Recertification for MCSE: Server Infrastructure
Question No: 151 – (Topic 8)
Your network contains an Active Directory Rights Management Services (AD RMS) cluster named Cluster1.
You plan to change Cluster1 to a new AD RMS cluster named Cluster2.
You need to ensure that all users retrieve the location of the AD RMS templates from Cluster2.
What should you do?
Modify the Service Connection Point (SCP).
Modify the exclusion policies.
Modify the templates file location of the rights policy templates.
Create an alias (CNAME) record named Cluster1.contoso.com that points to Cluster2.
Question No: 152 – (Topic 8)
Contoso.Ltd, has an Active Directory Domain Services (AD DS) domain named contoso.com. The domain and forest functional levels are set to Windows Server 2008 R2. You have a property configured certification authority (CA). All servers run Windows Server 2012 R2.
You have the following requirements.
. Users must not be able to attach specific documents to e-mail messages or copy the files to a personal USB device.
. Finance department users must be able to access the solution from their domain-joined windows devices on the corporate network over the internet without any additional configuration.
. Finance department uses must be able to access the documents even if the primary server fails.
What should you do?
Upgrade the domain functional level to Windows 2012 or higher.
Install Active Directory Federation Services (AD FS), and integrate the Active Directory Rights Managements Services server with AD FS.
Ensure that the internal and external URLs for the Active Directory Rights Management Services cluster are the same.
Implement an Active Directory Rights Management Services cluster and place at least one cluster node in the perimeter network
Question No: 153 – (Topic 8)
Your network contains an Active Directory domain named contoso.com. The network has an Active Directory Certificate Services (AD CS) infrastructure.
You need to issue a certificate to users to meet the following requirements:
->Ensure that the users can encrypt files by using Encrypting File System (EFS).
->Ensure that all of the users reenroll for their certificate every six months.
What should you do first?
From the properties of the User certificate template, assign the Allow -Enroll permission to the Authenticated Users group.
From the properties of the Basic EFS template, assign the Allow -Enroll permission to the Authenticated Users group.
Create a copy of the User certificate template, and then modify the extensions of the copy.
Create a copy of the Basic EFS certificate template, and then modify the validity period of the copy.
Answer: D Explanation: Explanation:
Question No: 154 DRAG DROP – (Topic 8)
You have a failover cluster named Cluster1 that contains four Hyper-V hosts. Cluster1 hosts 20 virtual machines.
You deploy a new failover cluster named Cluster2.
You plan to replicate the virtual machines from Cluster1 to Cluster2.
You need to recommend which actions must be performed on Cluster2 for the planned deployment.
Which three actions should you recommend?
To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Box 1: Install the Hyper-V server role
Box 2: Install the Hyper-V Replica Broker cluster role. Box 3: Create replicas of the virtual machines.
Windows Server 2012 Hyper-V Role introduces a new capability, Hyper-V Replica, as a built-in replication mechanism at a virtual machine (VM) level. Hyper-V Replica can asynchronously replicate a selected VM running at a primary site to a designated replica site across LAN/WAN.
*Step 1: Prepare to Deploy Hyper-V Replica
Make basic planning decisions
Install the Hyper-V server role
Configure the firewall
Configure Hyper-V Replica Broker
Step2: Step 2: Enable Replication
2.1 Configure the Replica server
2.2. Configure a Replica server that is part of a failover cluster (optional)
Enable replication for virtual machines
Each virtual machine that is to be replicated must be enabled for replication.
Configure primary server to receive replication
Question No: 155 DRAG DROP – (Topic 8)
Your network contains an Active Directory domain named contoso.com. The domain contains two domain controllers named DC1 and DC2. The domain contains a server named Server1.
Server1 is a certification authority (CA). All servers run Windows Server 2012 R2.
You plan to deploy BitLocker Drive Encryption (BitLocker) to all client computers. The unique identifier for your organization is set to Contoso.
