https://killexams.com/pass4sure/exam-detail/E20-385
QUESTION:95
On an EMC Data Domain system, what is the purpose of the log host add <host>
command?
A. Add a system to the list that receives alert messages
B. Add a system to the list that receives system log messages
C. Enable sending log messages using SNMP
D. Enable the Data Domain system to receive log messages
Answer: B
QUESTION:96
An organization has 3000 GB of file system data with a daily change rate of 10%.
Assume the first backup reduces by a factor of 3 (3x), daily incremental backups reduce
by a factor of 10 (10x), and subsequent full backups reduce by a factor of 30 (30x).
Required retention is 10 weeks (1 weekly full/6 daily incrementals) and system
utilization cannot exceed 50% of available capacity. What is the minimum EMC Data
Domain storage required?
A. 2800 GB
B. 3800 GB
C. 5600 GB
D. 7600 GB
Answer: D
QUESTION:97
An organization has 6000 GB of file system data with a daily change rate of 10%.
Assume the first backup reduces by a factor of 3 (3x), daily incremental backups reduce
by a factor of 10 (10x), and subsequent full backups reduce by a factor of 30 (30x).
Required retention is 10 weeks (1 weekly full/6 daily incrementals) and system
utilization cannot exceed 50% of available capacity. What is the minimum EMC Data
Domain storage required?
A. 5600 GB
B. 7600 GB
C. 11200 GB
D. 15200 GB
Answer: D
QUESTION:98
As represented in the exhibit,
which metric is the Local-Comp Factor reporting in the filesys show compression
output?
A. Reduction in segment size resulting from the configured compression type lz, gz, or
gzfast
B. Reduction in segment size from EMC DD Boost plugin clients
C. Reduction in segment size from low bandwidth optimized replication at the source
D. Deduplication reduction factor for the local EMC Data Domain system
Answer: A
QUESTION:99
Which pieces of information are necessary to determine the capacity requirements of an
EMC Data Domain system?
A. Full backup size, backup frequency, anticipated deduplication ratios, and retention
policy
B. Backup window duration, backup frequency, retention policy, and number of backup
tapes created weekly
C. Full backup size, recovery time objective, anticipated deduplication ratios, and
retention policy
D. Backup window duration, recovery time objective, anticipated deduplication ratios,
and frequency of data restores
Answer: A
QUESTION: 100
What is the default behavior for messages log files in an EMC Data Domain system?
A. Every day at 06:00 a new log file is opened and the previous log file is renamed
B. Every Sunday at 03:00 a new log file is opened and the previous log file is deleted
C. Every Sunday at 03:00 a new log file is opened and the previous log file is renamed
D. Every day at 06:00 a new log file is opened and the previous log file is deleted
Answer: C
QUESTION:101
On 8/15, what causes the drop in disk usage on the EMC Data Domain system as
illustrated in the exhibit?
A. Data was deleted on the system and file system cleaning completed
B. Data was deleted on the system and no longer used
C. Better deduplication ratios and less storage was needed
D. More storage was added and allowed for higher compression
Answer: A
QUESTION:102
An EMC Data Domain system has 300 TB of usable storage with 270 TB currently
used. Daily backups are consuming an additional 5 TB per day. Based on this trend,
what will occur if nothing is changed?
A. Compression will keep increasing
B. Disk performance will decrease
C. File system will run cleaning more often
D. File system will run out of space
Answer: D
QUESTION:103
A customer has a Symantec NetBackup environment with an EMC Data Domain system
using the CIFS transport protocol You have been tasked with configuring and testing
backup functionality between NetBackup and the Domain system.What is the correct
sequence of steps for creating and validating a backup?
Answer:
QUESTION:104
What is the correct sequence of steps for powering up an EMC Data Domain system
with an expansion shelf?
Answer:
For More exams visit https://killexams.com
�
Kill your exam at First Attempt....Guaranteed!
Wednesday, 18 September 2019
Monday, 9 September 2019
Download Brain Dumps FSMTB MBLEX MegaCerts.com
https://killexams.com/pass4sure/exam-detail/MBLEX
Question: 384
Paralysis of one side of the body is a condition known as
A. Semiplegia
B. Quadriplegia
C. Paraplegia
D. Hemiplegia
Answer: D
Question: 385
Inability to contract muscles
A. Lupus
B. Neuritis
C. Neuralgia
D. Paralysis
Answer: D
Question: 386
The linea aspera is located on which side of the femur
A. Posterior
B. Medial
C. Lateral
D. Anterior
Answer: A
Question: 387
A blood clot is also known as
A. Thrombus
B. Embolus
C. Aneurysm
D. Plasma
Answer: A
Question: 388
The floating ribs are considered
A. An absolute contraindication
B. An endangerment site
C. Not a contraindication
D. A local contraindication
Answer: B
Question: 389
To take pressure off the lower back of a client laying supine, a bolster should be
placed
A. Under the knees
B. Between the legs
C. Under the hips
D. Under the ankles
Answer: A
Question: 390
The spinal cord is formed by which type of tissue
A. Muscular
B. Epithelial
C. Connective
D. Nervous
Answer: D
Question: 391
What is the structure labeled 7
A. Infraspinous fossa
B. Lateral border
C. Medial border
D. Superior angle
Answer: B
Question: 392
Cryotherapy treatment used for an acute strain or sprain
A. SOAP
B. PPALM
C. CAR
D. PRICE
Answer: D
Question: 393
Proximal attachment of infraspinatus
A. Greater Tubercle
B. Infraspinous Fossa
C. Lateral border of the scapula
D. Supraspinous Fossa
Answer: B
Question: 394
Parts of the body targeted in reflexology include all of the following except
A. Hands
B. Ears
C. Feet
D. Abdomen
Answer: D
For More exams visit https://killexams.com
Kill your exam at First Attempt....Guaranteed!
Question: 384
Paralysis of one side of the body is a condition known as
A. Semiplegia
B. Quadriplegia
C. Paraplegia
D. Hemiplegia
Answer: D
Question: 385
Inability to contract muscles
A. Lupus
B. Neuritis
C. Neuralgia
D. Paralysis
Answer: D
Question: 386
The linea aspera is located on which side of the femur
A. Posterior
B. Medial
C. Lateral
D. Anterior
Answer: A
Question: 387
A blood clot is also known as
A. Thrombus
B. Embolus
C. Aneurysm
D. Plasma
Answer: A
Question: 388
The floating ribs are considered
A. An absolute contraindication
B. An endangerment site
C. Not a contraindication
D. A local contraindication
Answer: B
Question: 389
To take pressure off the lower back of a client laying supine, a bolster should be
placed
A. Under the knees
B. Between the legs
C. Under the hips
D. Under the ankles
Answer: A
Question: 390
The spinal cord is formed by which type of tissue
A. Muscular
B. Epithelial
C. Connective
D. Nervous
Answer: D
Question: 391
What is the structure labeled 7
A. Infraspinous fossa
B. Lateral border
C. Medial border
D. Superior angle
Answer: B
Question: 392
Cryotherapy treatment used for an acute strain or sprain
A. SOAP
B. PPALM
C. CAR
D. PRICE
Answer: D
Question: 393
Proximal attachment of infraspinatus
A. Greater Tubercle
B. Infraspinous Fossa
C. Lateral border of the scapula
D. Supraspinous Fossa
Answer: B
Question: 394
Parts of the body targeted in reflexology include all of the following except
A. Hands
B. Ears
C. Feet
D. Abdomen
Answer: D
For More exams visit https://killexams.com
Kill your exam at First Attempt....Guaranteed!
Thursday, 5 September 2019
Download Pass IT Certification Exams Fast – 70-411 Microsoft Real Exam Dumps
https://killexams.com/pass4sure/exam-detail/70-411
Answer: A
Explanation:
Priority. Priority specifies the order of importance of the RADIUS server to the NPS proxy
server. Priority level must be assigned a value that is an integer, such as 1, 2, or 3. The lower
the number, the higher priority the NPS proxy gives to the RADIUS server. For example, if
the RADIUS server is assigned the highest priority of 1, the NPS proxy sends connection
requests to the RADIUS server first; if servers with priority 1 are not available, NPS then
sends connection requests to RADIUS servers with priority 2, and so on. You can assign the
same priority to multiple RADIUS servers, and then use the Weight setting to load balance
between them.
QUESTION: 101
YournetworkcontainsanActiveDirectorydomainnamedadatum.com.Thedomain
contains a server named Server1 that runs Windows Server 2012 R2. Server1 is configured
as a Network Policy Server (NPS) server and as a DHCP server. The network contains two
subnets named Subnet1 and Subnet2. Server1 has a DHCP scope for each subnet. You need
to ensure that noncompliant computers on Subnet1 receive different network policies than
noncompliantcomputersonSubnet2.Whichtwosettingsshouldyouconfigure?(Each
correct answer presents part of the solution. Choose two.)
A. The NAP-Capable Computers conditions
B. The NAS Port Type constraints
C. The Health Policies conditions
D. The MS-Service Class conditions
E. The Called Station ID constraints
Answer: C, D
Explanation:
The NAP health policy server uses the NPS role service with configured health policies and
systemhealthvalidators(SHVs)toevaluateclienthealthbasedonadministrator-defined
requirements. Based on results of this evaluation, NPS instructs the DHCP server to provide
full access to compliant NAP client computers and to restrict access to client computers that
are noncompliant with health requirements. If policies are filtered by DHCP scope, then MS-
Service Class is configured in policy conditions.
QUESTION: 102
Your network is configured as shown in the exhibit. (Click the Exhibit button.)
134
Server1 regularly accesses Server2. You discover that all of the connections from Server1 to
Server2 are routed through Router1. You need to optimize the connection path from Server1
to Server2. Which route command should you run on Server1?
A. Route add -p 10.10.10.0 MASK 255.255.255.0 172.23.16.2 METRIC 100
B. Route add -p 10.10.10.0 MASK 255.255.255.0 10.10.10.1 METRIC 50
C. Route add -p 10.10.10.12 MASK 255.255.255.0 10.10.10.1 METRIC 100
D. Route add -p 10.10.10.12 MASK 255.255.255.0 10.10.10.0 METRIC 50
Answer: A
Explanation:
Destination -specifies either an IP address or host name for the network or host.
specifies a subnet mask to be associated with this route entry. If subnetmask is
subnetmask -
not specified, 255.255.255.255 is used.
gateway -specifies either an IP address or host name for the gateway or router to use when
forwarding.
costmetric - assignsanintegercostmetric(rangingfrom1through9,999)tobeusedin
calculatingthefastest,mostreliable,and/orleastexpensiveroutes.Ifcostmetricisnot
specified, 1 is used.
interface -specifies the interface to be used for the route that uses the interface number. If an
interfaceisnotspecified,theinterfacetobeusedfortherouteisdeterminedfromthe
gateway IP address.
References:
http: //support. microsoft. com/kb/299540/en-us
http: //technet. microsoft. com/en-us/library/cc757323%28v=ws. 10%29. aspx
QUESTION: 103
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Thedomain
contains a RADIUS servernamed Server1 that runs Windows Server 2012 R2. You add a
VPN server named Server2 to the network. On Server1, you create several network policies.
You need to configure Server1 to accept authentication requests from Server2. Which tool
should you use on Server1?
A. Server Manager
135
B. Routing and Remote Access
C. New-NpsRadiusClient
D. Connection Manager Administration Kit (CMAK)
Answer: C
Explanation:
New-NpsRadiusClient-Name"NameOfMyClientGroup"-Address"10.1.0.0/16"-
AuthAttributeRequired0-NapCompatible0-SharedSecret"SuperSharedSecretxyz"-
VendorName "RADIUSStandard"
Reference:
http: //technet. microsoft. com/en-us/library/hh918425(v=wps. 620). aspx
http: //technet. microsoft. com/en-us/library/jj872740(v=wps. 620). aspx
http: //technet. microsoft. com/en-us/library/dd469790. Aspx
QUESTION: 104
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Thedomain
containsadomaincontrollernamedDC1thatrunsWindowsServer2012R2.Allclient
computers runWindows 8 Enterprise.DC1 contains a Group Policy object (GPO) named
GPO1. You need to update the PATH variable on all of the client computers. Which Group
Policy preference should you configure?
137
A. Ini Files
B. Services
C. Data Sources
D. Environment
Answer: D
Explanation:
Environment Variable preference items allow you to create, update, replace, and delete user
and system environment variables or semicolon-delimited segments of the PATH variable.
Before you create an Environment Variable preference item, you should review the behavior
of each type of action possible with this extension.
QUESTION: 105
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Alldomain
controllers run Windows Server 2012 R2. An organizational unit (OU) named OU1 contains
200 client computers that run Windows 8 Enterprise. A Group Policy object (GPO) named
GPO1 is linked to OU1. You make a change to GPO1. You need to force all of the computers
inOU1torefreshtheirGroupPolicysettingsimmediately.Thesolutionmustminimize
administrative effort. Which tool should you use?
