https://killexams.com/pass4sure/exam-detail/400-201
QUESTION:40
Which three components are included in the Cisco IOS XR infrastructure? (Choose
three.)
A. modular line cards
B. shelf controllers
C. route processors
D. service processors
E. distributed service cards
Answer: B, C, D
Explanation:
1.4. SP high end product 1.4.01. IOS-XR structure Distributed Infrastructure
The kernel is replicated across the router infrastructure. The services and client
applications can be distributed across the router infrastructure. The infrastructure includes
route processors (RPs), distributed route processors (DRPs), service processors (SPs),
shelf controllers (SCs), modular service cards (MSCs), and line cards (LCs).
QUESTION:41
Which statement about multicast VPN is true?
A. The MDT group address should be the same for both address families in the same
VRF.
B. The MDT group address should be the same for both address families in the different
VRFs.
C. Configuration of the MDT source on a pre-VRF basis is supported only on IPv6.
D. The MDT group address should be different for both address families in the same
VRF.
Answer: A
Explanation:
Restrictions for Multicast VPN for Multicast Routing
� Configuration of the MDT source on a per-VRF basis is only supported on IPv4. � The
MDT group address should be the same for both the address families in the same VRF.
Default-MDTs must have the same group address for all VRFs
that comprise a MVPN.
Data-MDTs may have the same group address if PIM-SSM is used. If PIM-SM is used,
they must have a different group address, as providing the same one could result in the
PE router receiving unwanted traffic. This is a PIM-SM protocol issue, not an
implementation issue.
QUESTION:42
Which three statements about the route target (RT) are true? (Choose three.)
A. The RT is a BGP extended community.
B. The RT is an 8-byte field that is prefixed to an IPv4 address to make it a unique
VPNv4 address.
C. When a VPN route that is learned from a CE router is injected into BGP, one or more
RTs are associated with it
D. The distribution of VPN routing information is controlled through the use of VPN RTs
E. When a VPN route that is learned from a CE router is injected into BGP, there is
always one RT that is associated with it.
Answer: A, C, D
QUESTION:43
What is the port number of the IPsec Encapsulating Security Payload packet?
A. UDP port 50
B. IP protocol 51
C. TCP port 51
D. TCP port 50
E. IP protocol 50
F. UDP port51
Answer: E
Explanation:
6.2. Managed Security services traversing the core
AH operates directly on top of IP, using IP protocol number 51. ESP operates directly on
top of IP, using IP protocol number 50.
QUESTION:44
Which statement about VPLS is true?
A. All CE devices emulate a bridge
B. All provider devices emulate a bridge
C. Hierarchical VPLS reduces signaling overhead
D. Each PE device emulates a bridge
E. Each CE device emulates a bridge
Answer: C
Explanation:
A hierarchical model can be used to improve the scalability characteristics of VPLS.
Hierarchical VPLS (HVPLS) reduces signaling overhead and packet replication
requirements for the provider edge.
QUESTION:45
Which three statements about the secure domain router are true? (Choose three.)
A. The logical router can span across chassis.
B. The fabric and system controller module are shared by all logical routers.
C. Each logical router has a distinct fabric and system controller module
D. The logical router can share a route processor
E. The logical router cannot share a route processor.
Answer: A, B, E
Explanation:
1.4. SP high end product
1.4.04. Secure domain router (SDR)
QUESTION:46
In Ethernet Aggregation application which option is needed when the U-PE connects to
an N-PE and broadband remote access servers?
A. Ethernet Multipoint Service (EMS)
B. VPLS
C. E1
D. Wire Service
Answer: A
For More exams visit https://killexams.com/vendors-exam-list
Kill your exam at First Attempt....Guaranteed!
Saturday, 28 September 2019
Thursday, 26 September 2019
Pass Guaranteed with 70-473 Microsoft Actual Answers
https://killexams.com/pass4sure/exam-detail/70-473
Section 4: Sec Four (49 to 54)
Details: Case Study: 3 Overview
Contoso, Ltd. Is a national scientific research company that has sales, marketing. And
research departments. Contoso has a main office in Dallas and more than 20 satellite
offices across the United States. Some employees work off-site at customer locations.
Contoso is expected to double in size during the next two years.
Existing Environment
The Microsoft SQL server environment contains the server configured as shown in the
following table.
Contoso currently uses SQL Server 2008 R2 on all of the database servers, SQL01
currently requires six cores and 50 GB memory.
Once a day, database snapshots are taken on the mirror to provide ad hoc reporting and
to load data warehouse.
One report is used for ad hoc reporting by using the mirrored copy of the OLTP
database. Research Gen IT is a Windows application that users currently access by using
Remote Desktop. Business Goals
Contoso identifies the following business goals:
� Minimize the costs associated with purchasing hardware and software.
� Prevent any negative impact on performance when moving database platforms to the
cloud.
� Audit user access to and query execution on all of the database in the research
department. Planned Changes
� Upgrade SQL03 fromSQL Server 2008 R2 to SQL Server 2014 on Windows Server
2012 R2.
� IVIigrate SQL01 and SQL02 to Infrastructure as a Service (IAAS) on SQL Server
2014.
� Leverage cloud services fora disaster recovery location and for high availability.
� Replace Research Gen II with a cloud-based application named One Research. The
database for this application will be migrated to a cloud service.
Departmental R equirements
Senior research project leaders must be able to upload databases to the cloud. Initially,
the databases will be less than 3 GB. Some databases may grow to 50 GB. The databases
must be recoverable to any point during the past two weeks.
The research project leaders must monitor the performance of their databases. They must
view statistics, such as query performance and overall database performance.
The marketing department plans to use cloud services to host web applications for
marketing campaigns. The database for the web applications have the requirements
shown in the following table.
Technical Requirements
� Contoso identifies the following technical requirements:
� OLTP will be offloaded to Nlicrosoft Azure virtual machines.
� The data for One Report must not be more than 15 minutes old.
� All of the databases for the OLTP system must be implemented on solid state drives
(SSDs)
� A solution for the OLTP system must be created to provide disaster recovery and
repoting between SQL01 and SQL02.
� All databases, except for the research and marketing databases, must be recoverable to
any point during the last 30 days.
� A solution for the data warehouse system must be created to provide disaster recovery
between SQL03 and an Azure virtual machine named SQL04.
QUESTION: 49
You are designing the data warehouse.
You need to recommended a solution that meets the business goals and the technical
requirements. What should you recommend?
A. Create an AIwaysOn availability group between SQL03 and SQL04.
B. Host the data warehouse on an Azure Virtual machine.
C. Create an Azure HD|nsight cluster.
D. Create an Azure DocumentDB database.
Answer: B
QUESTION: 50
You are designing the data warehouse. You need to recommend a solution that meets the
business goals and the technical requirements. What should you recommend?
A. Create an AIwaysOn availability group between SQL03 and SQL04.
B. Host the data warehouse on an Azure virtual machine.
C. Create an Azure HD|nsight cluster.
D. Create an Azure Document DB database.
Answer: C
QUESTION: 51
You are evaluating the use of active geo-replication for one of the research department
databases. You need to identify which service tier to use for the database. The solution
must meet the department requirements and the business requirements.
What should you identify?
A. Premium P1
B. Premium P4
C. Standard S0 D.BaQc
Answer: D
QUESTION: 52
You need to ensure that the performance statistics for the research department are
collected. What should you enable?
A. Query Performance Insight
B. Scale and Configuration
C. Dynamic Data Masking
D. Index advisor
Answer: C
QUESTION: 53
You need to tell the research project leaders how to migrate their databases.
Which task should you instruct the leaders to use from SQL Server Management Studio?
A. Extract Data-tier Application
B. Deploy Database to a Microsoft Azure VM
C. Deploy Databaseto a Microsoft Azure SQL Database
D. Copy Database
Answer: B
QUESTION: 54
You need to recommend an auditing solution that meets the business goals.
Which three events should you include in the recommendation? Each correct answer
presents part of the solution.
A. Transaction Management
B. Stored Procedure
C. Plain SQL
D. Login
E. Failed Connections
Answer: D
For More exams visit https://killexams.com
�
Kill your exam at First Attempt....Guaranteed!
Section 4: Sec Four (49 to 54)
Details: Case Study: 3 Overview
Contoso, Ltd. Is a national scientific research company that has sales, marketing. And
research departments. Contoso has a main office in Dallas and more than 20 satellite
offices across the United States. Some employees work off-site at customer locations.
Contoso is expected to double in size during the next two years.
Existing Environment
The Microsoft SQL server environment contains the server configured as shown in the
following table.
Contoso currently uses SQL Server 2008 R2 on all of the database servers, SQL01
currently requires six cores and 50 GB memory.
Once a day, database snapshots are taken on the mirror to provide ad hoc reporting and
to load data warehouse.
One report is used for ad hoc reporting by using the mirrored copy of the OLTP
database. Research Gen IT is a Windows application that users currently access by using
Remote Desktop. Business Goals
Contoso identifies the following business goals:
� Minimize the costs associated with purchasing hardware and software.
� Prevent any negative impact on performance when moving database platforms to the
cloud.
� Audit user access to and query execution on all of the database in the research
department. Planned Changes
� Upgrade SQL03 fromSQL Server 2008 R2 to SQL Server 2014 on Windows Server
2012 R2.
� IVIigrate SQL01 and SQL02 to Infrastructure as a Service (IAAS) on SQL Server
2014.
� Leverage cloud services fora disaster recovery location and for high availability.
� Replace Research Gen II with a cloud-based application named One Research. The
database for this application will be migrated to a cloud service.
Departmental R equirements
Senior research project leaders must be able to upload databases to the cloud. Initially,
the databases will be less than 3 GB. Some databases may grow to 50 GB. The databases
must be recoverable to any point during the past two weeks.
The research project leaders must monitor the performance of their databases. They must
view statistics, such as query performance and overall database performance.
The marketing department plans to use cloud services to host web applications for
marketing campaigns. The database for the web applications have the requirements
shown in the following table.
Technical Requirements
� Contoso identifies the following technical requirements:
� OLTP will be offloaded to Nlicrosoft Azure virtual machines.
� The data for One Report must not be more than 15 minutes old.
� All of the databases for the OLTP system must be implemented on solid state drives
(SSDs)
� A solution for the OLTP system must be created to provide disaster recovery and
repoting between SQL01 and SQL02.
� All databases, except for the research and marketing databases, must be recoverable to
any point during the last 30 days.
� A solution for the data warehouse system must be created to provide disaster recovery
between SQL03 and an Azure virtual machine named SQL04.
QUESTION: 49
You are designing the data warehouse.
You need to recommended a solution that meets the business goals and the technical
requirements. What should you recommend?
A. Create an AIwaysOn availability group between SQL03 and SQL04.
B. Host the data warehouse on an Azure Virtual machine.
C. Create an Azure HD|nsight cluster.
D. Create an Azure DocumentDB database.
Answer: B
QUESTION: 50
You are designing the data warehouse. You need to recommend a solution that meets the
business goals and the technical requirements. What should you recommend?
A. Create an AIwaysOn availability group between SQL03 and SQL04.
B. Host the data warehouse on an Azure virtual machine.
C. Create an Azure HD|nsight cluster.
D. Create an Azure Document DB database.
Answer: C
QUESTION: 51
You are evaluating the use of active geo-replication for one of the research department
databases. You need to identify which service tier to use for the database. The solution
must meet the department requirements and the business requirements.
What should you identify?
A. Premium P1
B. Premium P4
C. Standard S0 D.BaQc
Answer: D
QUESTION: 52
You need to ensure that the performance statistics for the research department are
collected. What should you enable?
A. Query Performance Insight
B. Scale and Configuration
C. Dynamic Data Masking
D. Index advisor
Answer: C
QUESTION: 53
You need to tell the research project leaders how to migrate their databases.
Which task should you instruct the leaders to use from SQL Server Management Studio?
A. Extract Data-tier Application
B. Deploy Database to a Microsoft Azure VM
C. Deploy Databaseto a Microsoft Azure SQL Database
D. Copy Database
Answer: B
QUESTION: 54
You need to recommend an auditing solution that meets the business goals.
Which three events should you include in the recommendation? Each correct answer
presents part of the solution.
A. Transaction Management
B. Stored Procedure
C. Plain SQL
D. Login
E. Failed Connections
Answer: D
For More exams visit https://killexams.com
�
Kill your exam at First Attempt....Guaranteed!
Fresh CPCM Financial Q&A Download - Guaranteed Success
https://killexams.com/pass4sure/exam-detail/CPCM
C. Contract administration
D. Contract formation
Answer: C
QUESTION: 135
Which of the following is the key policy of contract administration?
A. compliance with contract terms and conditions
B. effective control of contract changes
C. effective resolution of claims and disputes
D. All of the above
Answer: D
QUESTION: 136
Generally, observing and collecting information cover which three categories of concern?
A. compliance, cost control and schedule control
B. cost control and schedule control, risk control
C. compliance, cost control and performance
D. compliance, change control and risk control
Answer: A
QUESTION: 137
A progress report from many observers, and technical reviews and audits is called:
A. Direct observation
B. Indirect observation
C. Contractual audit
D. Change observation
Answer: B
QUESTION: 138
Changes are an inevitable part of contracting, because no one can predict the future with
perfect accuracy.
A. True
B. False
QUESTION: 139
Contract closure by mutual agreement or breach of contract is called contract closeout.
A True
B. False
Answer: B
QUESTION: 140
What refers to verifying that all administrative matters are concluded on a contract that is
otherwise physically complete?
A. Contract termination
B. Contract certificate
C. Contract closeout
D. Contract execution
Answer: C
QUESTION: 141
Which of the following is the type of termination?
A. termination for cause
B. termination by mutual agreement
C. no-cost settlement
D. All of the above
Answer: D
QUESTION: 142
Used without normal termination procedures, no-cost settlement can be considered when:
A. the seller has indicated it will accept it
B. no buyer property was furnished under the contract
C. the product or service can be readily obtained elsewhere
D. All of the above
Answer: D
QUESTION: 143
Supply chain management advocates told buyers that they needed to:
A. use fewer suppliers vs. many suppliers
B. negotiate long-term contract vs. short-term contracts
C. conduct more detailed progress or milestone tracking of suppliers
D. All of the above
Answer: D
QUESTION: 144
To achieve high performance results year after year, companies must take what action to
form successful long-term partnerships?
A. unleashing corporate buying and selling power
B. changing buying and selling processes and tools
C. developing and integrated supply chain
D. All of the above
Answer: D
For More exams visit https://killexams.com
�
uaranteed!
C. Contract administration
D. Contract formation
Answer: C
QUESTION: 135
Which of the following is the key policy of contract administration?
A. compliance with contract terms and conditions
B. effective control of contract changes
C. effective resolution of claims and disputes
D. All of the above
Answer: D
QUESTION: 136
Generally, observing and collecting information cover which three categories of concern?
A. compliance, cost control and schedule control
B. cost control and schedule control, risk control
C. compliance, cost control and performance
D. compliance, change control and risk control
Answer: A
QUESTION: 137
A progress report from many observers, and technical reviews and audits is called:
A. Direct observation
B. Indirect observation
C. Contractual audit
D. Change observation
Answer: B
QUESTION: 138
Changes are an inevitable part of contracting, because no one can predict the future with
perfect accuracy.
A. True
B. False
QUESTION: 139
Contract closure by mutual agreement or breach of contract is called contract closeout.
A True
B. False
Answer: B
QUESTION: 140
What refers to verifying that all administrative matters are concluded on a contract that is
otherwise physically complete?
A. Contract termination
B. Contract certificate
C. Contract closeout
D. Contract execution
Answer: C
QUESTION: 141
Which of the following is the type of termination?
