New Semester
Started
Get
50% OFF
Study Help!
--h --m --s
Claim Now
Question Answers
Textbooks
Find textbooks, questions and answers
Oops, something went wrong!
Change your search query and then try again
S
Books
FREE
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Tutors
Online Tutors
Find a Tutor
Hire a Tutor
Become a Tutor
AI Tutor
AI Study Planner
NEW
Sell Books
Search
Search
Sign In
Register
study help
business
training kit windows server 2008 enterprise administrator
Mcitp Self Paced Training Kit Windows Server 2008 Enterprise Administrator 2nd Edition David R Miller ,John Policelli ,Paul Mancuso ,Orin Thomas ,Ian Mclean ,J C Mackin ,Grandmasters - Solutions
Understand the differences among operating system virtualization technologies.
You need to design a PKI for your company, Northwind Traders, whose network consists of a single Active Directory domain. You plan to deploy all company CAs on servers running Windows Server 2008 R2. Your goal is to automate the distribution of certificates to users as much as possible. Which of
Determine whether DFS is a suitable solution for your network.
What plans should you make to migrate the VMs hosted at the Warrandyte datacenter from Virtual Server 2005 R2 to Hyper-V?
Which of the following scenarios provides the most compelling case for the planned deployment of SCVMM 2008 R2?A. You need to virtualize four Windows 2000 Server computers.B. You want to be able to move virtualized servers between hosts on your Fibre Channel SAN.C. You are responsible for managing
The Wangaratta site currently hosts a Windows 2000 Server domain controller that also hosts the DHCP and DNS services. A Windows 2000 Server computer hosts a SQL Server 2000 database, and there are two additional Windows 2000 Server computers, each of which hosts custom business applications. These
You work as a systems administrator for a software development company. During the application development phase, it is necessary to deploy several versions of the same software from the same Remote Desktop Session Host. When you attempt to install the applications side by side, a conflict arises.
In which of the following situations must you plan to deploy Microsoft Application Virtualization for RDS?A. You want to deploy Microsoft Office 2007 applications by using RemoteApp from a single Remote Desktop Session Host.B. You want to deploy both Microsoft Office 2007 and Microsoft Office XP to
Your organization is about to open a branch office location in a suburb on the other side of the city in which the HQ site is located. You already use App-V to deploy several mission-critical applications to desktop computers at the HQ site. You plan to do the same for the new branch office
Which of the following App-V components is used to convert applications so that they can be deployed through Microsoft Application Virtualization Management Server as App-V applications for client computers?A. App-V data store B. App-V sequencer C. App-V Application Virtualization for RDS D. App-V
Which of the following high-availability solutions should you plan to deploy to ensure that the Microsoft Application Virtualization Management Server component of your application virtualization is still available in the event of a critical hardware failure?A. Deploy two servers in DNS round-robin
What plans should you make to address the needs of the Contoso users who are telecommuting?
What plans should you make to ensure that Contoso staff at the head and branch offices is able to access important line-of-business applications if a server and WAN links fail completely during a peak business period?
What aspects of Contoso’s operation strongly indicate the necessity of using an application deployment strategy that leverages Microsoft App-V Application Virtualization over other application deployment alternatives?
You are planning the deployment of SCVMM 2008 R2 to manage several hundred VMs hosted by Windows Server 2008 R2 computers with Hyper-V. Approximately 30 VMs are hosted on two Windows Server 2008 R2 computers in your organization’s screened subnet. Which of the following plans should you make to
Which of the following SCVMM 2008 R2 components should you plan to install at branch office locations where you will need to be able to rapidly deploy new VMs to virtual hosts at those sites?A. SCVMM database B. SCVMM self-service portal C. SCVMM server D. SCVMM library server
Which of the following are the management limits of a single-server SCVMM 2008 R2 deployment? (Choose two. Each correct answer forms a complete solution.)A. 400 virtual machine hosts B. 800 virtual machine hosts C. 1,200 virtual machine hosts D. 16,000 virtual machines E. 8,000 virtual machines
On which of the following platforms can you install the Hyper-V server role?A. A Server Core installation of the x64 version of Windows Server 2008 R2 Enterprise B. A Server Core installation of the x86 version of Windows Server 2008 R2 Datacenter C. A standard installation of the x86 version of
The Yarragon site currently hosts six terminal servers, each of which hosts a separate business application. One of these applications uses a SQL Server 2005 database. These applications cannot be colocated without causing problems on the host terminal servers. Because the Yarragon site has only a
Understand the DFS settings that are integral to an overall DFS design.
