-
You need to design a patch management strategy for Northwind Traders. What should you do?()
A . Configure the Default Domain Policy Group Policy object (GPO) for the northwindtraders.com domain to configure client computers to download updates from the SUS server in New York. Configure the Default Domain Policy GPO for the boston.northwindtraders.com domain to configure client computers to download updates from the SUS server in New York
B . Use Group Policy to configure client computers to download updates from a Windows Update server on the Internet. Configure the Default Domain Policy Group Policy object (GPO) with a startup script that runs Mbsacli.exe. Configure it to scan the computers in both of the branch offices
C . Install and configure a SUS server in the Boston branch office. Configure the server to download updates from a Windows Update server on the Internet. Configure Microsoft Baseline Security Analyzer (MBSA) to scan for updates and computers in the New York office
D . Install and configure a SUS server in each branch office. Configure the SUS servers to download updates from the New York SUS server. Configure Microsoft Baseline Security Analyzer (MBSA) to scan for updates on computers in the New York office
-
You need to design a strategy to meet the company’s requirements for e-mail. What should you do?()
A . Configure and publish a certificate template that is suitable for S/MIME, Deploy a Group Policy object (GPO) so that a certificate that is based on this template is automatically issued to all domain users
B . Specify Group Policy objects (GPOs) and IPSec policies that require all client computers to use Kerberos authentication to connect to mail servers
C . For each mail server, acquire an SSL server certificate from a commercial CA whose root certificate is already trusted
D . Require IPSec encryption on all TCP connections that are used to send or receive e-mail message
-
You need to design a storage mode for the ProductOrderStatus measure group. What should you do?()
A . Use ROLAP for the Historical partition and MOLAP for the CurrentDay partition.
B . Use MOLAP for the Historical partition and ROLAP for the CurrentDay partition.
C . Use ROLAP for the Historical partition and Automatic MOLAP for the CurrentDay partition.
D . Use HOLAP for the Historical partition and Low-latency MOLAP for the CurrentDay partition.
-
You need to design an administrative model for the Exchange Server environment. What should you do?()
A . Create a single organizational unit (OU). Place the user accounts for each office in the OU. Delegate control over the OU to the office’s server administrators and the central IT staff
B . Create a single Exchange administrative group. Place all Exchange servers into that administrative group. Assign permissions for the administrative group to the officer’s server administrators and the central IT staff
C . Create an Exchange administrative group for each office. Place the Exchange severs for each office into that office’s administrative group. Assign permissions for the administrative group to the office’s server administrators. Allow the central IT staff to manage user mailboxes
D . Create an organizational unit (OU) for each office. Place the user accounts for each office into the appropriate OU. Delegate control over each OU to the office’s server administrators. Allow the central IT staff to manager user mailboxe
-
You need to design a patch management strategy that meets business requirements. What should you do?()
A . Install Systems Management Server (SMS) on a computer on the internal network. Use the Default Domain Policy GPO to distribute the SMS client software to all computers in the domain
B . Install Microsoft Operations Manager (MOM) on a computer on the internal network. Use the Default Domain Policy GPO to distribute the MOM client software to all computers in the domain
C . Install Software Update Services (SUS) on a Web server, and configure it to synchronize and approve updates nightly. Configure client computers to receive automatic updates from the Web server. Ensure that users restart their client computers daily
D . Install Software Update Services (SUS) on a domain controller, and configure it to synchronize and approve updates nightly. Configure client computers to receive automatic updates from the domain controller. Ensure that users restart their client computers daily
-
You need to design a method to address the chief information officer’s security concerns. What should you do?()
A . Configure Windows Management Instrumentation (WMI) filtering options in the Default Domain Policy GPO
B . Use the gpresult command
C . Use Mbsacli.exe
D . Configure software restriction policy options in the Default Domain Policy GPO
-
You need to design the storage of the loan response message. Which actions or actions should you perform?()
A . Use the xml data type to store the message.
B . Use a user-defined data type to store the message.
C . Use the nvarchar(max) data type to store the message.
D . Use a check constraint to validate that the correct tags are used.
E . Use an XML schema definition (XSD) to validate that the correct tags are used.
F . Use a foreign key constraint to validate that the correct tags are used.
