-
You need to design a patch management strategy for Northwind Traders. What should you do?()
A . Configure the Default Domain Policy Group Policy object (GPO) for the northwindtraders.com domain to configure client computers to download updates from the SUS server in New York. Configure the Default Domain Policy GPO for the boston.northwindtraders.com domain to configure client computers to download updates from the SUS server in New York
B . Use Group Policy to configure client computers to download updates from a Windows Update server on the Internet. Configure the Default Domain Policy Group Policy object (GPO) with a startup script that runs Mbsacli.exe. Configure it to scan the computers in both of the branch offices
C . Install and configure a SUS server in the Boston branch office. Configure the server to download updates from a Windows Update server on the Internet. Configure Microsoft Baseline Security Analyzer (MBSA) to scan for updates and computers in the New York office
D . Install and configure a SUS server in each branch office. Configure the SUS servers to download updates from the New York SUS server. Configure Microsoft Baseline Security Analyzer (MBSA) to scan for updates on computers in the New York office
-
You need to design a strategy to meet the company’s requirements for e-mail. What should you do?()
A . Configure and publish a certificate template that is suitable for S/MIME, Deploy a Group Policy object (GPO) so that a certificate that is based on this template is automatically issued to all domain users
B . Specify Group Policy objects (GPOs) and IPSec policies that require all client computers to use Kerberos authentication to connect to mail servers
C . For each mail server, acquire an SSL server certificate from a commercial CA whose root certificate is already trusted
D . Require IPSec encryption on all TCP connections that are used to send or receive e-mail message
-
You need to design a storage mode for the ProductOrderStatus measure group. What should you do?()
A . Use ROLAP for the Historical partition and MOLAP for the CurrentDay partition.
B . Use MOLAP for the Historical partition and ROLAP for the CurrentDay partition.
C . Use ROLAP for the Historical partition and Automatic MOLAP for the CurrentDay partition.
D . Use HOLAP for the Historical partition and Low-latency MOLAP for the CurrentDay partition.
-
You need to design a method to implement account policies that meets the requirements in the written security policy. What should you do?()
A . Create a GPO and link it to the New York OU, to the Denver OU, and to the Dallas OU.Configure the GPO with the required account policy settings
B . On all computers in the domain, configure the Local Security Policy7 with the required account policy settings
C . Configure the Default Domain Policy GPO with the required account policy settings
D . Configure the Default Domain Controllers Policy GPO with the required account policy setting
-
You are designing a Windows Server 2008 R2 Hyper-V environment. Your design includes a failover cluster that supports live migration. You need to ensure that the network supports this design. What should you do?()
A . Use two iSCSI host bus adapters
B . Use two Fibre Channel host bus adapters
C . Place the physical host servers on the same TCP/IP subnet
D . Place the physical host servers on different TCP/IP subnet
-
You need to design a patch management strategy that meets business requirements. What should you do?()
A . Install Systems Management Server (SMS) on a computer on the internal network. Use the Default Domain Policy GPO to distribute the SMS client software to all computers in the domain
B . Install Microsoft Operations Manager (MOM) on a computer on the internal network. Use the Default Domain Policy GPO to distribute the MOM client software to all computers in the domain
C . Install Software Update Services (SUS) on a Web server, and configure it to synchronize and approve updates nightly. Configure client computers to receive automatic updates from the Web server. Ensure that users restart their client computers daily
D . Install Software Update Services (SUS) on a domain controller, and configure it to synchronize and approve updates nightly. Configure client computers to receive automatic updates from the domain controller. Ensure that users restart their client computers daily
-
You need to design a password policy that meets business requirements. What should you do? Select all that apply.()
A . Increase the number of passwords that are remembered
B . Disable reversible encryption
C . Set the minimum password age to zero days
D . Increase the maximum password age
-
You need to design a method to address the chief information officer’s security concerns. What should you do?()
A . Configure Windows Management Instrumentation (WMI) filtering options in the Default Domain Policy GPO