Which of the following tools can you use to apply an XML-formatted, role-based security policy remotely to 400 computers running Windows Server 2008 R2 located throughout an Active Directory forest in which your user account has administrative privileges?A. Security Configuration and Analysis tool
It is a high priority to deliver current information to employees about the validity of certificates issued to partners. Which method should you use to enable employee computers to check for revocation status?
You want to minimize the administrative difficulty of issuing certificates to users. Which certificate enrollment method should you recommend for Litware employees? For partners?
You want all user certificates issued to partners to have a lifetime of one year by default, but you want all user certificates issued to employees to have a lifetime of three years by default. How many CAs should the PKI include, at a minimum?
You need to design your PKI environment to be able to determine if specific issued certificates are no longer being honored by the organization, such as when an employee who had been issued a user certificate quits. Which of the following could you configure to accomplish this? (Choose two. Each
You run a Windows Server 2008 Service Pack 1 PKI system and have configured the use of digital certificates for your network devices. You wish to configure the PKI environment to automatically renew these device certificates when they approach expiration.What do you need to do to accomplish this?A.
Assume that the headquarters site and all branch offices include a domain controller for the fabrikam.com domain. If the currency of revocation data is a low priority and the ease of implementation is a high priority, which type of distribution point should you use to publish certificate validity
You want a single technology to support the distribution of revocation information for all clients in your organization. Which revocation technology is best suited to support the CA supporting clients internal to fabrikam.com—OCSP or CRLs?
If the internal web server will be used by all employees, what is the best method to distribute certificates to support connections to the server—autoenrollment or web enrollment?
You want the internal web server to support SSL with both server and client authentication. Should the certificates used to support SSL on this web server originate from an enterprise CA, a stand-alone CA, or a public CA?
You want the external web server to support SSL with server authentication and encryption. Should the certificate used to support SSL on this web server originate from an enterprise CA, a stand-alone CA, or a public CA?
When is it preferable to use web-based CRL publication points?
Which of the following is used to verify the identity of the end entity before issuing a digital certificate?A. CA B. CDP C. RA D. OCSP
You work as an IT administrator in a large company, City Power and Light, which operates in an Active Directory environment. The company needs a PKI branch to authenticate its internal users, computers, network devices, and applications. It also plans to develop a relationship with an external
You work as an IT administrator in a large company, City Power and Light. The cpandl.com network consists of a single AD DS domain.You are a member of a team designing a new in-house PKI for use with EFS. Your goals are to minimize the risk that the entire PKI will be compromised and to minimize
In what mode should you deploy a downstream WSUS 3.0 SP2 server if you want it to use the approvals and computer group configuration of the designated upstream server?
In what mode should you deploy a downstream WSUS 3.0 SP2 server if the local branch office administrator will be responsible for the approval of software updates?
You are planning the deployment of a software update solution to an organization that has 300 computers running Windows Vista, 120 computers running Windows 7, and 20 computers running Windows Server 2008 R2, all hosted at a single site. The organization has a single domain forest, and all
Determine whether Microsoft Office SharePoint Server 2007 is a suitable solution for your network.
You want to perform a daily check of the intranet servers in the cohowinery.internal forest to verify that their configuration still conforms to the applied security policy. You want to run this check from your management server in the cohowinery.internal forest and have the results output in HTML
Which tools can you use to create role-based policies for the intranet servers?
