
Explanation
Explanation/Reference:
QUESTION 39
You have a System Center 2012 R2 Configuration Manager deployment.
All users have client computers that run Windows 8.1. The users log on to their client computer as standard users.
An application named App1 is deployed to the client computers by using System Center.
You need to recommend a solution to validate a registry key used by App1. If the registry key has an incorrect value, the value must be changed. The registry key
must be validated every day. The solution must generate a report on non-compliant computers.
What is the best approach to achieve the goal? More than one answer choice may achieve the goal. Select the BEST answer.
A. Group Policy preferences
B. A desired configuration baseline
C. The Windows PowerShell Desired State Configuration (DSC) feature
D. The Microsoft Baseline Security Analyzer (MBSA)
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 40
Your network contains 20 servers that run Windows Server 2012. The servers have the Hyper-V server role installed.
You plan to deploy a management solution.
You need to recommend which Microsoft System Center 2012 roles must be deployed to meet the following requirements:
An administrator must be notified when an incident occurs, such as a serious error in the event log, on a Hyper-V host, or on a virtual machine.
An administrator must be able to assign an incident to a specific administrator for resolution.
An incident that remains unresolved for more than 10 hours must be escalated automatically to another administrator.
Administrators must be able to generate reports that contain the details of incidents and escalations.
Which System Center 2012 roles should you recommend? More than one answer choice may achieve the goal. Select the BEST answer.
A. Operations Manager and Orchestrator
B. Operations Manager and Service Manager
C. Configuration Manager and Service Manager
D. Service Manager and Virtual Machine Manager (VMM)
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 41
Your company has a main office and a branch office. Each office contains several hundred computers that run Windows 2012.
You plan to deploy two Windows Server Update Services (WSUS) servers. The WSUS servers will be configured as shown in the following table.

You need to implement the WSUS infrastructure to meet the following requirements:
All updates must be approved from a server in the main office.
All client computers must connect to a WSUS server in their local office.
What should you do? (Each correct answer presents part of the solution. Choose all that apply.
A. Deploy a Group Policy object (GPO) that has the update location set to Server1.
B. On Server2, configure WSUS in Replica mode.
C. On Server1, configure WSUS in Replica mode.
D. On Server2, configure WSUS in Autonomous mode.
E. Deploy a Group Policy object (GPO) that has the update location set to Server2.
F. On Server1, configure WSUS in Autonomous mode.
Correct Answer: ABEF
Section: [none]
Explanation
Explanation/Reference:
QUESTION 42
Your company has a human resources department, a finance department, a sales department and an R&D department.
The company audits the access of documents that contain department-specific sensitive information.
You are planning an administrative model for the departments to meet the following requirements:
Provide R&D managers with the ability to back up all the files of their department only.
Provide finance managers with the ability to view the audit logs for the files of their department only.
Provide human resources managers with the ability to view the audit logs for the files of their department only.
Provide sales managers with the ability to modify the permissions on all the shared folders of their department only.
You need to identify the minimum amount of file servers required on the network to meet the requirements of each department.
How many file servers should you identify?
A. 1
B. 2
C. 3
D. 4
Correct Answer: C
Section: [none]
Explanation
Explanation/Reference:
QUESTION 43
Your network contains an Active Directory domain named contoso.com. The network contains two servers named Server1 and Server2.
You deploy Active Directory Certificate Services (AD CS). The certification authority (CA) is configured as shown in the exhibit. (Click the Exhibit button.)
All updates must be approved from a server in the main office.
All client computers must connect to a WSUS server in their local office.
What should you do? (Each correct answer presents part of the solution. Choose all that apply.
A. Deploy a Group Policy object (GPO) that has the update location set to Server1.
B. On Server2, configure WSUS in Replica mode.
C. On Server1, configure WSUS in Replica mode.
D. On Server2, configure WSUS in Autonomous mode.
E. Deploy a Group Policy object (GPO) that has the update location set to Server2.
F. On Server1, configure WSUS in Autonomous mode.
Correct Answer: ABEF
Section: [none]
Explanation
Explanation/Reference:
QUESTION 42
Your company has a human resources department, a finance department, a sales department and an R&D department.
The company audits the access of documents that contain department-specific sensitive information.
You are planning an administrative model for the departments to meet the following requirements:
Provide R&D managers with the ability to back up all the files of their department only.
Provide finance managers with the ability to view the audit logs for the files of their department only.
Provide human resources managers with the ability to view the audit logs for the files of their department only.
Provide sales managers with the ability to modify the permissions on all the shared folders of their department only.
You need to identify the minimum amount of file servers required on the network to meet the requirements of each department.
How many file servers should you identify?
A. 1
B. 2
C. 3
D. 4
Correct Answer: C
Section: [none]
Explanation
Explanation/Reference:
QUESTION 43
Your network contains an Active Directory domain named contoso.com. The network contains two servers named Server1 and Server2.
You deploy Active Directory Certificate Services (AD CS). The certification authority (CA) is configured as shown in the exhibit. (Click the Exhibit button.)

