-
You need to design a strategy to meet the company’s requirements for e-mail. What should you do?()
A . Configure and publish a certificate template that is suitable for S/MIME, Deploy a Group Policy object (GPO) so that a certificate that is based on this template is automatically issued to all domain users
B . Specify Group Policy objects (GPOs) and IPSec policies that require all client computers to use Kerberos authentication to connect to mail servers
C . For each mail server, acquire an SSL server certificate from a commercial CA whose root certificate is already trusted
D . Require IPSec encryption on all TCP connections that are used to send or receive e-mail message
-
You need to design a storage mode for the ProductOrderStatus measure group. What should you do?()
A . Use ROLAP for the Historical partition and MOLAP for the CurrentDay partition.
B . Use MOLAP for the Historical partition and ROLAP for the CurrentDay partition.
C . Use ROLAP for the Historical partition and Automatic MOLAP for the CurrentDay partition.
D . Use HOLAP for the Historical partition and Low-latency MOLAP for the CurrentDay partition.
-
You need to design a method to implement account policies that meets the requirements in the written security policy. What should you do?()
A . Create a GPO and link it to the New York OU, to the Denver OU, and to the Dallas OU.Configure the GPO with the required account policy settings
B . On all computers in the domain, configure the Local Security Policy7 with the required account policy settings
C . Configure the Default Domain Policy GPO with the required account policy settings
D . Configure the Default Domain Controllers Policy GPO with the required account policy setting
-
You need to design the VLAN scheme for the Company network. Which two statements are true about best practices in VLAN design?()
A . Routing should occur at the access layer ifvoice VLANs are utilized. Otherwise, routing should occur at the distribution layer.
B . Routing should always be performed at the distribution layer.
C . VLANs should be localized to a switch.
D . VLANs should be localized to a single switch unlessvoice VLANs are being utilized.
E . Routing should not be performed between VLANs located on separate switches.
-
You need to design an administrative model for the Exchange Server environment. What should you do?()
A . Create a single organizational unit (OU). Place the user accounts for each office in the OU. Delegate control over the OU to the office’s server administrators and the central IT staff
B . Create a single Exchange administrative group. Place all Exchange servers into that administrative group. Assign permissions for the administrative group to the officer’s server administrators and the central IT staff
C . Create an Exchange administrative group for each office. Place the Exchange severs for each office into that office’s administrative group. Assign permissions for the administrative group to the office’s server administrators. Allow the central IT staff to manage user mailboxes
D . Create an organizational unit (OU) for each office. Place the user accounts for each office into the appropriate OU. Delegate control over each OU to the office’s server administrators. Allow the central IT staff to manager user mailboxe
-
You need to design a security strategy for the DHCP servers in the Seattle office. Which two actions should you perform?()
A . Disable all unnecessary services on each DHCP server
B . Modify the discretionary access control lists (DACLs) in Active Directory so that only members of the Enterprise Admins security group can authorize additional DHCP servers
C . Use an IPSec policy that allows only the packets necessary for DHCP and domain membership for each DHCP server
D . Install a digital certificate for SSL on each DHCP server
-
You need to design the database permissions for access from the terminals to the database server. Which action or actions should you perform?()
A . Create a database role named BankTerminals.
B . Grant the BankTerminals role the Execute permission for the WoodgroveBanking database.
C . Grant database access to the Windows Bank Terminals group, and add the group to the BankTerminals role.
D . Grant the BankTerminals role the Execute permission for the Bank schema.
E . Grant the Windows Bank Terminals group the Execute permission for the Bank schema.
F . Grant the BankTerminals role the Execute permission for all stored procedures and user-defined functions in the Bank schema.
-
You need to design a method to configure the servers in the development department to meet the requirements of the chief information officer. What should you do?()
A . Use error reporting on all servers in the development department to report errors for a custom application
B . Configure all servers in the development department so that they do not require the CTRL+ALT+DELTE keys to pressed in order to log on interactively to the server
C . Create a Group Policy object (GPO) and link it to the development department’s Servers OU. Configure the GPO with an interactive logon policy to display a message for users who attempt to log on
D . Configure the screen saver on all servers in the development department to require a password
-
You need to design a method to address the chief information officer’s security concerns. What should you do?()
A . Configure Windows Management Instrumentation (WMI) filtering options in the Default Domain Policy GPO
B . Use the gpresult command
C . Use Mbsacli.exe
D . Configure software restriction policy options in the Default Domain Policy GPO
-
You need to design the storage of the loan response message. Which actions or actions should you perform?()
A . Use the xml data type to store the message.