A. termination for cause
B. termination by mutual agreement
C. no-cost settlement
D. All of the above
Answer: D
QUESTION: 142
Used without normal termination procedures, no-cost settlement can be considered when:
A. the seller has indicated it will accept it
B. no buyer property was furnished under the contract
C. the product or service can be readily obtained elsewhere
D. All of the above
Answer: D
QUESTION: 143
Supply chain management advocates told buyers that they needed to:
A. use fewer suppliers vs. many suppliers
B. negotiate long-term contract vs. short-term contracts
C. conduct more detailed progress or milestone tracking of suppliers
D. All of the above
Answer: D
QUESTION: 144
To achieve high performance results year after year, companies must take what action to
form successful long-term partnerships?
A. unleashing corporate buying and selling power
B. changing buying and selling processes and tools
C. developing and integrated supply chain
D. All of the above
Answer: D
For More exams visit https://killexams.com
�
uaranteed!
Wednesday, 25 September 2019
MB2-717 Microsoft Free Certification Exam Questions & Online Courses
https://killexams.com/pass4sure/exam-detail/MB2-717
Question: 94
You have two price lists described as shown in the following table
You create an opportunity that uses Pricelist1. The opportunity contains line items for Product 1 and Product 3 You
add a write-in product named Product 5 that has a price of SS.
You change the opportunity to use Pricelist 2, and then you add Product 2.
You need to identify which products are listed in the opportunity.
What should you identify?
A. Product 1 with a price of $15
Product 2 with a price of $20
Product 3 with a price of $10
Product 5 with a price of $8
B. Product 1 with a Price of $15
Product 2 with a price of $20
Product 5 with a price of $8
Product 3 removed
C. Product 1 with a price of $10
Product 2 with a price of $20
Product 3 with a price of $10
Product 5 with a price of $8
D. Product 2 with a price of $20
Product 5 with a price of $8
Product 1 and Product 3 removed
Answer: A
Question: 95
You create a personal dashboard that tracks important sales information.
Your manager wants all of the users in the company to use the dashboard.
You need to recommend a method to make the dashboard available to all of the users. The solution must minimize
effort.
What should you recommend?
A. Export the definitions of the dashboard components, and then import the components.
B. Ask an administrator to recreate the dashboard as a system dashboard.
C. Ask an administrator to share the dashboard with all of the users.
D. Edit the properties of the dashboard, and then assign the dashboard.
Answer: C
Question: 96
After two months of communicating with a prospect your organization is ready to provide a formal offer for
products and to the prospect. You need to ensure the record is correct in Microsoft Dynamics 365.
Which item should you create to represent this formal offer?
A. Opportunity
B. Quote
C. Lead
D. Order
Answer: B
Question: 97
You are a sales person for a large automobile dealership.
You created a lead within Microsoft Dynamics 365 for a potential customer who was interested in a current sales
event at your dealership.
The potential customer selected a new car but was unable to finance it due to bad credit. The potential customer has
given up for the time being How should you modify the record to update it for this sales opportunity?
A. Close as Lost
B. Close as Won
C. Close as Disgualified
D. Close as Canceled
Answer: A
Question: 98
You are working with the Microsoft Dynamics 365 for Phones app.
You have created a new Opportunity to track information that could lead to a sale while visiting a customer and
have a Business Process Flow at the Qualify stage.
You need to be able to update the record with information for qualifying the Opportunity.
What are three items you can capture on the Opportunity to help you manage this opportunity through to a sale?
Each correct answer presents a complete solution.
A. tracking product returns
B. tracking activities related to the opportunity
C. tracking Invoice adjustment notes
D. tracking competitors
E. tracking the products in which the customer is interested
Answer: B,D,E
Question: 99
You notice that all of your current customers are stored in Microsoft Dynamics 365 as Account records You need
to create records for other organizations you work with to support your customers.
These organizations represent vendors, partners, and distributors.
What record type should you use for these organizations?
A. Account
B. Prospect
C. Organization
D. Company
Answer: A
Question: 100
You are a sales manager.
You need to have a formal way for your sales staff to track your competitor information against over the course of
the year.
Which three areas in Microsoft Dynamics 365 allow you to track this information? Each correct answer presents a
complete solution
A. Opportunities
B. Tasks
C. Sales literature
D. Cases
E. Products
Answer: A,C,E
For More exams visit https://killexams.com/vendors-exam-list
Kill your exam at First Attempt....Guaranteed!
Question: 94
You have two price lists described as shown in the following table
You create an opportunity that uses Pricelist1. The opportunity contains line items for Product 1 and Product 3 You
add a write-in product named Product 5 that has a price of SS.
You change the opportunity to use Pricelist 2, and then you add Product 2.
You need to identify which products are listed in the opportunity.
What should you identify?
A. Product 1 with a price of $15
Product 2 with a price of $20
Product 3 with a price of $10
Product 5 with a price of $8
B. Product 1 with a Price of $15
Product 2 with a price of $20
Product 5 with a price of $8
Product 3 removed
C. Product 1 with a price of $10
Product 2 with a price of $20
Product 3 with a price of $10
Product 5 with a price of $8
D. Product 2 with a price of $20
Product 5 with a price of $8
Product 1 and Product 3 removed
Answer: A
Question: 95
You create a personal dashboard that tracks important sales information.
Your manager wants all of the users in the company to use the dashboard.
You need to recommend a method to make the dashboard available to all of the users. The solution must minimize
effort.
What should you recommend?
A. Export the definitions of the dashboard components, and then import the components.
B. Ask an administrator to recreate the dashboard as a system dashboard.
C. Ask an administrator to share the dashboard with all of the users.
D. Edit the properties of the dashboard, and then assign the dashboard.
Answer: C
Question: 96
After two months of communicating with a prospect your organization is ready to provide a formal offer for
products and to the prospect. You need to ensure the record is correct in Microsoft Dynamics 365.
Which item should you create to represent this formal offer?
A. Opportunity
B. Quote
C. Lead
D. Order
Answer: B
Question: 97
You are a sales person for a large automobile dealership.
You created a lead within Microsoft Dynamics 365 for a potential customer who was interested in a current sales
event at your dealership.
The potential customer selected a new car but was unable to finance it due to bad credit. The potential customer has
given up for the time being How should you modify the record to update it for this sales opportunity?
A. Close as Lost
B. Close as Won
C. Close as Disgualified
D. Close as Canceled
Answer: A
Question: 98
You are working with the Microsoft Dynamics 365 for Phones app.
You have created a new Opportunity to track information that could lead to a sale while visiting a customer and
have a Business Process Flow at the Qualify stage.
You need to be able to update the record with information for qualifying the Opportunity.
What are three items you can capture on the Opportunity to help you manage this opportunity through to a sale?
Each correct answer presents a complete solution.
A. tracking product returns
B. tracking activities related to the opportunity
C. tracking Invoice adjustment notes
D. tracking competitors
E. tracking the products in which the customer is interested
Answer: B,D,E
Question: 99
You notice that all of your current customers are stored in Microsoft Dynamics 365 as Account records You need
to create records for other organizations you work with to support your customers.
These organizations represent vendors, partners, and distributors.
What record type should you use for these organizations?
A. Account
B. Prospect
C. Organization
D. Company
Answer: A
Question: 100
You are a sales manager.
You need to have a formal way for your sales staff to track your competitor information against over the course of
the year.
Which three areas in Microsoft Dynamics 365 allow you to track this information? Each correct answer presents a
complete solution
A. Opportunities
B. Tasks
C. Sales literature
D. Cases
E. Products
Answer: A,C,E
For More exams visit https://killexams.com/vendors-exam-list
Kill your exam at First Attempt....Guaranteed!
Tuesday, 24 September 2019
IBM Bring Ultimate Exams & Certification Solutions of C2090-623
https://killexams.com/pass4sure/exam-detail/C2090-623
QUESTION:54
In a LifeCycle Manager Project, a user can create either a Benchmark task or a
Comparison task. Which statement is INCORRECT when describing the application of
Benchmark tasks?
A. Benchmark tasks can be used as a benchmark test for any LifeCycle Manager Project.
B. Benchmark tasks can be used to create a benchmark test to run Compatible Query
Mode (CQM) reports as Dynamic Query (DQ) reports.
C. When creating a Benchmark task, the administrator can choose whether to validate
reports before they are run, and whether to run the reports in Dynamic Query Mode
(DQM).
D. To use a previously run Benchmark, select a previously created Benchmark task for
the benchmark source and the target Cognos server that you want to compare to the
benchmark.
Answer: C
QUESTION:55
A report author gets the following error message:
�An error has occurred. Please contact your administrator. The complete error has been
logged by CAF with SecureErrorID:2004-05-25-15:44:11.296-#9.�
How can the administrator get the complete error message?
A. Open the cogerror.log file using a text editor.
B. Open the cogserver.log file using a text editor.
C. Run the user report errors audit report from the samples Audit package.
D. Run the user session details audit report from the samples Audit package.
Answer: B
Explanation:
To find out about the actual error though an administrator with file access to the server
log (cogserver.log) will need to search that log for the SecureErrorID given in the on-
screen message.
References:
http://www-01.ibm.com/support/docview.wss?uid=swg21344157
QUESTION:56
An administrator wants to control server workload by putting routing rules in place.
Which components can be used?
A. a package and/or group or role
B. a package and/or a server group
C. a group or role and/or a server group
D. a package and/or group or role and/or a server group
Answer: D
Explanation:
A routing rule determines, based on user, group, or package, which server group you
wish to handle a user request. There are four routing set rules in Cognos Business
Intelligence.
References:
http://www-01.ibm.com/support/docview.wss?uid=swg21427147
QUESTION:57
An administrator wants to ensure that a datasource can be referenced when creating data
modules in the IBM Cognos Analytics Portal (New > Data module). What must be done
to accomplish this?
A. Add the datasource to the list of supported datasources in IBM Cognos Configuration.
B. Configure the datasource in IBM Cognos Transformer so that it can communicate with
the portal.
C. In the web-based modeling tool itself, specify the �Create Data Modules� access
permission for the datasource.
D. On the Connection tab of the datasource properties, ensure that the �Allow web-based
modeling� check box is selected.
Answer: D
Explanation:
Problem(Abstract): Datasource connections not listed in Data server by default Symptom:
We can see the datasource in the Admin console but not in the list of data servers.
Cause: This is default behavior. Resolving the problem Go to the Administrative Console
-> Configuration -> Set properties -> Connections tab. On the bottom, you will see "Data
source capabilities"
Inside that, check the box which says "Allow web-based modeling" Once you check this,
the datasource would be present as data server.
References:
http://www-01.ibm.com/support/docview.wss?uid=swg21978718
QUESTION:58
An administrator needs to address an environment that is not running optimally and
conduct an architecture review. Which performance attributes should be considered?
A. capacity, scalability, availability
B. gateways, application servers, Content Manager
C. IBM Cognos implementation, capacity, infrastructure
D. infrastructure, gateways, application servers, scalability
Answer: C
Explanation:
Conduct an architecture review to assess the physical architecture and software
installation.
References:
ftp://public.dhe.ibm.com/software/pdf/dk/service-
shop/IBM_Cognos_BI_Health_Check_Service_FINAL_10-21-11.pdf
QUESTION:59
An administrator is tuning the Caching services to improve Dynamic cube report
performance. At the same time, there is a need to control the memory usage and Clear
Cache. How is this done?
A. Control of the memory usage and scheduling of the Clear Cache is a default setup.
B. In IBM Cognos Configuration under IBM Cognos Services/IBM Cognos select Query
Service and select operation Clear Cache.
C. In IBM Cognos Administration under System tab from the actions menu, select Query
Service and enable the checkbox for Clear Cache.
D. In IBM Cognos Administration under Configuration tab click Content Administration,
click the New Query task button and select Clear Cache.
Answer: B
Explanation:
To avoid using outdated data that might be stored in the cache, you can clear the cache.
You might want to clear the cache manually if your data source metadata changes
infrequently or if you want to clear the cache in between automatically scheduled cache
clearing. When you clear the cache using the following steps, it clears everything in the
cache.
Steps
1. Start IBM Cognos Connection.
2. In the upper-right corner, click Launch, IBM Cognos Administration.
3. On the Configuration tab, click Query Service Caching.
4. Select the server groups for cache clearing.
5. Click Clear cache.The status of the Clear cache command is displayed.If a cache is
being used by one or more pending reports or queries, it is internally flagged as �stale� by
this command and is automatically cleared as soon as this usage completes. 6. Click
Close.
References:
IBM Cognos Administration Version 10.1.0, Administration and Security Guide, page
253
QUESTION:60
An administrator is implementing security by managing and working with the Cognos
namespace. Which statement is true?
A. To gain access to IBM Cognos Analytics, users can log on to the Cognos namespace.
B. Create domain users in the Cognos namespace to avoid cluttering the existing
authentication provider.
C. User-defined groups and roles must be created in a 3rd-party authentication provider
and cannot be created in the Cognos namespace.
D. Although the use of the predefined and built-in groups and roles within the Cognos
namespace is optional, the Cognos namespace cannot be deleted.
Answer: D
Explanation:
The Cognos namespace includes predefined objects to help you quickly set up initial
security. You use the predefined objects and other features of the Cognos namespace for
ongoing security management. You can create groups and roles in the Cognos
namespace. Initial access permissions are applied to all predefined objects. You can
modify the permissions from the object properties.
References:
https://www.ibm.com/support/knowledgecenter/en/SSEP7J_11.0.0/com.ibm.swg.ba.cogn
os.ag_manage.doc/c_ca_cognos_namespace.html
For More exams visit https://killexams.com
Kill your exam at First Attempt....Guaranteed!
QUESTION:54
In a LifeCycle Manager Project, a user can create either a Benchmark task or a
Comparison task. Which statement is INCORRECT when describing the application of
Benchmark tasks?
A. Benchmark tasks can be used as a benchmark test for any LifeCycle Manager Project.
B. Benchmark tasks can be used to create a benchmark test to run Compatible Query
Mode (CQM) reports as Dynamic Query (DQ) reports.
C. When creating a Benchmark task, the administrator can choose whether to validate
reports before they are run, and whether to run the reports in Dynamic Query Mode
(DQM).
D. To use a previously run Benchmark, select a previously created Benchmark task for
the benchmark source and the target Cognos server that you want to compare to the
benchmark.
Answer: C
QUESTION:55
A report author gets the following error message:
�An error has occurred. Please contact your administrator. The complete error has been
logged by CAF with SecureErrorID:2004-05-25-15:44:11.296-#9.�
How can the administrator get the complete error message?
A. Open the cogerror.log file using a text editor.
B. Open the cogserver.log file using a text editor.
C. Run the user report errors audit report from the samples Audit package.
D. Run the user session details audit report from the samples Audit package.
Answer: B
Explanation:
To find out about the actual error though an administrator with file access to the server
log (cogserver.log) will need to search that log for the SecureErrorID given in the on-
screen message.
References:
http://www-01.ibm.com/support/docview.wss?uid=swg21344157
QUESTION:56
An administrator wants to control server workload by putting routing rules in place.
Which components can be used?
A. a package and/or group or role
B. a package and/or a server group
C. a group or role and/or a server group
D. a package and/or group or role and/or a server group
Answer: D
Explanation:
A routing rule determines, based on user, group, or package, which server group you
wish to handle a user request. There are four routing set rules in Cognos Business
Intelligence.
References:
http://www-01.ibm.com/support/docview.wss?uid=swg21427147
QUESTION:57
An administrator wants to ensure that a datasource can be referenced when creating data
modules in the IBM Cognos Analytics Portal (New > Data module). What must be done
to accomplish this?
A. Add the datasource to the list of supported datasources in IBM Cognos Configuration.
B. Configure the datasource in IBM Cognos Transformer so that it can communicate with
the portal.
C. In the web-based modeling tool itself, specify the �Create Data Modules� access
permission for the datasource.
D. On the Connection tab of the datasource properties, ensure that the �Allow web-based
modeling� check box is selected.
Answer: D
Explanation:
Problem(Abstract): Datasource connections not listed in Data server by default Symptom:
We can see the datasource in the Admin console but not in the list of data servers.