You need to ensure that you can issue certificates based on certificate templates.
What should you do?
A. On Server1, install the Network Device Enrollment Service role service.
B. Configure Server2 as a standalone subordinate CA.
C. On Server1, uninstall, and then reinstall AD CS.
D. On Server1, run the Add-CertificateEnrollmentPolicyServer cmdlet.
Correct Answer: C
Section: [none]
Explanation
Explanation/Reference:
Explanation:
In a typical CA infrastructure the Stand-alone CAs are primarily intended to be used as Trusted Offline RootCAs in a CA hierarchy or when extranets and the
Internet are involved. In a stand-alone CA Certificate templates are not used. An enterprise CA uses certificate types, which are based on a certificate template.
QUESTION 44
Your network contains an Active Directory forest named contoso.com.
Your company works with a partner company that has an Active Directory forest named fabrikam.com. Both forests contain domain controllers that run only
Windows Server 2012 R2.
The certification authority (CA) infrastructure of both companies is configured as shown in the following table.
What should you do?
A. On Server1, install the Network Device Enrollment Service role service.
B. Configure Server2 as a standalone subordinate CA.
C. On Server1, uninstall, and then reinstall AD CS.
D. On Server1, run the Add-CertificateEnrollmentPolicyServer cmdlet.
Correct Answer: C
Section: [none]
Explanation
Explanation/Reference:
Explanation:
In a typical CA infrastructure the Stand-alone CAs are primarily intended to be used as Trusted Offline RootCAs in a CA hierarchy or when extranets and the
Internet are involved. In a stand-alone CA Certificate templates are not used. An enterprise CA uses certificate types, which are based on a certificate template.
QUESTION 44
Your network contains an Active Directory forest named contoso.com.
Your company works with a partner company that has an Active Directory forest named fabrikam.com. Both forests contain domain controllers that run only
Windows Server 2012 R2.
The certification authority (CA) infrastructure of both companies is configured as shown in the following table.