A. The Secedit command
B. Group Policy Management Console (GPMC)
C. Server Manager
D. The Gpupdate command
Answer: B
Explanation:
InthepreviousversionsofWindows,thiswasaccomplishedbyhavingtheuserrun
GPUpdate.exe on their computer.
StartingwithWindowsServer�2012andWindows�8,youcannowremotelyrefresh
GroupPolicysettingsforallcomputersinanOUfromonecentrallocationthroughthe
Group Policy Management Console (GPMC). Or you can use the Invoke-GPUpdatecmdlet to
refresh Group Policy for a set of computers, not limited to the OU structure, for example, if
the computers are located in the default computers container.
http: //technet. microsoft. com/en-us//library/jj134201. aspx
http: //blogs. technet. com/b/grouppolicy/archive/2012/11/27/group-policy-in-windows-
server-2012-using-remote-gpupdate. aspx
QUESTION: 106
HOTSPOT
Yournetworkcontains25WebserversthatrunWindowsServer2012R2.Youneedto
configure auditing policies that meet the following requirements:
? Generate an event each time a new process is created.
? Generate an event each time a user attempts to access a file share.
Which two auditing policies should you configure? To answer, select the appropriate two
auditing policies in the answer area.
QUESTION: 107
141
HOTSPOT
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Thedomain
contains a server named Server1 that runs Windows Server 2012 R2 and has the Network
Policy Server role service installed. An administrator creates a Network Policy Server (NPS)
network policy named Policy1. You need to ensure that Policy1 applies to L2TP connections
only. Which condition should you modify? To answer, select the appropriate object in the
answer area.
QUESTION: 108
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Alldomain
controllersrunWindowsServer2012R2.Onallofthedomaincontrollers,Windowsis
installed in C:\Windows and the Active Directory database is located in D:\Windows\NTDS\.
All of the domain controllers have a third-party application installed. The operating system
failstorecognizethattheapplicationiscompatiblewithdomaincontrollercloning.You
verify with the application vendor that the application supports domain controller cloning.
You need to prepare a domain controller for cloning. What should you do?
A.InD:\Windows\NTDS\,createanXMLfilenamedDCCloneConfig.xmlandaddthe
application information to the file.
B. In the root of a USB flash drive, add the application information to an XML file named
DefaultDCCIoneAllowList.xml.
C. In D:\Windows\NTDS\, create an XML file named CustomDCCloneAllowList.xml and
add the application information to the file.
D.InC:\Windows\System32\Sysprep\Actionfiles\,addtheapplicationinformationtoan
XML file named Respecialize.xml.
Answer: C
Explanation:
PlacetheCustomDCCloneAllowList.xmlfileinthesamefolderastheActiveDirectory
143
database (ntds. dit) on the source Domain Controller.
References:
http://blogs.dirteam.com/blogs/sanderberkouwer/archive/2012/09/10/new-features-in-
active-directory-domain-services-in-windows-server-2012-part-13-domain-controller-
cloning. aspx
http://www.thomasmaurer.ch/2012/08/windows-server-2012-hyper-v-how-to-clone-a-
virtual-domain-controller
http: //technet. microsoft. com/en-us/library/hh831734. aspx
QUESTION: 109
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Alldomain
controllers run Windows Server 2012 R2. An organizational unit (OU) named OU1 contains
200 client computers that run Windows 8 Enterprise. A Group Policy object (GPO) named
GPO1 is linked to OU1. You make a change to GPO1. You need to force all of the computers
inOU1torefreshtheirGroupPolicysettingsimmediately.Thesolutionmustminimize
administrative effort. Which tool should you use?
A. Server Manager
B. Active Directory Users and Computers
C. The Gpupdate command
D. Group Policy Management Console (GPMC)
Answer: D
Explanation:
StartingwithWindowsServer�2012andWindows�8,youcannowremotelyrefresh
GroupPolicysettingsforallcomputersinanOUfromonecentrallocationthroughthe
Group Policy Management Console (GPMC). Or you can use the Invoke-GPUpdatecmdlet to
refresh Group Policy for a set of computers, not limited to the OU structure, for example, if
the computers are located in the default computers container.
References:
http: //technet. microsoft. com/en-us//library/jj134201. aspx
http://blogs.technet.com/b/grouppolicy/archive/2012/11/27/group-policy-in-windows-
server-2012-using-remote-gpupdate. aspx
QUESTION: 110
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Alldomain
controllers run Windows Server 2012 R2. You plan to use fine-grained password policies to
customize the password policy settings ofcontoso.com. You need to identify to which Active
Directory object types you can directly apply the fine-grained password policies. Which two
object types should you identify? (Each correct answer presents part of the solution. Choose
two.)
A. Users
B. Global groups
C. computers
D. Universal groups
E. Domain local groups
Answer: A, B
Explanation:
146
Firstoff,yourdomainfunctionallevelmustbeatWindowsServer2008.Second,Fine-
grained password policies ONLY apply to user objects, and global security groups. Linking
them to universal or domain local groups is ineffective. I know what you�re thinking, what
about OU�s? Nope, Fine-grained password policy cannot be applied to an organizational unit
(OU) directly. The third thing to keep in mind is, by default only members of the Domain
Admins group can set fine-grained password policies. However, you can delegate this ability
to other users if needed.
Fine-grained password policies apply only to user objects (or inetOrgPerson objects if they
are used instead of user objects) and global security groups.
You can apply Password Settings objects (PSOs) to users or global security groups:
References:
http: //technet. microsoft. com/en-us/library/cc731589%28v=ws. 10%29. aspx
http: //technet. microsoft. com/en-us/library/cc731589%28v=ws. 10%29. aspx
http: //technet. microsoft. com/en-us/library/cc770848%28v=ws. 10%29. aspx
http: //www. brandonlawson. com/active-directory/creating-fine-grained-password-policies/
QUESTION: 111
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Thedomain
containsaservernamedServer1thatrunsWindowsServer2012R2.Youenableand
configure Routing and Remote Access (RRAS) on Server1. You create a user account named
User1.YouneedtoensurethatUser1canestablishVPNconnectionstoServer1.What
should you do?
A. Create a network policy.
B. Create a connection request policy.
C. Add a RADIUS client.
D. Modify the members of the Remote Management Users group.
Answer: A
Explanation:
Network policies are sets of conditions, constraints, and settings that allow you to designate
who is authorized to connect to the network and the circumstances under which they can or
cannot connect.
Networkpoliciescanbeviewedasrules.Eachrulehasasetofconditionsandsettings.
ConfigureyourVPNservertouseNetworkAccessProtection(NAP)toenforcehealth
requirement policies.
147
References:
http: //technet. microsoft. com/en-us/library/hh831683. aspx
http: //technet. microsoft. com/en-us/library/cc754107. aspx
http: //technet. microsoft. com/en-us/library/dd314165%28v=ws. 10%29. aspx
http: //technet. microsoft. com/en-us/windowsserver/dd448603. aspx
http: //technet. microsoft. com/en-us/library/dd314165(v=ws. 10). aspx
http: //technet. microsoft. com/en-us/library/dd469733. aspx
http: //technet. microsoft. com/en-us/library/dd469660. aspx
http: //technet. microsoft. com/en-us/library/cc753603. aspx
http: //technet. microsoft. com/en-us/library/cc754033. aspx
http: //technet. microsoft. com/en-us/windowsserver/dd448603. Aspx
QUESTION: 112
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Thedomain
containsaservernamedServer1thatrunsWindowsServer2012P.2.Server1hasthe
Network Policy and Access Services server role installed. Your company's security policy
requires that certificate-based authentication must be used by some network services. You
need to identify which Network Policy Server (NPS) authentication methods comply with the
securitypolicy.Whichtwoauthenticationmethodsshouldyouidentify?(Eachcorrect
answer presents part of the solution. Choose two.)
A. MS-CHAP
B. PEAP-MS-CHAP v2
C. Chap
D. EAP-TLS
E. MS-CHAP v2
Answer: B, D
Explanation:
PEAP is similar in design to EAP-TTLS, requiring only a server-side PKI certificate to create
asecureTLStunneltoprotectuserauthentication,andusesserver-sidepublickey
certificates to authenticate the server.
WhenyouuseEAPwithastrong EAPtype,suchasTLS withsmartcards orTLSwith
certificates, both the client and the server use certificates to verify their identities to each
other.
QUESTION: 113
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the File
Server Resource Manager role service installed. Each time a user receives an access-denied
messageafterattemptingtoaccessafolderonServer1,anemailnotificationissenttoa
distribution list named DL1. You create a folder named Folder1 on Server1, and then you
configurecustomNTFSpermissionsforFolder1.Youneedtoensurethatwhenauser
receives an access-denied message while attempting to access Folder1, an email notification
is sent to a distribution list named DL2. The solution must not prevent DL1 from receiving
notifications about other access-denied messages. What should you do?
148
A. From File Explorer, modify the Classification tab of Folder1.
B. From the File Server Resource Manager console, modify the Email Notifications settings.
C. From the File Server Resource Manager console, set a folder management property.
D. From File Explorer, modify the Customize tab of Folder1.
Answer: C
Explanation:
Whenusingtheemailmodeleachofthefileshares,youcandeterminewhetheraccess
requeststoeachfilesharewillbereceivedbytheadministrator,adistributionlistthat
represents thefileshareowners,orboth.YoucanusetheFileServerResourceManager
console to configure the owner distribution list by editing the management properties of the
classification properties.
Reference: http://technet.microsoft.com/en-us/library/jj574182.aspx#BKMK12
QUESTION: 114
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Thedomain
contains a domain controller named DC1 that runs WindowsServer 2012. You have a Group
Policyobject(GPO)namedGPO1thatcontainsseveralcustom Administrativetemplates.
You need to filter the GPO to display only settings that will be removed from the registry
whentheGPOfallsoutofscope.Thesolutionmustonlydisplaysettingsthatareeither
enabledordisabledandthathaveacomment.Howshouldyouconfigurethefilter?To
answer, select the appropriate options below. Select three.
A. Set Managed to: Yes
B. Set Managed to: No
C. Set Managed to: Any
D. Set Configured to: Yes
E. Set Configured to: No
F. Set Configured to: Any
G. Set Commented to: Yes
H. Set Commented to: No
I. Set Commented to: Any
For More exams visit https://killexams.com
�
Kill your exam at First Attempt....Guaranteed!
https://killexams.com/pass4sure/exam-detail/70-411
Answer: A
Explanation:
Priority. Priority specifies the order of importance of the RADIUS server to the NPS proxy
server. Priority level must be assigned a value that is an integer, such as 1, 2, or 3. The lower
the number, the higher priority the NPS proxy gives to the RADIUS server. For example, if
the RADIUS server is assigned the highest priority of 1, the NPS proxy sends connection
requests to the RADIUS server first; if servers with priority 1 are not available, NPS then
sends connection requests to RADIUS servers with priority 2, and so on. You can assign the
same priority to multiple RADIUS servers, and then use the Weight setting to load balance
between them.
QUESTION: 101
YournetworkcontainsanActiveDirectorydomainnamedadatum.com.Thedomain
contains a server named Server1 that runs Windows Server 2012 R2. Server1 is configured
as a Network Policy Server (NPS) server and as a DHCP server. The network contains two
subnets named Subnet1 and Subnet2. Server1 has a DHCP scope for each subnet. You need
to ensure that noncompliant computers on Subnet1 receive different network policies than
noncompliantcomputersonSubnet2.Whichtwosettingsshouldyouconfigure?(Each
correct answer presents part of the solution. Choose two.)
A. The NAP-Capable Computers conditions
B. The NAS Port Type constraints
C. The Health Policies conditions
D. The MS-Service Class conditions
E. The Called Station ID constraints
Answer: C, D
Explanation:
The NAP health policy server uses the NPS role service with configured health policies and
systemhealthvalidators(SHVs)toevaluateclienthealthbasedonadministrator-defined
requirements. Based on results of this evaluation, NPS instructs the DHCP server to provide
full access to compliant NAP client computers and to restrict access to client computers that
are noncompliant with health requirements. If policies are filtered by DHCP scope, then MS-
Service Class is configured in policy conditions.
QUESTION: 102
Your network is configured as shown in the exhibit. (Click the Exhibit button.)
134
Server1 regularly accesses Server2. You discover that all of the connections from Server1 to
Server2 are routed through Router1. You need to optimize the connection path from Server1
to Server2. Which route command should you run on Server1?