Cause: This is default behavior. Resolving the problem Go to the Administrative Console
-> Configuration -> Set properties -> Connections tab. On the bottom, you will see "Data
source capabilities"
Inside that, check the box which says "Allow web-based modeling" Once you check this,
the datasource would be present as data server.
References:
http://www-01.ibm.com/support/docview.wss?uid=swg21978718
QUESTION:58
An administrator needs to address an environment that is not running optimally and
conduct an architecture review. Which performance attributes should be considered?
A. capacity, scalability, availability
B. gateways, application servers, Content Manager
C. IBM Cognos implementation, capacity, infrastructure
D. infrastructure, gateways, application servers, scalability
Answer: C
Explanation:
Conduct an architecture review to assess the physical architecture and software
installation.
References:
ftp://public.dhe.ibm.com/software/pdf/dk/service-
shop/IBM_Cognos_BI_Health_Check_Service_FINAL_10-21-11.pdf
QUESTION:59
An administrator is tuning the Caching services to improve Dynamic cube report
performance. At the same time, there is a need to control the memory usage and Clear
Cache. How is this done?
A. Control of the memory usage and scheduling of the Clear Cache is a default setup.
B. In IBM Cognos Configuration under IBM Cognos Services/IBM Cognos select Query
Service and select operation Clear Cache.
C. In IBM Cognos Administration under System tab from the actions menu, select Query
Service and enable the checkbox for Clear Cache.
D. In IBM Cognos Administration under Configuration tab click Content Administration,
click the New Query task button and select Clear Cache.
Answer: B
Explanation:
To avoid using outdated data that might be stored in the cache, you can clear the cache.
You might want to clear the cache manually if your data source metadata changes
infrequently or if you want to clear the cache in between automatically scheduled cache
clearing. When you clear the cache using the following steps, it clears everything in the
cache.
Steps
1. Start IBM Cognos Connection.
2. In the upper-right corner, click Launch, IBM Cognos Administration.
3. On the Configuration tab, click Query Service Caching.
4. Select the server groups for cache clearing.
5. Click Clear cache.The status of the Clear cache command is displayed.If a cache is
being used by one or more pending reports or queries, it is internally flagged as �stale� by
this command and is automatically cleared as soon as this usage completes. 6. Click
Close.
References:
IBM Cognos Administration Version 10.1.0, Administration and Security Guide, page
253
QUESTION:60
An administrator is implementing security by managing and working with the Cognos
namespace. Which statement is true?
A. To gain access to IBM Cognos Analytics, users can log on to the Cognos namespace.
B. Create domain users in the Cognos namespace to avoid cluttering the existing
authentication provider.
C. User-defined groups and roles must be created in a 3rd-party authentication provider
and cannot be created in the Cognos namespace.
D. Although the use of the predefined and built-in groups and roles within the Cognos
namespace is optional, the Cognos namespace cannot be deleted.
Answer: D
Explanation:
The Cognos namespace includes predefined objects to help you quickly set up initial
security. You use the predefined objects and other features of the Cognos namespace for
ongoing security management. You can create groups and roles in the Cognos
namespace. Initial access permissions are applied to all predefined objects. You can
modify the permissions from the object properties.
References:
https://www.ibm.com/support/knowledgecenter/en/SSEP7J_11.0.0/com.ibm.swg.ba.cogn
os.ag_manage.doc/c_ca_cognos_namespace.html
For More exams visit https://killexams.com
Kill your exam at First Attempt....Guaranteed!
Saturday, 21 September 2019
GED Best Platform to Download your IT Certification Preparation-American-College
https://killexams.com/pass4sure/exam-detail/GED
Answer: A
QUESTION: 497
The organ of Corti is found in what area of the body?
A. Mouth
B. Ear
C. Nose
D. Lungs
Answer: B
QUESTION: 498
The condition of rickets is associated with a deficiency in which vitamin?
A. A
B. C
C. D
D. Z
Answer: C
QUESTION: 499
A steroid is considered a ______.
A. Lipid
B. Protein
C. Enzyme
D. Weak acid
Answer: A
QUESTION: 500
The X cranial nerve is the ____ nerve.
A. Abducen
B. Hypoglossal
C. Facial
D. Vagus
Answer: D
QUESTION: 501
Which of the following pH ranges is a strong base?
A. 1.3-2.0
B. 4.5-5.2
C. 7.1-9.0
D. 11.2-12.0
Answer: D
QUESTION: 502
Which chamber of the heart pumps blood to the systemic circulation?
A. Left Atrium
B. Right Atrium
C. Left Ventricle
D. Right Ventricle
Answer: C
QUESTION: 503
Which of the following formulas indicates Newton's second law of motion?
A. F = ma
B. F = mva
C. v = d/t
D. p = mv
Answer: A
Section 42: Sec Forty Two (504 to 513)
Details: Writing Review Practice Test
Angela Villajuan grew up in 1Orange, County,California, 2south from Los Angeles.
When she and her 3husband,Gilbert, 4have their first daughter, Emily, Angela
5quither job as a preschool teacher to stay home and raise her. The family 6live
modestly in a middle class neighborhood and dreamed of owning a 7home one day,
but knew it was unlikely on Gilbert's income. 8A few years earlier, Angela's mother
had returned to her native Wisconsin after spending her adult life in Los Angeles.
Angela 10tried to convince her to return,
QUESTION: 504
1Orange, County, California,
A. NO CHANGE
B. Orange County, California
C. Orange County California
D. Orange County California,
Answer: B
QUESTION: 505
2south from Los Angeles. When she and her
A. NO CHANGE
B. south,
C. just south of
D. just south of,
Answer: C
QUESTION: 506
3husband, Gilbert,
A. NO CHANGE
B. husband Gilbert,
C. Gilbert
D. she and Emily
Answer: A
QUESTION: 507
4have their first daughter, Emily, Angela
A. NO CHANGE
B. had
C. will have
D. did have
Answer: B
QUESTION: 508
5quither job as a preschool teacher to stay home and raise her. The family
A. NO CHANGE
B. quit her job
C. deciding to quit her job
D. decided to quit her job
Answer: B
QUESTION: 509
6live modestly in a middle class neighborhood and dreamed of owning a
A. NO CHANGE
B. will live
C. living
D. lived
Answer: D
QUESTION: 510
7home one day, but knew it was unlikely on Gilbert's income.
A. NO CHANGE
B. home, but
C. house
D. house, but
Answer: C
QUESTION: 511
8A few years earlier, Angela's mother had returned to her native Wisconsin after
spending her adult life in Los Angeles. Angela
A. NO CHANGE
B. a few years, earlier
C. a few years earlier
D. a few, years earlier,
Answer: A
QUESTION: 512
Given that all the following sentences are true which would logically follow the
previous sentence?
A. Angela missed having her mom close by.
B. There was no way we would ever afford a house in this neighborhood.
C. The Villajuans kissed California goodbye.
D. Angela kissed her mother goodbye.
Answer: A
QUESTION: 513
10tried to convince her to return,
A. NO CHANGE
B. tried hard
C. did try
D. was trying
Answer: D
For More exams visit https://killexams.com
�
Kill your exam at First Attempt....Guaranteed!
Answer: A
QUESTION: 497
The organ of Corti is found in what area of the body?
A. Mouth
B. Ear
C. Nose
D. Lungs
Answer: B
QUESTION: 498
The condition of rickets is associated with a deficiency in which vitamin?
A. A
B. C
C. D
D. Z
Answer: C
QUESTION: 499
A steroid is considered a ______.
A. Lipid
B. Protein
C. Enzyme
D. Weak acid
Answer: A
QUESTION: 500
The X cranial nerve is the ____ nerve.
A. Abducen
B. Hypoglossal
C. Facial
D. Vagus
Answer: D
QUESTION: 501
Which of the following pH ranges is a strong base?
A. 1.3-2.0
B. 4.5-5.2
C. 7.1-9.0
D. 11.2-12.0
Answer: D
QUESTION: 502
Which chamber of the heart pumps blood to the systemic circulation?
A. Left Atrium
B. Right Atrium
C. Left Ventricle
D. Right Ventricle
Answer: C
QUESTION: 503
Which of the following formulas indicates Newton's second law of motion?
A. F = ma
B. F = mva
C. v = d/t
D. p = mv
Answer: A
Section 42: Sec Forty Two (504 to 513)
Details: Writing Review Practice Test
Angela Villajuan grew up in 1Orange, County,California, 2south from Los Angeles.
When she and her 3husband,Gilbert, 4have their first daughter, Emily, Angela
5quither job as a preschool teacher to stay home and raise her. The family 6live
modestly in a middle class neighborhood and dreamed of owning a 7home one day,
but knew it was unlikely on Gilbert's income. 8A few years earlier, Angela's mother
had returned to her native Wisconsin after spending her adult life in Los Angeles.
Angela 10tried to convince her to return,
QUESTION: 504
1Orange, County, California,
A. NO CHANGE
B. Orange County, California
C. Orange County California
D. Orange County California,
Answer: B
QUESTION: 505
2south from Los Angeles. When she and her
A. NO CHANGE
B. south,
C. just south of
D. just south of,
Answer: C
QUESTION: 506
3husband, Gilbert,
A. NO CHANGE
B. husband Gilbert,
C. Gilbert
D. she and Emily
Answer: A
QUESTION: 507
4have their first daughter, Emily, Angela
A. NO CHANGE
B. had
C. will have
D. did have
Answer: B
QUESTION: 508
5quither job as a preschool teacher to stay home and raise her. The family
A. NO CHANGE
B. quit her job
C. deciding to quit her job
D. decided to quit her job
Answer: B
QUESTION: 509
6live modestly in a middle class neighborhood and dreamed of owning a
A. NO CHANGE
B. will live
C. living
D. lived
Answer: D
QUESTION: 510
7home one day, but knew it was unlikely on Gilbert's income.
A. NO CHANGE
B. home, but
C. house
D. house, but
Answer: C
QUESTION: 511
8A few years earlier, Angela's mother had returned to her native Wisconsin after
spending her adult life in Los Angeles. Angela
A. NO CHANGE
B. a few years, earlier
C. a few years earlier
D. a few, years earlier,
Answer: A
QUESTION: 512
Given that all the following sentences are true which would logically follow the
previous sentence?
A. Angela missed having her mom close by.
B. There was no way we would ever afford a house in this neighborhood.
C. The Villajuans kissed California goodbye.
D. Angela kissed her mother goodbye.
Answer: A
QUESTION: 513
10tried to convince her to return,
A. NO CHANGE
B. tried hard
C. did try
D. was trying
Answer: D
For More exams visit https://killexams.com
�
Kill your exam at First Attempt....Guaranteed!
Thursday, 19 September 2019
Get Pass IT Certification Exams Test – 70-767 Microsoft Crazy Exam Dumps
https://killexams.com/pass4sure/exam-detail/70-767
QUESTION: 227
You plan to deploy a package to a server that has SQL Server installed. The server
contains a SQL Server Integration Services Catalog. You need to ensure that the
package credentials are encrypted. Which protection level should you set for the
package?
A. EncryptSensitivewithUserKey
B. EncryptAllWithUserKey
C. ServerStorage
D. EncryptSensitivewithPassword
Answer: D
QUESTION: 228
DRAG DROP
You are maintaining a SQL Server Integration Services (SSIS) package. The package
uses custom functionality that is implemented in Microsoft Visual C#.
The implementation of the custom functionality changes overtime. The design of the
package allows you to deploy new releases of the custom functionality without
redeploying the entire package. You need to implement and deploy an update to the
custom functionality without requiring package redeployment. Which three actions
should you perform in sequence? (To answer, move the appropriate actions from the list
of actions to the answer area and arrange them in the correct order.)
Answer:
Exhibit
QUESTION: 229
You are designing a data warehouse with two fact tables. The first table contains sales
per month and the second table contains orders per day. Referential integrity must be
enforced declaratively. You need to design a solution that can join a single time
dimension to both fact tables. What should you do?
A. Join the two fact tables.
B. Merge the fact tables.
C. Change the level of granularity in both fact tables to be the same.
D. Partition the fact tables by day.
Answer: D
QUESTION: 230
You have a SQL server integration Services (SSIS) package named package1. You
discover that the Data Flow task for Package1 runs slower than expected. You need to
reduce the amount of time required to run the Data Flow task. Which two actions should
you perform? (Select Two)
A. Configure the package to run by using the CallerInfo option.
B. Modify the DefaultBufferSize package setting.
C. Modify the ForceExecutionResult Package setting.
D. Modify the DefaultBufferMaxRows package setting.
E. Configure the package to run by using MaxConcurrent option.
Answer: D, E
QUESTION: 231
You are designing an extract, transform, and load (ETL) solution that loads data into
dimension tables. The ETL process involves many transformation steps.
You need to ensure that the design can provide:
�Auditing information for compliance and business user acceptance
�Tracking and unique identification of records for troubleshooting and error correction
What should you do?
A.Create aSQLCommon LanguageRuntime (SQLCLR)
component that records all transformation steps in a Microsoft SharePoint
list.
B. Create a version control repository for the transformation steps in Team Foundation
Server (TFS).
C. Develop a custom data lineage solution.
D. Develop a Data Quality Services (DQS) solution.
Answer: C
QUESTION: 232
HOTSPOT
You are developing a SQL Server Integration Services (SSIS) package to load data into
a SQL Server 2016 database. The name of the target instance is passed to the package
via an Environment variable. The Environment variable provides the server name to the
Project parameter named ServerName. The OLE DB Project Connection Manager has
been parameterized. You need to configure the Connection Manager property to accept
the parameter. Which property and parameter should you use? (To answer, configure the
appropriate option or options in the dialog box in the answer area.)
Answer:
Exhibit
QUESTION: 233
You are designing a SQL Server Integration Services (SSIS) project that uses the Project
Deployment Model. The project will contain 10 packages. All the packages must
connect to the same data source and destination. You need to define and reuse the
connection managers in all the packages by using the least development effort.
What should you do?
A. Implement parent package variables.
B. Copy and paste connection managers from one package to the others.
C. Implement project connection managers.
D. Implement package connection managers.
Answer: C
QUESTION: 234
HOTSPOT
You are developing a SQL Server Integration Services (SSIS) package. The data source
for the data flow task is a table that has been configured as a change data capture (CDC)
table. You are using a CDC Source component to obtain the CDC data.
The data source will be polled once per hour. The data is updated with multiple
important status changes per minute. For each captured data change, the before and after
values must be included. You need to configure the CDC Source component.
Which CDC processing mode should you select? (To answer, configure the appropriate
option in the dialog box in the answer area.)
Answer:
Exhibit
QUESTION: 235
You are administering SQL Server Integration Services (SSIS) permissions on a
production server that runs SQL Server 2016. Package developers in your company
must have permission to perform the following tasks only on their own projects:
View projects and packages, View Environments, Validate packages, Execute packages.
You need to grant rights to the developers without assigning unnecessary privileges.
What should you do? (Each correct answer presents part of a solution. Choose all that
apply.)
A. Add developer logins to the db_ssisltduser role in the msdb database.
B. Add developer logins to the db_ssisoperator role in the msdb database.
C. Grant Execute permission in the projects for the developer logins.
D. Grant Read permission in the SSIS catalog folder, the projects, and the
Environments.
E. Add developer logins to the ssis_admin role in the SSISDB database.
F. Grant Modify permission in the projects for the developer logins.
Answer: B, D
QUESTION: 236
You are implementing a new SQL Server Integration Services (SSIS) 2016 package that
loads data from various flat files and a Windows Azure SQL Database database.
Daily transactions must be loaded into a staging database. All the SSIS tasks will use the
CurrentDate variable as the transaction date. You need to set the CurrentDate variable to
the current execution date when the package starts. You need to achieve this goal by
using the least amount of development effort. What should you use to set the variable?
A. An Expression task
B. A Script component
C. A Script task
D. An Execute SQL task
Answer: A
QUESTION: 237
You are completing the installation of the Data Quality Server component of SQL
Server Data Quality Services (DQS). You need to complete the post-installation
configuration. What should you do?