You need to recommend a certificate solution that meets the following requirements:
Server authentication certificates issued from fabrikam.com must be trusted automatically by the computers in contoso.com.
The computers in contoso.com must not trust automatically any other type of certificates issued from the CA hierarchy in fabrikam.com.
What should you include in the recommendation?
A. Deploy a Group Policy object (GPO) that defines intermediate CAs. Import a certificate that has an application policy object identifier (OID) of CA Encryption
Certificate.
B. Deploy a Group Policy object (GPO) that defines an enterprise trust. Import a certificate that has an application policy object identifier (OID) of Microsoft Trust
List Signing.
C. Deploy a Group Policy object (GPO) that defines an enterprise trust. Import a certificate that has an application policy object identifier (OID) of CA Encryption
Certificate.
D. Deploy a Group Policy object (GPO) that defines intermediate CAs. Import a certificate that has an application policy object identifier (OID) of Microsoft Trust List
Signing.
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 45
Your network contains an Active Directory domain named contoso.com.
Your company has an enterprise root certification authority (CA) named CA1.
You plan to deploy Active Directory Federation Services (AD FS) to a server named Server1.
The company purchases a Microsoft Office 365 subscription.
You plan to register the company’s SMTP domain for Office 365 and to configure single sign-on for all users.
You need to identify which certificate or certificates are required for the planned deployment.
Which certificate or certificates should you identify? (Each correct answer presents a complete solution. Choose all that apply.)
A. a server authentication certificate that is issued by a trusted third-party root CA and that contains the subject name serverl.contoso.com
B. a server authentication certificate that is issued by CA1 and that contains the subject name Server1
C. a server authentication certificate that is issued by a trusted third-party root CA and that contains the subject name Server1
D. a server authentication certificate that is issued by CA1 and that contains the subject name serverl.contoso.com
E. self-signed server authentication certificates for server1.contoso.com
Correct Answer: DE
Section: [none]
Explanation
Explanation/Reference:
QUESTION 46
Your network contains five Active Directory forests.
You plan to protect the resources in one of the forests by using Active Directory Rights Management Services (AD RMS).
Users in all of the forests will access the protected resources.
You need to identify the minimum number of AD RMS clusters required for the planned deployment.
What should you identify?
A. Five root clusters
B. Five licensing clusters
C. One licensing cluster and five root clusters
D. One root cluster and five licensing clusters
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
QUESTION 47
DRAG DROP
Your network contains an Active Directory domain named contoso.com. The domain contains two domain controllers named DC1 and DC2. The domain contains a
server named Server1.
Server1 is a certification authority (CA). All servers run Windows Server 2012 R2.
You plan to deploy BitLocker Drive Encryption (BitLocker) to all client computers. The unique identifier for your organization is set to Contoso.
You need to ensure that you can recover the BitLocker encrypted data by using a BitLocker data recovery agent. You must be able to perform the recovery from any
administrative computer.
Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the
correct order.
Select and Place:
Server authentication certificates issued from fabrikam.com must be trusted automatically by the computers in contoso.com.
The computers in contoso.com must not trust automatically any other type of certificates issued from the CA hierarchy in fabrikam.com.
What should you include in the recommendation?
A. Deploy a Group Policy object (GPO) that defines intermediate CAs. Import a certificate that has an application policy object identifier (OID) of CA Encryption
Certificate.
B. Deploy a Group Policy object (GPO) that defines an enterprise trust. Import a certificate that has an application policy object identifier (OID) of Microsoft Trust
List Signing.
C. Deploy a Group Policy object (GPO) that defines an enterprise trust. Import a certificate that has an application policy object identifier (OID) of CA Encryption
Certificate.
D. Deploy a Group Policy object (GPO) that defines intermediate CAs. Import a certificate that has an application policy object identifier (OID) of Microsoft Trust List
Signing.
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 45
Your network contains an Active Directory domain named contoso.com.
Your company has an enterprise root certification authority (CA) named CA1.
You plan to deploy Active Directory Federation Services (AD FS) to a server named Server1.
The company purchases a Microsoft Office 365 subscription.
You plan to register the company’s SMTP domain for Office 365 and to configure single sign-on for all users.
You need to identify which certificate or certificates are required for the planned deployment.
Which certificate or certificates should you identify? (Each correct answer presents a complete solution. Choose all that apply.)
A. a server authentication certificate that is issued by a trusted third-party root CA and that contains the subject name serverl.contoso.com
B. a server authentication certificate that is issued by CA1 and that contains the subject name Server1
C. a server authentication certificate that is issued by a trusted third-party root CA and that contains the subject name Server1
D. a server authentication certificate that is issued by CA1 and that contains the subject name serverl.contoso.com
E. self-signed server authentication certificates for server1.contoso.com
Correct Answer: DE
Section: [none]
Explanation
Explanation/Reference:
QUESTION 46
Your network contains five Active Directory forests.
You plan to protect the resources in one of the forests by using Active Directory Rights Management Services (AD RMS).
Users in all of the forests will access the protected resources.
You need to identify the minimum number of AD RMS clusters required for the planned deployment.
What should you identify?
A. Five root clusters
B. Five licensing clusters
C. One licensing cluster and five root clusters
D. One root cluster and five licensing clusters
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
QUESTION 47
DRAG DROP
Your network contains an Active Directory domain named contoso.com. The domain contains two domain controllers named DC1 and DC2. The domain contains a
server named Server1.
Server1 is a certification authority (CA). All servers run Windows Server 2012 R2.
You plan to deploy BitLocker Drive Encryption (BitLocker) to all client computers. The unique identifier for your organization is set to Contoso.
You need to ensure that you can recover the BitLocker encrypted data by using a BitLocker data recovery agent. You must be able to perform the recovery from any
administrative computer.
Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the
correct order.
Select and Place:

Correct Answer:

Section: [none]
Explanation
Explanation/Reference:
QUESTION 48
Your network contains an Active Directory domain named contoso.com. The network contains a perimeter network. The perimeter network and the internal network
are separated by a firewall.
On the perimeter network, you deploy a server named Server1 that runs Windows Server 2012.
You deploy Active Directory Certificate Services (AD CS).
Each user is issued a smart card.
Users report that when they work remotely, they are unable to renew their smart card certificate.
You need to recommend a solution to ensure that the users can renew their smart card certificate from the Internet.
What should you recommend implementing on Server1?
More than one answer choice may achieve the goal. Select the BEST answer.
A. The Certificate Enrollment Policy Web Service role service and the Certificate Enrollment Web Service role service
B. The Active Directory Federation Services server role
C. An additional certification authority (CA) and the Online Responder role service
D. The Certification Authority Web Enrollment role service and the Online Responder role service
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
QUESTION 49
Your network contains an Active Directory domain named contoso.com.
You plan to deploy an Active Directory Federation Services (AD FS) farm that will contain eight federation servers.
You need to identify which technology or technologies must be deployed on the network before you install the federation servers.
Which technology or technologies should you identify? (Each correct answer presents part of the solution. Choose all that apply.)
A. Network Load Balancing (NLB)
B. Microsoft Forefront Identity Manager (FIM) 2010
C. The Windows Internal Database feature
D. Microsoft SQL Server 2012
E. The Windows Identity Foundation 3.5 feature
Correct Answer: AD
Section: [none]
Explanation
Explanation/Reference:
Explanation:
Best practices for deploying a federation server farm. We recommend the following best practices for deploying a federation server in a production environment:
* (A) Use NLB or some other form of clustering to allocate a single IP address for many federation server computers.
* (D) If the AD FS configuration database will be stored in a SQL database, avoid editing the SQL database from multiple federation servers at the same time.
* If you will be deploying multiple federation servers at the same time or you know that you will be adding more servers to the farm over time, consider creating a
server image of an existing federation server in the farm and then installing from that image when you need to create additional federation servers quickly.
* Reserve a static IP address for each federation server in the farm and, depending on your Domain Name System (DNS) configuration, insert an exclusion for each
IP address in Dynamic Host Configuration Protocol (DHCP). Microsoft NLB technology requires that each server that participates in the NLB cluster be assigned a
static IP address.
Reference: When to Create a Federation Server Farm
QUESTION 50
HOTSPOT
You plan to deploy a certification authority (CA) infrastructure that contains the following servers:
An offline standalone root CA named CA1
An enterprise subordinate CA named CA2
On all of the computers, you import the root CA certificate from CA1 to the Trusted Root Certification Authorities Certificates store.
You need to ensure that CA2 can issue certificates for the CA hierarchy.
What should you do? To answer, select the appropriate options in the answer area.
Hot Area:
Explanation
Explanation/Reference:
QUESTION 48
Your network contains an Active Directory domain named contoso.com. The network contains a perimeter network. The perimeter network and the internal network
are separated by a firewall.
On the perimeter network, you deploy a server named Server1 that runs Windows Server 2012.
You deploy Active Directory Certificate Services (AD CS).
Each user is issued a smart card.
Users report that when they work remotely, they are unable to renew their smart card certificate.
You need to recommend a solution to ensure that the users can renew their smart card certificate from the Internet.
What should you recommend implementing on Server1?
More than one answer choice may achieve the goal. Select the BEST answer.
A. The Certificate Enrollment Policy Web Service role service and the Certificate Enrollment Web Service role service
B. The Active Directory Federation Services server role
C. An additional certification authority (CA) and the Online Responder role service
D. The Certification Authority Web Enrollment role service and the Online Responder role service
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
QUESTION 49
Your network contains an Active Directory domain named contoso.com.
You plan to deploy an Active Directory Federation Services (AD FS) farm that will contain eight federation servers.
You need to identify which technology or technologies must be deployed on the network before you install the federation servers.
Which technology or technologies should you identify? (Each correct answer presents part of the solution. Choose all that apply.)
A. Network Load Balancing (NLB)
B. Microsoft Forefront Identity Manager (FIM) 2010
C. The Windows Internal Database feature
D. Microsoft SQL Server 2012
E. The Windows Identity Foundation 3.5 feature
Correct Answer: AD
Section: [none]
Explanation
Explanation/Reference:
Explanation:
Best practices for deploying a federation server farm. We recommend the following best practices for deploying a federation server in a production environment:
* (A) Use NLB or some other form of clustering to allocate a single IP address for many federation server computers.
* (D) If the AD FS configuration database will be stored in a SQL database, avoid editing the SQL database from multiple federation servers at the same time.
* If you will be deploying multiple federation servers at the same time or you know that you will be adding more servers to the farm over time, consider creating a
server image of an existing federation server in the farm and then installing from that image when you need to create additional federation servers quickly.
* Reserve a static IP address for each federation server in the farm and, depending on your Domain Name System (DNS) configuration, insert an exclusion for each
IP address in Dynamic Host Configuration Protocol (DHCP). Microsoft NLB technology requires that each server that participates in the NLB cluster be assigned a
static IP address.
Reference: When to Create a Federation Server Farm
QUESTION 50
HOTSPOT
You plan to deploy a certification authority (CA) infrastructure that contains the following servers:
An offline standalone root CA named CA1
An enterprise subordinate CA named CA2
On all of the computers, you import the root CA certificate from CA1 to the Trusted Root Certification Authorities Certificates store.
You need to ensure that CA2 can issue certificates for the CA hierarchy.
What should you do? To answer, select the appropriate options in the answer area.
Hot Area:

Correct Answer:

Section: [none]
Explanation
Explanation/Reference:
QUESTION 51
Your network contains an Active Directory domain named contoso.com.
You deploy Active Directory Certificate Services (AD CS).
Your company, which is named Contoso, Ltd., has a partner company named Fabrikam, Inc. Fabrikam also deploys AD CS.
Contoso and Fabrikam plan to exchange signed and encrypted email messages.
You need to ensure that the client computers in both Contoso and Fabrikam trust each other’s email certificates. The solution must prevent other certificates from
being trusted and minimize administrative effort.
What should you do?
More than one answer choice may achieve the goal. Select the BEST answer.
A. Implement an online responder in each company.
B. Exchange the root certification authority (CA) certificates of both companies, and then deploy the certificates to the Enterprise Trust store by using Group Policy
objects (GPOs).
C. Implement cross-certification in each company.
D. Exchange the root certification authority (CA) certificates of both companies, and then deploy the certificates to the Trusted Root Certification Authorities store
by using Group Policy objects (GPOs).
Correct Answer: C
Section: [none]
Explanation
Explanation/Reference:
QUESTION 52
Your network contains a Hyper-V host named Host1. Host1 hosts 25 virtual machines.
All of the virtual machines are configured to start automatically when Host1 restarts.
You discover that some of the virtual machines fail to start automatically when Host1 restarts and require an administrator to start them manually.
You need to modify the settings of the virtual machines to ensure that they automatically restart when Host1 restarts.
Which settings should you modify?
A. Maximum RAM
B. Minimum RAM
C. Memory weight
D. Startup RAM
Correct Answer: D
Section: [none]
Explanation
Explanation/Reference:
QUESTION 53
HOTSPOT
Your network contains five physical servers. The servers are configured as shown in the following table.
Explanation
Explanation/Reference:
QUESTION 51
Your network contains an Active Directory domain named contoso.com.
You deploy Active Directory Certificate Services (AD CS).
Your company, which is named Contoso, Ltd., has a partner company named Fabrikam, Inc. Fabrikam also deploys AD CS.
Contoso and Fabrikam plan to exchange signed and encrypted email messages.
You need to ensure that the client computers in both Contoso and Fabrikam trust each other’s email certificates. The solution must prevent other certificates from
being trusted and minimize administrative effort.
What should you do?
More than one answer choice may achieve the goal. Select the BEST answer.
A. Implement an online responder in each company.
B. Exchange the root certification authority (CA) certificates of both companies, and then deploy the certificates to the Enterprise Trust store by using Group Policy
objects (GPOs).
C. Implement cross-certification in each company.
D. Exchange the root certification authority (CA) certificates of both companies, and then deploy the certificates to the Trusted Root Certification Authorities store
by using Group Policy objects (GPOs).
Correct Answer: C
Section: [none]
Explanation
Explanation/Reference:
QUESTION 52
Your network contains a Hyper-V host named Host1. Host1 hosts 25 virtual machines.
All of the virtual machines are configured to start automatically when Host1 restarts.
You discover that some of the virtual machines fail to start automatically when Host1 restarts and require an administrator to start them manually.
You need to modify the settings of the virtual machines to ensure that they automatically restart when Host1 restarts.
Which settings should you modify?
A. Maximum RAM
B. Minimum RAM
C. Memory weight
D. Startup RAM
Correct Answer: D
Section: [none]
Explanation
Explanation/Reference:
QUESTION 53
HOTSPOT
Your network contains five physical servers. The servers are configured as shown in the following table.

All servers run Windows Server 2012 R2.
During the setup of VMM, you configure distributed key management.
You need to ensure that the entire VMM infrastructure can be restored.
What should you include in the backup plan? To answer, select the appropriate server to back up for each backup content type in the answer.
Hot Area:
During the setup of VMM, you configure distributed key management.
You need to ensure that the entire VMM infrastructure can be restored.
What should you include in the backup plan? To answer, select the appropriate server to back up for each backup content type in the answer.
Hot Area:

Correct Answer:

Section: [none]
Explanation
Explanation/Reference:
QUESTION 54
Your network contains four clusters. The clusters are configured as shown in the following table.
Explanation
Explanation/Reference:
QUESTION 54
Your network contains four clusters. The clusters are configured as shown in the following table.