-
You need to design an e-mail access strategy for remote users. What should you do? ()
A . Instruct remote users to connect to their e-mail by using RPC
B . Instruct remote users to connect to Outlook Web Access by using only HTTPS
C . Instruct remote users to connect to the company network by using PPTP connections
D . Instruct remote users to connectd to their e-mail by using RPC over HTTP Configure the HTTP servers to require encryption.
-
You need to design a strategy for migrating to the mailboxes from Exchange Server 5.5 to Exchange Server 2003. What should you do?()
A . Use the Exchange Migration Wizard to migrate all the mailboxes to the Exchange 2003 Servers
B . Use the Exchange Mailbox Merge Wizard (Exmerge) to migrate all the mailboxes to use the Exchange 2003 servers
C . Use the Exchange Server Migration Wizard to migrate all the mailboxes to the Exchange 2003 Servers
D . Export the contents of each mailbox to a .pst file. Create a new mailbox on the Exchange 2003 servers for each existing mailbox. Import the .pst file contents into each new mailbox
-
You need to design the storage of the application texts for UI elements to fulfill the requirements. Which table and column design should you use?()
A . Languages (LanguageID, Name)Elements (ElementID, Description)ElementLanguages (ElementID, LanguageID, Text)
B . Languages (LanguageID, Name)Elements (ElementID, LanguageID, Description, Text)
C . Languages (LanguageID, Name)ElementTexts (LanguageID, Text)ElementDescriptions (ElementID, Description)
D . Languages (LanguageID, Name)Elements (ElementID, Description, Text)
-
You need to design a PKI for the Northwind Traders internal network. What should you do?()
A . Add an enterprise root CA to the northwindtraders.com domain. Configure cross-certification between the northwindtraders.com domain and the boston.northwindtraders.com domain
B . Add an enterprise subordinate issuing CA to the northwindtraders.com domain. Configure qualified subordination for the enterprise subordinate issuing CA in Boston
C . Add enterprise subordinate issuing CAs to the New York, Boston, and Seattle LANs. Configure qualified subordinations for each enterprise subordinate issuing CA
D . Add a stand-alone commercial issuing CA to only the northwindtraders.com domain. Configure cross-certification between the commercial CA and the boston.northwindtraders.com domai
-
You need to design a PKI for Litware, Inc. What should you do?()
A . Add one offline stand-alone root certificate authority(CA).Add two online enterprise subordinate CAs
B . Add one online stand-alone root certification authority(CA).Add two online enterprise subordinate CAs
C . Add one online enterprise root certification authority CA).Add one offline enterprise subordinate CA
D . Add one online enterprise root certification authority(CA).Add two online enterprise subordinate CA
-
You need to design a configuration for the mailbox servers. What should you do?()
A . Create two Exchange Server 2003 computers. Place the mailboxes for main office users on one server, and place the mailboxes for remote users on the other server
B . Create a Network Load Balancing cluster that contains two Exchange Server 2003 computers. Place half of the user mailboxes on one server, and place half of the user mailboxes on the other server
C . Create a Microsoft Cluster Server cluster that contains two Exchange Server 2003 computers. Place all of the user mailboxes on one server and configure the other server as a failover node
D . Create a Microsoft Cluster Server cluster that contains two Exchange Server 2003 computers. Place half of the user mailboxes on one server, and place half of the user mailboxes on the other server
-
You need to design the restrictions on the Bank.Customers table. Which three actions should you perform?()
A . Design a trigger that verifies that the first names and surnames are not empty strings.
B . Design a check constraint that verifies that the first names and surnames are not empty strings.
C . Design a check constraint that uses a CLR user-defined function to verify that either the phone number is a null value or the format of the phone number is valid.
D . Design a trigger that uses a CLR user-defined function to verify that either the phone number is a null value or the format of the phone number is valid.
E . Design a check constraint that ensures that the phone number cannot be changed from a valid format to a null value or to an invalid format.
F . Design a trigger that ensures that the phone number cannot be changed from a valid format to a null value.