A. Route add -p 10.10.10.0 MASK 255.255.255.0 172.23.16.2 METRIC 100
B. Route add -p 10.10.10.0 MASK 255.255.255.0 10.10.10.1 METRIC 50
C. Route add -p 10.10.10.12 MASK 255.255.255.0 10.10.10.1 METRIC 100
D. Route add -p 10.10.10.12 MASK 255.255.255.0 10.10.10.0 METRIC 50
Answer: A
Explanation:
Destination -specifies either an IP address or host name for the network or host.
specifies a subnet mask to be associated with this route entry. If subnetmask is
subnetmask -
not specified, 255.255.255.255 is used.
gateway -specifies either an IP address or host name for the gateway or router to use when
forwarding.
costmetric - assignsanintegercostmetric(rangingfrom1through9,999)tobeusedin
calculatingthefastest,mostreliable,and/orleastexpensiveroutes.Ifcostmetricisnot
specified, 1 is used.
interface -specifies the interface to be used for the route that uses the interface number. If an
interfaceisnotspecified,theinterfacetobeusedfortherouteisdeterminedfromthe
gateway IP address.
References:
http: //support. microsoft. com/kb/299540/en-us
http: //technet. microsoft. com/en-us/library/cc757323%28v=ws. 10%29. aspx
QUESTION: 103
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Thedomain
contains a RADIUS servernamed Server1 that runs Windows Server 2012 R2. You add a
VPN server named Server2 to the network. On Server1, you create several network policies.
You need to configure Server1 to accept authentication requests from Server2. Which tool
should you use on Server1?
A. Server Manager
135
B. Routing and Remote Access
C. New-NpsRadiusClient
D. Connection Manager Administration Kit (CMAK)
Answer: C
Explanation:
New-NpsRadiusClient-Name"NameOfMyClientGroup"-Address"10.1.0.0/16"-
AuthAttributeRequired0-NapCompatible0-SharedSecret"SuperSharedSecretxyz"-
VendorName "RADIUSStandard"
Reference:
http: //technet. microsoft. com/en-us/library/hh918425(v=wps. 620). aspx
http: //technet. microsoft. com/en-us/library/jj872740(v=wps. 620). aspx
http: //technet. microsoft. com/en-us/library/dd469790. Aspx
QUESTION: 104
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Thedomain
containsadomaincontrollernamedDC1thatrunsWindowsServer2012R2.Allclient
computers runWindows 8 Enterprise.DC1 contains a Group Policy object (GPO) named
GPO1. You need to update the PATH variable on all of the client computers. Which Group
Policy preference should you configure?
137
A. Ini Files
B. Services
C. Data Sources
D. Environment
Answer: D
Explanation:
Environment Variable preference items allow you to create, update, replace, and delete user
and system environment variables or semicolon-delimited segments of the PATH variable.
Before you create an Environment Variable preference item, you should review the behavior
of each type of action possible with this extension.
QUESTION: 105
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Alldomain
controllers run Windows Server 2012 R2. An organizational unit (OU) named OU1 contains
200 client computers that run Windows 8 Enterprise. A Group Policy object (GPO) named
GPO1 is linked to OU1. You make a change to GPO1. You need to force all of the computers
inOU1torefreshtheirGroupPolicysettingsimmediately.Thesolutionmustminimize
administrative effort. Which tool should you use?
A. The Secedit command
B. Group Policy Management Console (GPMC)
C. Server Manager
D. The Gpupdate command
Answer: B
Explanation:
InthepreviousversionsofWindows,thiswasaccomplishedbyhavingtheuserrun
GPUpdate.exe on their computer.
StartingwithWindowsServer�2012andWindows�8,youcannowremotelyrefresh
GroupPolicysettingsforallcomputersinanOUfromonecentrallocationthroughthe
Group Policy Management Console (GPMC). Or you can use the Invoke-GPUpdatecmdlet to
refresh Group Policy for a set of computers, not limited to the OU structure, for example, if
the computers are located in the default computers container.
http: //technet. microsoft. com/en-us//library/jj134201. aspx
http: //blogs. technet. com/b/grouppolicy/archive/2012/11/27/group-policy-in-windows-
server-2012-using-remote-gpupdate. aspx
QUESTION: 106
HOTSPOT
Yournetworkcontains25WebserversthatrunWindowsServer2012R2.Youneedto
configure auditing policies that meet the following requirements:
? Generate an event each time a new process is created.
? Generate an event each time a user attempts to access a file share.
Which two auditing policies should you configure? To answer, select the appropriate two
auditing policies in the answer area.
QUESTION: 107
141
HOTSPOT
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Thedomain
contains a server named Server1 that runs Windows Server 2012 R2 and has the Network
Policy Server role service installed. An administrator creates a Network Policy Server (NPS)
network policy named Policy1. You need to ensure that Policy1 applies to L2TP connections
only. Which condition should you modify? To answer, select the appropriate object in the
answer area.
Answer:
QUESTION: 108
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Alldomain
controllersrunWindowsServer2012R2.Onallofthedomaincontrollers,Windowsis
installed in C:\Windows and the Active Directory database is located in D:\Windows\NTDS\.
All of the domain controllers have a third-party application installed. The operating system
failstorecognizethattheapplicationiscompatiblewithdomaincontrollercloning.You
verify with the application vendor that the application supports domain controller cloning.
You need to prepare a domain controller for cloning. What should you do?
A.InD:\Windows\NTDS\,createanXMLfilenamedDCCloneConfig.xmlandaddthe
application information to the file.
B. In the root of a USB flash drive, add the application information to an XML file named
DefaultDCCIoneAllowList.xml.
C. In D:\Windows\NTDS\, create an XML file named CustomDCCloneAllowList.xml and
add the application information to the file.
D.InC:\Windows\System32\Sysprep\Actionfiles\,addtheapplicationinformationtoan
XML file named Respecialize.xml.
Answer: C
Explanation:
PlacetheCustomDCCloneAllowList.xmlfileinthesamefolderastheActiveDirectory
143
database (ntds. dit) on the source Domain Controller.
References:
http://blogs.dirteam.com/blogs/sanderberkouwer/archive/2012/09/10/new-features-in-
active-directory-domain-services-in-windows-server-2012-part-13-domain-controller-
cloning. aspx
http://www.thomasmaurer.ch/2012/08/windows-server-2012-hyper-v-how-to-clone-a-
virtual-domain-controller
http: //technet. microsoft. com/en-us/library/hh831734. aspx
QUESTION: 109
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Alldomain
controllers run Windows Server 2012 R2. An organizational unit (OU) named OU1 contains
200 client computers that run Windows 8 Enterprise. A Group Policy object (GPO) named
GPO1 is linked to OU1. You make a change to GPO1. You need to force all of the computers
inOU1torefreshtheirGroupPolicysettingsimmediately.Thesolutionmustminimize
administrative effort. Which tool should you use?
A. Server Manager
B. Active Directory Users and Computers
C. The Gpupdate command
D. Group Policy Management Console (GPMC)
Answer: D
Explanation:
StartingwithWindowsServer�2012andWindows�8,youcannowremotelyrefresh
GroupPolicysettingsforallcomputersinanOUfromonecentrallocationthroughthe
Group Policy Management Console (GPMC). Or you can use the Invoke-GPUpdatecmdlet to
refresh Group Policy for a set of computers, not limited to the OU structure, for example, if
the computers are located in the default computers container.
References:
http: //technet. microsoft. com/en-us//library/jj134201. aspx
http://blogs.technet.com/b/grouppolicy/archive/2012/11/27/group-policy-in-windows-
server-2012-using-remote-gpupdate. aspx
QUESTION: 110
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Alldomain
controllers run Windows Server 2012 R2. You plan to use fine-grained password policies to
customize the password policy settings ofcontoso.com. You need to identify to which Active
Directory object types you can directly apply the fine-grained password policies. Which two
object types should you identify? (Each correct answer presents part of the solution. Choose
two.)
A. Users
B. Global groups
C. computers
D. Universal groups
E. Domain local groups
Answer: A, B
Explanation:
Firstoff,yourdomainfunctionallevelmustbeatWindowsServer2008.Second,Fine-
grained password policies ONLY apply to user objects, and global security groups. Linking
them to universal or domain local groups is ineffective. I know what you�re thinking, what
about OU�s? Nope, Fine-grained password policy cannot be applied to an organizational unit
(OU) directly. The third thing to keep in mind is, by default only members of the Domain
Admins group can set fine-grained password policies. However, you can delegate this ability
to other users if needed.
Fine-grained password policies apply only to user objects (or inetOrgPerson objects if they
are used instead of user objects) and global security groups.
You can apply Password Settings objects (PSOs) to users or global security groups:
References:
http: //technet. microsoft. com/en-us/library/cc731589%28v=ws. 10%29. aspx
http: //technet. microsoft. com/en-us/library/cc731589%28v=ws. 10%29. aspx
http: //technet. microsoft. com/en-us/library/cc770848%28v=ws. 10%29. aspx
http: //www. brandonlawson. com/active-directory/creating-fine-grained-password-policies/
QUESTION: 111
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Thedomain
containsaservernamedServer1thatrunsWindowsServer2012R2.Youenableand
configure Routing and Remote Access (RRAS) on Server1. You create a user account named
User1.YouneedtoensurethatUser1canestablishVPNconnectionstoServer1.What
should you do?
A. Create a network policy.
B. Create a connection request policy.
C. Add a RADIUS client.
D. Modify the members of the Remote Management Users group.
Answer: A
Explanation:
Network policies are sets of conditions, constraints, and settings that allow you to designate
who is authorized to connect to the network and the circumstances under which they can or
cannot connect.
Networkpoliciescanbeviewedasrules.Eachrulehasasetofconditionsandsettings.
ConfigureyourVPNservertouseNetworkAccessProtection(NAP)toenforcehealth
requirement policies.
References:
http: //technet. microsoft. com/en-us/library/hh831683. aspx
http: //technet. microsoft. com/en-us/library/cc754107. aspx
http: //technet. microsoft. com/en-us/library/dd314165%28v=ws. 10%29. aspx
http: //technet. microsoft. com/en-us/windowsserver/dd448603. aspx
http: //technet. microsoft. com/en-us/library/dd314165(v=ws. 10). aspx
http: //technet. microsoft. com/en-us/library/dd469733. aspx
http: //technet. microsoft. com/en-us/library/dd469660. aspx
http: //technet. microsoft. com/en-us/library/cc753603. aspx
http: //technet. microsoft. com/en-us/library/cc754033. aspx
http: //technet. microsoft. com/en-us/windowsserver/dd448603. Aspx
QUESTION: 112
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Thedomain
containsaservernamedServer1thatrunsWindowsServer2012P.2.Server1hasthe
Network Policy and Access Services server role installed. Your company's security policy
requires that certificate-based authentication must be used by some network services. You
need to identify which Network Policy Server (NPS) authentication methods comply with the
securitypolicy.Whichtwoauthenticationmethodsshouldyouidentify?(Eachcorrect
answer presents part of the solution. Choose two.)
A. MS-CHAP
B. PEAP-MS-CHAP v2
C. Chap
D. EAP-TLS
E. MS-CHAP v2
Answer: B, D
Explanation:
PEAP is similar in design to EAP-TTLS, requiring only a server-side PKI certificate to create
asecureTLStunneltoprotectuserauthentication,andusesserver-sidepublickey
certificates to authenticate the server.
WhenyouuseEAPwithastrong EAPtype,suchasTLS withsmartcards orTLSwith
certificates, both the client and the server use certificates to verify their identities to each
other.
QUESTION: 113
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the File
Server Resource Manager role service installed. Each time a user receives an access-denied
messageafterattemptingtoaccessafolderonServer1,anemailnotificationissenttoa
distribution list named DL1. You create a folder named Folder1 on Server1, and then you
configurecustomNTFSpermissionsforFolder1.Youneedtoensurethatwhenauser
receives an access-denied message while attempting to access Folder1, an email notification
is sent to a distribution list named DL2. The solution must not prevent DL1 from receiving
notifications about other access-denied messages. What should you do?
148
A. From File Explorer, modify the Classification tab of Folder1.
B. From the File Server Resource Manager console, modify the Email Notifications settings.
C. From the File Server Resource Manager console, set a folder management property.
D. From File Explorer, modify the Customize tab of Folder1.
Answer: C
Explanation:
Whenusingtheemailmodeleachofthefileshares,youcandeterminewhetheraccess
requeststoeachfilesharewillbereceivedbytheadministrator,adistributionlistthat
represents thefileshareowners,orboth.YoucanusetheFileServerResourceManager
console to configure the owner distribution list by editing the management properties of the
classification properties.
Reference: http://technet.microsoft.com/en-us/library/jj574182.aspx#BKMK12
QUESTION: 114
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Thedomain
contains a domain controller named DC1 that runs WindowsServer 2012. You have a Group
Policyobject(GPO)namedGPO1thatcontainsseveralcustom Administrativetemplates.
You need to filter the GPO to display only settings that will be removed from the registry
whentheGPOfallsoutofscope.Thesolutionmustonlydisplaysettingsthatareeither
enabledordisabledandthathaveacomment.Howshouldyouconfigurethefilter?To
answer, select the appropriate options below. Select three.
A. Set Managed to: Yes
B. Set Managed to: No
C. Set Managed to: Any
D. Set Configured to: Yes
E. Set Configured to: No
F. Set Configured to: Any
G. Set Commented to: Yes
H. Set Commented to: No
I. Set Commented to: Any
Answer: A, F, G
For More exams visit https://killexams.com
�
Kill your exam at First Attempt....Guaranteed!