B . Use a user-defined data type to store the message.
C . Use the nvarchar(max) data type to store the message.
D . Use a check constraint to validate that the correct tags are used.
E . Use an XML schema definition (XSD) to validate that the correct tags are used.
F . Use a foreign key constraint to validate that the correct tags are used.
-
You need to design a strategy for migrating to the mailboxes from Exchange Server 5.5 to Exchange Server 2003. What should you do?()
A . Use the Exchange Migration Wizard to migrate all the mailboxes to the Exchange 2003 Servers
B . Use the Exchange Mailbox Merge Wizard (Exmerge) to migrate all the mailboxes to use the Exchange 2003 servers
C . Use the Exchange Server Migration Wizard to migrate all the mailboxes to the Exchange 2003 Servers
D . Export the contents of each mailbox to a .pst file. Create a new mailbox on the Exchange 2003 servers for each existing mailbox. Import the .pst file contents into each new mailbox
-
You need to design the storage of the application texts for UI elements to fulfill the requirements. Which table and column design should you use?()
A . Languages (LanguageID, Name)Elements (ElementID, Description)ElementLanguages (ElementID, LanguageID, Text)
B . Languages (LanguageID, Name)Elements (ElementID, LanguageID, Description, Text)
C . Languages (LanguageID, Name)ElementTexts (LanguageID, Text)ElementDescriptions (ElementID, Description)
D . Languages (LanguageID, Name)Elements (ElementID, Description, Text)
-
You need to design a PKI for the Northwind Traders internal network. What should you do?()
A . Add an enterprise root CA to the northwindtraders.com domain. Configure cross-certification between the northwindtraders.com domain and the boston.northwindtraders.com domain
B . Add an enterprise subordinate issuing CA to the northwindtraders.com domain. Configure qualified subordination for the enterprise subordinate issuing CA in Boston
C . Add enterprise subordinate issuing CAs to the New York, Boston, and Seattle LANs. Configure qualified subordinations for each enterprise subordinate issuing CA
D . Add a stand-alone commercial issuing CA to only the northwindtraders.com domain. Configure cross-certification between the commercial CA and the boston.northwindtraders.com domai
-
You need to design a method to monitor the security configuration of the IIS server to meet the requirements in the written security policy. What should you do?()
A . Log on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the IIS server computer account
B . Run the Microsoft Baseline Security Analyzer (MBSA) on the IIS server and scan for vulnerabilities in Windows and IIS checks
C . Run Security Configuration and Analysis to analyze the IIS server’s security settings by using a custom security template
D . On the IIS server, run the gpresult command from a command prompt and analyze the output
-
You need to design a configuration for the mailbox servers. What should you do?()
A . Create two Exchange Server 2003 computers. Place the mailboxes for main office users on one server, and place the mailboxes for remote users on the other server
B . Create a Network Load Balancing cluster that contains two Exchange Server 2003 computers. Place half of the user mailboxes on one server, and place half of the user mailboxes on the other server
C . Create a Microsoft Cluster Server cluster that contains two Exchange Server 2003 computers. Place all of the user mailboxes on one server and configure the other server as a failover node
D . Create a Microsoft Cluster Server cluster that contains two Exchange Server 2003 computers. Place half of the user mailboxes on one server, and place half of the user mailboxes on the other server
-
You need to design an administrative model that meets the business and technical requirements. What should you do?()
A . Assign permissions to manage Mailbox and Exchange Server configuration to the server-admins group
B . Assign permissions to manage Mailbox and Exchange Server configuration to the domain-admins group
C . Assign permissions to manage Mailboxes to the server-admins group. Assign permissions to manage Exchange Servers configuration to the domain-admins group
D . Assign permissions to manage Mailboxes to the domain-admins group. Assign permissions to manage Exchange Servers configuration to the server-admins grou
-
You need to design the restrictions on the Bank.Customers table. Which three actions should you perform?()
A . Design a trigger that verifies that the first names and surnames are not empty strings.