A. Install the Analysis Services OLE DB Provider.
B. Run the DQSInstaller.exe command.
C. Run the Configuration component in the Data Quality Client.
D. Make the data available for DQS operations.
Answer: B
For More exams visit https://killexams.com
Kill your exam at First Attempt....Guaranteed!
QUESTION: 227
You plan to deploy a package to a server that has SQL Server installed. The server
contains a SQL Server Integration Services Catalog. You need to ensure that the
package credentials are encrypted. Which protection level should you set for the
package?
A. EncryptSensitivewithUserKey
B. EncryptAllWithUserKey
C. ServerStorage
D. EncryptSensitivewithPassword
Answer: D
QUESTION: 228
DRAG DROP
You are maintaining a SQL Server Integration Services (SSIS) package. The package
uses custom functionality that is implemented in Microsoft Visual C#.
The implementation of the custom functionality changes overtime. The design of the
package allows you to deploy new releases of the custom functionality without
redeploying the entire package. You need to implement and deploy an update to the
custom functionality without requiring package redeployment. Which three actions
should you perform in sequence? (To answer, move the appropriate actions from the list
of actions to the answer area and arrange them in the correct order.)
Answer:
Exhibit
QUESTION: 229
You are designing a data warehouse with two fact tables. The first table contains sales
per month and the second table contains orders per day. Referential integrity must be
enforced declaratively. You need to design a solution that can join a single time
dimension to both fact tables. What should you do?
A. Join the two fact tables.
B. Merge the fact tables.
C. Change the level of granularity in both fact tables to be the same.
D. Partition the fact tables by day.
Answer: D
QUESTION: 230
You have a SQL server integration Services (SSIS) package named package1. You
discover that the Data Flow task for Package1 runs slower than expected. You need to
reduce the amount of time required to run the Data Flow task. Which two actions should
you perform? (Select Two)
A. Configure the package to run by using the CallerInfo option.
B. Modify the DefaultBufferSize package setting.
C. Modify the ForceExecutionResult Package setting.
D. Modify the DefaultBufferMaxRows package setting.
E. Configure the package to run by using MaxConcurrent option.
Answer: D, E
QUESTION: 231
You are designing an extract, transform, and load (ETL) solution that loads data into
dimension tables. The ETL process involves many transformation steps.
You need to ensure that the design can provide:
�Auditing information for compliance and business user acceptance
�Tracking and unique identification of records for troubleshooting and error correction
What should you do?
A.Create aSQLCommon LanguageRuntime (SQLCLR)
component that records all transformation steps in a Microsoft SharePoint
list.
B. Create a version control repository for the transformation steps in Team Foundation
Server (TFS).
C. Develop a custom data lineage solution.
D. Develop a Data Quality Services (DQS) solution.
Answer: C
QUESTION: 232
HOTSPOT
You are developing a SQL Server Integration Services (SSIS) package to load data into
a SQL Server 2016 database. The name of the target instance is passed to the package
via an Environment variable. The Environment variable provides the server name to the
Project parameter named ServerName. The OLE DB Project Connection Manager has
been parameterized. You need to configure the Connection Manager property to accept
the parameter. Which property and parameter should you use? (To answer, configure the
appropriate option or options in the dialog box in the answer area.)
Answer:
Exhibit
QUESTION: 233
You are designing a SQL Server Integration Services (SSIS) project that uses the Project
Deployment Model. The project will contain 10 packages. All the packages must
connect to the same data source and destination. You need to define and reuse the
connection managers in all the packages by using the least development effort.
What should you do?
A. Implement parent package variables.
B. Copy and paste connection managers from one package to the others.
C. Implement project connection managers.
D. Implement package connection managers.
Answer: C
QUESTION: 234
HOTSPOT
You are developing a SQL Server Integration Services (SSIS) package. The data source
for the data flow task is a table that has been configured as a change data capture (CDC)
table. You are using a CDC Source component to obtain the CDC data.
The data source will be polled once per hour. The data is updated with multiple
important status changes per minute. For each captured data change, the before and after
values must be included. You need to configure the CDC Source component.
Which CDC processing mode should you select? (To answer, configure the appropriate
option in the dialog box in the answer area.)
Answer:
Exhibit
QUESTION: 235
You are administering SQL Server Integration Services (SSIS) permissions on a
production server that runs SQL Server 2016. Package developers in your company
must have permission to perform the following tasks only on their own projects:
View projects and packages, View Environments, Validate packages, Execute packages.
You need to grant rights to the developers without assigning unnecessary privileges.
What should you do? (Each correct answer presents part of a solution. Choose all that
apply.)
A. Add developer logins to the db_ssisltduser role in the msdb database.
B. Add developer logins to the db_ssisoperator role in the msdb database.
C. Grant Execute permission in the projects for the developer logins.
D. Grant Read permission in the SSIS catalog folder, the projects, and the
Environments.
E. Add developer logins to the ssis_admin role in the SSISDB database.
F. Grant Modify permission in the projects for the developer logins.
Answer: B, D
QUESTION: 236
You are implementing a new SQL Server Integration Services (SSIS) 2016 package that
loads data from various flat files and a Windows Azure SQL Database database.
Daily transactions must be loaded into a staging database. All the SSIS tasks will use the
CurrentDate variable as the transaction date. You need to set the CurrentDate variable to
the current execution date when the package starts. You need to achieve this goal by
using the least amount of development effort. What should you use to set the variable?
A. An Expression task
B. A Script component
C. A Script task
D. An Execute SQL task
Answer: A
QUESTION: 237
You are completing the installation of the Data Quality Server component of SQL
Server Data Quality Services (DQS). You need to complete the post-installation
configuration. What should you do?
A. Install the Analysis Services OLE DB Provider.
B. Run the DQSInstaller.exe command.
C. Run the Configuration component in the Data Quality Client.
D. Make the data available for DQS operations.
Answer: B
For More exams visit https://killexams.com
Kill your exam at First Attempt....Guaranteed!
Wednesday, 18 September 2019
Download Pass IT Certification Exams Fast – E20-385 EMC Real Exam Dumps
https://killexams.com/pass4sure/exam-detail/E20-385
QUESTION:95
On an EMC Data Domain system, what is the purpose of the log host add <host>
command?
A. Add a system to the list that receives alert messages
B. Add a system to the list that receives system log messages
C. Enable sending log messages using SNMP
D. Enable the Data Domain system to receive log messages
Answer: B
QUESTION:96
An organization has 3000 GB of file system data with a daily change rate of 10%.
Assume the first backup reduces by a factor of 3 (3x), daily incremental backups reduce
by a factor of 10 (10x), and subsequent full backups reduce by a factor of 30 (30x).
Required retention is 10 weeks (1 weekly full/6 daily incrementals) and system
utilization cannot exceed 50% of available capacity. What is the minimum EMC Data
Domain storage required?
A. 2800 GB
B. 3800 GB
C. 5600 GB
D. 7600 GB
Answer: D
QUESTION:97
An organization has 6000 GB of file system data with a daily change rate of 10%.
Assume the first backup reduces by a factor of 3 (3x), daily incremental backups reduce
by a factor of 10 (10x), and subsequent full backups reduce by a factor of 30 (30x).
Required retention is 10 weeks (1 weekly full/6 daily incrementals) and system
utilization cannot exceed 50% of available capacity. What is the minimum EMC Data
Domain storage required?
A. 5600 GB
B. 7600 GB
C. 11200 GB
D. 15200 GB
Answer: D
QUESTION:98
As represented in the exhibit,
which metric is the Local-Comp Factor reporting in the filesys show compression
output?
A. Reduction in segment size resulting from the configured compression type lz, gz, or
gzfast
B. Reduction in segment size from EMC DD Boost plugin clients
C. Reduction in segment size from low bandwidth optimized replication at the source
D. Deduplication reduction factor for the local EMC Data Domain system
Answer: A
QUESTION:99
Which pieces of information are necessary to determine the capacity requirements of an
EMC Data Domain system?
A. Full backup size, backup frequency, anticipated deduplication ratios, and retention
policy
B. Backup window duration, backup frequency, retention policy, and number of backup
tapes created weekly
C. Full backup size, recovery time objective, anticipated deduplication ratios, and
retention policy
D. Backup window duration, recovery time objective, anticipated deduplication ratios,
and frequency of data restores
Answer: A
QUESTION: 100
What is the default behavior for messages log files in an EMC Data Domain system?
A. Every day at 06:00 a new log file is opened and the previous log file is renamed
B. Every Sunday at 03:00 a new log file is opened and the previous log file is deleted
C. Every Sunday at 03:00 a new log file is opened and the previous log file is renamed
D. Every day at 06:00 a new log file is opened and the previous log file is deleted
Answer: C
QUESTION:101
On 8/15, what causes the drop in disk usage on the EMC Data Domain system as
illustrated in the exhibit?
A. Data was deleted on the system and file system cleaning completed
B. Data was deleted on the system and no longer used
C. Better deduplication ratios and less storage was needed
D. More storage was added and allowed for higher compression
Answer: A
QUESTION:102
An EMC Data Domain system has 300 TB of usable storage with 270 TB currently
used. Daily backups are consuming an additional 5 TB per day. Based on this trend,
what will occur if nothing is changed?
A. Compression will keep increasing
B. Disk performance will decrease
C. File system will run cleaning more often
D. File system will run out of space
Answer: D
QUESTION:103
A customer has a Symantec NetBackup environment with an EMC Data Domain system
using the CIFS transport protocol You have been tasked with configuring and testing
backup functionality between NetBackup and the Domain system.What is the correct
sequence of steps for creating and validating a backup?
Answer:
QUESTION:104
What is the correct sequence of steps for powering up an EMC Data Domain system
with an expansion shelf?
Answer:
For More exams visit https://killexams.com
�
Kill your exam at First Attempt....Guaranteed!
QUESTION:95
On an EMC Data Domain system, what is the purpose of the log host add <host>
command?
A. Add a system to the list that receives alert messages
B. Add a system to the list that receives system log messages
C. Enable sending log messages using SNMP
D. Enable the Data Domain system to receive log messages
Answer: B
QUESTION:96
An organization has 3000 GB of file system data with a daily change rate of 10%.
Assume the first backup reduces by a factor of 3 (3x), daily incremental backups reduce
by a factor of 10 (10x), and subsequent full backups reduce by a factor of 30 (30x).
Required retention is 10 weeks (1 weekly full/6 daily incrementals) and system
utilization cannot exceed 50% of available capacity. What is the minimum EMC Data
Domain storage required?
A. 2800 GB
B. 3800 GB
C. 5600 GB
D. 7600 GB
Answer: D
QUESTION:97
An organization has 6000 GB of file system data with a daily change rate of 10%.
Assume the first backup reduces by a factor of 3 (3x), daily incremental backups reduce
by a factor of 10 (10x), and subsequent full backups reduce by a factor of 30 (30x).
Required retention is 10 weeks (1 weekly full/6 daily incrementals) and system
utilization cannot exceed 50% of available capacity. What is the minimum EMC Data
Domain storage required?
A. 5600 GB
B. 7600 GB
C. 11200 GB
D. 15200 GB
Answer: D
QUESTION:98
As represented in the exhibit,
which metric is the Local-Comp Factor reporting in the filesys show compression
output?
A. Reduction in segment size resulting from the configured compression type lz, gz, or
gzfast
B. Reduction in segment size from EMC DD Boost plugin clients
C. Reduction in segment size from low bandwidth optimized replication at the source
D. Deduplication reduction factor for the local EMC Data Domain system
Answer: A
QUESTION:99
Which pieces of information are necessary to determine the capacity requirements of an
EMC Data Domain system?
A. Full backup size, backup frequency, anticipated deduplication ratios, and retention
policy
B. Backup window duration, backup frequency, retention policy, and number of backup
tapes created weekly
C. Full backup size, recovery time objective, anticipated deduplication ratios, and
retention policy
D. Backup window duration, recovery time objective, anticipated deduplication ratios,
and frequency of data restores
Answer: A
QUESTION: 100
What is the default behavior for messages log files in an EMC Data Domain system?
A. Every day at 06:00 a new log file is opened and the previous log file is renamed
B. Every Sunday at 03:00 a new log file is opened and the previous log file is deleted
C. Every Sunday at 03:00 a new log file is opened and the previous log file is renamed
D. Every day at 06:00 a new log file is opened and the previous log file is deleted
Answer: C
QUESTION:101
On 8/15, what causes the drop in disk usage on the EMC Data Domain system as
illustrated in the exhibit?
A. Data was deleted on the system and file system cleaning completed
B. Data was deleted on the system and no longer used
C. Better deduplication ratios and less storage was needed
D. More storage was added and allowed for higher compression
Answer: A
QUESTION:102
An EMC Data Domain system has 300 TB of usable storage with 270 TB currently
used. Daily backups are consuming an additional 5 TB per day. Based on this trend,
what will occur if nothing is changed?
A. Compression will keep increasing
B. Disk performance will decrease
C. File system will run cleaning more often
D. File system will run out of space
Answer: D
QUESTION:103
A customer has a Symantec NetBackup environment with an EMC Data Domain system
using the CIFS transport protocol You have been tasked with configuring and testing
backup functionality between NetBackup and the Domain system.What is the correct
sequence of steps for creating and validating a backup?
Answer:
QUESTION:104
What is the correct sequence of steps for powering up an EMC Data Domain system
with an expansion shelf?
Answer:
For More exams visit https://killexams.com
�
Kill your exam at First Attempt....Guaranteed!
Monday, 9 September 2019
Download Brain Dumps FSMTB MBLEX MegaCerts.com
https://killexams.com/pass4sure/exam-detail/MBLEX
Question: 384
Paralysis of one side of the body is a condition known as
A. Semiplegia
B. Quadriplegia
C. Paraplegia
D. Hemiplegia
Answer: D
Question: 385
Inability to contract muscles
A. Lupus
B. Neuritis
C. Neuralgia
D. Paralysis
Answer: D
Question: 386
The linea aspera is located on which side of the femur
A. Posterior
B. Medial
C. Lateral
D. Anterior
Answer: A
Question: 387
A blood clot is also known as
A. Thrombus
B. Embolus
C. Aneurysm
D. Plasma
Answer: A
Question: 388
The floating ribs are considered
A. An absolute contraindication
B. An endangerment site
C. Not a contraindication
D. A local contraindication
Answer: B
Question: 389
To take pressure off the lower back of a client laying supine, a bolster should be
placed
A. Under the knees
B. Between the legs
C. Under the hips
D. Under the ankles
Answer: A
Question: 390
The spinal cord is formed by which type of tissue
A. Muscular
B. Epithelial
C. Connective
D. Nervous
Answer: D
Question: 391
What is the structure labeled 7
A. Infraspinous fossa
B. Lateral border
C. Medial border
D. Superior angle
Answer: B
Question: 392
Cryotherapy treatment used for an acute strain or sprain
A. SOAP
B. PPALM
C. CAR
D. PRICE
Answer: D
Question: 393
Proximal attachment of infraspinatus
A. Greater Tubercle
B. Infraspinous Fossa
C. Lateral border of the scapula
D. Supraspinous Fossa
Answer: B
Question: 394
Parts of the body targeted in reflexology include all of the following except
A. Hands
B. Ears
C. Feet
D. Abdomen
Answer: D
For More exams visit https://killexams.com
Kill your exam at First Attempt....Guaranteed!