Answer: A
Explanation:
Priority. Priority specifies the order of importance of the RADIUS server to the NPS proxy
server. Priority level must be assigned a value that is an integer, such as 1, 2, or 3. The lower
the number, the higher priority the NPS proxy gives to the RADIUS server. For example, if
the RADIUS server is assigned the highest priority of 1, the NPS proxy sends connection
requests to the RADIUS server first; if servers with priority 1 are not available, NPS then
sends connection requests to RADIUS servers with priority 2, and so on. You can assign the
same priority to multiple RADIUS servers, and then use the Weight setting to load balance
between them.
QUESTION: 101
YournetworkcontainsanActiveDirectorydomainnamedadatum.com.Thedomain
contains a server named Server1 that runs Windows Server 2012 R2. Server1 is configured
as a Network Policy Server (NPS) server and as a DHCP server. The network contains two
subnets named Subnet1 and Subnet2. Server1 has a DHCP scope for each subnet. You need
to ensure that noncompliant computers on Subnet1 receive different network policies than
noncompliantcomputersonSubnet2.Whichtwosettingsshouldyouconfigure?(Each
correct answer presents part of the solution. Choose two.)
A. The NAP-Capable Computers conditions
B. The NAS Port Type constraints
C. The Health Policies conditions
D. The MS-Service Class conditions
E. The Called Station ID constraints
Answer: C, D
Explanation:
The NAP health policy server uses the NPS role service with configured health policies and
systemhealthvalidators(SHVs)toevaluateclienthealthbasedonadministrator-defined
requirements. Based on results of this evaluation, NPS instructs the DHCP server to provide
full access to compliant NAP client computers and to restrict access to client computers that
are noncompliant with health requirements. If policies are filtered by DHCP scope, then MS-
Service Class is configured in policy conditions.
QUESTION: 102
Your network is configured as shown in the exhibit. (Click the Exhibit button.)
134
Server1 regularly accesses Server2. You discover that all of the connections from Server1 to
Server2 are routed through Router1. You need to optimize the connection path from Server1
to Server2. Which route command should you run on Server1?
A. Route add -p 10.10.10.0 MASK 255.255.255.0 172.23.16.2 METRIC 100
B. Route add -p 10.10.10.0 MASK 255.255.255.0 10.10.10.1 METRIC 50
C. Route add -p 10.10.10.12 MASK 255.255.255.0 10.10.10.1 METRIC 100
D. Route add -p 10.10.10.12 MASK 255.255.255.0 10.10.10.0 METRIC 50
Answer: A
Explanation:
Destination -specifies either an IP address or host name for the network or host.
specifies a subnet mask to be associated with this route entry. If subnetmask is
subnetmask -
not specified, 255.255.255.255 is used.
gateway -specifies either an IP address or host name for the gateway or router to use when
forwarding.
costmetric - assignsanintegercostmetric(rangingfrom1through9,999)tobeusedin
calculatingthefastest,mostreliable,and/orleastexpensiveroutes.Ifcostmetricisnot
specified, 1 is used.
interface -specifies the interface to be used for the route that uses the interface number. If an
interfaceisnotspecified,theinterfacetobeusedfortherouteisdeterminedfromthe
gateway IP address.
References:
http: //support. microsoft. com/kb/299540/en-us
http: //technet. microsoft. com/en-us/library/cc757323%28v=ws. 10%29. aspx
QUESTION: 103
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Thedomain
contains a RADIUS servernamed Server1 that runs Windows Server 2012 R2. You add a
VPN server named Server2 to the network. On Server1, you create several network policies.
You need to configure Server1 to accept authentication requests from Server2. Which tool
should you use on Server1?
A. Server Manager
135
B. Routing and Remote Access
C. New-NpsRadiusClient
D. Connection Manager Administration Kit (CMAK)
Answer: C
Explanation:
New-NpsRadiusClient-Name"NameOfMyClientGroup"-Address"10.1.0.0/16"-
AuthAttributeRequired0-NapCompatible0-SharedSecret"SuperSharedSecretxyz"-
VendorName "RADIUSStandard"
Reference:
http: //technet. microsoft. com/en-us/library/hh918425(v=wps. 620). aspx
http: //technet. microsoft. com/en-us/library/jj872740(v=wps. 620). aspx
http: //technet. microsoft. com/en-us/library/dd469790. Aspx
QUESTION: 104
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Thedomain
containsadomaincontrollernamedDC1thatrunsWindowsServer2012R2.Allclient
computers runWindows 8 Enterprise.DC1 contains a Group Policy object (GPO) named
GPO1. You need to update the PATH variable on all of the client computers. Which Group
Policy preference should you configure?
137
A. Ini Files
B. Services
C. Data Sources
D. Environment
Answer: D
Explanation:
Environment Variable preference items allow you to create, update, replace, and delete user
and system environment variables or semicolon-delimited segments of the PATH variable.
Before you create an Environment Variable preference item, you should review the behavior
of each type of action possible with this extension.
QUESTION: 105
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Alldomain
controllers run Windows Server 2012 R2. An organizational unit (OU) named OU1 contains
200 client computers that run Windows 8 Enterprise. A Group Policy object (GPO) named
GPO1 is linked to OU1. You make a change to GPO1. You need to force all of the computers
inOU1torefreshtheirGroupPolicysettingsimmediately.Thesolutionmustminimize
administrative effort. Which tool should you use?
A. The Secedit command
B. Group Policy Management Console (GPMC)
C. Server Manager
D. The Gpupdate command
Answer: B
Explanation:
InthepreviousversionsofWindows,thiswasaccomplishedbyhavingtheuserrun
GPUpdate.exe on their computer.
StartingwithWindowsServer�2012andWindows�8,youcannowremotelyrefresh
GroupPolicysettingsforallcomputersinanOUfromonecentrallocationthroughthe
Group Policy Management Console (GPMC). Or you can use the Invoke-GPUpdatecmdlet to
refresh Group Policy for a set of computers, not limited to the OU structure, for example, if
the computers are located in the default computers container.
http: //technet. microsoft. com/en-us//library/jj134201. aspx
http: //blogs. technet. com/b/grouppolicy/archive/2012/11/27/group-policy-in-windows-
server-2012-using-remote-gpupdate. aspx
QUESTION: 106
HOTSPOT
Yournetworkcontains25WebserversthatrunWindowsServer2012R2.Youneedto
configure auditing policies that meet the following requirements:
? Generate an event each time a new process is created.
? Generate an event each time a user attempts to access a file share.
Which two auditing policies should you configure? To answer, select the appropriate two
auditing policies in the answer area.
QUESTION: 107
141
HOTSPOT
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Thedomain
contains a server named Server1 that runs Windows Server 2012 R2 and has the Network
Policy Server role service installed. An administrator creates a Network Policy Server (NPS)
network policy named Policy1. You need to ensure that Policy1 applies to L2TP connections
only. Which condition should you modify? To answer, select the appropriate object in the
answer area.
QUESTION: 108
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Alldomain
controllersrunWindowsServer2012R2.Onallofthedomaincontrollers,Windowsis
installed in C:\Windows and the Active Directory database is located in D:\Windows\NTDS\.
All of the domain controllers have a third-party application installed. The operating system
failstorecognizethattheapplicationiscompatiblewithdomaincontrollercloning.You
verify with the application vendor that the application supports domain controller cloning.
You need to prepare a domain controller for cloning. What should you do?
A.InD:\Windows\NTDS\,createanXMLfilenamedDCCloneConfig.xmlandaddthe
application information to the file.
B. In the root of a USB flash drive, add the application information to an XML file named
DefaultDCCIoneAllowList.xml.
C. In D:\Windows\NTDS\, create an XML file named CustomDCCloneAllowList.xml and
add the application information to the file.
D.InC:\Windows\System32\Sysprep\Actionfiles\,addtheapplicationinformationtoan
XML file named Respecialize.xml.
Answer: C
Explanation:
PlacetheCustomDCCloneAllowList.xmlfileinthesamefolderastheActiveDirectory
143
database (ntds. dit) on the source Domain Controller.
References:
http://blogs.dirteam.com/blogs/sanderberkouwer/archive/2012/09/10/new-features-in-
active-directory-domain-services-in-windows-server-2012-part-13-domain-controller-
cloning. aspx
http://www.thomasmaurer.ch/2012/08/windows-server-2012-hyper-v-how-to-clone-a-
virtual-domain-controller
http: //technet. microsoft. com/en-us/library/hh831734. aspx
QUESTION: 109
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Alldomain
controllers run Windows Server 2012 R2. An organizational unit (OU) named OU1 contains
200 client computers that run Windows 8 Enterprise. A Group Policy object (GPO) named
GPO1 is linked to OU1. You make a change to GPO1. You need to force all of the computers
inOU1torefreshtheirGroupPolicysettingsimmediately.Thesolutionmustminimize
administrative effort. Which tool should you use?
A. Server Manager
B. Active Directory Users and Computers
C. The Gpupdate command
D. Group Policy Management Console (GPMC)
Answer: D
Explanation:
StartingwithWindowsServer�2012andWindows�8,youcannowremotelyrefresh
GroupPolicysettingsforallcomputersinanOUfromonecentrallocationthroughthe
Group Policy Management Console (GPMC). Or you can use the Invoke-GPUpdatecmdlet to
refresh Group Policy for a set of computers, not limited to the OU structure, for example, if
the computers are located in the default computers container.
References:
http: //technet. microsoft. com/en-us//library/jj134201. aspx
http://blogs.technet.com/b/grouppolicy/archive/2012/11/27/group-policy-in-windows-
server-2012-using-remote-gpupdate. aspx
QUESTION: 110
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Alldomain
controllers run Windows Server 2012 R2. You plan to use fine-grained password policies to
customize the password policy settings ofcontoso.com. You need to identify to which Active
Directory object types you can directly apply the fine-grained password policies. Which two
object types should you identify? (Each correct answer presents part of the solution. Choose
two.)
A. Users
B. Global groups
C. computers
D. Universal groups
E. Domain local groups
Answer: A, B
Explanation:
146
Firstoff,yourdomainfunctionallevelmustbeatWindowsServer2008.Second,Fine-
grained password policies ONLY apply to user objects, and global security groups. Linking
them to universal or domain local groups is ineffective. I know what you�re thinking, what
about OU�s? Nope, Fine-grained password policy cannot be applied to an organizational unit
(OU) directly. The third thing to keep in mind is, by default only members of the Domain
Admins group can set fine-grained password policies. However, you can delegate this ability
to other users if needed.
Fine-grained password policies apply only to user objects (or inetOrgPerson objects if they
are used instead of user objects) and global security groups.
You can apply Password Settings objects (PSOs) to users or global security groups:
References:
http: //technet. microsoft. com/en-us/library/cc731589%28v=ws. 10%29. aspx
http: //technet. microsoft. com/en-us/library/cc731589%28v=ws. 10%29. aspx
http: //technet. microsoft. com/en-us/library/cc770848%28v=ws. 10%29. aspx
http: //www. brandonlawson. com/active-directory/creating-fine-grained-password-policies/
QUESTION: 111
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Thedomain
containsaservernamedServer1thatrunsWindowsServer2012R2.Youenableand
configure Routing and Remote Access (RRAS) on Server1. You create a user account named
User1.YouneedtoensurethatUser1canestablishVPNconnectionstoServer1.What
should you do?
A. Create a network policy.
B. Create a connection request policy.
C. Add a RADIUS client.
D. Modify the members of the Remote Management Users group.
Answer: A
Explanation:
Network policies are sets of conditions, constraints, and settings that allow you to designate
who is authorized to connect to the network and the circumstances under which they can or
cannot connect.
Networkpoliciescanbeviewedasrules.Eachrulehasasetofconditionsandsettings.
ConfigureyourVPNservertouseNetworkAccessProtection(NAP)toenforcehealth
requirement policies.
147
References:
http: //technet. microsoft. com/en-us/library/hh831683. aspx
http: //technet. microsoft. com/en-us/library/cc754107. aspx
http: //technet. microsoft. com/en-us/library/dd314165%28v=ws. 10%29. aspx
http: //technet. microsoft. com/en-us/windowsserver/dd448603. aspx
http: //technet. microsoft. com/en-us/library/dd314165(v=ws. 10). aspx
http: //technet. microsoft. com/en-us/library/dd469733. aspx
http: //technet. microsoft. com/en-us/library/dd469660. aspx
http: //technet. microsoft. com/en-us/library/cc753603. aspx
http: //technet. microsoft. com/en-us/library/cc754033. aspx
http: //technet. microsoft. com/en-us/windowsserver/dd448603. Aspx
QUESTION: 112
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Thedomain
containsaservernamedServer1thatrunsWindowsServer2012P.2.Server1hasthe
Network Policy and Access Services server role installed. Your company's security policy
requires that certificate-based authentication must be used by some network services. You
need to identify which Network Policy Server (NPS) authentication methods comply with the
securitypolicy.Whichtwoauthenticationmethodsshouldyouidentify?(Eachcorrect
answer presents part of the solution. Choose two.)
