-
You are designing an authentication solution to meet the security needs of the network administrators. You install an enterprise certification authority (CA). Which three additional actions should you take?()
A . Enroll each administrative account for a smart card authentication certificate.
B . Configure autoenrollment for computer authentication certificates.
C . Install a smart card reader on each server computer.
D . Install a smart card reader on each network administrator’s computer.
E . Configure each administrative account to require a smart card for interactive logon.
F . Configure the Default Domain Policy GPO to require smart cards for interactive login.
-
You need to design an administrative model for the Exchange Server environment. What should you do?()
A . Create a single organizational unit (OU). Place the user accounts for each office in the OU. Delegate control over the OU to the office’s server administrators and the central IT staff
B . Create a single Exchange administrative group. Place all Exchange servers into that administrative group. Assign permissions for the administrative group to the officer’s server administrators and the central IT staff
C . Create an Exchange administrative group for each office. Place the Exchange severs for each office into that office’s administrative group. Assign permissions for the administrative group to the office’s server administrators. Allow the central IT staff to manage user mailboxes
D . Create an organizational unit (OU) for each office. Place the user accounts for each office into the appropriate OU. Delegate control over each OU to the office’s server administrators. Allow the central IT staff to manager user mailboxe
-
You need to design an authentication solution for Terminal Services that meets the business requirements.What should you do?()
A . Configure the terminal server to use smart cards
B . Configure IPSec to permit only Remote Desktop Protocol (RDP) connections to the terminal server
C . Deny the Remote Desktop Users group access to the terminal server
D . Restrict treyresearch.com users from logging on locally to the terminal server
-
You are designing a plan to migrate an application to Windows Azure. The application generates log files in a proprietary format. You need to recommend an approach for retaining the existing log file format. What should you recommend?()
A . Configure Windows Azure Diagnostics to transfer event logs.
B . Configure Windows Azure Diagnostics to transfer directories.
C . Configure Windows AzureDiagnostics to transfer performance counters.
D . Configure Windows Azure Diagnostics to transfer basic Windows Azure logs.
-
You need to design an e-mail access strategy for remote users. What should you do? ()
A . Instruct remote users to connect to their e-mail by using RPC
B . Instruct remote users to connect to Outlook Web Access by using only HTTPS
C . Instruct remote users to connect to the company network by using PPTP connections
D . Instruct remote users to connectd to their e-mail by using RPC over HTTP Configure the HTTP servers to require encryption.
-
You are designing an authentication solution to meet the security needs of the network administrators. You install an enterprise certification authority (CA). Which three additional actions should you take?()
A . Enroll each administrative account for a smart card authentication certificate.
B . Configure autoenrollment for computer authentication certificates.
C . Install a smart card reader on each server computer.
D . Install a smart card reader on each network administrator’s computer.
E . Configure each administrative account to require a smart card for interactive logon.
F . Configure the Default Domain Policy GPO to require smart cards for interactive login.
-
You need to design an administrative model that meets the business and technical requirements. What should you do?()
A . Assign permissions to manage Mailbox and Exchange Server configuration to the server-admins group
B . Assign permissions to manage Mailbox and Exchange Server configuration to the domain-admins group
C . Assign permissions to manage Mailboxes to the server-admins group. Assign permissions to manage Exchange Servers configuration to the domain-admins group
D . Assign permissions to manage Mailboxes to the domain-admins group. Assign permissions to manage Exchange Servers configuration to the server-admins grou
-
You need to design an authentication solution for the wireless network. Your solution must meet the security requirements. What should you do?()
A . Create wireless VPNs using L2TP/IPSec between the client computers to the wireless access point
B . Configure IEEE 802.1x authentication with smart cards
C . Configure the wireless network to use Wired Equivalent Privacy (WEP)
D . Install and configure an Internet Authentication Service (IAS) server
-
You need to design an administrative model for Exchange Server 2003. What should you?()
A . Create an administrative group for each office. Place each Exchange server that is managed by an office technician into that Office’s administrative group. Assign the central IT group full control over all administrative groups. Assign each office technician control over his or her office’s administrative groups
B . Create one administrative group. Place all Exchange servers in the administrative group. Assign the central IT group full control over the administrative group. Make each office technician a member fo the local Backup Operators group on each group they manage
C . Create an administrative group for each office. Place one Exchange server in each group. Assign the central IT group and each office technician full control over each administrative group
D . Create one administrative group for all Exchange front-end servers. Assign each office technician control over this administrative group. Create another administrative group for all Exchange back-end servers. Assign the central IT group control over this administrative grou
-
You need to design an authentication strategy for users of portable computers. Your solution must meet business requirements. What should you do?()
A . Issue smart cards and smart card readers to all portable computer users. Configure the domain to require smart cards for login and to log off users who remote their smart cards