Question: 384
Paralysis of one side of the body is a condition known as
A. Semiplegia
B. Quadriplegia
C. Paraplegia
D. Hemiplegia
Answer: D
Question: 385
Inability to contract muscles
A. Lupus
B. Neuritis
C. Neuralgia
D. Paralysis
Answer: D
Question: 386
The linea aspera is located on which side of the femur
A. Posterior
B. Medial
C. Lateral
D. Anterior
Answer: A
Question: 387
A blood clot is also known as
A. Thrombus
B. Embolus
C. Aneurysm
D. Plasma
Answer: A
Question: 388
The floating ribs are considered
A. An absolute contraindication
B. An endangerment site
C. Not a contraindication
D. A local contraindication
Answer: B
Question: 389
To take pressure off the lower back of a client laying supine, a bolster should be
placed
A. Under the knees
B. Between the legs
C. Under the hips
D. Under the ankles
Answer: A
Question: 390
The spinal cord is formed by which type of tissue
A. Muscular
B. Epithelial
C. Connective
D. Nervous
Answer: D
Question: 391
What is the structure labeled 7
A. Infraspinous fossa
B. Lateral border
C. Medial border
D. Superior angle
Answer: B
Question: 392
Cryotherapy treatment used for an acute strain or sprain
A. SOAP
B. PPALM
C. CAR
D. PRICE
Answer: D
Question: 393
Proximal attachment of infraspinatus
A. Greater Tubercle
B. Infraspinous Fossa
C. Lateral border of the scapula
D. Supraspinous Fossa
Answer: B
Question: 394
Parts of the body targeted in reflexology include all of the following except
A. Hands
B. Ears
C. Feet
D. Abdomen
Answer: D
For More exams visit https://killexams.com
Kill your exam at First Attempt....Guaranteed!
Thursday, 5 September 2019
Download Pass IT Certification Exams Fast – 70-411 Microsoft Real Exam Dumps
https://killexams.com/pass4sure/exam-detail/70-411
Answer: A
Explanation:
Priority. Priority specifies the order of importance of the RADIUS server to the NPS proxy
server. Priority level must be assigned a value that is an integer, such as 1, 2, or 3. The lower
the number, the higher priority the NPS proxy gives to the RADIUS server. For example, if
the RADIUS server is assigned the highest priority of 1, the NPS proxy sends connection
requests to the RADIUS server first; if servers with priority 1 are not available, NPS then
sends connection requests to RADIUS servers with priority 2, and so on. You can assign the
same priority to multiple RADIUS servers, and then use the Weight setting to load balance
between them.
QUESTION: 101
YournetworkcontainsanActiveDirectorydomainnamedadatum.com.Thedomain
contains a server named Server1 that runs Windows Server 2012 R2. Server1 is configured
as a Network Policy Server (NPS) server and as a DHCP server. The network contains two
subnets named Subnet1 and Subnet2. Server1 has a DHCP scope for each subnet. You need
to ensure that noncompliant computers on Subnet1 receive different network policies than
noncompliantcomputersonSubnet2.Whichtwosettingsshouldyouconfigure?(Each
correct answer presents part of the solution. Choose two.)
A. The NAP-Capable Computers conditions
B. The NAS Port Type constraints
C. The Health Policies conditions
D. The MS-Service Class conditions
E. The Called Station ID constraints
Answer: C, D
Explanation:
The NAP health policy server uses the NPS role service with configured health policies and
systemhealthvalidators(SHVs)toevaluateclienthealthbasedonadministrator-defined
requirements. Based on results of this evaluation, NPS instructs the DHCP server to provide
full access to compliant NAP client computers and to restrict access to client computers that
are noncompliant with health requirements. If policies are filtered by DHCP scope, then MS-
Service Class is configured in policy conditions.
QUESTION: 102
Your network is configured as shown in the exhibit. (Click the Exhibit button.)
134
Server1 regularly accesses Server2. You discover that all of the connections from Server1 to
Server2 are routed through Router1. You need to optimize the connection path from Server1
to Server2. Which route command should you run on Server1?
A. Route add -p 10.10.10.0 MASK 255.255.255.0 172.23.16.2 METRIC 100
B. Route add -p 10.10.10.0 MASK 255.255.255.0 10.10.10.1 METRIC 50
C. Route add -p 10.10.10.12 MASK 255.255.255.0 10.10.10.1 METRIC 100
D. Route add -p 10.10.10.12 MASK 255.255.255.0 10.10.10.0 METRIC 50
Answer: A
Explanation:
Destination -specifies either an IP address or host name for the network or host.
specifies a subnet mask to be associated with this route entry. If subnetmask is
subnetmask -
not specified, 255.255.255.255 is used.
gateway -specifies either an IP address or host name for the gateway or router to use when
forwarding.
costmetric - assignsanintegercostmetric(rangingfrom1through9,999)tobeusedin
calculatingthefastest,mostreliable,and/orleastexpensiveroutes.Ifcostmetricisnot
specified, 1 is used.
interface -specifies the interface to be used for the route that uses the interface number. If an
interfaceisnotspecified,theinterfacetobeusedfortherouteisdeterminedfromthe
gateway IP address.
References:
http: //support. microsoft. com/kb/299540/en-us
http: //technet. microsoft. com/en-us/library/cc757323%28v=ws. 10%29. aspx
QUESTION: 103
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Thedomain
contains a RADIUS servernamed Server1 that runs Windows Server 2012 R2. You add a
VPN server named Server2 to the network. On Server1, you create several network policies.
You need to configure Server1 to accept authentication requests from Server2. Which tool
should you use on Server1?
A. Server Manager
135
B. Routing and Remote Access
C. New-NpsRadiusClient
D. Connection Manager Administration Kit (CMAK)
Answer: C
Explanation:
New-NpsRadiusClient-Name"NameOfMyClientGroup"-Address"10.1.0.0/16"-
AuthAttributeRequired0-NapCompatible0-SharedSecret"SuperSharedSecretxyz"-
VendorName "RADIUSStandard"
Reference:
http: //technet. microsoft. com/en-us/library/hh918425(v=wps. 620). aspx
http: //technet. microsoft. com/en-us/library/jj872740(v=wps. 620). aspx
http: //technet. microsoft. com/en-us/library/dd469790. Aspx
QUESTION: 104
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Thedomain
containsadomaincontrollernamedDC1thatrunsWindowsServer2012R2.Allclient
computers runWindows 8 Enterprise.DC1 contains a Group Policy object (GPO) named
GPO1. You need to update the PATH variable on all of the client computers. Which Group
Policy preference should you configure?
137
A. Ini Files
B. Services
C. Data Sources
D. Environment
Answer: D
Explanation:
Environment Variable preference items allow you to create, update, replace, and delete user
and system environment variables or semicolon-delimited segments of the PATH variable.
Before you create an Environment Variable preference item, you should review the behavior
of each type of action possible with this extension.
QUESTION: 105
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Alldomain
controllers run Windows Server 2012 R2. An organizational unit (OU) named OU1 contains
200 client computers that run Windows 8 Enterprise. A Group Policy object (GPO) named
GPO1 is linked to OU1. You make a change to GPO1. You need to force all of the computers
inOU1torefreshtheirGroupPolicysettingsimmediately.Thesolutionmustminimize
administrative effort. Which tool should you use?
A. The Secedit command
B. Group Policy Management Console (GPMC)
C. Server Manager
D. The Gpupdate command
Answer: B
Explanation:
InthepreviousversionsofWindows,thiswasaccomplishedbyhavingtheuserrun
GPUpdate.exe on their computer.
StartingwithWindowsServer�2012andWindows�8,youcannowremotelyrefresh
GroupPolicysettingsforallcomputersinanOUfromonecentrallocationthroughthe
Group Policy Management Console (GPMC). Or you can use the Invoke-GPUpdatecmdlet to
refresh Group Policy for a set of computers, not limited to the OU structure, for example, if
the computers are located in the default computers container.
http: //technet. microsoft. com/en-us//library/jj134201. aspx
http: //blogs. technet. com/b/grouppolicy/archive/2012/11/27/group-policy-in-windows-
server-2012-using-remote-gpupdate. aspx
QUESTION: 106
HOTSPOT
Yournetworkcontains25WebserversthatrunWindowsServer2012R2.Youneedto
configure auditing policies that meet the following requirements:
? Generate an event each time a new process is created.
? Generate an event each time a user attempts to access a file share.
Which two auditing policies should you configure? To answer, select the appropriate two
auditing policies in the answer area.
QUESTION: 107
141
HOTSPOT
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Thedomain
contains a server named Server1 that runs Windows Server 2012 R2 and has the Network
Policy Server role service installed. An administrator creates a Network Policy Server (NPS)
network policy named Policy1. You need to ensure that Policy1 applies to L2TP connections
only. Which condition should you modify? To answer, select the appropriate object in the
answer area.
QUESTION: 108
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Alldomain
controllersrunWindowsServer2012R2.Onallofthedomaincontrollers,Windowsis
installed in C:\Windows and the Active Directory database is located in D:\Windows\NTDS\.
All of the domain controllers have a third-party application installed. The operating system
failstorecognizethattheapplicationiscompatiblewithdomaincontrollercloning.You
verify with the application vendor that the application supports domain controller cloning.
You need to prepare a domain controller for cloning. What should you do?
A.InD:\Windows\NTDS\,createanXMLfilenamedDCCloneConfig.xmlandaddthe
application information to the file.
B. In the root of a USB flash drive, add the application information to an XML file named
DefaultDCCIoneAllowList.xml.
C. In D:\Windows\NTDS\, create an XML file named CustomDCCloneAllowList.xml and
add the application information to the file.
D.InC:\Windows\System32\Sysprep\Actionfiles\,addtheapplicationinformationtoan
XML file named Respecialize.xml.
Answer: C
Explanation:
PlacetheCustomDCCloneAllowList.xmlfileinthesamefolderastheActiveDirectory
143
database (ntds. dit) on the source Domain Controller.
References:
http://blogs.dirteam.com/blogs/sanderberkouwer/archive/2012/09/10/new-features-in-
active-directory-domain-services-in-windows-server-2012-part-13-domain-controller-
cloning. aspx
http://www.thomasmaurer.ch/2012/08/windows-server-2012-hyper-v-how-to-clone-a-
virtual-domain-controller
http: //technet. microsoft. com/en-us/library/hh831734. aspx
QUESTION: 109
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Alldomain
controllers run Windows Server 2012 R2. An organizational unit (OU) named OU1 contains
200 client computers that run Windows 8 Enterprise. A Group Policy object (GPO) named
GPO1 is linked to OU1. You make a change to GPO1. You need to force all of the computers
inOU1torefreshtheirGroupPolicysettingsimmediately.Thesolutionmustminimize
administrative effort. Which tool should you use?
A. Server Manager
B. Active Directory Users and Computers
C. The Gpupdate command
D. Group Policy Management Console (GPMC)
Answer: D
Explanation:
StartingwithWindowsServer�2012andWindows�8,youcannowremotelyrefresh
GroupPolicysettingsforallcomputersinanOUfromonecentrallocationthroughthe
Group Policy Management Console (GPMC). Or you can use the Invoke-GPUpdatecmdlet to
refresh Group Policy for a set of computers, not limited to the OU structure, for example, if
the computers are located in the default computers container.
References:
http: //technet. microsoft. com/en-us//library/jj134201. aspx
http://blogs.technet.com/b/grouppolicy/archive/2012/11/27/group-policy-in-windows-
server-2012-using-remote-gpupdate. aspx
QUESTION: 110
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Alldomain
controllers run Windows Server 2012 R2. You plan to use fine-grained password policies to
customize the password policy settings ofcontoso.com. You need to identify to which Active
Directory object types you can directly apply the fine-grained password policies. Which two
object types should you identify? (Each correct answer presents part of the solution. Choose
two.)
A. Users
B. Global groups
C. computers
D. Universal groups
E. Domain local groups
Answer: A, B
Explanation:
146
Firstoff,yourdomainfunctionallevelmustbeatWindowsServer2008.Second,Fine-
grained password policies ONLY apply to user objects, and global security groups. Linking
them to universal or domain local groups is ineffective. I know what you�re thinking, what
about OU�s? Nope, Fine-grained password policy cannot be applied to an organizational unit
(OU) directly. The third thing to keep in mind is, by default only members of the Domain
Admins group can set fine-grained password policies. However, you can delegate this ability
to other users if needed.
Fine-grained password policies apply only to user objects (or inetOrgPerson objects if they
are used instead of user objects) and global security groups.
You can apply Password Settings objects (PSOs) to users or global security groups:
References:
http: //technet. microsoft. com/en-us/library/cc731589%28v=ws. 10%29. aspx
http: //technet. microsoft. com/en-us/library/cc731589%28v=ws. 10%29. aspx
http: //technet. microsoft. com/en-us/library/cc770848%28v=ws. 10%29. aspx
http: //www. brandonlawson. com/active-directory/creating-fine-grained-password-policies/
QUESTION: 111
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Thedomain
containsaservernamedServer1thatrunsWindowsServer2012R2.Youenableand
configure Routing and Remote Access (RRAS) on Server1. You create a user account named
User1.YouneedtoensurethatUser1canestablishVPNconnectionstoServer1.What
should you do?
A. Create a network policy.
B. Create a connection request policy.
C. Add a RADIUS client.
D. Modify the members of the Remote Management Users group.
Answer: A
Explanation:
Network policies are sets of conditions, constraints, and settings that allow you to designate
who is authorized to connect to the network and the circumstances under which they can or
cannot connect.
Networkpoliciescanbeviewedasrules.Eachrulehasasetofconditionsandsettings.
ConfigureyourVPNservertouseNetworkAccessProtection(NAP)toenforcehealth
requirement policies.
147
References:
http: //technet. microsoft. com/en-us/library/hh831683. aspx
http: //technet. microsoft. com/en-us/library/cc754107. aspx
http: //technet. microsoft. com/en-us/library/dd314165%28v=ws. 10%29. aspx
http: //technet. microsoft. com/en-us/windowsserver/dd448603. aspx
http: //technet. microsoft. com/en-us/library/dd314165(v=ws. 10). aspx
http: //technet. microsoft. com/en-us/library/dd469733. aspx
http: //technet. microsoft. com/en-us/library/dd469660. aspx
http: //technet. microsoft. com/en-us/library/cc753603. aspx
http: //technet. microsoft. com/en-us/library/cc754033. aspx
http: //technet. microsoft. com/en-us/windowsserver/dd448603. Aspx
QUESTION: 112
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Thedomain
containsaservernamedServer1thatrunsWindowsServer2012P.2.Server1hasthe
Network Policy and Access Services server role installed. Your company's security policy
requires that certificate-based authentication must be used by some network services. You
need to identify which Network Policy Server (NPS) authentication methods comply with the
securitypolicy.Whichtwoauthenticationmethodsshouldyouidentify?(Eachcorrect
answer presents part of the solution. Choose two.)
A. MS-CHAP
B. PEAP-MS-CHAP v2
C. Chap
D. EAP-TLS
E. MS-CHAP v2
Answer: B, D
Explanation:
PEAP is similar in design to EAP-TTLS, requiring only a server-side PKI certificate to create
asecureTLStunneltoprotectuserauthentication,andusesserver-sidepublickey
certificates to authenticate the server.
WhenyouuseEAPwithastrong EAPtype,suchasTLS withsmartcards orTLSwith
certificates, both the client and the server use certificates to verify their identities to each
other.
QUESTION: 113
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the File
Server Resource Manager role service installed. Each time a user receives an access-denied
messageafterattemptingtoaccessafolderonServer1,anemailnotificationissenttoa
distribution list named DL1. You create a folder named Folder1 on Server1, and then you
configurecustomNTFSpermissionsforFolder1.Youneedtoensurethatwhenauser
receives an access-denied message while attempting to access Folder1, an email notification
is sent to a distribution list named DL2. The solution must not prevent DL1 from receiving
notifications about other access-denied messages. What should you do?
148
A. From File Explorer, modify the Classification tab of Folder1.
B. From the File Server Resource Manager console, modify the Email Notifications settings.
C. From the File Server Resource Manager console, set a folder management property.
D. From File Explorer, modify the Customize tab of Folder1.
Answer: C
Explanation:
Whenusingtheemailmodeleachofthefileshares,youcandeterminewhetheraccess
requeststoeachfilesharewillbereceivedbytheadministrator,adistributionlistthat
represents thefileshareowners,orboth.YoucanusetheFileServerResourceManager
console to configure the owner distribution list by editing the management properties of the
classification properties.