A. MS-CHAP
B. PEAP-MS-CHAP v2
C. Chap
D. EAP-TLS
E. MS-CHAP v2
Answer: B, D
Explanation:
PEAP is similar in design to EAP-TTLS, requiring only a server-side PKI certificate to create
asecureTLStunneltoprotectuserauthentication,andusesserver-sidepublickey
certificates to authenticate the server.
WhenyouuseEAPwithastrong EAPtype,suchasTLS withsmartcards orTLSwith
certificates, both the client and the server use certificates to verify their identities to each
other.
QUESTION: 113
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the File
Server Resource Manager role service installed. Each time a user receives an access-denied
messageafterattemptingtoaccessafolderonServer1,anemailnotificationissenttoa
distribution list named DL1. You create a folder named Folder1 on Server1, and then you
configurecustomNTFSpermissionsforFolder1.Youneedtoensurethatwhenauser
receives an access-denied message while attempting to access Folder1, an email notification
is sent to a distribution list named DL2. The solution must not prevent DL1 from receiving
notifications about other access-denied messages. What should you do?
148
A. From File Explorer, modify the Classification tab of Folder1.
B. From the File Server Resource Manager console, modify the Email Notifications settings.
C. From the File Server Resource Manager console, set a folder management property.
D. From File Explorer, modify the Customize tab of Folder1.
Answer: C
Explanation:
Whenusingtheemailmodeleachofthefileshares,youcandeterminewhetheraccess
requeststoeachfilesharewillbereceivedbytheadministrator,adistributionlistthat
represents thefileshareowners,orboth.YoucanusetheFileServerResourceManager
console to configure the owner distribution list by editing the management properties of the
classification properties.
Reference: http://technet.microsoft.com/en-us/library/jj574182.aspx#BKMK12
QUESTION: 114
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Thedomain
contains a domain controller named DC1 that runs WindowsServer 2012. You have a Group
Policyobject(GPO)namedGPO1thatcontainsseveralcustom Administrativetemplates.
You need to filter the GPO to display only settings that will be removed from the registry
whentheGPOfallsoutofscope.Thesolutionmustonlydisplaysettingsthatareeither
enabledordisabledandthathaveacomment.Howshouldyouconfigurethefilter?To
answer, select the appropriate options below. Select three.
A. Set Managed to: Yes
B. Set Managed to: No
C. Set Managed to: Any
D. Set Configured to: Yes
E. Set Configured to: No
F. Set Configured to: Any
G. Set Commented to: Yes
H. Set Commented to: No
I. Set Commented to: Any
For More exams visit https://killexams.com
�
Kill your exam at First Attempt....Guaranteed!
https://killexams.com/pass4sure/exam-detail/70-411
Answer: A
Explanation:
Priority. Priority specifies the order of importance of the RADIUS server to the NPS proxy
server. Priority level must be assigned a value that is an integer, such as 1, 2, or 3. The lower
the number, the higher priority the NPS proxy gives to the RADIUS server. For example, if
the RADIUS server is assigned the highest priority of 1, the NPS proxy sends connection
requests to the RADIUS server first; if servers with priority 1 are not available, NPS then
sends connection requests to RADIUS servers with priority 2, and so on. You can assign the
same priority to multiple RADIUS servers, and then use the Weight setting to load balance
between them.
QUESTION: 101
YournetworkcontainsanActiveDirectorydomainnamedadatum.com.Thedomain
contains a server named Server1 that runs Windows Server 2012 R2. Server1 is configured
as a Network Policy Server (NPS) server and as a DHCP server. The network contains two
subnets named Subnet1 and Subnet2. Server1 has a DHCP scope for each subnet. You need
to ensure that noncompliant computers on Subnet1 receive different network policies than
noncompliantcomputersonSubnet2.Whichtwosettingsshouldyouconfigure?(Each
correct answer presents part of the solution. Choose two.)
A. The NAP-Capable Computers conditions
B. The NAS Port Type constraints
C. The Health Policies conditions
D. The MS-Service Class conditions
E. The Called Station ID constraints
Answer: C, D
Explanation:
The NAP health policy server uses the NPS role service with configured health policies and
systemhealthvalidators(SHVs)toevaluateclienthealthbasedonadministrator-defined
requirements. Based on results of this evaluation, NPS instructs the DHCP server to provide
full access to compliant NAP client computers and to restrict access to client computers that
are noncompliant with health requirements. If policies are filtered by DHCP scope, then MS-
Service Class is configured in policy conditions.
QUESTION: 102
Your network is configured as shown in the exhibit. (Click the Exhibit button.)
134
Server1 regularly accesses Server2. You discover that all of the connections from Server1 to
Server2 are routed through Router1. You need to optimize the connection path from Server1
to Server2. Which route command should you run on Server1?
A. Route add -p 10.10.10.0 MASK 255.255.255.0 172.23.16.2 METRIC 100
B. Route add -p 10.10.10.0 MASK 255.255.255.0 10.10.10.1 METRIC 50
C. Route add -p 10.10.10.12 MASK 255.255.255.0 10.10.10.1 METRIC 100
D. Route add -p 10.10.10.12 MASK 255.255.255.0 10.10.10.0 METRIC 50
Answer: A
Explanation:
Destination -specifies either an IP address or host name for the network or host.
specifies a subnet mask to be associated with this route entry. If subnetmask is
subnetmask -
not specified, 255.255.255.255 is used.
gateway -specifies either an IP address or host name for the gateway or router to use when
forwarding.
costmetric - assignsanintegercostmetric(rangingfrom1through9,999)tobeusedin
calculatingthefastest,mostreliable,and/orleastexpensiveroutes.Ifcostmetricisnot
specified, 1 is used.
interface -specifies the interface to be used for the route that uses the interface number. If an
interfaceisnotspecified,theinterfacetobeusedfortherouteisdeterminedfromthe
gateway IP address.
References:
http: //support. microsoft. com/kb/299540/en-us
http: //technet. microsoft. com/en-us/library/cc757323%28v=ws. 10%29. aspx
QUESTION: 103
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Thedomain
contains a RADIUS servernamed Server1 that runs Windows Server 2012 R2. You add a
VPN server named Server2 to the network. On Server1, you create several network policies.
You need to configure Server1 to accept authentication requests from Server2. Which tool
should you use on Server1?
A. Server Manager
135
B. Routing and Remote Access
C. New-NpsRadiusClient
D. Connection Manager Administration Kit (CMAK)
Answer: C
Explanation:
New-NpsRadiusClient-Name"NameOfMyClientGroup"-Address"10.1.0.0/16"-
AuthAttributeRequired0-NapCompatible0-SharedSecret"SuperSharedSecretxyz"-
VendorName "RADIUSStandard"
Reference:
http: //technet. microsoft. com/en-us/library/hh918425(v=wps. 620). aspx
http: //technet. microsoft. com/en-us/library/jj872740(v=wps. 620). aspx
http: //technet. microsoft. com/en-us/library/dd469790. Aspx
QUESTION: 104
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Thedomain
containsadomaincontrollernamedDC1thatrunsWindowsServer2012R2.Allclient
computers runWindows 8 Enterprise.DC1 contains a Group Policy object (GPO) named
GPO1. You need to update the PATH variable on all of the client computers. Which Group
Policy preference should you configure?
137
A. Ini Files
B. Services
C. Data Sources
D. Environment
Answer: D
Explanation:
Environment Variable preference items allow you to create, update, replace, and delete user
and system environment variables or semicolon-delimited segments of the PATH variable.
Before you create an Environment Variable preference item, you should review the behavior
of each type of action possible with this extension.
QUESTION: 105
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Alldomain
controllers run Windows Server 2012 R2. An organizational unit (OU) named OU1 contains
200 client computers that run Windows 8 Enterprise. A Group Policy object (GPO) named
GPO1 is linked to OU1. You make a change to GPO1. You need to force all of the computers
inOU1torefreshtheirGroupPolicysettingsimmediately.Thesolutionmustminimize
administrative effort. Which tool should you use?
A. The Secedit command
B. Group Policy Management Console (GPMC)
C. Server Manager
D. The Gpupdate command
Answer: B
Explanation:
InthepreviousversionsofWindows,thiswasaccomplishedbyhavingtheuserrun
GPUpdate.exe on their computer.
StartingwithWindowsServer�2012andWindows�8,youcannowremotelyrefresh
GroupPolicysettingsforallcomputersinanOUfromonecentrallocationthroughthe
Group Policy Management Console (GPMC). Or you can use the Invoke-GPUpdatecmdlet to
refresh Group Policy for a set of computers, not limited to the OU structure, for example, if
the computers are located in the default computers container.
http: //technet. microsoft. com/en-us//library/jj134201. aspx
http: //blogs. technet. com/b/grouppolicy/archive/2012/11/27/group-policy-in-windows-
server-2012-using-remote-gpupdate. aspx
QUESTION: 106
HOTSPOT
Yournetworkcontains25WebserversthatrunWindowsServer2012R2.Youneedto
configure auditing policies that meet the following requirements:
? Generate an event each time a new process is created.
? Generate an event each time a user attempts to access a file share.
Which two auditing policies should you configure? To answer, select the appropriate two
auditing policies in the answer area.
QUESTION: 107
141
HOTSPOT
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Thedomain
contains a server named Server1 that runs Windows Server 2012 R2 and has the Network
Policy Server role service installed. An administrator creates a Network Policy Server (NPS)
network policy named Policy1. You need to ensure that Policy1 applies to L2TP connections
only. Which condition should you modify? To answer, select the appropriate object in the
answer area.
Answer:
QUESTION: 108
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Alldomain
controllersrunWindowsServer2012R2.Onallofthedomaincontrollers,Windowsis
installed in C:\Windows and the Active Directory database is located in D:\Windows\NTDS\.
All of the domain controllers have a third-party application installed. The operating system
failstorecognizethattheapplicationiscompatiblewithdomaincontrollercloning.You
verify with the application vendor that the application supports domain controller cloning.
You need to prepare a domain controller for cloning. What should you do?
A.InD:\Windows\NTDS\,createanXMLfilenamedDCCloneConfig.xmlandaddthe
application information to the file.
B. In the root of a USB flash drive, add the application information to an XML file named
DefaultDCCIoneAllowList.xml.
C. In D:\Windows\NTDS\, create an XML file named CustomDCCloneAllowList.xml and
add the application information to the file.
D.InC:\Windows\System32\Sysprep\Actionfiles\,addtheapplicationinformationtoan
XML file named Respecialize.xml.
Answer: C
Explanation:
PlacetheCustomDCCloneAllowList.xmlfileinthesamefolderastheActiveDirectory
143
database (ntds. dit) on the source Domain Controller.
References:
http://blogs.dirteam.com/blogs/sanderberkouwer/archive/2012/09/10/new-features-in-
active-directory-domain-services-in-windows-server-2012-part-13-domain-controller-
cloning. aspx
http://www.thomasmaurer.ch/2012/08/windows-server-2012-hyper-v-how-to-clone-a-
virtual-domain-controller
http: //technet. microsoft. com/en-us/library/hh831734. aspx
QUESTION: 109
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Alldomain
controllers run Windows Server 2012 R2. An organizational unit (OU) named OU1 contains
200 client computers that run Windows 8 Enterprise. A Group Policy object (GPO) named
GPO1 is linked to OU1. You make a change to GPO1. You need to force all of the computers
inOU1torefreshtheirGroupPolicysettingsimmediately.Thesolutionmustminimize
administrative effort. Which tool should you use?
A. Server Manager
B. Active Directory Users and Computers
C. The Gpupdate command
D. Group Policy Management Console (GPMC)
Answer: D
Explanation:
StartingwithWindowsServer�2012andWindows�8,youcannowremotelyrefresh
GroupPolicysettingsforallcomputersinanOUfromonecentrallocationthroughthe
Group Policy Management Console (GPMC). Or you can use the Invoke-GPUpdatecmdlet to
refresh Group Policy for a set of computers, not limited to the OU structure, for example, if
the computers are located in the default computers container.
References:
http: //technet. microsoft. com/en-us//library/jj134201. aspx
http://blogs.technet.com/b/grouppolicy/archive/2012/11/27/group-policy-in-windows-
server-2012-using-remote-gpupdate. aspx
QUESTION: 110
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Alldomain
controllers run Windows Server 2012 R2. You plan to use fine-grained password policies to
customize the password policy settings ofcontoso.com. You need to identify to which Active
Directory object types you can directly apply the fine-grained password policies. Which two
object types should you identify? (Each correct answer presents part of the solution. Choose
two.)