You manage all of the clusters by using Microsoft System Center 2012 Virtual Machine Manager (VMM). You plan to implement Dynamic Optimization for the virtual
machines.
You need to recommend a configuration for the planned implementation.
What should you recommend?
A. Dynamic Optimization on Cluster2 and Cluster4 only
Virtual machines that are balanced across the clusters
B. Dynamic Optimization on Cluster1 and Cluster2 only
Virtual machines that are balanced across the nodes in the clusters
C. Dynamic Optimization on all of the clusters
Virtual machines that are balanced across the nodes in the clusters
D. Dynamic Optimization on all of the clusters
Virtual machines that are balanced across the clusters
Correct Answer: C
Section: [none]
Explanation
Explanation/Reference:
QUESTION 55
Your network contains a Microsoft System Center 2012 Virtual Machine Manager (VMM) server named Server1.
You use Server1 to manage 20 Hyper-V hosts.
The network also contains five Citrix XenServer virtualization hosts.
You need to recommend which installation is required to manage the XenServer servers from Server1.
What should you recommend installing?
A. The Citrix XenServer – Microsoft System Center Integration Pack on the Citrix XenServer hosts
B. The Citrix XenServer – Microsoft System Center Integration Pack on Server1
C. Citrix Essentials for Hyper-V on Server1
D. Citrix Essentials for Hyper-V on the Citrix XenServer hosts
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
QUESTION 56
HOTSPOT
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. System Center 2012 R2 Virtual Machine
Manager (VMM) is deployed to the domain.
In VMM, you create a host group named HostGroup1. You add a 16-node Hyper-V failover cluster to HostGroup1. From Windows PowerShell, you run the following
commands:
machines.
You need to recommend a configuration for the planned implementation.
What should you recommend?
A. Dynamic Optimization on Cluster2 and Cluster4 only
Virtual machines that are balanced across the clusters
B. Dynamic Optimization on Cluster1 and Cluster2 only
Virtual machines that are balanced across the nodes in the clusters
C. Dynamic Optimization on all of the clusters
Virtual machines that are balanced across the nodes in the clusters
D. Dynamic Optimization on all of the clusters
Virtual machines that are balanced across the clusters
Correct Answer: C
Section: [none]
Explanation
Explanation/Reference:
QUESTION 55
Your network contains a Microsoft System Center 2012 Virtual Machine Manager (VMM) server named Server1.
You use Server1 to manage 20 Hyper-V hosts.
The network also contains five Citrix XenServer virtualization hosts.
You need to recommend which installation is required to manage the XenServer servers from Server1.
What should you recommend installing?
A. The Citrix XenServer – Microsoft System Center Integration Pack on the Citrix XenServer hosts
B. The Citrix XenServer – Microsoft System Center Integration Pack on Server1
C. Citrix Essentials for Hyper-V on Server1
D. Citrix Essentials for Hyper-V on the Citrix XenServer hosts
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
QUESTION 56
HOTSPOT
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. System Center 2012 R2 Virtual Machine
Manager (VMM) is deployed to the domain.
In VMM, you create a host group named HostGroup1. You add a 16-node Hyper-V failover cluster to HostGroup1. From Windows PowerShell, you run the following