Reference: http://technet.microsoft.com/en-us/library/jj574182.aspx#BKMK12
QUESTION: 114
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Thedomain
contains a domain controller named DC1 that runs WindowsServer 2012. You have a Group
Policyobject(GPO)namedGPO1thatcontainsseveralcustom Administrativetemplates.
You need to filter the GPO to display only settings that will be removed from the registry
whentheGPOfallsoutofscope.Thesolutionmustonlydisplaysettingsthatareeither
enabledordisabledandthathaveacomment.Howshouldyouconfigurethefilter?To
answer, select the appropriate options below. Select three.
A. Set Managed to: Yes
B. Set Managed to: No
C. Set Managed to: Any
D. Set Configured to: Yes
E. Set Configured to: No
F. Set Configured to: Any
G. Set Commented to: Yes
H. Set Commented to: No
I. Set Commented to: Any
For More exams visit https://killexams.com
�
Kill your exam at First Attempt....Guaranteed!
https://killexams.com/pass4sure/exam-detail/70-411
Answer: A
Explanation:
Priority. Priority specifies the order of importance of the RADIUS server to the NPS proxy
server. Priority level must be assigned a value that is an integer, such as 1, 2, or 3. The lower
the number, the higher priority the NPS proxy gives to the RADIUS server. For example, if
the RADIUS server is assigned the highest priority of 1, the NPS proxy sends connection
requests to the RADIUS server first; if servers with priority 1 are not available, NPS then
sends connection requests to RADIUS servers with priority 2, and so on. You can assign the
same priority to multiple RADIUS servers, and then use the Weight setting to load balance
between them.
QUESTION: 101
YournetworkcontainsanActiveDirectorydomainnamedadatum.com.Thedomain
contains a server named Server1 that runs Windows Server 2012 R2. Server1 is configured
as a Network Policy Server (NPS) server and as a DHCP server. The network contains two
subnets named Subnet1 and Subnet2. Server1 has a DHCP scope for each subnet. You need
to ensure that noncompliant computers on Subnet1 receive different network policies than
noncompliantcomputersonSubnet2.Whichtwosettingsshouldyouconfigure?(Each
correct answer presents part of the solution. Choose two.)
A. The NAP-Capable Computers conditions
B. The NAS Port Type constraints
C. The Health Policies conditions
D. The MS-Service Class conditions
E. The Called Station ID constraints
Answer: C, D
Explanation:
The NAP health policy server uses the NPS role service with configured health policies and
systemhealthvalidators(SHVs)toevaluateclienthealthbasedonadministrator-defined
requirements. Based on results of this evaluation, NPS instructs the DHCP server to provide
full access to compliant NAP client computers and to restrict access to client computers that
are noncompliant with health requirements. If policies are filtered by DHCP scope, then MS-
Service Class is configured in policy conditions.
QUESTION: 102
Your network is configured as shown in the exhibit. (Click the Exhibit button.)
134
Server1 regularly accesses Server2. You discover that all of the connections from Server1 to
Server2 are routed through Router1. You need to optimize the connection path from Server1
to Server2. Which route command should you run on Server1?
A. Route add -p 10.10.10.0 MASK 255.255.255.0 172.23.16.2 METRIC 100
B. Route add -p 10.10.10.0 MASK 255.255.255.0 10.10.10.1 METRIC 50
C. Route add -p 10.10.10.12 MASK 255.255.255.0 10.10.10.1 METRIC 100
D. Route add -p 10.10.10.12 MASK 255.255.255.0 10.10.10.0 METRIC 50
Answer: A
Explanation:
Destination -specifies either an IP address or host name for the network or host.
specifies a subnet mask to be associated with this route entry. If subnetmask is
subnetmask -
not specified, 255.255.255.255 is used.
gateway -specifies either an IP address or host name for the gateway or router to use when
forwarding.
costmetric - assignsanintegercostmetric(rangingfrom1through9,999)tobeusedin
calculatingthefastest,mostreliable,and/orleastexpensiveroutes.Ifcostmetricisnot
specified, 1 is used.
interface -specifies the interface to be used for the route that uses the interface number. If an
interfaceisnotspecified,theinterfacetobeusedfortherouteisdeterminedfromthe
gateway IP address.
References:
http: //support. microsoft. com/kb/299540/en-us
http: //technet. microsoft. com/en-us/library/cc757323%28v=ws. 10%29. aspx
QUESTION: 103
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Thedomain
contains a RADIUS servernamed Server1 that runs Windows Server 2012 R2. You add a
VPN server named Server2 to the network. On Server1, you create several network policies.
You need to configure Server1 to accept authentication requests from Server2. Which tool
should you use on Server1?
A. Server Manager
135
B. Routing and Remote Access
C. New-NpsRadiusClient
D. Connection Manager Administration Kit (CMAK)
Answer: C
Explanation:
New-NpsRadiusClient-Name"NameOfMyClientGroup"-Address"10.1.0.0/16"-
AuthAttributeRequired0-NapCompatible0-SharedSecret"SuperSharedSecretxyz"-
VendorName "RADIUSStandard"
Reference:
http: //technet. microsoft. com/en-us/library/hh918425(v=wps. 620). aspx
http: //technet. microsoft. com/en-us/library/jj872740(v=wps. 620). aspx
http: //technet. microsoft. com/en-us/library/dd469790. Aspx
QUESTION: 104
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Thedomain
containsadomaincontrollernamedDC1thatrunsWindowsServer2012R2.Allclient
computers runWindows 8 Enterprise.DC1 contains a Group Policy object (GPO) named
GPO1. You need to update the PATH variable on all of the client computers. Which Group
Policy preference should you configure?
137
A. Ini Files
B. Services
C. Data Sources
D. Environment
Answer: D
Explanation:
Environment Variable preference items allow you to create, update, replace, and delete user
and system environment variables or semicolon-delimited segments of the PATH variable.
Before you create an Environment Variable preference item, you should review the behavior
of each type of action possible with this extension.
QUESTION: 105
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Alldomain
controllers run Windows Server 2012 R2. An organizational unit (OU) named OU1 contains
200 client computers that run Windows 8 Enterprise. A Group Policy object (GPO) named
GPO1 is linked to OU1. You make a change to GPO1. You need to force all of the computers
inOU1torefreshtheirGroupPolicysettingsimmediately.Thesolutionmustminimize
administrative effort. Which tool should you use?
A. The Secedit command
B. Group Policy Management Console (GPMC)
C. Server Manager
D. The Gpupdate command
Answer: B
Explanation:
InthepreviousversionsofWindows,thiswasaccomplishedbyhavingtheuserrun
GPUpdate.exe on their computer.
StartingwithWindowsServer�2012andWindows�8,youcannowremotelyrefresh
GroupPolicysettingsforallcomputersinanOUfromonecentrallocationthroughthe
Group Policy Management Console (GPMC). Or you can use the Invoke-GPUpdatecmdlet to
refresh Group Policy for a set of computers, not limited to the OU structure, for example, if
the computers are located in the default computers container.
http: //technet. microsoft. com/en-us//library/jj134201. aspx
http: //blogs. technet. com/b/grouppolicy/archive/2012/11/27/group-policy-in-windows-
server-2012-using-remote-gpupdate. aspx
QUESTION: 106
HOTSPOT
Yournetworkcontains25WebserversthatrunWindowsServer2012R2.Youneedto
configure auditing policies that meet the following requirements:
? Generate an event each time a new process is created.
? Generate an event each time a user attempts to access a file share.
Which two auditing policies should you configure? To answer, select the appropriate two
auditing policies in the answer area.
QUESTION: 107
141
HOTSPOT
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Thedomain
contains a server named Server1 that runs Windows Server 2012 R2 and has the Network
Policy Server role service installed. An administrator creates a Network Policy Server (NPS)
network policy named Policy1. You need to ensure that Policy1 applies to L2TP connections
only. Which condition should you modify? To answer, select the appropriate object in the
answer area.
Answer:
QUESTION: 108
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Alldomain
controllersrunWindowsServer2012R2.Onallofthedomaincontrollers,Windowsis
installed in C:\Windows and the Active Directory database is located in D:\Windows\NTDS\.
All of the domain controllers have a third-party application installed. The operating system
failstorecognizethattheapplicationiscompatiblewithdomaincontrollercloning.You
verify with the application vendor that the application supports domain controller cloning.
You need to prepare a domain controller for cloning. What should you do?
A.InD:\Windows\NTDS\,createanXMLfilenamedDCCloneConfig.xmlandaddthe
application information to the file.
B. In the root of a USB flash drive, add the application information to an XML file named
DefaultDCCIoneAllowList.xml.
C. In D:\Windows\NTDS\, create an XML file named CustomDCCloneAllowList.xml and
add the application information to the file.
D.InC:\Windows\System32\Sysprep\Actionfiles\,addtheapplicationinformationtoan
XML file named Respecialize.xml.
Answer: C
Explanation:
PlacetheCustomDCCloneAllowList.xmlfileinthesamefolderastheActiveDirectory
143
database (ntds. dit) on the source Domain Controller.
References:
http://blogs.dirteam.com/blogs/sanderberkouwer/archive/2012/09/10/new-features-in-
active-directory-domain-services-in-windows-server-2012-part-13-domain-controller-
cloning. aspx
http://www.thomasmaurer.ch/2012/08/windows-server-2012-hyper-v-how-to-clone-a-
virtual-domain-controller
http: //technet. microsoft. com/en-us/library/hh831734. aspx
QUESTION: 109
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Alldomain
controllers run Windows Server 2012 R2. An organizational unit (OU) named OU1 contains
200 client computers that run Windows 8 Enterprise. A Group Policy object (GPO) named
GPO1 is linked to OU1. You make a change to GPO1. You need to force all of the computers
inOU1torefreshtheirGroupPolicysettingsimmediately.Thesolutionmustminimize
administrative effort. Which tool should you use?
A. Server Manager
B. Active Directory Users and Computers
C. The Gpupdate command
D. Group Policy Management Console (GPMC)
Answer: D
Explanation:
StartingwithWindowsServer�2012andWindows�8,youcannowremotelyrefresh
GroupPolicysettingsforallcomputersinanOUfromonecentrallocationthroughthe
Group Policy Management Console (GPMC). Or you can use the Invoke-GPUpdatecmdlet to
refresh Group Policy for a set of computers, not limited to the OU structure, for example, if
the computers are located in the default computers container.
References:
http: //technet. microsoft. com/en-us//library/jj134201. aspx
http://blogs.technet.com/b/grouppolicy/archive/2012/11/27/group-policy-in-windows-
server-2012-using-remote-gpupdate. aspx
QUESTION: 110
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Alldomain
controllers run Windows Server 2012 R2. You plan to use fine-grained password policies to
customize the password policy settings ofcontoso.com. You need to identify to which Active
Directory object types you can directly apply the fine-grained password policies. Which two
object types should you identify? (Each correct answer presents part of the solution. Choose
two.)
A. Users
B. Global groups
C. computers
D. Universal groups
E. Domain local groups
Answer: A, B
Explanation:
Firstoff,yourdomainfunctionallevelmustbeatWindowsServer2008.Second,Fine-
grained password policies ONLY apply to user objects, and global security groups. Linking
them to universal or domain local groups is ineffective. I know what you�re thinking, what
about OU�s? Nope, Fine-grained password policy cannot be applied to an organizational unit
(OU) directly. The third thing to keep in mind is, by default only members of the Domain
Admins group can set fine-grained password policies. However, you can delegate this ability
to other users if needed.
Fine-grained password policies apply only to user objects (or inetOrgPerson objects if they
are used instead of user objects) and global security groups.
You can apply Password Settings objects (PSOs) to users or global security groups:
References:
http: //technet. microsoft. com/en-us/library/cc731589%28v=ws. 10%29. aspx
http: //technet. microsoft. com/en-us/library/cc731589%28v=ws. 10%29. aspx
http: //technet. microsoft. com/en-us/library/cc770848%28v=ws. 10%29. aspx
http: //www. brandonlawson. com/active-directory/creating-fine-grained-password-policies/
QUESTION: 111
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Thedomain
containsaservernamedServer1thatrunsWindowsServer2012R2.Youenableand
configure Routing and Remote Access (RRAS) on Server1. You create a user account named
User1.YouneedtoensurethatUser1canestablishVPNconnectionstoServer1.What
should you do?
A. Create a network policy.
B. Create a connection request policy.
C. Add a RADIUS client.
D. Modify the members of the Remote Management Users group.
Answer: A
Explanation:
Network policies are sets of conditions, constraints, and settings that allow you to designate
who is authorized to connect to the network and the circumstances under which they can or
cannot connect.
Networkpoliciescanbeviewedasrules.Eachrulehasasetofconditionsandsettings.
ConfigureyourVPNservertouseNetworkAccessProtection(NAP)toenforcehealth
requirement policies.
References:
http: //technet. microsoft. com/en-us/library/hh831683. aspx
http: //technet. microsoft. com/en-us/library/cc754107. aspx
http: //technet. microsoft. com/en-us/library/dd314165%28v=ws. 10%29. aspx
http: //technet. microsoft. com/en-us/windowsserver/dd448603. aspx
http: //technet. microsoft. com/en-us/library/dd314165(v=ws. 10). aspx
http: //technet. microsoft. com/en-us/library/dd469733. aspx
http: //technet. microsoft. com/en-us/library/dd469660. aspx
http: //technet. microsoft. com/en-us/library/cc753603. aspx
http: //technet. microsoft. com/en-us/library/cc754033. aspx
http: //technet. microsoft. com/en-us/windowsserver/dd448603. Aspx
QUESTION: 112
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Thedomain
containsaservernamedServer1thatrunsWindowsServer2012P.2.Server1hasthe
Network Policy and Access Services server role installed. Your company's security policy
requires that certificate-based authentication must be used by some network services. You
need to identify which Network Policy Server (NPS) authentication methods comply with the
securitypolicy.Whichtwoauthenticationmethodsshouldyouidentify?(Eachcorrect
answer presents part of the solution. Choose two.)
A. MS-CHAP
B. PEAP-MS-CHAP v2
C. Chap
D. EAP-TLS
E. MS-CHAP v2
Answer: B, D
Explanation:
PEAP is similar in design to EAP-TTLS, requiring only a server-side PKI certificate to create
asecureTLStunneltoprotectuserauthentication,andusesserver-sidepublickey
certificates to authenticate the server.
WhenyouuseEAPwithastrong EAPtype,suchasTLS withsmartcards orTLSwith
certificates, both the client and the server use certificates to verify their identities to each
other.
QUESTION: 113
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the File
Server Resource Manager role service installed. Each time a user receives an access-denied
messageafterattemptingtoaccessafolderonServer1,anemailnotificationissenttoa
distribution list named DL1. You create a folder named Folder1 on Server1, and then you
configurecustomNTFSpermissionsforFolder1.Youneedtoensurethatwhenauser
receives an access-denied message while attempting to access Folder1, an email notification
is sent to a distribution list named DL2. The solution must not prevent DL1 from receiving
notifications about other access-denied messages. What should you do?
148
A. From File Explorer, modify the Classification tab of Folder1.
B. From the File Server Resource Manager console, modify the Email Notifications settings.
C. From the File Server Resource Manager console, set a folder management property.
D. From File Explorer, modify the Customize tab of Folder1.
Answer: C
Explanation:
Whenusingtheemailmodeleachofthefileshares,youcandeterminewhetheraccess
requeststoeachfilesharewillbereceivedbytheadministrator,adistributionlistthat
represents thefileshareowners,orboth.YoucanusetheFileServerResourceManager
console to configure the owner distribution list by editing the management properties of the
classification properties.
Reference: http://technet.microsoft.com/en-us/library/jj574182.aspx#BKMK12
QUESTION: 114
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Thedomain
contains a domain controller named DC1 that runs WindowsServer 2012. You have a Group
Policyobject(GPO)namedGPO1thatcontainsseveralcustom Administrativetemplates.