A. Users
B. Global groups
C. computers
D. Universal groups
E. Domain local groups
Answer: A, B
Explanation:
Firstoff,yourdomainfunctionallevelmustbeatWindowsServer2008.Second,Fine-
grained password policies ONLY apply to user objects, and global security groups. Linking
them to universal or domain local groups is ineffective. I know what you�re thinking, what
about OU�s? Nope, Fine-grained password policy cannot be applied to an organizational unit
(OU) directly. The third thing to keep in mind is, by default only members of the Domain
Admins group can set fine-grained password policies. However, you can delegate this ability
to other users if needed.
Fine-grained password policies apply only to user objects (or inetOrgPerson objects if they
are used instead of user objects) and global security groups.
You can apply Password Settings objects (PSOs) to users or global security groups:
References:
http: //technet. microsoft. com/en-us/library/cc731589%28v=ws. 10%29. aspx
http: //technet. microsoft. com/en-us/library/cc731589%28v=ws. 10%29. aspx
http: //technet. microsoft. com/en-us/library/cc770848%28v=ws. 10%29. aspx
http: //www. brandonlawson. com/active-directory/creating-fine-grained-password-policies/
QUESTION: 111
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Thedomain
containsaservernamedServer1thatrunsWindowsServer2012R2.Youenableand
configure Routing and Remote Access (RRAS) on Server1. You create a user account named
User1.YouneedtoensurethatUser1canestablishVPNconnectionstoServer1.What
should you do?
A. Create a network policy.
B. Create a connection request policy.
C. Add a RADIUS client.
D. Modify the members of the Remote Management Users group.
Answer: A
Explanation:
Network policies are sets of conditions, constraints, and settings that allow you to designate
who is authorized to connect to the network and the circumstances under which they can or
cannot connect.
Networkpoliciescanbeviewedasrules.Eachrulehasasetofconditionsandsettings.
ConfigureyourVPNservertouseNetworkAccessProtection(NAP)toenforcehealth
requirement policies.
References:
http: //technet. microsoft. com/en-us/library/hh831683. aspx
http: //technet. microsoft. com/en-us/library/cc754107. aspx
http: //technet. microsoft. com/en-us/library/dd314165%28v=ws. 10%29. aspx
http: //technet. microsoft. com/en-us/windowsserver/dd448603. aspx
http: //technet. microsoft. com/en-us/library/dd314165(v=ws. 10). aspx
http: //technet. microsoft. com/en-us/library/dd469733. aspx
http: //technet. microsoft. com/en-us/library/dd469660. aspx
http: //technet. microsoft. com/en-us/library/cc753603. aspx
http: //technet. microsoft. com/en-us/library/cc754033. aspx
http: //technet. microsoft. com/en-us/windowsserver/dd448603. Aspx
QUESTION: 112
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Thedomain
containsaservernamedServer1thatrunsWindowsServer2012P.2.Server1hasthe
Network Policy and Access Services server role installed. Your company's security policy
requires that certificate-based authentication must be used by some network services. You
need to identify which Network Policy Server (NPS) authentication methods comply with the
securitypolicy.Whichtwoauthenticationmethodsshouldyouidentify?(Eachcorrect
answer presents part of the solution. Choose two.)
A. MS-CHAP
B. PEAP-MS-CHAP v2
C. Chap
D. EAP-TLS
E. MS-CHAP v2
Answer: B, D
Explanation:
PEAP is similar in design to EAP-TTLS, requiring only a server-side PKI certificate to create
asecureTLStunneltoprotectuserauthentication,andusesserver-sidepublickey
certificates to authenticate the server.
WhenyouuseEAPwithastrong EAPtype,suchasTLS withsmartcards orTLSwith
certificates, both the client and the server use certificates to verify their identities to each
other.
QUESTION: 113
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the File
Server Resource Manager role service installed. Each time a user receives an access-denied
messageafterattemptingtoaccessafolderonServer1,anemailnotificationissenttoa
distribution list named DL1. You create a folder named Folder1 on Server1, and then you
configurecustomNTFSpermissionsforFolder1.Youneedtoensurethatwhenauser
receives an access-denied message while attempting to access Folder1, an email notification
is sent to a distribution list named DL2. The solution must not prevent DL1 from receiving
notifications about other access-denied messages. What should you do?
148
A. From File Explorer, modify the Classification tab of Folder1.
B. From the File Server Resource Manager console, modify the Email Notifications settings.
C. From the File Server Resource Manager console, set a folder management property.
D. From File Explorer, modify the Customize tab of Folder1.
Answer: C
Explanation:
Whenusingtheemailmodeleachofthefileshares,youcandeterminewhetheraccess
requeststoeachfilesharewillbereceivedbytheadministrator,adistributionlistthat
represents thefileshareowners,orboth.YoucanusetheFileServerResourceManager
console to configure the owner distribution list by editing the management properties of the
classification properties.
Reference: http://technet.microsoft.com/en-us/library/jj574182.aspx#BKMK12
QUESTION: 114
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Thedomain
contains a domain controller named DC1 that runs WindowsServer 2012. You have a Group
Policyobject(GPO)namedGPO1thatcontainsseveralcustom Administrativetemplates.
You need to filter the GPO to display only settings that will be removed from the registry
whentheGPOfallsoutofscope.Thesolutionmustonlydisplaysettingsthatareeither
enabledordisabledandthathaveacomment.Howshouldyouconfigurethefilter?To
answer, select the appropriate options below. Select three.
A. Set Managed to: Yes
B. Set Managed to: No
C. Set Managed to: Any
D. Set Configured to: Yes
E. Set Configured to: No
F. Set Configured to: Any
G. Set Commented to: Yes
H. Set Commented to: No
I. Set Commented to: Any
Answer: A, F, G
For More exams visit https://killexams.com
�
Kill your exam at First Attempt....Guaranteed!
Friday, 30 August 2019
Here Full Trainingcamp of CCRN Medical today Free Pass
https://killexams.com/pass4sure/exam-detail/CCRN
Answer: D
Section 20: Sec Twenty (351 to 355)
Details:Critical Care Nursing Neonatal Exam
QUESTION: 351
Ifa newborn's stroke volume is about 5 mL, what is the averagepulse required to ensure
adequate cardiac output?
A. 100 bpm.
B. 145 bpm.
C. 180 bpm.
D. 195 bpm.
Answer: B
QUESTION: 352
Aneonatehas adifferentialdiagnosisofcongenitalmusculardystrophy(CMD)(laminin
alpha-2 deficiency) and exhibits hypotonia at birth with poor feeding and mild respiratory
distress. Which tests are necessary to establish the diagnosis?
A. Creatinine kinase.
B. Electromyogram, nerve conduction studies, and muscle biopsy.
C. Muscle biopsy only.
D. MRI only.
Answer: B
QUESTION: 353
The nurse is inserting a PICC for an infant who requires extended IV therapy because of very
lowbirthweight.Duringtheprocedure,theinfantmustbemonitoredforwhichofthe
following?
A. Tachycardia and tachypnea.
B. Bradycardia and hypoxia.
C. Atrial fibrillation.
D. Blood pressure.
Answer: B
QUESTION: 354
A mixed venous oxygensaturation (SvO2) level of less than 60% can indicate which of the
following?
A. Increased hemoglobin, PaO2, and/or cardiac output.
B. Decreased hemoglobin, PaO2, and/or cardiac output.
C. Decreased oxygen consumption.
D. Sepsis.
Answer: B
QUESTION: 355
A21-day-oldneonatedevelopsgreen-bronzejaundice,darkurine,claycoloredstools,
abdominaldistentionwithdistendedabdominalveins,andhepatosplenomegalywithfirm
liver. Liver biopsy and test shows extrahepatic biliary atresia, and a hepatoportoenterostomy
(Kasai procedure) is done to create a conduit between the liver and small intestine. Which
added vitamin(s) or minerals should the baby receive postoperatively?
A. Water-soluble vitamins (B-complex, C).
B. Fat-soluble vitamins (A, D, E, K).
C. Calcium.
D. Potassium.
Answer: B
Section 21: Sec Twenty One (356 to 360)
Details:Progressive Care Certified Nurse (PCCN) Practice
QUESTION: 356
Thoracic electrical bioimpedence monitoring with 4 sets of bioimpedence electrodes and 3
ECGelectrodesisusedtoevaluatehemodynamicstatusofapostsurgicalcardiacpatient.
Where are the bioimpedence electrodes placed?
A. One set on the arms, one set on the legs, and one set on the sides of the chest.
B. Two sets bilaterally at the base of the neck and two sets on each side of the chest.
C. One set on the legs and three sets on each side of the chest.
D. One set on the arms, one set bilaterally at the base of the neck, and two sets on each side
of the chest.
Answer: B
QUESTION: 357
A 52-year-old female with a history of bipolar disease is one-day post-operative following a
hip replacement. The patient slept only one or two hours during the night and is speaking
rapidly, throwing her belongings at the nurses, and insisting she is going to leave the hospital
against medical advice. The nurse should notify:
A. The mental health crisis team
B. Social services
C. A home health agency
D. The patient's husband
Answer: A
QUESTION: 358
If all patients who develop urinary infections are evaluated per urine culture and sensitivities
for microbial resistance, but only those with clinically-evident infections are included, then
those with subclinical infections may be missed, skewing results. This is an example of:
A. Information bias
B. Selection bias
C. Hypothesis testing
D. Generalizability
Answer: B
QUESTION: 359
A28-year-oldmalewithextensivesecondandthird-degreeburnsdevelopsabdominal
discomfort and vomits cffee ground emesis and frank blood. The most likely cause is:
A. A peptic ulcer
B. The erosion of the esophagus from burns
C. Paralytic ileus
D. Stress-related erosive syndrome
Answer: D
QUESTION: 360
Beck'striad(increasedcentralvenouspressurewithdistendedneckveins,muffledheart
sounds, and hypotension) is indicative of which condition?
A. Myocardial infarction
B. Aortic valve prolapse
C. Cardiac tamponade
D. Pulmonary embolism
Answer: C
For More exams visit https://killexams.com
�
Kill your exam at First Attempt....Guaranteed!
Answer: D
Section 20: Sec Twenty (351 to 355)
Details:Critical Care Nursing Neonatal Exam
QUESTION: 351
Ifa newborn's stroke volume is about 5 mL, what is the averagepulse required to ensure
adequate cardiac output?
A. 100 bpm.
B. 145 bpm.
C. 180 bpm.
D. 195 bpm.
Answer: B
QUESTION: 352
Aneonatehas adifferentialdiagnosisofcongenitalmusculardystrophy(CMD)(laminin
alpha-2 deficiency) and exhibits hypotonia at birth with poor feeding and mild respiratory
distress. Which tests are necessary to establish the diagnosis?
A. Creatinine kinase.
B. Electromyogram, nerve conduction studies, and muscle biopsy.
C. Muscle biopsy only.
D. MRI only.
Answer: B
QUESTION: 353
The nurse is inserting a PICC for an infant who requires extended IV therapy because of very
lowbirthweight.Duringtheprocedure,theinfantmustbemonitoredforwhichofthe
following?
A. Tachycardia and tachypnea.
B. Bradycardia and hypoxia.
C. Atrial fibrillation.
D. Blood pressure.
Answer: B
QUESTION: 354
A mixed venous oxygensaturation (SvO2) level of less than 60% can indicate which of the
following?
A. Increased hemoglobin, PaO2, and/or cardiac output.
B. Decreased hemoglobin, PaO2, and/or cardiac output.
C. Decreased oxygen consumption.
D. Sepsis.
Answer: B
QUESTION: 355
A21-day-oldneonatedevelopsgreen-bronzejaundice,darkurine,claycoloredstools,
abdominaldistentionwithdistendedabdominalveins,andhepatosplenomegalywithfirm
liver. Liver biopsy and test shows extrahepatic biliary atresia, and a hepatoportoenterostomy
(Kasai procedure) is done to create a conduit between the liver and small intestine. Which
added vitamin(s) or minerals should the baby receive postoperatively?
A. Water-soluble vitamins (B-complex, C).
B. Fat-soluble vitamins (A, D, E, K).
C. Calcium.
D. Potassium.
Answer: B
Section 21: Sec Twenty One (356 to 360)
Details:Progressive Care Certified Nurse (PCCN) Practice
QUESTION: 356
Thoracic electrical bioimpedence monitoring with 4 sets of bioimpedence electrodes and 3
ECGelectrodesisusedtoevaluatehemodynamicstatusofapostsurgicalcardiacpatient.
Where are the bioimpedence electrodes placed?
A. One set on the arms, one set on the legs, and one set on the sides of the chest.
B. Two sets bilaterally at the base of the neck and two sets on each side of the chest.
C. One set on the legs and three sets on each side of the chest.
D. One set on the arms, one set bilaterally at the base of the neck, and two sets on each side
of the chest.