The intranet servers use both the 32-bit and 64-bit versions of Windows Server 2008 as their operating system. How many role-based security policies should you develop for these servers?
Which type of report should you instruct the CIO to generate to gain detailed information about the specific computers on which a particular update’s installation has failed?
How should you configure the update source of downstream WSUS servers at the Fabrikam satellite offices?
To which local group on the computer running Windows Server 2008 R2 hosting WSUS should you add the CIO’s user account?
You need a list of computers on which a recent update did not install so that you can send a technician to investigate further. Which of the following WSUS 3.0 SP2 reports should you generate to locate this information quickly?A. Update Status Summary B. Computer Status Summary C. Update Detailed
Which of the following security settings, when remotely applied to a group of computers running Windows Server 2008 R2 in an Active Directory forest, will take precedence over all the others?A. Security settings applied through Group Policy B. Security settings applied using the Scwcmd command-line
Tailspin Toys has a single domain forest with 700 client computers running Windows 7 and 24 computers running Windows Server 2008 R2. You are planning the deployment of a product that will be able to perform compliance reporting on all computers in the tailspintoys.internal domain to ensure that a
You are the enterprise administrator for a large metropolitan university where more than 5,000 computers running Windows Vista, 1,000 computers running Windows 7, and 200 servers running Windows Server 2008 R2 have been deployed. You need to be able to deploy software updates for Microsoft and
Which method can you use to ensure that all security and critical updates deploy to computers in the PatchTest computer group, using WSUS?A. Create a scheduled task.B. Create an Automatic Approval rule that uses the All Computers group as a target.C. Create an Automatic Approval rule that uses the
You want to stagger the rollout of updates from your organization’s WSUS 3.0 SP2 server on a departmental basis. The computer accounts for the computers in each department are located in departmental organizational units (OUs). Which of the following should you do? (Choose two. Each answer forms
You are in the process of planning the deployment of WSUS at a university. The university contains five colleges, each of which has its own IT staff and Active Directory forest. The university has a single connection to the Internet through which all traffic passes and wants to minimize the amount
Why should a root CA remain offline?
Which of the following is used to control the use of digitally signed executables?A. DirectAccess B. Hyper-V C. AppLocker D. OCSP
Determine whether Microsoft Windows SharePoint Services 3.0 is a suitable solution for your network.
Are there any hardware prerequisites to meet requirement B? If so, what are they?
Which security feature should you use to meet requirement B?
Are there any hardware prerequisites to meet requirement A? If so, what are they?
Which security feature should you use to meet requirement A?
As a best practice, how many EFS recovery agents should you designate per OU?
Your company has a single Active Directory Domain Services forest with a single domain. The domain functional level and the forest functional level are set to Windows Server 2003. All domain controllers have Windows Server 2008 installed. You deploy new Windows Server 2008 R2–based DFS servers.
You are planning a collaboration solution for your company. You need to ensure the solution provides access to real-time, interactive Microsoft Office Excel 2007 spreadsheets from a web browser.How should you enable this functionality?A. Deploy Distributed File System.B. Deploy Windows SharePoint
You have implemented a domain-based DFS namespace that spans all five sites of your company network in London, New York, Los Angeles, Toronto, and Sydney. The site link costs among all sites are configured as equal at all five sites.A certain folder named Marketing in the DFS namespace includes
At a minimum, which solution or solutions should you implement to meet the stated requirements for the Bangalore project?
At a minimum, which solution or solutions should you implement to meet the stated requirements for the London project?
At a minimum, which solution or solutions should you implement to meet the stated requirements for the San Jose project?
Assuming that the design goals of making files available locally are met, how can you automatically redirect users to files in the opposite branch when the local server is unavailable?
At a minimum, which solution or solutions should you implement to meet the stated requirements for the Boston project?
How can you keep a specific file from replicating in a DFS namespace?
Which security solution should you use to meet requirement C?
What technology should you deploy to meet requirement D?