B . Design a check constraint that verifies that the first names and surnames are not empty strings.
C . Design a check constraint that uses a CLR user-defined function to verify that either the phone number is a null value or the format of the phone number is valid.
D . Design a trigger that uses a CLR user-defined function to verify that either the phone number is a null value or the format of the phone number is valid.
E . Design a check constraint that ensures that the phone number cannot be changed from a valid format to a null value or to an invalid format.
F . Design a trigger that ensures that the phone number cannot be changed from a valid format to a null value.
-
You need to design a strategy for managing the messages that are sent to the customer service mailboxes. What should you do?()
A . Create a separate storage group and database to contain the customer service mailboxes. Enable circular logging for this storage group
B . Create a separate storage group and database to contain the customer service mailboxes. Set the deleted item retention period for this database to zero
C . Place the customer service mailboxes on a new mailbox store in the storage group that contains the main office user mailboxes. Enable circular logging for this storage group
D . Place the customer service mailboxes on a new mailbox store in the storage group that contains the branch office user mailboxes. Set the deleted item retention period for this database to zero
-
You need to recommend a configuration design for the new VMs. The design must ensure that operating systems can be deployed to the new VMs. What should you include in the recommendation?()
A . virtual machine queue (VMQ)
B . Virtual Machine Chimney
C . a synthetic network adapter
D . an emulated network adapter
-
You need to design a configuration for the Microsoft Outlook Web Access servers. What should you do?()
A . Create a Network Load Balancing cluster that contains the Outlook Web Access servers
B . Create a Microsoft Cluster Server cluster that contains the Outlook Web Access servers
C . Create public DNS host (A) resource records for each Outlook Web Access server. Instruct each user to connect to the server that contains his or her mailbox
D . Install Microsoft Application Center 2000 on the Outlook Web Access servers. Create a Web cluster that contains all of the Outlook Web Access server
-
You need to design an access control strategy for the Payment folder for the Sales Managers group. What should you do?()
A . Use IPSec in transport mode
B . Use Encrypting File System (EFS) over Web Distributed Authoring and Versioning (WebDAV)
C . Use PEAP-EAP-TLS
D . Use Encrypting File System (EFS) remote encryptio
-
You need to design a group membership strategy for the EditorialAdmins group. What should you do?()
A . Move the EditorialAdmins group to the Servers OU in the editorial department
B . Move the members of the EditorialAdmins group to the Editorial OU
C . Move the members of the EditorialAdmins group to the New York OU
D . Move the EditorialAdmins group to the New York OU
-
You need to design the deployment of antivirus software. What should you do?()
A . Install the antivirus software on each mailbox storage server
B . Install the antivirus software on each Outlook Web Access server
C . Install the antivirus software on one Outlook Web Access server at each office
D . Install the antivirus software on a back-end server that contains no mailboxe
-
You need to design an access control strategy for the Contact Info and the Order History folders. What should you do?()
A . Create a domain local group named Customer Relations in the northwindtraders.com domain. Add the Sales group and the Sales Managers groups to the Customer Relations group. Add the Customer Relationships group to the Customer Information folder. Assign the appropriate permissions. Add the accounts for the sales department users in Boston to the Boston Customer Relationship group. Add the Boston Customer Relationships group to the Customer Relations group. Disable inheritance on the Payment folder
B . Create a domain local group named Customer Relations in the boston.northwindtraders.com domain. Add the Customer Relations group to the Customer Information folder. Assign the appropriate permissions. Add the Boston Customer Relations group to the Customer Relations group. Disable permission inheritance on the Payment folder
C . Create a domain local group named Customer Relations in the boston.northwindtraders.com domain. Add the Customer Relations group to the Order History folder. Assign the appropriate permissions. Add the Boston Customer Relations group to the Customer Relations group. Disable permission inheritance on the Payment folder
D . Create a domain local group named Customer Relations in the boston.northwindtraders.com domain. Add the Customer Relations group to the Customer Information folder. Assign the appropriate permissions. Add the Boston Customer Relations group to the Customer **MISSING**
-
You need to design a strategy to increase security for the client computers in the finance department. Which two actions should you perform?()
A . Enable automatic certificate enrollment
B . Enforce smart card logons
C . Enable Encrypting File System (EFS) for offline files
D . Enable a screen saver password