Answer: B
QUESTION: 357
A 52-year-old female with a history of bipolar disease is one-day post-operative following a
hip replacement. The patient slept only one or two hours during the night and is speaking
rapidly, throwing her belongings at the nurses, and insisting she is going to leave the hospital
against medical advice. The nurse should notify:
A. The mental health crisis team
B. Social services
C. A home health agency
D. The patient's husband
Answer: A
QUESTION: 358
If all patients who develop urinary infections are evaluated per urine culture and sensitivities
for microbial resistance, but only those with clinically-evident infections are included, then
those with subclinical infections may be missed, skewing results. This is an example of:
A. Information bias
B. Selection bias
C. Hypothesis testing
D. Generalizability
Answer: B
QUESTION: 359
A28-year-oldmalewithextensivesecondandthird-degreeburnsdevelopsabdominal
discomfort and vomits cffee ground emesis and frank blood. The most likely cause is:
A. A peptic ulcer
B. The erosion of the esophagus from burns
C. Paralytic ileus
D. Stress-related erosive syndrome
Answer: D
QUESTION: 360
Beck'striad(increasedcentralvenouspressurewithdistendedneckveins,muffledheart
sounds, and hypotension) is indicative of which condition?
A. Myocardial infarction
B. Aortic valve prolapse
C. Cardiac tamponade
D. Pulmonary embolism
Answer: C
For More exams visit https://killexams.com
�
Kill your exam at First Attempt....Guaranteed!
Download Brain Dumps Citrix 1Y0-402 MegaCerts.com
https://killexams.com/pass4sure/exam-detail/1Y0-402
QUESTION: 64
Scenario: A Citrix Architect needs to create a conceptual architecture for a XenApp and
XenDesktop environment on behalf of a marketing firm. Based on some initial
discussions around the firm's business goals and objectives, the architect has collected
the information as shown in the Exhibit. Click the Exhibit button to view the
information.
Which delivery model should the architect recommend?
A. Single-Site in Citrix Cloud, single public cloud resource location
B. Multi-Site, single-zone, multiple public cloud resource locations
C. Multi-Site, single on-premises datacenter
D. Single-Site in Citrix Cloud, single on-premises resource location
E. Single-Site, single-zone, single on-premises datacenter
Answer: A
QUESTION: 65
Scenario: A Citrix Architect needs to design a new XenApp and XenDesktop
environment. The table in the Exhibit lists details about the requirements of the current
user groups and their Virtual Delivery Agent (VDA) machine workloads.
Click the Exhibit button to view the table.
The architect should scale the hardware used to host the VMs for User Group 1 to_
(Choose the correct option to complete the sentence.)
A. 256
B. 128
C. 384
D. 196
E. 64
Answer: C
QUESTION: 66
Scenario: A Citrix Architect needs to design a new XenApp and XenDesktop
environment. The customer previously installed all applications locally on managed
laptops and desktops but is willing to evaluate other application delivery methods as part
of the new deployment. The environment will be standardized on Windows 10 and
Windows Server 2016 for the Virtual Delivery Agent (VDA) machines.
As part of an application analysis performed earlier in the project, the information in the
Exhibit was collected regarding one of the required applications.
Click the Exhibit button to view the information.
Additionally, the customer has the following objectives: Minimize the amount of
additional infrastructure components. Minimize the server hardware required.
How should the architect install the application?
A. On an Application Layer using Citrix App Layering, be included in a layered image,
and accessed through a virtual desktop session
B. Stream it to a VDA machine using Microsoft App-V and accessed through a virtual
desktop session
C. Directly on a Server OS VDA machine and accessed from the endpoint as a published
application
D. Directly on a VDA machine image and accessed through a virtual desktop session
E. Directly on endpoint devices and included in a virtual desktop session using the Local
App Access feature
Answer: D
QUESTION: 67
Scenario: During an assessment of a Citrix Infrastructure, a Citrix Architect finds that
there are four active Sites. Each Site has one NetScaler SDX pair and two StoreFront
servers in a server group to allow access for internal and external users. Users have to
use different URLs when they access resources from different Sites. Single-factor
authentication is used for both internal and external access. NetScaler appliances are
placed in the DMZ with the appropriate firewall ports configured to allow Citrix traffic.
Many of the internal users connect using corporate-owned laptops and some external
users also connect using personal devices. The architect needs to provide a design for a
multi-tier environment with segregated internal and external traffic on the NetScaler
appliance. How many NetScaler instances and StoreFront servers are required to meet
this highly available design?
A. Eight NetScaler instances (two in each Site) and sixteen StoreFront servers (four in
each Site)
B. Four NetScaler instances (one in each Site) and eight StoreFront servers (two in each
Site)
C. Eight NetScaler instances (two in each Site) and eight StoreFront servers (two in each
Site)
D. Sixteen NetScaler instances (four in each Site) and eight StoreFront servers (two in
each Site)
Answer: B
QUESTION: 68
Scenario: A Citrix Architect has implemented a multi-location profile strategy as part of
a large XenApp and XenDesktop solution. The architect needs to implement a single
policy that sets the profile path for all users. New York users � Server:NYC-
FS.company.lan � Share: NYC-Profiles$ Miami users � Server:MIA-FS.company.lan �
Share: MIA-Profiles$ San Francisco users � Server:SFO-FS.company.lan � Share: SFO-
Profiles$ The architect has proposed the usage of the following path for all users:
\\#Loc#-FS.company.lan\#Loc#-Profiles$\#sAMAccountName#\%ProfileVer%\
What does the architect need to define in order to use the above path for all users as the
profile location?
A. A Loc variable using the Current-Location attribute
B. A new attribute called Loc using Active Directory Explorer
C. A user environment variable Loc using a login script
D. A DFS-ROOT variable per datacenter and incorporate the user environment variable
%homeshare%
Answer: C
QUESTION: 69
Scenario: A Citrix Architect is implementing a new XenApp and XenDesktop
environment. The customer has stated the following requirements:
All users must be able to aggregate resources from all Sites. Both Sites should be treated
as one equivalent farm set. User connections should be directed to the New York Site
with failover to San Francisco. Click the Exhibit button to view the StoreFront
configurations.
Exhibit 1
Exhibit 2
Based on the configurations, requirement 1 is_____, requirement 2 is _______, and
requirement 3 is_______. (Choose the correct option to complete the sentence.)
A. met; met; NOT met
B. NOT met; NOT met; NOT met
C. NOT met; met; NOT met
D. met; NOT met; NOT met
E. met; NOT met; met
F. met; met; met
G. NOT met; met; met
Answer: E
QUESTION: 70
Scenario: A Citrix Architect is performing a XenApp and XenDesktop design. During a
discussion with the server hardware team, two potential network configurations are
proposed for the XenServer hosts. Click the Exhibit button to view the network
configurations.
Which statement will support a decision to use Network Configuration 2?
A. It will ensure that virtual machine workloads do NOT interfere with each other.
B. It will provide greater security for all traffic types.
C. It will achieve a higher level of redundancy for the different traffic types.
D. It will reserve more bandwidth for virtual machine traffic.
Answer: C
For More exams visit https://killexams.com
Kill your exam at First Attempt....Guaranteed!
QUESTION: 64
Scenario: A Citrix Architect needs to create a conceptual architecture for a XenApp and
XenDesktop environment on behalf of a marketing firm. Based on some initial
discussions around the firm's business goals and objectives, the architect has collected
the information as shown in the Exhibit. Click the Exhibit button to view the
information.
Which delivery model should the architect recommend?
A. Single-Site in Citrix Cloud, single public cloud resource location
B. Multi-Site, single-zone, multiple public cloud resource locations
C. Multi-Site, single on-premises datacenter
D. Single-Site in Citrix Cloud, single on-premises resource location
E. Single-Site, single-zone, single on-premises datacenter
Answer: A
QUESTION: 65
Scenario: A Citrix Architect needs to design a new XenApp and XenDesktop
environment. The table in the Exhibit lists details about the requirements of the current
user groups and their Virtual Delivery Agent (VDA) machine workloads.
Click the Exhibit button to view the table.
The architect should scale the hardware used to host the VMs for User Group 1 to_
(Choose the correct option to complete the sentence.)
A. 256
B. 128
C. 384
D. 196
E. 64
Answer: C
QUESTION: 66
Scenario: A Citrix Architect needs to design a new XenApp and XenDesktop
environment. The customer previously installed all applications locally on managed
laptops and desktops but is willing to evaluate other application delivery methods as part
of the new deployment. The environment will be standardized on Windows 10 and
Windows Server 2016 for the Virtual Delivery Agent (VDA) machines.
As part of an application analysis performed earlier in the project, the information in the
Exhibit was collected regarding one of the required applications.
Click the Exhibit button to view the information.
Additionally, the customer has the following objectives: Minimize the amount of
additional infrastructure components. Minimize the server hardware required.
How should the architect install the application?
A. On an Application Layer using Citrix App Layering, be included in a layered image,
and accessed through a virtual desktop session
B. Stream it to a VDA machine using Microsoft App-V and accessed through a virtual
desktop session
C. Directly on a Server OS VDA machine and accessed from the endpoint as a published
application
D. Directly on a VDA machine image and accessed through a virtual desktop session
E. Directly on endpoint devices and included in a virtual desktop session using the Local
App Access feature
Answer: D
QUESTION: 67
Scenario: During an assessment of a Citrix Infrastructure, a Citrix Architect finds that
there are four active Sites. Each Site has one NetScaler SDX pair and two StoreFront
servers in a server group to allow access for internal and external users. Users have to
use different URLs when they access resources from different Sites. Single-factor
authentication is used for both internal and external access. NetScaler appliances are
placed in the DMZ with the appropriate firewall ports configured to allow Citrix traffic.
Many of the internal users connect using corporate-owned laptops and some external
users also connect using personal devices. The architect needs to provide a design for a
multi-tier environment with segregated internal and external traffic on the NetScaler
appliance. How many NetScaler instances and StoreFront servers are required to meet
this highly available design?
A. Eight NetScaler instances (two in each Site) and sixteen StoreFront servers (four in
each Site)
B. Four NetScaler instances (one in each Site) and eight StoreFront servers (two in each
Site)
C. Eight NetScaler instances (two in each Site) and eight StoreFront servers (two in each
Site)
D. Sixteen NetScaler instances (four in each Site) and eight StoreFront servers (two in
each Site)
Answer: B
QUESTION: 68
Scenario: A Citrix Architect has implemented a multi-location profile strategy as part of
a large XenApp and XenDesktop solution. The architect needs to implement a single
policy that sets the profile path for all users. New York users � Server:NYC-
FS.company.lan � Share: NYC-Profiles$ Miami users � Server:MIA-FS.company.lan �
Share: MIA-Profiles$ San Francisco users � Server:SFO-FS.company.lan � Share: SFO-
Profiles$ The architect has proposed the usage of the following path for all users:
\\#Loc#-FS.company.lan\#Loc#-Profiles$\#sAMAccountName#\%ProfileVer%\
What does the architect need to define in order to use the above path for all users as the
profile location?
A. A Loc variable using the Current-Location attribute
B. A new attribute called Loc using Active Directory Explorer
C. A user environment variable Loc using a login script
D. A DFS-ROOT variable per datacenter and incorporate the user environment variable
%homeshare%
Answer: C
QUESTION: 69
Scenario: A Citrix Architect is implementing a new XenApp and XenDesktop
environment. The customer has stated the following requirements:
All users must be able to aggregate resources from all Sites. Both Sites should be treated
as one equivalent farm set. User connections should be directed to the New York Site
with failover to San Francisco. Click the Exhibit button to view the StoreFront
configurations.
Exhibit 1
Exhibit 2
Based on the configurations, requirement 1 is_____, requirement 2 is _______, and
requirement 3 is_______. (Choose the correct option to complete the sentence.)
A. met; met; NOT met
B. NOT met; NOT met; NOT met
C. NOT met; met; NOT met
D. met; NOT met; NOT met
E. met; NOT met; met
F. met; met; met
G. NOT met; met; met
Answer: E
QUESTION: 70
Scenario: A Citrix Architect is performing a XenApp and XenDesktop design. During a
discussion with the server hardware team, two potential network configurations are
proposed for the XenServer hosts. Click the Exhibit button to view the network
configurations.
Which statement will support a decision to use Network Configuration 2?
A. It will ensure that virtual machine workloads do NOT interfere with each other.
B. It will provide greater security for all traffic types.
C. It will achieve a higher level of redundancy for the different traffic types.
D. It will reserve more bandwidth for virtual machine traffic.
Answer: C
For More exams visit https://killexams.com
Kill your exam at First Attempt....Guaranteed!
Thursday, 22 August 2019
Zip Download Practice Test VMCE_V9 Veeam, Question & Answers VMCE_V9 Veeam
https://killexams.com/pass4sure/exam-detail/VMCE_V9
QUESTION:171
Under certain circumstances. VMware Change Block Tracking (CBT) may be
unavailable to Veeam Backup & Replication. What effect will a lack of CBT
information have on the Veeam backup job?
A. Veeam will perform a full backup automatically
B. You will not be able to later copy this file to tape or offsite
C. The backup job will fail
D. The backupjob duration will increase
Answer: C
QUESTION:172
A Backup Administrator has restored a VM, on Hyper-V, using Instant VM Recovery.