You want to deploy Microsoft SQL Server 2008 on a database server to store confidential data that is accessed infrequently. The server itself is rack-mounted and is not likely to be stolen, but the disks are hot-swappable and could feasibly be removed by an intruder. You want to ensure that even if
Which of the following applications does NOT require the use of certificates?A. Encrypting File System (EFS)B. Secure/Multipurpose Internet Mail Extensions (S/MIME)C. Internet Protocol Security (IPsec)D. Secure Sockets Layer (SSL)
What kind of security services should be offered by using certificates?
What applications should be secured with certificates?
If the lifetime of an issued user certificate is two years, what should normally be the minimum lifetime of the certificate for the issuing CA?
Which feature should you use to meet the requirement for database servers?
Which technology should you use to meet the requirement to protect confidential email?
Which technology should you use to meet the goals for department file shares? How should you meet the requirement to avoid intersite communication for department share queries?
At a minimum, what technology should you use to meet the need to assemble team websites?
The domain controller that holds the PDC emulator role fails and you are unable to recover it. You take the domain controller offline and seize the PDC emulator role from this domain controller. You determine the cause of the failure to be a faulty motherboard. You replace the motherboard on this
You are planning to deploy BitLocker in your organization. You need to ensure data is protected if drives are stolen from computers. Additionally, this should be accomplished without user intervention. Which BitLocker authentication method should you choose?A. BitLocker with a TPM only B. TPM with
Which of the following is NOT a legitimate business reason to require the use of digital certificates or a PKI?A. Business partnership requirements B. Legal or regulatory requirements C. Corporate security policy requirements D. Corporate loan requirements
You are planning to deploy BitLocker in your organization. You need to ensure data is protected if computers are stolen. Which BitLocker authentication method should you choose?A. BitLocker with a TPM only B. TPM with USB flash device C. TPM with PIN D. USB flash device only
If you want to design a domain controller’s storage for maximum recoverability, which three elements should all be kept on separate volumes that do not contain user or application data?
You are planning a failover cluster for a database server. You want the server to include two nodes, and you want to include a witness (quorum) disk in your design. Which quorum configuration should you choose?A. Node majority B. Node and disk majority C. Node and file share majority D. No
You are designing a disaster recovery strategy for your AD DS environment. You need to ensure that your disaster recovery strategy includes steps to recovery from accidental deletions of OUs. What should you do?A. Plan to perform an authoritative restore.B. Plan to perform a nonauthoritative
Identify the basic components that establish electronic security on a network.
Describe the major components of physical security for the branch office.
Your HQ has a DHCP server. You are designing a new branch office. You need to provide dynamic IP addressing to branch office clients, even if the WAN link fails between HQ and the new branch office. What should you do?A. Install a DHCP relay agent in the branch office.B. Configure a superscope on
Which of the following provides user data fault tolerance in a branch office?A. Read-only domain controller (RODC)B. Clustering C. Server Core D. DFS replication
What new feature of Windows Server 2008 gives a branch office administrator the privilege of logging onto a domain controller for server administration but does not give the administrator the privilege of administering Active Directory?A. Read-only domain controller (RODC)B. Server Core domain
Describe the features in Windows Server 2008 that you can use to satisfy specific security targets.
Describe how to use an RODC to provide increased security in the branch office.
Describe how to design a Password Replication Policy to maximize security on the RODC.
Describe how to use the Windows Server 2008 Server Core and the Windows Server 2008 Server Core domain controller server installation to provide increased security in the branch office.
Describe how to secure data in storage on servers in the branch office.
Encryption for data in storage can be provided by which Microsoft technologies in Windows Server 2008 R2?
What tool does Windows Server 2008 R2 provide to reset passwords of accounts on RODC servers that become compromised?
What type of domain controller should be implemented in the branch office for maximum security?A. RODC on a Windows Server Full Installation B. RODC on a Server Core Installation domain controller C. Full (writable) domain controller on a Windows Server Full Installation D. Full (writable) domain
Showing 900 - 1000
of 1217
1
2
3
4
5
6
7
8
9
10
11
12
13
Step by Step Answers