New Semester
Started
Get
50% OFF
Study Help!
--h --m --s
Claim Now
Question Answers
Textbooks
Find textbooks, questions and answers
Oops, something went wrong!
Change your search query and then try again
S
Books
FREE
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Tutors
Online Tutors
Find a Tutor
Hire a Tutor
Become a Tutor
AI Tutor
AI Study Planner
NEW
Sell Books
Search
Search
Sign In
Register
study help
business
training kit windows server 2008 enterprise administrator
Mcitp Self Paced Training Kit Windows Server 2008 Enterprise Administrator 2nd Edition David R Miller ,John Policelli ,Paul Mancuso ,Orin Thomas ,Ian Mclean ,J C Mackin ,Grandmasters - Solutions
A member of your administrative team informs you that she cannot get the finegrained password policy to work, even though all domain controllers now run Windows Server 2008 R2. What do you advise her to do?
Some members of staff (for example, the CEO) want to use simple passwords, although the default policy for the litware.com domain enforces complex passwords. This is possible in Windows Server 2003, but it is difficult to configure, and, therefore, was never implemented by Litware. You are asked
Is there a need to deploy a PKI to support the VPN infrastructure?
Which VPN solution can be used with computers running Windows XP?
Describe NAP and the various scenarios for its implementation.
Which VPN solution provides a solution allowing commonly used web-based protocols?
Identify purposes for specific NAP enforcement methods.
Describe the architecture and components of NAP.
Which of the following are true statements regarding authentication protocols used for remote access? (Choose all that apply.)A. EAP-TLS uses only the server certificate to create secure communication between an authenticating client and the authentication server prior to the computer
Which of the following does not describe an appropriate function of a RADIUS proxy?A. Processing requests from access servers and forwarding them to a RADIUS server B. Processing incoming connection attempts from access clients C. Load balancing RADIUS requests among servers of the RADIUS server
Which of the following performs RADIUS authentication?A. Access client B. Access server C. RADIUS proxy D. RADIUS server
Which components are required of a RADIUS solution for each branch office and for the main office?
What are the primary considerations in moving the VPN connection toward a RADIUS solution in line with Contoso’s overall goals?
Which VPN protocol should you use?
Which authentication protocols can you choose? Why?
What are important factors in the current environment to consider when forming a remote access solution?
You are examining an existing AD DS environment to determine whether to upgrade the existing domains or deploy new domains. What factors must you consider?(Choose all that apply.)A. Existing domain model B. The amount of downtime that can be incurred C. Time constraints D. Budget
Based on your analysis of the requirements, how many domains are required for each forest?
How many domain trees will be required for each forest?
What are the relevant functional level design requirements for Contoso and its subsidiaries?
What will the domain functional level design be for each forest?
What will the forest functional level design be for each forest?
Which replication topology will be used for the replication design?
What will the shortcut trust design be?
How can you achieve data autonomy when designing the forest structure?A. Create a new forest by using the resource forest model.B. Join an existing forest.C. Create a new forest by using the organizational forest model.D. Create a new forest by using the restricted access forest model.
Where will global catalog servers be placed as part of the design?
Which site links are required to facilitate the replication design?
Will placing a global catalog server in the Argentina location meet the requirements?
Will using a hybrid AD DS replication topology meet the requirements?
Will joining the Wingtip Toys computers to the existing Tailspin Toys forest meet the requirements?
You have a single AD DS forest with a single domain that is using the hub and spoke replication topology. Where should you place the server that holds the PDC emulator operations master role?A. In the location represented by the hub site B. In one of the locations represented by a spoke site C. In
Which replication topology would you use if your network consists of faster network connections between major computing hubs and slower links connecting branch offices?A. Single site model B. Ring replication topology C. Hub and spoke replication topology D. Full mesh replication topology
Which of the following uses intrasite replication only?A. Single site model B. Multiple sites model C. Hub and spoke replication topology D. Full mesh replication topology
Where will the operations master role holders be placed as part of the design?
Where will RODCs be placed as part of the design?
Where will the regional domain controllers be placed as part of the design?
Where will the forest root domain controllers be placed as part of the design?
What will the replication interval design be for each site link?
What will the replication schedule design be for each site link?
What will the cost of each site link be?
What are the relevant shortcut trust design requirements for Contoso and its subsidiaries?
What are the relevant replication design requirements for Blue Yonder Airlines?
Will using a hub and spoke AD DS replication topology meet the requirements?
Will placing an RODC in the Argentina location meet the requirements?
What will the forest root domain design be for the NOS directory forest?
Which domain model will be used for each forest?
How can you achieve service autonomy when designing the forest structure?A. Create a new forest by using the restricted access forest model.B. Create a new forest by using the resource forest model.C. Create a new forest by using the organizational forest model.D. Join an existing forest.
Design Active Directory forests and domains.
Design Active Directory physical topology.
Design for data management and data access.
Which domain functional levels are supported if your forest functional level is set to Windows 2008 R2?
Which operating systems are supported on domain controllers when the domain functional level is set to Windows Server 2008?
