New Semester
Started
Get
50% OFF
Study Help!
--h --m --s
Claim Now
Question Answers
Textbooks
Find textbooks, questions and answers
Oops, something went wrong!
Change your search query and then try again
S
Books
FREE
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Tutors
Online Tutors
Find a Tutor
Hire a Tutor
Become a Tutor
AI Tutor
AI Study Planner
NEW
Sell Books
Search
Search
Sign In
Register
study help
business
training kit windows server 2008 enterprise administrator
Mcitp Self Paced Training Kit Windows Server 2008 Enterprise Administrator 2nd Edition David R Miller ,John Policelli ,Paul Mancuso ,Orin Thomas ,Ian Mclean ,J C Mackin ,Grandmasters - Solutions
Which installation of a domain controller provides the most security?
Which installation of a domain controller provides increased security and a full graphical user interface?
Describe the mechanisms used to improve the availability of information system services and resources in the branch office.
Which computers should be exempt from NAP IPsec enforcement?
Consider creating NAP IPsec client groups for computers that require NAP IPsec enforcement and for those that should be exempt.
Run an extensive limited trial prior to broader implementation to ensure that possible issues that you might encounter have been appropriately addressed.
Choose the appropriate decision points when deciding to implement NAP. (Choose all that apply.)A. Provides a safer environment for trusted computers B. Enforces a policy on the health level of the computers in the trusted environment C. Provides a firewall block against would-be attackers D.
Choose the correct statement when determining which NAP enforcement method meets a stated policy goal of that NAP enforcement type.A. 802.1x enforcement provides end-to-end secure communications of NAPcompliant clients.B. DHCP enforcement enables an administrator to mandate the use of a VLAN ID in
Clients at the larger branch offices access servers at the main office. Several users at two of the branch offices access one of the database clusters that has been deemed a high-value server. How would you apply an IPsec NAP solution at these offices?
Support staff at the branch office require access to the servers running Exchange Server and access to file servers that all reside at the main office. None of these resource servers have been deemed high-value servers. Will an IPsec NAP enforcement solution be necessary at these branch offices?
Describe the server roles and their uses in the branch office implementation.
Identify the network infrastructure services and know how to deploy them in a branch office environment.
Describe the components required to provide reliable and secure authentication to branch offices.
Describe the concept of Administrator Role Separation.
Describe the advantages and disadvantages of using full, read-only, and Server Core domain controllers in a branch office.
Describe the benefits and ramifications of performing forest restructuring when implementing branch offices.
Which computers require IPsec enforcement?
How can you ensure that replication will successfully occur to a site with only one Windows Server 2008 RODC?A. Place a Windows Server 2008 full (writable) domain controller in the site nearest to the RODC.B. Place a Windows Server 2008 R2 RODC in the site nearest to the RODC.C. Make the site-link
What is the first action to take if you receive a report that one of the branch offices has had an RODC stolen?A. Implement Administrator Role Separation on the replacement RODC.B. Use ADSI Edit to construct a new PSO.C. Construct a new IFM disk.D. In Active Directory Users and Computers, delete
Clients connecting to RD-Alpha and RD-Beta at the Sydney head office site are reporting that performance has degraded significantly. It is likely that the number of users at the head office that need to use application Alpha and application Beta will increase threefold in the next financial year.
You are planning the deployment of Remote Desktop licensing for your organization’s Australian subsidiary. Your organization has two offices, one located in Brisbane and one located in Adelaide. A data center in Hobart hosts infrastructure servers. Both the Brisbane and Adelaide offices have
You are planning the deployment of RD Licensing servers. Which of the following steps do you need to take prior to installing Remote Desktop Services CALs on an RD Licensing server?A. Set the forest functional level to Windows Server 2008.B. Set the domain functional level of each domain in the
The organization for which you work is going through a period of growth. Users access business applications from client terminals. You are concerned that the growth in users will outstrip the processing capacity of the RD Session Host. Which of the following solutions enables you to increase the
You need to ensure that clients connecting to your RD Session Hosts have passed a health check. Which of the following deployments should you implement?A. Install Microsoft Forefront Client Security on the RD Session Hosts.B. Implement an RD Connection Broker.C. Mediate access using an RD Gateway
Which application deployment method would be most appropriate for use in the wingtiptoys.design forest, and why?
Which application deployment infrastructure plans would you make for the wingtiptoys.internal forest? Include information about the infrastructure that will be deployed at each Active Directory site.
Under what circumstances would it be necessary to use System Center Configuration Manager 2007 rather than System Center Essentials 2010 as an application deployment solution for the wingtiptoys.development forest?