You need to filter the GPO to display only settings that will be removed from the registry
whentheGPOfallsoutofscope.Thesolutionmustonlydisplaysettingsthatareeither
enabledordisabledandthathaveacomment.Howshouldyouconfigurethefilter?To
answer, select the appropriate options below. Select three.
A. Set Managed to: Yes
B. Set Managed to: No
C. Set Managed to: Any
D. Set Configured to: Yes
E. Set Configured to: No
F. Set Configured to: Any
G. Set Commented to: Yes
H. Set Commented to: No
I. Set Commented to: Any
Answer: A, F, G
For More exams visit https://killexams.com
�
Kill your exam at First Attempt....Guaranteed!
Answer: A
Explanation:
Priority. Priority specifies the order of importance of the RADIUS server to the NPS proxy
server. Priority level must be assigned a value that is an integer, such as 1, 2, or 3. The lower
the number, the higher priority the NPS proxy gives to the RADIUS server. For example, if
the RADIUS server is assigned the highest priority of 1, the NPS proxy sends connection
requests to the RADIUS server first; if servers with priority 1 are not available, NPS then
sends connection requests to RADIUS servers with priority 2, and so on. You can assign the
same priority to multiple RADIUS servers, and then use the Weight setting to load balance
between them.
QUESTION: 101
YournetworkcontainsanActiveDirectorydomainnamedadatum.com.Thedomain
contains a server named Server1 that runs Windows Server 2012 R2. Server1 is configured
as a Network Policy Server (NPS) server and as a DHCP server. The network contains two
subnets named Subnet1 and Subnet2. Server1 has a DHCP scope for each subnet. You need
to ensure that noncompliant computers on Subnet1 receive different network policies than
noncompliantcomputersonSubnet2.Whichtwosettingsshouldyouconfigure?(Each
correct answer presents part of the solution. Choose two.)
A. The NAP-Capable Computers conditions
B. The NAS Port Type constraints
C. The Health Policies conditions
D. The MS-Service Class conditions
E. The Called Station ID constraints
Answer: C, D
Explanation:
The NAP health policy server uses the NPS role service with configured health policies and
systemhealthvalidators(SHVs)toevaluateclienthealthbasedonadministrator-defined
requirements. Based on results of this evaluation, NPS instructs the DHCP server to provide
full access to compliant NAP client computers and to restrict access to client computers that
are noncompliant with health requirements. If policies are filtered by DHCP scope, then MS-
Service Class is configured in policy conditions.
QUESTION: 102
Your network is configured as shown in the exhibit. (Click the Exhibit button.)
134
Server1 regularly accesses Server2. You discover that all of the connections from Server1 to
Server2 are routed through Router1. You need to optimize the connection path from Server1
to Server2. Which route command should you run on Server1?
A. Route add -p 10.10.10.0 MASK 255.255.255.0 172.23.16.2 METRIC 100
B. Route add -p 10.10.10.0 MASK 255.255.255.0 10.10.10.1 METRIC 50
C. Route add -p 10.10.10.12 MASK 255.255.255.0 10.10.10.1 METRIC 100
D. Route add -p 10.10.10.12 MASK 255.255.255.0 10.10.10.0 METRIC 50
Answer: A
Explanation:
Destination -specifies either an IP address or host name for the network or host.
specifies a subnet mask to be associated with this route entry. If subnetmask is
subnetmask -
not specified, 255.255.255.255 is used.
gateway -specifies either an IP address or host name for the gateway or router to use when
forwarding.
costmetric - assignsanintegercostmetric(rangingfrom1through9,999)tobeusedin
calculatingthefastest,mostreliable,and/orleastexpensiveroutes.Ifcostmetricisnot
specified, 1 is used.
interface -specifies the interface to be used for the route that uses the interface number. If an
interfaceisnotspecified,theinterfacetobeusedfortherouteisdeterminedfromthe
gateway IP address.
References:
http: //support. microsoft. com/kb/299540/en-us
http: //technet. microsoft. com/en-us/library/cc757323%28v=ws. 10%29. aspx
QUESTION: 103
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Thedomain
contains a RADIUS servernamed Server1 that runs Windows Server 2012 R2. You add a
VPN server named Server2 to the network. On Server1, you create several network policies.
You need to configure Server1 to accept authentication requests from Server2. Which tool
should you use on Server1?
A. Server Manager
135
B. Routing and Remote Access
C. New-NpsRadiusClient
D. Connection Manager Administration Kit (CMAK)
Answer: C
Explanation:
New-NpsRadiusClient-Name"NameOfMyClientGroup"-Address"10.1.0.0/16"-
AuthAttributeRequired0-NapCompatible0-SharedSecret"SuperSharedSecretxyz"-
VendorName "RADIUSStandard"
Reference:
http: //technet. microsoft. com/en-us/library/hh918425(v=wps. 620). aspx
http: //technet. microsoft. com/en-us/library/jj872740(v=wps. 620). aspx
http: //technet. microsoft. com/en-us/library/dd469790. Aspx
QUESTION: 104
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Thedomain
containsadomaincontrollernamedDC1thatrunsWindowsServer2012R2.Allclient
computers runWindows 8 Enterprise.DC1 contains a Group Policy object (GPO) named
GPO1. You need to update the PATH variable on all of the client computers. Which Group
Policy preference should you configure?
137
A. Ini Files
B. Services
C. Data Sources
D. Environment
Answer: D
Explanation:
Environment Variable preference items allow you to create, update, replace, and delete user
and system environment variables or semicolon-delimited segments of the PATH variable.
Before you create an Environment Variable preference item, you should review the behavior
of each type of action possible with this extension.
QUESTION: 105
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Alldomain
controllers run Windows Server 2012 R2. An organizational unit (OU) named OU1 contains
200 client computers that run Windows 8 Enterprise. A Group Policy object (GPO) named
GPO1 is linked to OU1. You make a change to GPO1. You need to force all of the computers
inOU1torefreshtheirGroupPolicysettingsimmediately.Thesolutionmustminimize
administrative effort. Which tool should you use?
A. The Secedit command
B. Group Policy Management Console (GPMC)
C. Server Manager
D. The Gpupdate command
Answer: B
Explanation:
InthepreviousversionsofWindows,thiswasaccomplishedbyhavingtheuserrun
GPUpdate.exe on their computer.
StartingwithWindowsServer�2012andWindows�8,youcannowremotelyrefresh
GroupPolicysettingsforallcomputersinanOUfromonecentrallocationthroughthe
Group Policy Management Console (GPMC). Or you can use the Invoke-GPUpdatecmdlet to
refresh Group Policy for a set of computers, not limited to the OU structure, for example, if
the computers are located in the default computers container.
http: //technet. microsoft. com/en-us//library/jj134201. aspx
http: //blogs. technet. com/b/grouppolicy/archive/2012/11/27/group-policy-in-windows-
server-2012-using-remote-gpupdate. aspx
QUESTION: 106
HOTSPOT
Yournetworkcontains25WebserversthatrunWindowsServer2012R2.Youneedto
configure auditing policies that meet the following requirements:
? Generate an event each time a new process is created.
? Generate an event each time a user attempts to access a file share.
Which two auditing policies should you configure? To answer, select the appropriate two
auditing policies in the answer area.
QUESTION: 107
141
HOTSPOT
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Thedomain
contains a server named Server1 that runs Windows Server 2012 R2 and has the Network
Policy Server role service installed. An administrator creates a Network Policy Server (NPS)
network policy named Policy1. You need to ensure that Policy1 applies to L2TP connections
only. Which condition should you modify? To answer, select the appropriate object in the
answer area.
QUESTION: 108
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Alldomain
controllersrunWindowsServer2012R2.Onallofthedomaincontrollers,Windowsis
installed in C:\Windows and the Active Directory database is located in D:\Windows\NTDS\.
All of the domain controllers have a third-party application installed. The operating system
failstorecognizethattheapplicationiscompatiblewithdomaincontrollercloning.You
verify with the application vendor that the application supports domain controller cloning.
You need to prepare a domain controller for cloning. What should you do?
A.InD:\Windows\NTDS\,createanXMLfilenamedDCCloneConfig.xmlandaddthe
application information to the file.
B. In the root of a USB flash drive, add the application information to an XML file named
DefaultDCCIoneAllowList.xml.
C. In D:\Windows\NTDS\, create an XML file named CustomDCCloneAllowList.xml and
add the application information to the file.
D.InC:\Windows\System32\Sysprep\Actionfiles\,addtheapplicationinformationtoan
XML file named Respecialize.xml.
Answer: C
Explanation:
PlacetheCustomDCCloneAllowList.xmlfileinthesamefolderastheActiveDirectory
143
database (ntds. dit) on the source Domain Controller.
References:
http://blogs.dirteam.com/blogs/sanderberkouwer/archive/2012/09/10/new-features-in-
active-directory-domain-services-in-windows-server-2012-part-13-domain-controller-
cloning. aspx
http://www.thomasmaurer.ch/2012/08/windows-server-2012-hyper-v-how-to-clone-a-
virtual-domain-controller
http: //technet. microsoft. com/en-us/library/hh831734. aspx
QUESTION: 109
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Alldomain
controllers run Windows Server 2012 R2. An organizational unit (OU) named OU1 contains
200 client computers that run Windows 8 Enterprise. A Group Policy object (GPO) named
GPO1 is linked to OU1. You make a change to GPO1. You need to force all of the computers
inOU1torefreshtheirGroupPolicysettingsimmediately.Thesolutionmustminimize
administrative effort. Which tool should you use?
A. Server Manager
B. Active Directory Users and Computers
C. The Gpupdate command
D. Group Policy Management Console (GPMC)
Answer: D
Explanation:
StartingwithWindowsServer�2012andWindows�8,youcannowremotelyrefresh
GroupPolicysettingsforallcomputersinanOUfromonecentrallocationthroughthe
Group Policy Management Console (GPMC). Or you can use the Invoke-GPUpdatecmdlet to
refresh Group Policy for a set of computers, not limited to the OU structure, for example, if
the computers are located in the default computers container.
References:
http: //technet. microsoft. com/en-us//library/jj134201. aspx
http://blogs.technet.com/b/grouppolicy/archive/2012/11/27/group-policy-in-windows-
server-2012-using-remote-gpupdate. aspx
QUESTION: 110
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Alldomain
controllers run Windows Server 2012 R2. You plan to use fine-grained password policies to
customize the password policy settings ofcontoso.com. You need to identify to which Active
Directory object types you can directly apply the fine-grained password policies. Which two
object types should you identify? (Each correct answer presents part of the solution. Choose
two.)
A. Users
B. Global groups
C. computers
D. Universal groups
E. Domain local groups
Answer: A, B
Explanation:
146
Firstoff,yourdomainfunctionallevelmustbeatWindowsServer2008.Second,Fine-
grained password policies ONLY apply to user objects, and global security groups. Linking
them to universal or domain local groups is ineffective. I know what you�re thinking, what
about OU�s? Nope, Fine-grained password policy cannot be applied to an organizational unit
(OU) directly. The third thing to keep in mind is, by default only members of the Domain
Admins group can set fine-grained password policies. However, you can delegate this ability
to other users if needed.
Fine-grained password policies apply only to user objects (or inetOrgPerson objects if they
are used instead of user objects) and global security groups.
You can apply Password Settings objects (PSOs) to users or global security groups:
References:
http: //technet. microsoft. com/en-us/library/cc731589%28v=ws. 10%29. aspx
http: //technet. microsoft. com/en-us/library/cc731589%28v=ws. 10%29. aspx
http: //technet. microsoft. com/en-us/library/cc770848%28v=ws. 10%29. aspx
http: //www. brandonlawson. com/active-directory/creating-fine-grained-password-policies/
QUESTION: 111
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Thedomain
containsaservernamedServer1thatrunsWindowsServer2012R2.Youenableand
configure Routing and Remote Access (RRAS) on Server1. You create a user account named
User1.YouneedtoensurethatUser1canestablishVPNconnectionstoServer1.What
should you do?
A. Create a network policy.
B. Create a connection request policy.
C. Add a RADIUS client.
D. Modify the members of the Remote Management Users group.
Answer: A
Explanation:
Network policies are sets of conditions, constraints, and settings that allow you to designate
who is authorized to connect to the network and the circumstances under which they can or
cannot connect.
Networkpoliciescanbeviewedasrules.Eachrulehasasetofconditionsandsettings.
ConfigureyourVPNservertouseNetworkAccessProtection(NAP)toenforcehealth
requirement policies.
147
References:
http: //technet. microsoft. com/en-us/library/hh831683. aspx
http: //technet. microsoft. com/en-us/library/cc754107. aspx
http: //technet. microsoft. com/en-us/library/dd314165%28v=ws. 10%29. aspx
http: //technet. microsoft. com/en-us/windowsserver/dd448603. aspx
http: //technet. microsoft. com/en-us/library/dd314165(v=ws. 10). aspx
http: //technet. microsoft. com/en-us/library/dd469733. aspx
http: //technet. microsoft. com/en-us/library/dd469660. aspx
http: //technet. microsoft. com/en-us/library/cc753603. aspx
http: //technet. microsoft. com/en-us/library/cc754033. aspx
http: //technet. microsoft. com/en-us/windowsserver/dd448603. Aspx
QUESTION: 112
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Thedomain
containsaservernamedServer1thatrunsWindowsServer2012P.2.Server1hasthe
Network Policy and Access Services server role installed. Your company's security policy
requires that certificate-based authentication must be used by some network services. You
need to identify which Network Policy Server (NPS) authentication methods comply with the
securitypolicy.Whichtwoauthenticationmethodsshouldyouidentify?(Eachcorrect
answer presents part of the solution. Choose two.)
A. MS-CHAP
B. PEAP-MS-CHAP v2
C. Chap
D. EAP-TLS
E. MS-CHAP v2
Answer: B, D
Explanation:
PEAP is similar in design to EAP-TTLS, requiring only a server-side PKI certificate to create
asecureTLStunneltoprotectuserauthentication,andusesserver-sidepublickey
certificates to authenticate the server.
WhenyouuseEAPwithastrong EAPtype,suchasTLS withsmartcards orTLSwith
certificates, both the client and the server use certificates to verify their identities to each
other.
QUESTION: 113
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the File
Server Resource Manager role service installed. Each time a user receives an access-denied
messageafterattemptingtoaccessafolderonServer1,anemailnotificationissenttoa
distribution list named DL1. You create a folder named Folder1 on Server1, and then you
configurecustomNTFSpermissionsforFolder1.Youneedtoensurethatwhenauser
receives an access-denied message while attempting to access Folder1, an email notification
is sent to a distribution list named DL2. The solution must not prevent DL1 from receiving
notifications about other access-denied messages. What should you do?
148
A. From File Explorer, modify the Classification tab of Folder1.
B. From the File Server Resource Manager console, modify the Email Notifications settings.
C. From the File Server Resource Manager console, set a folder management property.
D. From File Explorer, modify the Customize tab of Folder1.
Answer: C
Explanation:
Whenusingtheemailmodeleachofthefileshares,youcandeterminewhetheraccess
requeststoeachfilesharewillbereceivedbytheadministrator,adistributionlistthat
represents thefileshareowners,orboth.YoucanusetheFileServerResourceManager
console to configure the owner distribution list by editing the management properties of the
classification properties.
Reference: http://technet.microsoft.com/en-us/library/jj574182.aspx#BKMK12
QUESTION: 114
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Thedomain
contains a domain controller named DC1 that runs WindowsServer 2012. You have a Group
Policyobject(GPO)namedGPO1thatcontainsseveralcustom Administrativetemplates.
You need to filter the GPO to display only settings that will be removed from the registry
whentheGPOfallsoutofscope.Thesolutionmustonlydisplaysettingsthatareeither
enabledordisabledandthathaveacomment.Howshouldyouconfigurethefilter?To
answer, select the appropriate options below. Select three.