You need to ensure that you can recover the BitLocker encrypted data by using a BitLocker data recovery agent. You must be able to perform the recovery from any administrative computer.
Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Question No: 156 – (Topic 8)
Your network contains 20 servers that run Windows Server 2012. The servers have the Hyper-V server role installed.
You plan to deploy a management solution.
You need to recommend which Microsoft System Center 2012 roles must be deployed to meet the following requirements:
->An administrator must be notified when an incident occurs, such as a serious error in the event log, on a Hyper-V host, or on a virtual machine.
->An administrator must be able to assign an incident to a specific administrator for
->An incident that remains unresolved for more than 10 hours must be escalated
automatically to another administrator.
->Administrators must be able to generate reports that contain the details of incidents and escalations.
Which System Center 2012 roles should you recommend? More than one answer choice may achieve the goal. Select the BEST answer.
Operations Manager and Orchestrator
Operations Manager and Service Manager
Configuration Manager and Service Manager
Service Manager and Virtual Machine Manager (VMM)
Question No: 157 DRAG DROP – (Topic 8)
Your network contains an Active Directory domain named contoso.com. The domain contains multiple servers that are configured as Hyper-V hosts.
You plan to implement four virtual machines. The virtual machines will be configured as shown in the following table.
You need to identify which network must be added to each virtual machine. Which network types should you identify?
To answer, drag the appropriate Network Type to the correct virtual machine in the answer area. Each Network Type may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content.
An external network, which provides communication between a virtual machine and a physical network by creating an association to a physical network adapter on the virtualization server.
An internal network, which provides communication between the virtualization server and virtual machines.
A private network, which provides communication between virtual machines only.
Question No: 158 – (Topic 8)
You administer a group of servers that run Windows Server 2012 R2.
You must install all updates. You must report on compliance with the update policy on a monthly basis.
You need to configure updates and compliance reporting for new devices. What should you do?
Deploy the Microsoft Baseline Security Analyzer. Scan the servers and specify the
In Configuration Manager, deploy a new Desired Configuration Management baseline that includes all required updates.
Configure a new group policy to install updates monthly. Deploy the group policy to all servers.
In Operations Manager, create an override that enables the software updates management pack. Apply the new override to the servers.
Question No: 159 – (Topic 8)
Your network contains an Active Directory domain named contoso.com. You deploy Active Directory Certificate Services (AD CS). You plan to deploy 100 external Web servers that will be publicly accessible and will require Secure Sockets Layer (SSL) certificates.
You also plan to deploy 50,000 certificates for secure email exchanges with Internet-based recipients.
You need to recommend a certificate services solution for the planned deployment.
What should you recommend? More than one answer choice may achieve the goal. Select the BEST answer.
Deploy a certification authority (CA) that is subordinate to an external root CA.
Purchase 50,100 certificates from a trusted third-party root certification authority (CA).
Distribute a copy of the root certification authority (CA) certificate to external relying parties.
Instruct each user to request a Secure Email certificate from a trusted third-party root CA, and then purchase 100 Web server certificates.
Answer: A Explanation: Explanation:
Question No: 160 – (Topic 8)
You manage a Hyper-V 2012 cluster by using System Center Virtual Machine Manager 2012 SP1. You need to ensure high availability for business-critical virtual machines (VMs) that host business-critical SQL Server databases.
Solution: You create an availability set and place each business-critical VM in the set. Does this meet the goal?
Explanation: When you place multiple virtual machines in an availability set, VMM will attempt to keep those virtual machines on separate hosts and avoid placing them together on the same host whenever possible. This helps to improve continuity of service.
Reference: Configuring Availability Options for Virtual Machines Overview https://technet.microsoft.com/en-us/library/jj628163.aspx
EnsurePass ExamCollection Testking Lowest Price Guarantee Yes No No Up-to-Dated Yes No No Real Questions Yes No No Explanation Yes No No PDF VCE Yes No No Free VCE Simulator Yes No No Instant Download Yes No No