B . Use the gpresult command
C . Use Mbsacli.exe
D . Configure software restriction policy options in the Default Domain Policy GPO
-
You need to design a monitoring strategy to meet business requirements for data on servers in the production department. What should you do?()
A . Use the Microsoft Baseline Security Analyzer (MBSA) to scan for Windows vulnerabilities on all servers in the production department
B . Run Security and Configuration Analysis to analyze the security settings of all servers in the production department
C . Enable auditing for data on each server in the production department. Run System Monitor on all servers in the production department to create a counter log that tracks activity for the Objects performance object
D . Create a Group Policy Object (GPO) that enables auditing for object access and link it to the product department’s Servers OU. Enable auditing for data on each server in the production department
-
You need to design a strategy for migrating to the mailboxes from Exchange Server 5.5 to Exchange Server 2003. What should you do?()
A . Use the Exchange Migration Wizard to migrate all the mailboxes to the Exchange 2003 Servers
B . Use the Exchange Mailbox Merge Wizard (Exmerge) to migrate all the mailboxes to use the Exchange 2003 servers
C . Use the Exchange Server Migration Wizard to migrate all the mailboxes to the Exchange 2003 Servers
D . Export the contents of each mailbox to a .pst file. Create a new mailbox on the Exchange 2003 servers for each existing mailbox. Import the .pst file contents into each new mailbox
-
You need to design a PKI for the Northwind Traders internal network. What should you do?()
A . Add an enterprise root CA to the northwindtraders.com domain. Configure cross-certification between the northwindtraders.com domain and the boston.northwindtraders.com domain
B . Add an enterprise subordinate issuing CA to the northwindtraders.com domain. Configure qualified subordination for the enterprise subordinate issuing CA in Boston
C . Add enterprise subordinate issuing CAs to the New York, Boston, and Seattle LANs. Configure qualified subordinations for each enterprise subordinate issuing CA
D . Add a stand-alone commercial issuing CA to only the northwindtraders.com domain. Configure cross-certification between the commercial CA and the boston.northwindtraders.com domai
-
You need to design a PKI for Litware, Inc. What should you do?()
A . Add one offline stand-alone root certificate authority(CA).Add two online enterprise subordinate CAs
B . Add one online stand-alone root certification authority(CA).Add two online enterprise subordinate CAs
C . Add one online enterprise root certification authority CA).Add one offline enterprise subordinate CA
D . Add one online enterprise root certification authority(CA).Add two online enterprise subordinate CA
-
You need to design a configuration for the mailbox servers. What should you do?()
A . Create two Exchange Server 2003 computers. Place the mailboxes for main office users on one server, and place the mailboxes for remote users on the other server
B . Create a Network Load Balancing cluster that contains two Exchange Server 2003 computers. Place half of the user mailboxes on one server, and place half of the user mailboxes on the other server
C . Create a Microsoft Cluster Server cluster that contains two Exchange Server 2003 computers. Place all of the user mailboxes on one server and configure the other server as a failover node
D . Create a Microsoft Cluster Server cluster that contains two Exchange Server 2003 computers. Place half of the user mailboxes on one server, and place half of the user mailboxes on the other server
-
You need to design a PKI that meets business requirements. What should you do?()
A . Move ATLCA1 offline and create an enterprise subordinate CA to issue certificates
B . Create a stand-alone subordinate CA to issue certificates
C . Use a qualified subordinate CA
D . Configure certificate template access control lists (ACLs) on ATLCA1
-
You need to design a strategy for managing the messages that are sent to the customer service mailboxes. What should you do?()
A . Create a separate storage group and database to contain the customer service mailboxes. Enable circular logging for this storage group
B . Create a separate storage group and database to contain the customer service mailboxes. Set the deleted item retention period for this database to zero
C . Place the customer service mailboxes on a new mailbox store in the storage group that contains the main office user mailboxes. Enable circular logging for this storage group
D . Place the customer service mailboxes on a new mailbox store in the storage group that contains the branch office user mailboxes. Set the deleted item retention period for this database to zero
-
You need to design a PKI solution that meets business and security requirements. What should you do?()