You are planning an application deployment strategy for a single domain forest that has 600 client computers spread across five Active Directory sites. Which of the following technologies can you use to deploy applications to all client computers in this environment? (Choose two. Each correct
You are planning to use Group Policy software deployment to deploy several important applications to client computers on your organization’s network. Before performing the actual deployment, you want to verify that the Group Policy configuration will behave in the planned manner. Which of the
You are planning the deployment of an important computer-aided design (CAD)application to a select group of users within your organization. You need to ensure that the application will be removed from the users’ computers if they are transferred to another department and their user accounts are
As part of your application deployment plans, you want to review application deployment every six months to ensure that your organization is using software licenses efficiently. You want to locate those computers in your organization that have unused applications. Which of the following tools
The purchase and management of Remote Desktop Services CALs should be handled separately. What plans should be made for an RD Licensing server deployment?
The RD Session Host in the Queensland office is reaching capacity and cannot be upgraded further. How can you continue to service clients in the Queensland office and ensure that interrupted sessions are reconnected?
What plans should you make for the deployment of Remote Desktop license servers on the Tailspin Toys network to mirror the company’s current software purchasing arrangements and to ensure that a license server is still accessible in the event of a hardware failure?
Twenty members of the accounting team need access to the front-end financial application installed on the RD Session Host. Which steps can you take to allow only these users access from anywhere, using the required TLS security layer for communications, and not configure certificates for each
What type of servers should be used in the branch offices?
What type of domain controllers should be used in the branch offices?
What privileges should the administrators in the branch offices be granted?
How can you improve security on the operating system and data files that reside on the domain controllers in Syracuse?
How should you satisfy the need for a stronger password policy for users in Schenectady?
What steps should you take to securely deploy the new RODC in Saskatchewan?
How should you configure delegated authority for the administrator in Saskatchewan?
What will be the anticipated deployment size for remote users and devices?
Will there be a need to provide Remote Desktop Session licensing for Windows Server 2008 Terminal Services? If so, what is the scope of the license server? Will it service clients in the domain or workgroup, or manage the licenses for all clients in the forest?
How will the license server be activated with Microsoft? How will additional licenses be purchased and installed?
How many license servers are required to service the needs of your organization?
What type of licenses will be deployed?
Which type of Remote Desktop Services CAL can be revoked?
At what point should you install the applications that will be used by Remote Desktop Services clients on the RD Session Host server?
What steps must you take to ensure that Windows Vista clients can access RemoteApp applications through RD Web Access?
Describe the process for implementing NAP policies.
Issue the appropriate certificates for each of the previous two groups to ensure proper identity for determining which systems require NAP IPsec enforcement.
Design the Active Directory Domain Services administrative model.
Design an enterprise-level Group Policy strategy.
Design for data management and data access.
What are the three main aspects of an enterprise’s administrative structure that you need to consider when planning an AD DS administration delegation model?
What are the attributes of a well-implemented delegation model?
One of your administrators is setting up AD DS replication auditing. What are the two auditing levels from which she can choose?
Northwind Traders is a large multinational company with offices located in a number of countries spread over several continents. Each national office has a high degree of autonomy and its own administrative staff. Some Group Policy settings are specified by the head office in Detroit, but the vast
Which of the following management roles does Microsoft recommend for delegating data management? (Choose all that apply.)A. Business Unit Administrators B. Security Policy Administrators C. Service Administration Managers D. Resource Administrators E. Security Group Administrators F.
Which Windows Server 2008 R2 global audit policy controls whether auditing for directory service events is enabled or disabled, and what is the default setting?A. Audit Directory Service Access. This is disabled by default.B. Audit Directory Service Access. This is enabled by default.C. Directory
You administer a Windows Server 2008 R2 single-domain AD DS forest. Your organization recently acquired another company that uses a Windows NT 4.0 domain. You need to set up a trust relationship with the Windows NT 4.0 domain. What sort of trust do you use?A. Forest trust B. Realm trust C. Shortcut
You are designing a Group Policy strategy and plan to give members of the software developers’ security group permission to link certain GPOs that have already been created to specific OUs within your organization. You do not want to allow members of the software developers’ security group to
By default, members of which group can create PSOs?