B . Configure the portable computers to connect to only wireless networks that use Wired Equivalent Privacy (WEP). Install digital certificates on all portable computers
C . Install computer certificates on all portable computers. Configure all portable computers to respond to requests for IPSec encryption
D . Install biometric authentication devices on all portable computers. Configure the Default Domain Policy GPO to require complex passwords for all user
-
You are designing a Hyper-V solution. You plan to virtualize an application server. The application server requires failover clustering that uses shared storage. You need to choose the correct storage solution. What should you choose?()
A . two child partitions with VHDs stored on an iSCSI SAN
B . two child partitions with volumes mounted from an iSCSI SAN
C . two host servers with iSCSI-attached storage enabled for Cluster Shared Volumes (CSVs)
D . two host servers with Fibre ChannelCattached storage enabled for Cluster Shared Volumes (CSVs)
-
You need to design an access control solution for customer information. Your solution must meet security requirements.What should you do?()
A . Configure the Web site to require SSL connections. Configure the Web site to require client certificates. Enable and configure client certificate mapping on the Web site
B . Configure the Web site to require SSL connections. Disable anonymous access to the Web site.Assign the Allow – Read permission to the customer user accounts for the folder that contains the Web site files
C . Configure the Web site to use only Microsoft .NET Passport authentication. Specify the den.corp.woodgrovebank.com domain as the default domain for .NET Passport authentication.Configure a custom local IPSec policy on the Web servers to require IPSec communications
D . Configure the Web site to use only Windows Integrated authentication. Configure a custom local IPSec policy on the Web servers to require IPSec communications. Configure the IPSec policy to use certificate-based authentication and encryptio
-
You need to create an administrative design that will enable the organization to centralize the management of the Exchange Server 2003 computers. Which two actions should you perform?()
A . Create a new domain named Exchange.Corp.cpandl.com and locate all the Exchange servers in the domain
B . Create a new organizational unit (OU) named Exchange OU and move all the Exchange servers into the OU
C . Locate all the Exchange servers in the Domain Controller OU.(Modified NEW answer)
D . Assign Full Exchange Administrator rights to the Domain Admins group and to the Exchange Admins Group.(Modified NEW answer)
E . Assign Full Exchange Administrator rights to the Domain Admins group. Assign Exchange Administrator rights to the Exchange Admins group.(Modified NEW answer)
F . Assign Full Exchange Administrator rights to the Domain Admins group. Add the Exchange Admins group to the Administrators group on each Exchange server.(Modified NEW answer)
-
You need to design an access control strategy for the external and intranet Web sites. Which two actions should you perform?()
A . Enable SSL on the external Web site by using a Microsoft cryptographic service provider (CSP)
B . Enable Microsoft .NET Passport authentication on the external Web site. Use Passport Level 0 with SSL on the external Web site
C . Enable SSL on the external Web site by using a commercial digital certificate
D . Enable SSL on the intranet Web site by using an internal server certificate
E . Enable SSL on the external Web site by using an internal server certificate
-
You are designing a Windows Azure application that will use Windows Azure Table storage. You need to recommend an approach for minimizing storage costs. What should you recommend? ()
A . Use Entity Group Transactions.
B . Use multiple partitions to store data.
C . Use a transaction scope to groupall storage operations.
D . Use Microsoft Distributed Transaction Coordinator (MSDTC).
-
You need to design an access control strategy for the Payment folder for the Sales Managers group. What should you do?()
A . Use IPSec in transport mode
B . Use Encrypting File System (EFS) over Web Distributed Authoring and Versioning (WebDAV)
C . Use PEAP-EAP-TLS
D . Use Encrypting File System (EFS) remote encryptio
-
You need to design an audit strategy for Southbridge Video. Your solution must meet business requirements.What should you do?()
A . Create a new security template that enables the Audit account logon events policy for successful and failed attempts. Create a new GPO, and link it to the domain. Import the new security template into the new GPO
B . Create a new security template that enables the Audit account logon events policy for successful and failed attempts. Create a new GPO, and link it to the Domain Controllers OU. Import the new security template into the new GPO
C . Create a new security template that enables the Audit logon events policy for successful and failed attempts. Create a new GPO, and link it to the Domain Controllers OU. Import the new security template into the new GPO
D . Create a new security template that enables the Audit logon events policy for successful and failed attempts. Create a new GPO, and link it to the domain. Import the new security template into the new GPO
-
You need to design an administrative control strategy for Denver administrators. What should you do?()
A . Create a security group named HelpDesk. Add the HelpDesk group to the Enterprise Admins group in both domains
B . Create a security group named HelpDesk. Add the HelpDesk group to the Domain Admins groups in both domains
C . Add the Domain Admins group in the litwareinc.com domain to the Domain Admins group in the contoso.com domain. Delegate full control of the litwareinc.com domain to the Domain Admins group in the contoso.com domain
D . Create a security group named HelpDesk for each office. Delegate administrative tasks to their respective OU or domain.Delegate full control of the contoso.com domain to the Domain Admins group from the litwareinc.com domai
-
You need to design an authentication solution for wireless network access. Your solution must meet business and technical requirements. Which two actions should you perform?()
