-
You are designing a strategy to allow users to gain VPN access to the internal network. What should you do?()
A . Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.
B . Allow all inbound VPN traffic to pass through the perimeter firewall only.
C . Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.
D . Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.
-
You are designing a migration strategy to meet the business and technical requirements. What should you do? ()
A . Upgrade the fourthcoffee BDC to Windows Server 2003. Then upgrade the PDC to Windows Server 2003
B . Upgrade an existing domain controller to Windows Server 2003. Establish a two-way trust relationship with the fourthcoffee domain.
C . Install and configure a new Windows NT 4.0 BDC. Promote the BDC to a PDC. Then upgrade the PDC to Windows Server 2003
D . Create a new Windows 2000 Server Active Directory domain. Establish a two-way trust relationship with the fourthcoffee domain. Use the Active Directory Migration Tool (ADMT) to migrate all user and computer accounts.
-
You are designing a strategy to migrate user accounts. Which two actions should you perform? ()
A . Change the functional level.
B . Create an external trust relationship.
C . Run adprep to prepare the research.com forest.
D . Run adprep to prepare the research.com domain.
-
You are designing a strategy to allow users to gain VPN access to the internal network. What should you do?()
A . Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.
B . Allow all inbound VPN traffic to pass through the perimeter firewall only.
C . Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.
D . Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.
-
You are designing a strategy to install the new scheduling application. Which two actions should you perform?()
A . Assign the scheduling application package to the Instructor OU.
B . Publish the scheduling application package to the Instructor OU.
C . Ensure that the scheduling application can install across slow WAN links.
D . Prevent the scheduling application from installing across slow WAN links.
-
You are designing a domain naming strategy for the new environment. Which two actions should you perform?()
A . Register airlines.com as a new domain name.
B . Register manifest.airlines.com as a new domain name.
C . Register manifest.blueyonderairlines.com as a new domain name.
D . Maintain the existing blueyonderairlines.com registered domain name.
E . Use the UPN suffix of airlines.com for all new users.
F . Use the UPN suffix of blueyonderairlines.com for all new users.&e
-
You are designing a Windows Server 2008 R2 Hyper-V environment. Your design includes a failover cluster that supports live migration. You need to ensure that the network supports this design. What should you do?()
A . Use two iSCSI host bus adapters
B . Use two Fibre Channel host bus adapters
C . Place the physical host servers on the same TCP/IP subnet
D . Place the physical host servers on different TCP/IP subnet
-
You are designing an IP addressing strategy for your VPN solution. How many public addresses should you use?()
A . 1
B . 25
C . 50
D . 255
-
You are designing a site topology to meet the business and technical requirements. What should you do?()
A . Increase the replication interval between sites.
B . Use SMTP as the transport protocol for replication.
C . Create site links to represent the physical topology.
D . Disable the Knowledge Consistency Checker (KCC) and manually configure site replication.
-
You are designing a strategy to provide Internet access to all users. What should you do?()
A . Configure Internet Connection Sharing on all client computers.
B . Configure Automatic Private IP Addressing (APIPA) on all client computers.
C . Configure one server as a Routing and Remote Access VPN server.
D . Configure one server as a Routing and Remote Access NAT router.
-
You are designing a DNS infrastructure to meet the Internet name resolution requirements. What should you do?()
A . Create a standard primary zone named “.” on all DNS servers.
B . Create an Active Directory-integrated zone named “.” on a DNS server on Los Angeles.
C . Configure all DNS servers to use forwarders. Specify the IP address of the DNS server at the local ISP.
D . Enable default root hints on all DNS servers.
E . Disable recursion on all DNS servers.&e
-
You are designing a strategy to address the requirements of the advertising department. What should you do? ()
A . Create a GPO and link it to the Denver site.
B . Create a GPO and link it to the Advertising OU.
C . Create a GPO and link it to the graphicdesigninstitute.com domain.
D . Configure the Default Domain Policy to have the No Override option.
E . Use block inheritance to prevent the GPO from applying to members of the advertising department.
-
You are designing a strategy to ensure that VPN users are able to access all internal resources. What should you do?()
A . Specify a static routing table entry on VPN1 for the Dallas network.
B . Specify a static routing table entry on VPN1 for the Seattle network.
C . Implement Internet Authentication Service (IAS) on VPN1.
D . Define a User Class option for Routing & Remote Access Clients on the DHCP Server.
-
You are designing a site topology for the new Active Directory environment. What should you do? ()
A . Create one site for all offices. Place the subnets for the four branch offices and the Sydney main office in this site.