You are planning your Group Policy structure. Which of the following statements represents good advice?A. Keep the number of GPOs to an absolute minimum by having many configuration settings in a single GPO.B. If you have two OUs at geographically remote sites that have the same Group Policy
Which of the following interfaces are components of the AD DS data store? (Choose all that apply.)A. Directory Server Agent (DSA)B. Messaging Application Programming Interface (MAPI)C. Security Accounts Manager (SAM)D. Replication (REPL)E. Lightweight Directory Access Protocol (LDAP)F. Extensible
You want to use Group Policy to control device installation in accordance with company policy. You want administrators to be able to install any device. You do not want standard users to be able to install any devices except for one device that has been approved by the company. You know the
Historically, the administrator team has mostly been involved in emergency resolution, and changes were made to AD DS that were not well documented. The technical director requires you to maintain an audit trail of AD DS changes, including what the original configurations are before changes are
The organization that you work for wants your assistance in planning the deployment of a solution that will ensure that new employee data entered in the human resource Oracle 9i database is synchronized with your organization’s Windows Server 2008 AD DS and Exchange Server 2007 deployments. Which
What plans could you make to migrate the Wingtip Toys payroll application to Tailspin Toys?
What plans could you make to simplify authentication to the Tailspin Toys accounting applications for Wingtip Toys staff?
On which domain controller should you perform the first forest preparation task?
Which of the Windows Server 2003 domain functional levels do not support the introduction of Windows Server 2008 R2 domain controllers?
Which steps should you include in your plans with respect to the tailspintoys.internal root domain?
Assuming that the operations master roles are distributed across Windows Server 2003 domain controllers in the forest root domain so that no one domain controller hosts more than a single role, on which of the following computers should you run the adprep /forestprep command?A. Domain controller
You have upgraded the forest root domain so that it now has Windows Server 2008 R2 domain controllers. You now plan to upgrade a child domain in the same forest. Assuming that no domain controller in the forest hosts more than one flexible single master operations (FSMO) role, on which domain
You are planning the migration of several thousand user accounts from the maffra.contoso.internal domain to the traralgon.fabrikam.internal domain. Each domain is in a separate AD DS forest. Each AD DS forest is configured to run at the Windows Server 2008 R2 functional level, and the forests share
You are planning a two-way forest trust between the Contoso and Fabrikam organizations. You want to ensure that only authorized users from each trusted forest have access to resources in the trusting forest. Many resources are available to authenticated users in each forest. These resources should
Determine the types of scenarios in which it is necessary to deploy AD FS 2.0.
Determine which interoperability technology to deploy for UNIX-based computers, based on organizational needs.
What does the deployment of AD FS 2.0 enable you to accomplish?
Which role services are included with AD FS 2.0?
What steps must you perform to ensure that the NIS master server is a computer running Windows Server 2008 R2 rather than a UNIX-based computer?
What steps must you perform to ensure that users who switch between Windowsbased and UNIX-based client computers use the same passwords for their user accounts?
What steps must you perform prior to decommissioning the UNIX-based file servers that UNIX-based client computers use?
In which of the following situations would you plan to deploy Active Directory Federation Services 2.0?A. You need to share files on a computer running Windows Server 2008 R2 to clients running UNIX-based operating systems.B. You need to synchronize user account passwords between computers running
Your predominantly Windows-based organization has recently acquired a company that uses UNIX-based computers for all client and server computers. The recently acquired company has a significant amount of spare office space. A nearby branch office has older facilities, so there is a plan to redeploy
You are putting the finishing touches on a plan to migrate several branch offices to Windows Server 2008 R2. Each branch office currently has an old UNIX-based computer that hosts several POSIX-compliant applications. You want to minimize the amount of hardware present at each branch office. Which
You have identified an OU that contains several security groups. You ask one of your administrators to create a GPO and to link it to the OU. However, the policy settings in the GPO should apply to only two of the groups and not to the remaining groups. Your team member is unsure how to do this.
A member of your team uses Group Policy to deploy isolation policies to a group of servers in your organization. After deploying the servers, you have determined that the isolation policies are not being applied to several of the servers. Which Group Policy Management Console tool should your team
Which authentication mechanisms are acceptable?
Which security policies exist to secure communication through your corporate firewall?
Which security requirements exist regarding encrypted communications?
Which operating systems do your VPN clients use?
How should NAP be integrated with VPN enforcement?
What public key infrastructure (PKI) support is needed for VPN access methods?
How should VPN servers deployed for Internet and extranet access be secured?
Which authentication methods should be supported when considering an eventual NAP deployment?
Which VPN protocols for remote access are available?
Currently, all staff at Litware can install USB flash memory devices on their client workstations and upload and download files. The technical director sees this as a security risk and wants only administrators to be able to install such devices. However, he does not want to lose the ability to
Showing 1000 - 1100
of 1217
1
2
3
4
5
6
7
8
9
10
11
12
13
Step by Step Answers