A . Deploy an offline enterprise root CA in the corp.woodgrovebank.com domain. Deploy subordinate enterprise root CAs in each child domain. Install Internet Authentication Service (IAS) on one member server in the la.corp.woodgrovebank.com domain and one member server in the den.corp.woodgrovebank.com domain
B . Deploy an enterprise root CA in each domain. Install Internet Authentication Service (IAS) on a member server in the corp.woodgrovebank.com domain. Install the Routing and Remote Access service on a member server in each child domain, and configure these servers as RADIUS clients
C . Enroll and deploy user certificates to all administrators in each domain. Enroll and deploy computer certificates to all portable computers that have wireless network adapters. Configure each portable computer to use Protected EAP (PEAP) for authentication
D . Enroll and deploy computer certificates to all portable computers that have wireless network adapters. Configure each portable computer to use EAP-MS-CHAP v2 for authentication. Configure each portable computer to connect to the Internet Authentication Service (IAS) server
-
You are designing a Hyper-V solution. You plan to virtualize an application server. The application server requires failover clustering that uses shared storage. You need to choose the correct storage solution. What should you choose?()
A . Two child partitions with volumes mounted from an iSCSI SAN
B . Two host servers with Fibre Channel-attached storage enabled for Cluster Shared Volumes (CSVs)
C . Two host servers with iSCSI-attached storage enabled for Cluster Shared Volumes (CSVs)
D . Two child partitions with VHDs stored on an iSCSI SAN
-
You need to design an access control strategy for the Contact Info and the Order History folders. What should you do?()
A . Create a domain local group named Customer Relations in the northwindtraders.com domain. Add the Sales group and the Sales Managers groups to the Customer Relations group. Add the Customer Relationships group to the Customer Information folder. Assign the appropriate permissions. Add the accounts for the sales department users in Boston to the Boston Customer Relationship group. Add the Boston Customer Relationships group to the Customer Relations group. Disable inheritance on the Payment folder
B . Create a domain local group named Customer Relations in the boston.northwindtraders.com domain. Add the Customer Relations group to the Customer Information folder. Assign the appropriate permissions. Add the Boston Customer Relations group to the Customer Relations group. Disable permission inheritance on the Payment folder
C . Create a domain local group named Customer Relations in the boston.northwindtraders.com domain. Add the Customer Relations group to the Order History folder. Assign the appropriate permissions. Add the Boston Customer Relations group to the Customer Relations group. Disable permission inheritance on the Payment folder
D . Create a domain local group named Customer Relations in the boston.northwindtraders.com domain. Add the Customer Relations group to the Customer Information folder. Assign the appropriate permissions. Add the Boston Customer Relations group to the Customer **MISSING**
-
You need to design an access control strategy that meets business and security requirements. Your solution must minimize forestwide replication. What should you do?()
A . Create a global group for each department and a global group for each location. Add users to their respective departmental groups as members. Place the departmental global groups within the location global groups. Assign the location global groups to file and printer resources in their respective domains, and then assign permissions for the file and printer resources by using the location global groups
B . Create a global group for each department, and add the respective users as members. Create domain local groups for file and printer resources. Add the global groups to the respective domain local groups. Then, assign permissions to the file and printer resources by using the domain local groups
C . Create a local group on each server and add the authorized users as members. Assign appropriate permissions for the file and printer resources to the local groups
D . Create a universal group for each location, and add the respective users as members. Assign the universal groups to file and printer resources. Then, assign permissions by using the universal grou
-
You need to design an administrative model that meets all business and technical requirements. What should you do?()
A . Place the mailboxes for each region on a separate server. Create an administrative group for each region. Assign each regional technician Exchange Full Administrator permission over that region’s administrative groups. Assign the main office IT staff Exchange Full Administrator permission over each administrative group.
B . Place the mailboxes for each region on a separate server. Create an administrative group for each region. Assign each regional technician Exchange Full Administrator permission over all administrative groups. Assign the main office IT staff Exchange Full Administrator permission over each administrative group
C . Place the mailboxes from multiple regions on each server. Create an administrative group for each server. Assign each regional technician Exchange Full Administrator permission over the administrative groups that contain servers that hold mailboxes for that region. Assign the main office IT staff Exchange Full Administrator permission over each administrative group
D . Place the mailboxes from multiple regions on each server. Create a single administrative group for all servers. Assign each regional technician and the main office IT Staff Exchange Full Administrator permission over the administrative grou
-
You need to design an access control strategy for the marketing application. You solution must minimize impact on server and network performance. What should you do?()
A . Require client computers to connect to the marketing application by using a VPN connection
B . Use IPSec to encrypt communications between the servers in the New York and Atlanta offices
C . Require the high security setting on Terminal Services connections to the marketing application
D . Configure all marketing application Web pages to require SSL