commands:

Use the drop-down menus to select the answer choice that completes each statement.
Hot Area:
Hot Area:

Correct Answer:

Section: [none]
Explanation
Explanation/Reference:
QUESTION 57
DRAG DROP
Your network contains an Active Directory domain named contoso.com. The domain contains multiple servers that are configured as Hyper-V hosts.
You plan to implement four virtual machines. The virtual machines will be configured as shown in the following table.
Explanation
Explanation/Reference:
QUESTION 57
DRAG DROP
Your network contains an Active Directory domain named contoso.com. The domain contains multiple servers that are configured as Hyper-V hosts.
You plan to implement four virtual machines. The virtual machines will be configured as shown in the following table.

You need to identify which network must be added to each virtual machine.
Which network types should you identify?
To answer, drag the appropriate Network Type to the correct virtual machine in the answer area. Each Network Type may be used once, more than once, or not at
all. Additionally, you may need to drag the split bar between panes or scroll to view content.
Select and Place:
Which network types should you identify?
To answer, drag the appropriate Network Type to the correct virtual machine in the answer area. Each Network Type may be used once, more than once, or not at
all. Additionally, you may need to drag the split bar between panes or scroll to view content.
Select and Place:

Correct Answer:

Section: [none]
Explanation
Explanation/Reference:
Explanation:
http://blogs.technet.com/b/jhoward/archive/2008/06/17/hyper-v-what-are-the-uses-for-different-types-of-virtual-networks.aspx
An external network, which provides communication between a virtual machine and a physical network by creating an association to a physical network adapter on
the virtualization server.
An internal network, which provides communication between the virtualization server and virtual machines.
A private network, which provides communication between virtual machines only.
Reference: http://technet.microsoft.com/en-us/library/cc732470%28v=WS.10%29.aspx
QUESTION 58
Your network contains multiple servers that run Windows Server 2012.
The network contains a Storage Area Network (SAN) that only supports Fibre Channel connections.
You have two failover clusters. The failover clusters are configured as shown in the following table.
Explanation
Explanation/Reference:
Explanation:
http://blogs.technet.com/b/jhoward/archive/2008/06/17/hyper-v-what-are-the-uses-for-different-types-of-virtual-networks.aspx
An external network, which provides communication between a virtual machine and a physical network by creating an association to a physical network adapter on
the virtualization server.
An internal network, which provides communication between the virtualization server and virtual machines.
A private network, which provides communication between virtual machines only.
Reference: http://technet.microsoft.com/en-us/library/cc732470%28v=WS.10%29.aspx
QUESTION 58
Your network contains multiple servers that run Windows Server 2012.
The network contains a Storage Area Network (SAN) that only supports Fibre Channel connections.
You have two failover clusters. The failover clusters are configured as shown in the following table.