Which additional step should be taken to finalize the Instant VM Recovery process?
A. Unmount the Instant Recovery VM
B. Stop publishing
C. Migrate to production
D. Delete the Instant Recovery VM
Answer: C
QUESTION:173
Which job statistics index can be used to identify the slowest component of the data path
of a backup job?
A. Warnings
B. "Action" log
C. Processing rate
D. Bottleneck statistics
Answer: D
QUESTION:174
Which Veeam Backup & Replication feature can be used to keep the production VM
online while the production host is patched?
A. Replica seeding
B. SureReplica
C. Failback of the Replica VM
D. Planned Failover of the Replica VM
Answer: D
QUESTION:175
What are some of the benefits of using replication from HP, NetApp or EMC storage
snapshot compared to the regular replication process? (Choose the 2 appropriate
options)
A. Lower impact on WAN link
B. Lower impact on production storage
C. Lower RPO
D. Lower RTO
E. Higher transfer speed
Answer: C, D
QUESTION:176
Which of the following describes Veeam Data Mover Service function most accurately?
(Choose the 2 appropriate options)
A. Analyzes the system,installs and upgrades necessary components and services
depending on the role selected for the server
B. Deploys and coordinates executable modules that perform mainjob activities on
behalf of Veeam Backup &
Replication
C. Performs data compression, deduplication and data transfer
D. Communicates with the VSS framework during backup, replication and other jobs,
and performing recovery tasks
Answer: A, D
QUESTION:177
Match each Veeam ONE component with the correct description of its functions.
Answer area
Answer:
Exhibit
QUESTION:178
Which requirements must be met in order to perform transaction log backups tor a
database on a Microsoft SQL Server with Veeam Backup & Replication? {Choose the 2
appropriate options)
A. The recovery model for the database must be set to Simple
B. The recovery model for the database must be set to Full or Bulk-Logged.
C. No other backup tool truncates the SQL servers log files.
D. The database must have its log flies on a separate VMDK
Answer: A, B
QUESTION:179
Which of the following built-in predefined tests can be performed to verify a VM replica
started in a Virtual Lab? (Choose the 3 appropriate options)
A. Application test
B. Heartbeat test
C. Memory test
D. Hard drive test
E. CRC check
F. Ping test
Answer: A, B, F
https://killexams.com
�
Kill your exam at First Attempt....Guaranteed!
QUESTION:171
Under certain circumstances. VMware Change Block Tracking (CBT) may be
unavailable to Veeam Backup & Replication. What effect will a lack of CBT
information have on the Veeam backup job?
A. Veeam will perform a full backup automatically
B. You will not be able to later copy this file to tape or offsite
C. The backup job will fail
D. The backupjob duration will increase
Answer: C
QUESTION:172
A Backup Administrator has restored a VM, on Hyper-V, using Instant VM Recovery.
Which additional step should be taken to finalize the Instant VM Recovery process?
A. Unmount the Instant Recovery VM
B. Stop publishing
C. Migrate to production
D. Delete the Instant Recovery VM
Answer: C
QUESTION:173
Which job statistics index can be used to identify the slowest component of the data path
of a backup job?
A. Warnings
B. "Action" log
C. Processing rate
D. Bottleneck statistics
Answer: D
QUESTION:174
Which Veeam Backup & Replication feature can be used to keep the production VM
online while the production host is patched?
A. Replica seeding
B. SureReplica
C. Failback of the Replica VM
D. Planned Failover of the Replica VM
Answer: D
QUESTION:175
What are some of the benefits of using replication from HP, NetApp or EMC storage
snapshot compared to the regular replication process? (Choose the 2 appropriate
options)
A. Lower impact on WAN link
B. Lower impact on production storage
C. Lower RPO
D. Lower RTO
E. Higher transfer speed
Answer: C, D
QUESTION:176
Which of the following describes Veeam Data Mover Service function most accurately?
(Choose the 2 appropriate options)
A. Analyzes the system,installs and upgrades necessary components and services
depending on the role selected for the server
B. Deploys and coordinates executable modules that perform mainjob activities on
behalf of Veeam Backup &
Replication
C. Performs data compression, deduplication and data transfer
D. Communicates with the VSS framework during backup, replication and other jobs,
and performing recovery tasks
Answer: A, D
QUESTION:177
Match each Veeam ONE component with the correct description of its functions.
Answer area
Answer:
Exhibit
QUESTION:178
Which requirements must be met in order to perform transaction log backups tor a
database on a Microsoft SQL Server with Veeam Backup & Replication? {Choose the 2
appropriate options)
A. The recovery model for the database must be set to Simple
B. The recovery model for the database must be set to Full or Bulk-Logged.
C. No other backup tool truncates the SQL servers log files.
D. The database must have its log flies on a separate VMDK
Answer: A, B
QUESTION:179
Which of the following built-in predefined tests can be performed to verify a VM replica
started in a Virtual Lab? (Choose the 3 appropriate options)
A. Application test
B. Heartbeat test
C. Memory test
D. Hard drive test
E. CRC check
F. Ping test
Answer: A, B, F
https://killexams.com
�
Kill your exam at First Attempt....Guaranteed!
Sunday, 4 August 2019
Here 70-705 Question and Answers, Today Download Microsoft Brain Dumps
https://killexams.com/pass4sure/exam-detail/70-705
QUESTION:180
This question requires that you evaluate the underlined text to determine if it is correct.
To meet the business goals, Proseware must convert training days into E-Leaning
courses. Review the underlined text. If it makes the statement correct, select "No change
is needed." If the statement is incorrect, select the answer choice that makes the
statement correct.
A. No change is needed.
B. Phone Support Incidents
C. Planning Services days
D. Premier Problem Resolution Support hours
Answer: A
QUESTION:181
This question requires that you evaluate the underlined text to determine if it iscorrect.
Proseware is evaluating whether to move workloads from the on-premises datacenter to
the cloud. When leveraging the Microsoft Azure Hybrid Benefit, the company is
allowed to use its Windows Server licenses on up to 320 virtual cores on Azure.
Review the underlined text. If it makes the statement correct, select "No change is
needed." If the statement is incorrect, select the answer choice that makes the statement
correct.
A. No change is needed.
B. Azure and the on-premises servers simultaneously
C. up to 32 Azure Virtual Machines ("Base Instances�)
D. Azure only after uninstalling Windows Server from the on-premises servers
Answer: C
QUESTION:182
Which licensing option should you recommend to meet the business goals and to
support the planned changes?
A. Enterprise Mobility + Security E3
B. Enterprise Mobility + Security E5
C. Microsoft 365 Enterprise E3
D. Microsoft 365 Enterprise E5
Answer: A
QUESTION:183
You need to identify to which Software Assurance (SA) benefits Proseware is entitled
when the company renews the EA for the existing Enterprise Products.
Which three benefits should you identity? Each correct answer presents a complete
solution. NOTE: Each correct selection is worth one point.
A. Roaming Rights for Office Professional Plus
B. Roaming Rights for Windows 10 Enterprise
C. License Mobility
D. Office Online Server
E. Virtualization Rights for Windows and Windows Embedded Desktops
Answer: C, D, E
QUESTION:184
Proseware is evaluating whether to acquire Microsoft 365 Enterprise licenses for all
users. You need to identify which two characteristics of an EA meet the business goals.
Which two characteristics should you identify? Each correct answer presents part of the
solution. NOTE: Each correct selection is worth one point.
A. the availability of Microsoft 365 Enterprise Add-on User Subscription Licenses
(USLs)
B. price protection for three years
C. the availability of Microsoft 365 Enterprise From SA User Subscription Licenses
(USLs)
D. extended use rights for Office servers when purchasing Microsoft 365 Enterprise
Answer: A
QUESTION:185
Which licensing option should you recommend to support the planned changes to the
on-premises datacenter?
A. Microsoft System Center 2016 Datacenter
B. Microsoft System Center Endpoint Protection
C. Microsoft System Center Configuration Manager
D. Microsoft System Center 2016 Standard
Answer: B
QUESTION:186
This question requires that you evaluate the underlined text to determine if it is correct.
Proseware is evaluating whether to license all users for Microsoft 365 Enterprise. Based
on the business goals, the company must purchase the licenses through an EA.
Review the underlined text. If it makes the statement correct, select "No change is
needed." If the statement is incorrect, select the answer choice that makes the statement
correct.
A. No change is needed.
B. the Cloud Solution Provider (CSP) program
C. the Services Provider License Agreement (SPLA)
D. the Microsoft Products and Services Agreement (MPSA)
Answer: D
QUESTION:187
Which two benefits meet the business goals and support the planned changes? Each
correct answer presents a complete solution. NOTE: Each correct selection is worth one
point.
A. Microsoft SharePoint Online allows multiple users to collaborate on a document
simultaneously.
B. Microsoft Exchange Online provides built-in defenses against email threats.
C. Microsoft Exchange Online protects sensitive data by using data loss prevention
(DLP) capabilities.
D. Microsoft SharePoint Online allows the external sharing of documents.
Answer: B
For More exams visit https://killexams.com
Kill your exam at First Attempt....Guaranteed!
QUESTION:180
This question requires that you evaluate the underlined text to determine if it is correct.
To meet the business goals, Proseware must convert training days into E-Leaning
courses. Review the underlined text. If it makes the statement correct, select "No change
is needed." If the statement is incorrect, select the answer choice that makes the
statement correct.
A. No change is needed.
B. Phone Support Incidents
C. Planning Services days
D. Premier Problem Resolution Support hours
Answer: A
QUESTION:181
This question requires that you evaluate the underlined text to determine if it iscorrect.
Proseware is evaluating whether to move workloads from the on-premises datacenter to
the cloud. When leveraging the Microsoft Azure Hybrid Benefit, the company is
allowed to use its Windows Server licenses on up to 320 virtual cores on Azure.
Review the underlined text. If it makes the statement correct, select "No change is
needed." If the statement is incorrect, select the answer choice that makes the statement
correct.
A. No change is needed.
B. Azure and the on-premises servers simultaneously
C. up to 32 Azure Virtual Machines ("Base Instances�)
D. Azure only after uninstalling Windows Server from the on-premises servers
Answer: C
QUESTION:182
Which licensing option should you recommend to meet the business goals and to
support the planned changes?
A. Enterprise Mobility + Security E3
B. Enterprise Mobility + Security E5
C. Microsoft 365 Enterprise E3
D. Microsoft 365 Enterprise E5
Answer: A
QUESTION:183
You need to identify to which Software Assurance (SA) benefits Proseware is entitled
when the company renews the EA for the existing Enterprise Products.
Which three benefits should you identity? Each correct answer presents a complete
solution. NOTE: Each correct selection is worth one point.
A. Roaming Rights for Office Professional Plus
B. Roaming Rights for Windows 10 Enterprise
C. License Mobility
D. Office Online Server
E. Virtualization Rights for Windows and Windows Embedded Desktops
Answer: C, D, E
QUESTION:184
Proseware is evaluating whether to acquire Microsoft 365 Enterprise licenses for all
users. You need to identify which two characteristics of an EA meet the business goals.
Which two characteristics should you identify? Each correct answer presents part of the
solution. NOTE: Each correct selection is worth one point.
A. the availability of Microsoft 365 Enterprise Add-on User Subscription Licenses
(USLs)
B. price protection for three years
C. the availability of Microsoft 365 Enterprise From SA User Subscription Licenses
(USLs)
D. extended use rights for Office servers when purchasing Microsoft 365 Enterprise
Answer: A
QUESTION:185
Which licensing option should you recommend to support the planned changes to the
on-premises datacenter?
A. Microsoft System Center 2016 Datacenter
B. Microsoft System Center Endpoint Protection
C. Microsoft System Center Configuration Manager
D. Microsoft System Center 2016 Standard
Answer: B
QUESTION:186
This question requires that you evaluate the underlined text to determine if it is correct.
Proseware is evaluating whether to license all users for Microsoft 365 Enterprise. Based
on the business goals, the company must purchase the licenses through an EA.
Review the underlined text. If it makes the statement correct, select "No change is
needed." If the statement is incorrect, select the answer choice that makes the statement
correct.
A. No change is needed.
B. the Cloud Solution Provider (CSP) program
C. the Services Provider License Agreement (SPLA)
D. the Microsoft Products and Services Agreement (MPSA)
Answer: D
QUESTION:187
Which two benefits meet the business goals and support the planned changes? Each
correct answer presents a complete solution. NOTE: Each correct selection is worth one
point.
A. Microsoft SharePoint Online allows multiple users to collaborate on a document
simultaneously.
B. Microsoft Exchange Online provides built-in defenses against email threats.
C. Microsoft Exchange Online protects sensitive data by using data loss prevention
(DLP) capabilities.
D. Microsoft SharePoint Online allows the external sharing of documents.
Answer: B
For More exams visit https://killexams.com
Kill your exam at First Attempt....Guaranteed!
Subscribe to:
Posts (Atom)