B . Create two sites: one site for the four branch offices and one site for the Sydney main office. Place the subnets for the branch offices in one site. Place the subnet for the Sydney main office in the other site.
C . Create three sites: one site for the four branch offices, one site for the Sydney main office, and one site for the Sydney satellite offices.
D . Create four sites: one for the Melbourne and Perth branch offices, one site for the Berlin and Paris branch offices, one site for the Sydney main office, and one site for the Sydney satellite offices.
E . Create five sites; one site for the Melbourne branch office, one site for the Perth branch office, one site for the Berlin branch office, one site for the Paris branch office, and one site for the Sydney main office. Place the subnets for each branch office and the Sydney main office in their respective sites.
-
You are designing a client computer upgrade strategy for Contoso.Ltd. What should you do?()
A . Use the ldifde command to migrate user settings.
B . Use the User State Migration Tool (USMT) to Migrate user settings.
C . Create trust relationships between the Chicago domain and the San Francisco domain. Use the Active Directory Migration Tool (ADMT) to migrate user settings.
D . Create trust relationships between the forest root domain and the San Francisco domain. Use the Active Directory Migration Tool (ADMT) to migrate user settings.
-
You are designing a DNS implementation strategy for the network. Which two zone types should you use?()
A . Reverse lookup zones
B . Standard primary zones
C . Standard secondary zones
D . Active Directory-integrated zone
-
You are designing a DNS infrastructure to meet the Internet name resolution requirements. What should you do? ()
A . Create a standard primary zone named “.” on all DNS servers.
B . Create an Active Directory-integrated zone named “.” on a DNS server on Los Angeles.
C . Configure all DNS servers to use forwarders. Specify the IP address of the DNS server at the local ISP.
D . Enable default root hints on all DNS servers.
E . Disable recursion on all DNS servers.
-
You are designing an IP addressing strategy for your VPN solution. How many public addresses should you use?()
A . 1
B . 25
C . 50
D . 255
-
You are designing a VPN Server strategy to meet the business and technical requirement. What should you do?()
A . Configure all client computers to point to a VPN server in Amsterdam.
B . Configure all client computers to use Multilink Bandwidth Allocation Protocol (BAP).
C . Create a network Load Balancing cluster of VPN servers.
D . Create a shutdown script for the VPN servers to delete the host(A) resource record of the VPN sever from the DNS database when the VPN server are shutdown.
-
You are designing a VPN strategy to meet the business and technical requirements. Based on the current infrastructure, what is the maximum number of VPN connections that can be supported? ()
A . 25
B . 35
C . 70
D . 128
E . 256
-
You are designing a VPN strategy to meet the business and technical requirements. Based on the current infrastructure, what is the maximum number of VPN connections that can be supported?()
A . 25
B . 35
C . 70
D . 128
E . 256
-
You are designing a client computer upgrade strategy for Contoso.Ltd. What should you do?()
A . Use the ldifde command to migrate user settings.
B . Use the User State Migration Tool (USMT) to Migrate user settings.
C . Create trust relationships between the Chicago domain and the San Francisco domain. Use the Active Directory Migration Tool (ADMT) to migrate user settings.
D . Create trust relationships between the forest root domain and the San Francisco domain. Use the Active Directory Migration Tool (ADMT) to migrate user settings.
-
You are designing a site topology for the new Active Directory environment. What should you do?()
A . Create one site for all offices. Place the subnets for the four branch offices and the Sydney main office in this site.
B . Create two sites: one site for the four branch offices and one site for the Sydney main office. Place the subnets for the branch offices in one site. Place the subnet for the Sydney main office in the other site.
C . Create three sites: one site for the four branch offices, one site for the Sydney main office, and one site for the Sydney satellite offices.
D . Create four sites: one for the Melbourne and Perth branch offices, one site for the Berlin and Paris branch offices, one site for the Sydney main office, and one site for the Sydney satellite offices.
E . Create five sites; one site for the Melbourne branch office, one site for the Perth branch office, one site for the Berlin branch office, one site for the Paris branch office, and one site for the Sydney main office. Place the subnets for each branch office and the Sydney main office in their respective sites.
-
You are designing a Windows Server 2008 R2 Hyper-V environment. Your design includes a failover cluster that supports live migration. You need to ensure that the network supports this design. What should you do?()
A . Use two iSCSI host bus adapters
B . Use two Fibre Channel host bus adapters
C . Place the physical host servers on the same TCP/IP subnet
D . Place the physical host servers on different TCP/IP subnet