A. Set Managed to: Yes
B. Set Managed to: No
C. Set Managed to: Any
D. Set Configured to: Yes
E. Set Configured to: No
F. Set Configured to: Any
G. Set Commented to: Yes
H. Set Commented to: No
I. Set Commented to: Any
For More exams visit https://killexams.com
�
Kill your exam at First Attempt....Guaranteed!
https://killexams.com/pass4sure/exam-detail/70-411
Answer: A
Explanation:
Priority. Priority specifies the order of importance of the RADIUS server to the NPS proxy
server. Priority level must be assigned a value that is an integer, such as 1, 2, or 3. The lower
the number, the higher priority the NPS proxy gives to the RADIUS server. For example, if
the RADIUS server is assigned the highest priority of 1, the NPS proxy sends connection
requests to the RADIUS server first; if servers with priority 1 are not available, NPS then
sends connection requests to RADIUS servers with priority 2, and so on. You can assign the
same priority to multiple RADIUS servers, and then use the Weight setting to load balance
between them.
QUESTION: 101
YournetworkcontainsanActiveDirectorydomainnamedadatum.com.Thedomain
contains a server named Server1 that runs Windows Server 2012 R2. Server1 is configured
as a Network Policy Server (NPS) server and as a DHCP server. The network contains two
subnets named Subnet1 and Subnet2. Server1 has a DHCP scope for each subnet. You need
to ensure that noncompliant computers on Subnet1 receive different network policies than
noncompliantcomputersonSubnet2.Whichtwosettingsshouldyouconfigure?(Each
correct answer presents part of the solution. Choose two.)
A. The NAP-Capable Computers conditions
B. The NAS Port Type constraints
C. The Health Policies conditions
D. The MS-Service Class conditions
E. The Called Station ID constraints
Answer: C, D
Explanation:
The NAP health policy server uses the NPS role service with configured health policies and
systemhealthvalidators(SHVs)toevaluateclienthealthbasedonadministrator-defined
requirements. Based on results of this evaluation, NPS instructs the DHCP server to provide
full access to compliant NAP client computers and to restrict access to client computers that
are noncompliant with health requirements. If policies are filtered by DHCP scope, then MS-
Service Class is configured in policy conditions.
QUESTION: 102
Your network is configured as shown in the exhibit. (Click the Exhibit button.)
134
Server1 regularly accesses Server2. You discover that all of the connections from Server1 to
Server2 are routed through Router1. You need to optimize the connection path from Server1
to Server2. Which route command should you run on Server1?
A. Route add -p 10.10.10.0 MASK 255.255.255.0 172.23.16.2 METRIC 100
B. Route add -p 10.10.10.0 MASK 255.255.255.0 10.10.10.1 METRIC 50
C. Route add -p 10.10.10.12 MASK 255.255.255.0 10.10.10.1 METRIC 100
D. Route add -p 10.10.10.12 MASK 255.255.255.0 10.10.10.0 METRIC 50
Answer: A
Explanation:
Destination -specifies either an IP address or host name for the network or host.
specifies a subnet mask to be associated with this route entry. If subnetmask is
subnetmask -
not specified, 255.255.255.255 is used.
gateway -specifies either an IP address or host name for the gateway or router to use when
forwarding.
costmetric - assignsanintegercostmetric(rangingfrom1through9,999)tobeusedin
calculatingthefastest,mostreliable,and/orleastexpensiveroutes.Ifcostmetricisnot
specified, 1 is used.
interface -specifies the interface to be used for the route that uses the interface number. If an
interfaceisnotspecified,theinterfacetobeusedfortherouteisdeterminedfromthe
gateway IP address.
References:
http: //support. microsoft. com/kb/299540/en-us
http: //technet. microsoft. com/en-us/library/cc757323%28v=ws. 10%29. aspx
QUESTION: 103
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Thedomain
contains a RADIUS servernamed Server1 that runs Windows Server 2012 R2. You add a
VPN server named Server2 to the network. On Server1, you create several network policies.
You need to configure Server1 to accept authentication requests from Server2. Which tool
should you use on Server1?
A. Server Manager
135
B. Routing and Remote Access
C. New-NpsRadiusClient
D. Connection Manager Administration Kit (CMAK)
Answer: C
Explanation:
New-NpsRadiusClient-Name"NameOfMyClientGroup"-Address"10.1.0.0/16"-
AuthAttributeRequired0-NapCompatible0-SharedSecret"SuperSharedSecretxyz"-
VendorName "RADIUSStandard"
Reference:
http: //technet. microsoft. com/en-us/library/hh918425(v=wps. 620). aspx
http: //technet. microsoft. com/en-us/library/jj872740(v=wps. 620). aspx
http: //technet. microsoft. com/en-us/library/dd469790. Aspx
QUESTION: 104
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Thedomain
containsadomaincontrollernamedDC1thatrunsWindowsServer2012R2.Allclient
computers runWindows 8 Enterprise.DC1 contains a Group Policy object (GPO) named
GPO1. You need to update the PATH variable on all of the client computers. Which Group
Policy preference should you configure?
137
A. Ini Files
B. Services
C. Data Sources
D. Environment
Answer: D
Explanation:
Environment Variable preference items allow you to create, update, replace, and delete user
and system environment variables or semicolon-delimited segments of the PATH variable.
Before you create an Environment Variable preference item, you should review the behavior
of each type of action possible with this extension.
QUESTION: 105
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Alldomain
controllers run Windows Server 2012 R2. An organizational unit (OU) named OU1 contains
200 client computers that run Windows 8 Enterprise. A Group Policy object (GPO) named
GPO1 is linked to OU1. You make a change to GPO1. You need to force all of the computers
inOU1torefreshtheirGroupPolicysettingsimmediately.Thesolutionmustminimize
administrative effort. Which tool should you use?
A. The Secedit command
B. Group Policy Management Console (GPMC)
C. Server Manager
D. The Gpupdate command
Answer: B
Explanation:
InthepreviousversionsofWindows,thiswasaccomplishedbyhavingtheuserrun
GPUpdate.exe on their computer.
StartingwithWindowsServer�2012andWindows�8,youcannowremotelyrefresh
GroupPolicysettingsforallcomputersinanOUfromonecentrallocationthroughthe
Group Policy Management Console (GPMC). Or you can use the Invoke-GPUpdatecmdlet to
refresh Group Policy for a set of computers, not limited to the OU structure, for example, if
the computers are located in the default computers container.
http: //technet. microsoft. com/en-us//library/jj134201. aspx
http: //blogs. technet. com/b/grouppolicy/archive/2012/11/27/group-policy-in-windows-
server-2012-using-remote-gpupdate. aspx
QUESTION: 106
HOTSPOT
Yournetworkcontains25WebserversthatrunWindowsServer2012R2.Youneedto
configure auditing policies that meet the following requirements:
? Generate an event each time a new process is created.
? Generate an event each time a user attempts to access a file share.
Which two auditing policies should you configure? To answer, select the appropriate two
auditing policies in the answer area.
QUESTION: 107
141
HOTSPOT
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Thedomain
contains a server named Server1 that runs Windows Server 2012 R2 and has the Network
Policy Server role service installed. An administrator creates a Network Policy Server (NPS)
network policy named Policy1. You need to ensure that Policy1 applies to L2TP connections
only. Which condition should you modify? To answer, select the appropriate object in the
answer area.
Answer:
QUESTION: 108
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Alldomain
controllersrunWindowsServer2012R2.Onallofthedomaincontrollers,Windowsis
installed in C:\Windows and the Active Directory database is located in D:\Windows\NTDS\.
All of the domain controllers have a third-party application installed. The operating system
failstorecognizethattheapplicationiscompatiblewithdomaincontrollercloning.You
verify with the application vendor that the application supports domain controller cloning.
You need to prepare a domain controller for cloning. What should you do?
A.InD:\Windows\NTDS\,createanXMLfilenamedDCCloneConfig.xmlandaddthe
application information to the file.
B. In the root of a USB flash drive, add the application information to an XML file named
DefaultDCCIoneAllowList.xml.
C. In D:\Windows\NTDS\, create an XML file named CustomDCCloneAllowList.xml and
add the application information to the file.
D.InC:\Windows\System32\Sysprep\Actionfiles\,addtheapplicationinformationtoan
XML file named Respecialize.xml.
Answer: C
Explanation:
PlacetheCustomDCCloneAllowList.xmlfileinthesamefolderastheActiveDirectory
143
database (ntds. dit) on the source Domain Controller.
References:
http://blogs.dirteam.com/blogs/sanderberkouwer/archive/2012/09/10/new-features-in-
active-directory-domain-services-in-windows-server-2012-part-13-domain-controller-
cloning. aspx
http://www.thomasmaurer.ch/2012/08/windows-server-2012-hyper-v-how-to-clone-a-
virtual-domain-controller
http: //technet. microsoft. com/en-us/library/hh831734. aspx
QUESTION: 109
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Alldomain
controllers run Windows Server 2012 R2. An organizational unit (OU) named OU1 contains
200 client computers that run Windows 8 Enterprise. A Group Policy object (GPO) named
GPO1 is linked to OU1. You make a change to GPO1. You need to force all of the computers
inOU1torefreshtheirGroupPolicysettingsimmediately.Thesolutionmustminimize
administrative effort. Which tool should you use?
A. Server Manager
B. Active Directory Users and Computers
C. The Gpupdate command
D. Group Policy Management Console (GPMC)
Answer: D
Explanation:
StartingwithWindowsServer�2012andWindows�8,youcannowremotelyrefresh
GroupPolicysettingsforallcomputersinanOUfromonecentrallocationthroughthe
Group Policy Management Console (GPMC). Or you can use the Invoke-GPUpdatecmdlet to
refresh Group Policy for a set of computers, not limited to the OU structure, for example, if
the computers are located in the default computers container.
References:
http: //technet. microsoft. com/en-us//library/jj134201. aspx
http://blogs.technet.com/b/grouppolicy/archive/2012/11/27/group-policy-in-windows-
server-2012-using-remote-gpupdate. aspx
QUESTION: 110
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Alldomain
controllers run Windows Server 2012 R2. You plan to use fine-grained password policies to
customize the password policy settings ofcontoso.com. You need to identify to which Active
Directory object types you can directly apply the fine-grained password policies. Which two
object types should you identify? (Each correct answer presents part of the solution. Choose
two.)
A. Users
B. Global groups
C. computers
D. Universal groups
E. Domain local groups
Answer: A, B
Explanation:
Firstoff,yourdomainfunctionallevelmustbeatWindowsServer2008.Second,Fine-
grained password policies ONLY apply to user objects, and global security groups. Linking
them to universal or domain local groups is ineffective. I know what you�re thinking, what
about OU�s? Nope, Fine-grained password policy cannot be applied to an organizational unit
(OU) directly. The third thing to keep in mind is, by default only members of the Domain
Admins group can set fine-grained password policies. However, you can delegate this ability
to other users if needed.
Fine-grained password policies apply only to user objects (or inetOrgPerson objects if they
are used instead of user objects) and global security groups.
You can apply Password Settings objects (PSOs) to users or global security groups:
References:
http: //technet. microsoft. com/en-us/library/cc731589%28v=ws. 10%29. aspx
http: //technet. microsoft. com/en-us/library/cc731589%28v=ws. 10%29. aspx
http: //technet. microsoft. com/en-us/library/cc770848%28v=ws. 10%29. aspx
http: //www. brandonlawson. com/active-directory/creating-fine-grained-password-policies/
QUESTION: 111
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Thedomain
containsaservernamedServer1thatrunsWindowsServer2012R2.Youenableand
configure Routing and Remote Access (RRAS) on Server1. You create a user account named
User1.YouneedtoensurethatUser1canestablishVPNconnectionstoServer1.What
should you do?
A. Create a network policy.
B. Create a connection request policy.
C. Add a RADIUS client.
D. Modify the members of the Remote Management Users group.
Answer: A
Explanation:
Network policies are sets of conditions, constraints, and settings that allow you to designate
who is authorized to connect to the network and the circumstances under which they can or
cannot connect.
Networkpoliciescanbeviewedasrules.Eachrulehasasetofconditionsandsettings.
ConfigureyourVPNservertouseNetworkAccessProtection(NAP)toenforcehealth
requirement policies.
References:
http: //technet. microsoft. com/en-us/library/hh831683. aspx
http: //technet. microsoft. com/en-us/library/cc754107. aspx
http: //technet. microsoft. com/en-us/library/dd314165%28v=ws. 10%29. aspx
http: //technet. microsoft. com/en-us/windowsserver/dd448603. aspx
http: //technet. microsoft. com/en-us/library/dd314165(v=ws. 10). aspx
http: //technet. microsoft. com/en-us/library/dd469733. aspx
http: //technet. microsoft. com/en-us/library/dd469660. aspx
http: //technet. microsoft. com/en-us/library/cc753603. aspx
http: //technet. microsoft. com/en-us/library/cc754033. aspx
http: //technet. microsoft. com/en-us/windowsserver/dd448603. Aspx
QUESTION: 112
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Thedomain
containsaservernamedServer1thatrunsWindowsServer2012P.2.Server1hasthe
Network Policy and Access Services server role installed. Your company's security policy
requires that certificate-based authentication must be used by some network services. You
need to identify which Network Policy Server (NPS) authentication methods comply with the
securitypolicy.Whichtwoauthenticationmethodsshouldyouidentify?(Eachcorrect
answer presents part of the solution. Choose two.)
A. MS-CHAP
B. PEAP-MS-CHAP v2
C. Chap
D. EAP-TLS
E. MS-CHAP v2
Answer: B, D
Explanation:
PEAP is similar in design to EAP-TTLS, requiring only a server-side PKI certificate to create
asecureTLStunneltoprotectuserauthentication,andusesserver-sidepublickey
certificates to authenticate the server.
WhenyouuseEAPwithastrong EAPtype,suchasTLS withsmartcards orTLSwith
certificates, both the client and the server use certificates to verify their identities to each
other.
QUESTION: 113
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the File
Server Resource Manager role service installed. Each time a user receives an access-denied
messageafterattemptingtoaccessafolderonServer1,anemailnotificationissenttoa
distribution list named DL1. You create a folder named Folder1 on Server1, and then you
configurecustomNTFSpermissionsforFolder1.Youneedtoensurethatwhenauser
receives an access-denied message while attempting to access Folder1, an email notification
is sent to a distribution list named DL2. The solution must not prevent DL1 from receiving
notifications about other access-denied messages. What should you do?
148
A. From File Explorer, modify the Classification tab of Folder1.
B. From the File Server Resource Manager console, modify the Email Notifications settings.
C. From the File Server Resource Manager console, set a folder management property.
D. From File Explorer, modify the Customize tab of Folder1.
Answer: C
Explanation:
Whenusingtheemailmodeleachofthefileshares,youcandeterminewhetheraccess
requeststoeachfilesharewillbereceivedbytheadministrator,adistributionlistthat
represents thefileshareowners,orboth.YoucanusetheFileServerResourceManager
console to configure the owner distribution list by editing the management properties of the
classification properties.
Reference: http://technet.microsoft.com/en-us/library/jj574182.aspx#BKMK12
QUESTION: 114
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Thedomain
contains a domain controller named DC1 that runs WindowsServer 2012. You have a Group
Policyobject(GPO)namedGPO1thatcontainsseveralcustom Administrativetemplates.
You need to filter the GPO to display only settings that will be removed from the registry
whentheGPOfallsoutofscope.Thesolutionmustonlydisplaysettingsthatareeither
enabledordisabledandthathaveacomment.Howshouldyouconfigurethefilter?To
answer, select the appropriate options below. Select three.
A. Set Managed to: Yes
B. Set Managed to: No
C. Set Managed to: Any
D. Set Configured to: Yes
E. Set Configured to: No
F. Set Configured to: Any
G. Set Commented to: Yes
H. Set Commented to: No
I. Set Commented to: Any
Answer: A, F, G
For More exams visit https://killexams.com
�
Kill your exam at First Attempt....Guaranteed!
Subscribe to:
Posts (Atom)