Will creating a new organizational forest for Wingtip Toys meet the requirements?
What are the relevant domain design requirements for Contoso and its subsidiaries?
Which forest model(s) will be used in the design?
Based on your analysis of the requirements, how many forests are required for Contoso and its subsidiaries?
What are the relevant forest design requirements for Contoso and its subsidiaries?
Is IPv6 network mobility used or required for IPv6?
Do the applications need globally routable IP addresses?
Will multicast and anycast addresses be used?
Who takes ownership of the network? For example, is network support in-house or outsourced?
Does a detailed asset management database exist?
Does the organization support remote workers? If so, how?
Is NAT v4–v6 available, and do the applications have any issues with using it?
Do the enterprise platforms support both IPv4 and IPv6? Is IPv6 installed by default on server and client platforms?
Which applications need to support IPv6 and can they be upgraded to do so? Will these applications need to support both IPv4 and IPv6?
Is IPv6 available using the same access links as IPv4?
Does the enterprise currently use an external data center? (For example, are servers located at the provider?)
Are site-external and site-internal IPv6 routing protocols required? If so, which ones?
How should prefix allocation be delegated in the enterprise?
What IPv6 services does the provider offer?
What is the enterprise’s policy for geographical numbering?
Do separate sites in the enterprise have different providers?
What options are available for the type of unicast address used on the subnets?
Blue Yonder wants to use an application that needs to resolve IPv6 addresses to hostnames. How do you implement this functionality?
For additional security, Blue Yonder uses RODCs at its branch locations. Management is concerned about keeping DNS zone information on these computers up to date. What information can you provide?
Your boss is aware of the need to replicate DNS zones to the two stand-alone BIND servers. She is concerned that an attacker might attempt to replicate DNS zone information to an unauthorized server, thus exposing the names and IP addresses of company computers. How do you reassure her?
Blue Yonder has set up wireless hotspots for the convenience of its customers. However, management is concerned that attackers might attempt to register their computers in the company’s DNS. How can you ensure against this?
Trey Research is an innovative research organization that prides itself on being at the forefront of technology. The company currently has 82 client computers all running Windows Vista Ultimate. All its servers—including its domain controllers—have recently been upgraded to Windows Server 2008
Which command enables you to configure an IPv6 address manually on a specified interface?A. netsh interface ipv6 show address B. netsh interface ipv6 add address C. netsh interface ipv6 set interface D. netsh interface ipv6 set address
Which IPv6-to-IPv4 transition strategy uses preconfigured tunnels and encapsulates an IPv6 packet within an IPv4 packet?A. Configured tunneling B. Dual stack C. ISATAP D. Teredo
Which protocol uses ICMPv6 messages to manage the interaction of neighboring nodes?A. ARP B. EUI-64 C. DHCPv6 D. ND
A node has a link-local IPv6 address of fe80::6b:28c:16a7:d43a. What is its corresponding solicited-node address?A. ff02::1:ffa7:d43a B. ff02::1:ff00:0:16a7:d43a C. fec0::1:ff a7:d43a D. fec0::1:ff00:0:16a7:d43a
Which type of IPv6 address is the equivalent of a public unicast IPv4 address?A. Unique-local B. Global C. Link-local D. Special
What proposals are in place for training technical staff in the use of IPv6?
What is the current IPv4 QoS policy (assuming you are not designing a new IPv6-only network)? Will this change when IPv6 is implemented?
Given that the Wingtip Toys network can support both IPv4 and IPv6, what is the most straightforward transition strategy?
What IPv6 address assignment plan is available from the provider?
Which command enables a DNS server to support GlobalNames zones?A. dnscmd /createdirectorypartition B. dnscmd /enlistdirectorypartition C. dnscmd /config D. dnscmd /createbuiltindirectorypartitions
Which DNS record enables you to specify refresh interval and TTL settings?A. SOA B. NS C. SRV D. CNAME
Which WINS topology uses a distributed WINS design with multiple WINS servers or clusters deployed across the enterprise, with each server or cluster replicating with every other WINS server or cluster?A. Centralized WINS topology B. Full mesh WINS topology C. Ring WINS topology D. Hub and spoke
Which is the name of the record that connects a parent namespace to its child namespace? (This record type actually contains two resource records, an NS record and an A record.)
What feature does Windows Server 2008 R2 DNS introduce that will help organizations phase out WINS and NetBT?
Which DNS record enables a hostname to be resolved to an IPv6 address?
Which command-line interface commands release and renew nonstatic IPv6 configurations?
Which command-line interface command can you use to create reverse lookup zones?
Administer DNS using the Microsoft Management Console (MMC) snap-in and command-line tools.
Determine the need for DNSSEC to provide reliable name resolution information.
Identify Windows Server 2008 R2 enhancements to DNS and use these in your planning process.
Consider Windows Server 2008 R2 DNS features when planning your name resolution infrastructure.
Showing 1100 - 1200
of 1217
1
2
3
4
5
6
7
8
9
10
11
12
13
Step by Step Answers