A . Implement an enterprise root CA in the corp.woodgrovebank.com domain.Implement subordinate CAs in each child domain. Take the root CA offline
B . Implement an enterprise root CA in the corp.woodgrovebank.com domain
C . Implement an enterprise root CA in each of the child domains. Take the enterprise CA in each domain offline
D . Implement an enterprise root CA in the corp.woodgrovebank.com domain. Implement a stand-alone root CA in each of the child domai
-
You need to design a certificate management process for internal users. What should you do?()
A . Establish a Web enrollment service for internal users to request access to resources
B . Grant Enrollment Agent rights to users
C . Establish enrollment stations and store user certificates in a smart card
D . Create Connection Manager scripts to identify the client computer operating system, and configure Web proxy settings to specify the appropriate Web enrollment service
-
You need to design a configuration for the Microsoft Outlook Web Access servers. What should you do?()
A . Create a Network Load Balancing cluster that contains the Outlook Web Access servers
B . Create a Microsoft Cluster Server cluster that contains the Outlook Web Access servers
C . Create public DNS host (A) resource records for each Outlook Web Access server. Instruct each user to connect to the server that contains his or her mailbox
D . Install Microsoft Application Center 2000 on the Outlook Web Access servers. Create a Web cluster that contains all of the Outlook Web Access server
-
You need to design a method to deploy security configuration settings to servers. What should you do?()
A . Run the Resultant Set of Policy wizard with a Windows Management Instrumentation (WMI) filter on each department’s Server OU
B . Log on to each server and use local policy to configure and manage the security settings
C . Create a customer security template. Log on to a domain controller and run the seceditcommand to import the security template
D . Create a customer security template. Create a GPO and import the security template. Link the GPO to each department’s Server OU
-
You need to design a Security strategy for the wireless network at all resort locations.What should you do?()
A . Connect the wireless access points to a dedicated subnet. Allow the subnet direct access to the Internet,but not to the company network.Require company users to establish a VPN to access company resources
B . Install Internet Authentication Service (IAS) on a domain controller.Configure the wireless access points to require IEEE 802.1x authentication
C . Establish IPSec policies on all company servers to request encryption from all computers that connect from the wireless IP networks
D . Configure all wireless access points to require the Wired Equivalent Privacy (WEP) protocol for all connections. Use a Group Policy object (GPO) to distribute the WEP keys to all computers in the domai
-
You need to design a security strategy for a remote e-mail access. What should you do?()
A . Require remote users to access e-mails by using Outlook Mobile Access
B . Require Outlook Web Access users to install the secure MIME ActiveX-Control and to encrypt all messages
C . On Outlook Web Access servers that accept connections from the Internet configure IIS to require SSL for all connections
D . On Outlook Web Access servers that accept connections from the Internet configure IIS to require Integrated Windows Authenticatio
-
You need to design a group membership strategy for the EditorialAdmins group. What should you do?()
A . Move the EditorialAdmins group to the Servers OU in the editorial department
B . Move the members of the EditorialAdmins group to the Editorial OU
C . Move the members of the EditorialAdmins group to the New York OU
D . Move the EditorialAdmins group to the New York OU
-
You need to design a migration path for migrating user accounts and mailboxes to the new environment. Which two actions should you perform?()
A . Use the Migration Wizard to create and migrate mailboxes to Exchange Server 2003
B . Use Active Directory Users and Computers to move user accounts and mailboxes to the new environment
C . Use Microsoft Identity Integration Server (MIIS) to synchronize user accounts with the new environment
D . Use the Active Directory Migration Tool (ADMT) to clone user accounts in Active Directory
E . Use ClonePrincipal to migrate user accounts to the new environment
-
You are designing a Windows Server 2008 R2 Hyper-V environment. Your design includes a failover cluster that supports live migration. You need to ensure that the network supports this design. What should you do?()
A . Use two iSCSI host bus adapters
B . Use two Fibre Channel host bus adapters
C . Place the physical host servers on the same TCP/IP subnet
D . Place the physical host servers on different TCP/IP subnet