Only the members of Cluster1 can connect to the SAN.
You plan to implement 15 highly available virtual machines on Cluster2. All of the virtual machines will be stored in a single shared folder.
You need to ensure that the VHD files of the virtual machines can be stored on the SAN.
What should you do? (Each correct answer presents a complete solution. Choose all that apply.)
A. From a node in Cluster2, create a Virtual Fibre Channel SAN.
B. From a node in Cluster1, create a Virtual Fibre Channel SAN.
C. From Cluster1, add the iSCSI Target Server cluster role.
D. From Cluster1, configure the clustered File Server role of the File Server for scale-out application data type.
Correct Answer: AD
Section: [none]
Explanation
Explanation/Reference:
QUESTION 59
DRAG DROP
You are planning to set up a proof-of-concept network virtualization environment. The environment will contain three servers. The servers will be configured as
shown in the following table.
You plan to implement 15 highly available virtual machines on Cluster2. All of the virtual machines will be stored in a single shared folder.
You need to ensure that the VHD files of the virtual machines can be stored on the SAN.
What should you do? (Each correct answer presents a complete solution. Choose all that apply.)
A. From a node in Cluster2, create a Virtual Fibre Channel SAN.
B. From a node in Cluster1, create a Virtual Fibre Channel SAN.
C. From Cluster1, add the iSCSI Target Server cluster role.
D. From Cluster1, configure the clustered File Server role of the File Server for scale-out application data type.
Correct Answer: AD
Section: [none]
Explanation
Explanation/Reference:
QUESTION 59
DRAG DROP
You are planning to set up a proof-of-concept network virtualization environment. The environment will contain three servers. The servers will be configured as
shown in the following table.

You need to enable network connectivity between the virtual machines and Server3.
Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the
correct order.
Select and Place:
Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the
correct order.
Select and Place:

Correct Answer:

Section: [none]
Explanation
Explanation/Reference:
QUESTION 60
DRAG DROP
Your network contains two servers named Server1 and Server2 that run Windows Server 2012. Server1 and Server2 have the Hyper-V server role installed and are
members of a failover cluster.
The network contains a Storage Area Network (SAN) that has a LUN named LUN1. LUN1 is connected to a 12-TB disk on the SAN.
You plan to host three new virtual machines on the failover cluster. Each virtual machine will store up to 4 TB of data on a single disk. The virtual machines will be
backed up from the hosts by using the Volume Shadow Copy Service (VSS).
You need to ensure that Server1 and Server2 can store the new virtual machines on the SAN.
Which three actions should you perform?
To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Select and Place:
Explanation
Explanation/Reference:
QUESTION 60
DRAG DROP
Your network contains two servers named Server1 and Server2 that run Windows Server 2012. Server1 and Server2 have the Hyper-V server role installed and are
members of a failover cluster.
The network contains a Storage Area Network (SAN) that has a LUN named LUN1. LUN1 is connected to a 12-TB disk on the SAN.
You plan to host three new virtual machines on the failover cluster. Each virtual machine will store up to 4 TB of data on a single disk. The virtual machines will be
backed up from the hosts by using the Volume Shadow Copy Service (VSS).
You need to ensure that Server1 and Server2 can store the new virtual machines on the SAN.
Which three actions should you perform?
To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Select and Place:

No comments:
Post a Comment