-
You need to design a PKI that meets business requirements. What should you do?()
A . Move ATLCA1 offline and create an enterprise subordinate CA to issue certificates
B . Create a stand-alone subordinate CA to issue certificates
C . Use a qualified subordinate CA
D . Configure certificate template access control lists (ACLs) on ATLCA1
-
You need to design an administrative model for Exchange Server 2003. What should you?()
A . Create an administrative group for each office. Place each Exchange server that is managed by an office technician into that Office’s administrative group. Assign the central IT group full control over all administrative groups. Assign each office technician control over his or her office’s administrative groups
B . Create one administrative group. Place all Exchange servers in the administrative group. Assign the central IT group full control over the administrative group. Make each office technician a member fo the local Backup Operators group on each group they manage
C . Create an administrative group for each office. Place one Exchange server in each group. Assign the central IT group and each office technician full control over each administrative group
D . Create one administrative group for all Exchange front-end servers. Assign each office technician control over this administrative group. Create another administrative group for all Exchange back-end servers. Assign the central IT group control over this administrative grou
-
You need to design a PKI solution that meets business and security requirements. What should you do?()
A . Implement an enterprise root CA in the corp.woodgrovebank.com domain.Implement subordinate CAs in each child domain. Take the root CA offline
B . Implement an enterprise root CA in the corp.woodgrovebank.com domain
C . Implement an enterprise root CA in each of the child domains. Take the enterprise CA in each domain offline
D . Implement an enterprise root CA in the corp.woodgrovebank.com domain. Implement a stand-alone root CA in each of the child domai
-
You need to design a certificate management process for internal users. What should you do?()
A . Establish a Web enrollment service for internal users to request access to resources
B . Grant Enrollment Agent rights to users
C . Establish enrollment stations and store user certificates in a smart card
D . Create Connection Manager scripts to identify the client computer operating system, and configure Web proxy settings to specify the appropriate Web enrollment service
-
You need to design a method to enable remote encryption on Server5. What should you do?()
A . Configure the editor’s user account properties to enable Store password using reversible encryption
B . Configure the editor’s user account properties to enable Use DES encryption for this account
C . Configure the Local Security Policy on Server to enable the System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing security policy
D . Configure the Server5 computer account properties to enable Trust computer for delegatio
-
You need to design a configuration for the Microsoft Outlook Web Access servers. What should you do?()
A . Create a Network Load Balancing cluster that contains the Outlook Web Access servers
B . Create a Microsoft Cluster Server cluster that contains the Outlook Web Access servers
C . Create public DNS host (A) resource records for each Outlook Web Access server. Instruct each user to connect to the server that contains his or her mailbox
D . Install Microsoft Application Center 2000 on the Outlook Web Access servers. Create a Web cluster that contains all of the Outlook Web Access server
-
You need to design a method to deploy security configuration settings to servers. What should you do?()
A . Run the Resultant Set of Policy wizard with a Windows Management Instrumentation (WMI) filter on each department’s Server OU
B . Log on to each server and use local policy to configure and manage the security settings
C . Create a customer security template. Log on to a domain controller and run the seceditcommand to import the security template
D . Create a customer security template. Create a GPO and import the security template. Link the GPO to each department’s Server OU
-
You need to design an administrative control strategy for Denver administrators. What should you do?()
A . Create a security group named HelpDesk. Add the HelpDesk group to the Enterprise Admins group in both domains
B . Create a security group named HelpDesk. Add the HelpDesk group to the Domain Admins groups in both domains
C . Add the Domain Admins group in the litwareinc.com domain to the Domain Admins group in the contoso.com domain. Delegate full control of the litwareinc.com domain to the Domain Admins group in the contoso.com domain
D . Create a security group named HelpDesk for each office. Delegate administrative tasks to their respective OU or domain.Delegate full control of the contoso.com domain to the Domain Admins group from the litwareinc.com domai
-
You need to design a group membership strategy for the EditorialAdmins group. What should you do?()
A . Move the EditorialAdmins group to the Servers OU in the editorial department
B . Move the members of the EditorialAdmins group to the Editorial OU
C . Move the members of the EditorialAdmins group to the New York OU
D . Move the EditorialAdmins group to the New York OU
-
You need to design access to e-mail by Internet users. What should you do?()
A . Configure front-end servers to use HTTP to communicate with back-end servers
B . Configure the internal firewall to allow IPSec traffic between front-end and back-end Exchange servers
C . Require all users to encrypt all outbound e-mail messages
D . Issue digital certificates to all remote users. Require the certificates to be used when authenticating to Outlook Web Acce
-
You need to design the deployment of antivirus software. What should you do?()
A . Install the antivirus software on each mailbox storage server
B . Install the antivirus software on each Outlook Web Access server
C . Install the antivirus software on one Outlook Web Access server at each office
D . Install the antivirus software on a back-end server that contains no mailboxe