Which two actions should you perform?

You are modifying an application that processes leases.
The following code defines the Lease class. (Line numbers are included for reference only.)

image054 - 
Which two actions should you perform?
Leases are restricted to a maximum term of 5 years. The application must send a notification message if a lease request exceeds 5 years. You need to implement the notification mechanism.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

image056 - 
Which two actions should you perform?
A. Option A
B. Option B
C. Option C
D. Option D
E. Option E
F. Option F

Answer: A, B

Leave a Reply

Which two actions should you perform?

Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server 1. All servers run Windows Server 2012 R2.
You need to collect the error events from all of the servers on Server1. The solution must ensure that when new servers are added to the domain, their error events are collected automatically on Server1.
Which two actions should you perform? (Each correct answer presents part of the solution. (Choose two.)
A. On Server1, create a collector initiated subscription.
B. On Server1, create a source computer initiated subscription.
C. From a Group Policy object (GPO), configure the Configure target Subscription Manager setting.
D. From a Group Policy object (GPO), configure the Configure forwarder resource usage setting.

Answer: B, C
Explanation:
To set up a Source-Initiated Subscription with Windows Server 2003/2008 so that events of interest from the Security event log of several domain controllers can be forwarded to an administrative workstation
* Group Policy
The forwarding computer needs to be configured with the address of the server to which the events are forwarded. This can be done with the following group policy setting:
Computer configuration-Administrative templates-Windows components-Event forwarding-Configure the server address, refresh interval, and issue certificate authority of a target subscription manager.
* Edit the GPO and browse to Computer Configuration | Policies | Administrative Templates | Windows Components | Event Forwarding – Configure the server address, refresh interval, and issuer certificate authority of a target Subscription Manager

Leave a Reply

Which two actions should you perform?

Your network contains an Active Directory domain named contoso.com. The domain contains servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 has the Active Directory Federation Services server role installed. Server2 is a file server. Your company introduces a Bring Your Own Device (BYOD) policy. You need to ensure that users can use a personal device to access domain resources by using Single Sign-On (SSO) while they are connected to the internal network.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Enable the Device Registration Service in Active Directory.
B. Publish the Device Registration Service by using a Web Application Proxy.
C. Configure Active Directory Federation Services (AD FS) for the Device Registration Service.
D. Create and configure a sync share on Server2.
E. Install the Work Folders role service on Server2.

Answer: A, C
Explanation:
* Workplace Join leverages a feature included in the Active Directory Federation Services (AD FS) Role in Windows Server 2012 R2, called Device Registration Service (DRS).
DRS provisions a device object in Active Directory when a device is Workplace Joined. Once the device object is in Active Directory, attributes of that object can be retrieved and used to provide conditional access to resources and applications. The device identity is represented by a certificate which is set on the personal device by DRS when the device is Workplace Joined.
* In Windows Server 2012 R2, AD FS and Active Directory Domain Services have been extended to comprehend the most popular mobile devices and provide conditional access to enterprise resources based on user+device combinations and access policies. With these policies in place, you can control access based on users, devices, locations, and access times.
Reference: BYOD Basics: Enabling the use of Consumer Devices using Active Directory in Windows Server 2012 R2

Leave a Reply

Which two actions should you perform?

You need to diagnose the source of the performance issues when preparing concert tickets.
Which two actions should you perform? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.
A. Examine the Storage Logging logs for any queue operations that have higher than expected latency.
B. Examine the Storage Client Library logs to determine whether there is a decrease in the total number of requests for storage operations.
C. Examine the diagnostic message logs for the worker role to determine whether the worker role is failing to process messages.
D. Examine the Storage Client Library logs to determine whether there are repeated retries for storage operations.

Answer: A,D
Explanation:
References: https://docs.microsoft.com/en-us/azure/storage/storage-monitoring-diagnosing-troubleshooting#you-are-experiencing-unexpected-delays-in-message-delivery

Leave a Reply

Which two actions should you perform?

Your network contains an Active Directory domain named contoso.com. The domain contains a certification authority (CA). You suspect that a certificate issued to a Web server is compromised. You need to minimize the likelihood that users will trust the compromised certificate.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Stop the Certificate Propagation service.
B. Modify the validity period of the Web Server certificate template.
C. Run certutil and specify the -revoke parameter.
D. Run certutil and specify the -deny parameter.
E. Publish the certificate revocation list (CRL).

Answer: C, E
Explanation:
First revoke the certificate, then publish the CRL.

Leave a Reply

Which two actions should you perform?

You have an Active Directory Rights Management Services (AD RMS) cluster. You need to prevent users from encrypting new content. The solution must ensure that the users can continue to decrypt content that was encrypted already.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. From the Active Directory Rights Management Services console, enable decommissioning.
B. From the Active Directory Rights Management Services console, create a user exclusion policy.
C. Modify the NTFS permissions of %systemdrive%\inetpub\wwwroot\_wmcs\licensing.
D. Modify the NTFS permissions of %systemdrive%\inetpub\wwwroot\_wmcs\decommission.
E. From the Active Directory Rights Management Services console, modify the rights policy templates.

Answer: A, D
Explanation:
* Decommissioning refers to the entire process of removing the AD RMS cluster and its associated databases from an organization. This process allows you to save rights-protected files as ordinary files before you remove AD RMS from your infrastructure so that you do not lose access to these files.
Decommissioning an AD RMS cluster is achieved by doing the following:
/ Enable the decommissioning service. (A)
/ Modify permissions on the decommissioning pipeline.
/ Configure the AD RMS-enabled application to use the decommissioning pipeline.
* To modify the permissions on the decommissioning pipeline

Leave a Reply

Which two actions should you perform?

You need to flag an item for direct delivery.
Which two actions should you perform? Each correct answer presents part of the solution.
A. Select a Direct delivery warehouse for the product.
B. Enable the Direct delivery slider on the products.
C. Select a default vendor for the product.
D. Select a Direct delivery site for the product.

Answer: BC

Leave a Reply

Which two actions should you perform?

You are responsible for installing new database server instances.
You must install Microsoft SQL Server Analysis Services (SSAS) to support deployment of the following projects. You develop both projects by using SQL Server Data Tools.
You need to install the appropriate services to support both projects.
Which two actions should you perform? Each correct answer presents part of the solution.
A. Install one tabular instance of SSAS and enable the Data Mining Extensions.
B. Install one multidimensional instance of SSAS.
C. Install one tabular instance of SSAS.
D. Install a multidimensional instance and a Power Pivot instance of SSAS on the same server.
E. Install two separate tabular instances of SSAS.

Answer: B,C
Explanation:
Analysis Services can be installed in one of three server modes: Multidimensional and Data Mining (default), Power Pivot for SharePoint, and Tabular.
References:https://docs.microsoft.com/en-us/sql/analysis-services/comparing-tabular-and-multidimensional-solutions-ssas

Leave a Reply

Which two actions should you perform?

Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.
Your network contains an Active Directory domain named contoso.com. The functional level of the domain is Windows Server 2012.
The network uses an address space of 192.168.0.0/16 and contains multiple subnets.
The network is not connected to the Internet.
The domain contains three servers configured as shown in the following table.

image065 - 
Which two actions should you perform?
Client computers obtain TCP/IP settings from Server3.
You add a second network adapter to Server2. You connect the new network adapter to the Internet. You install the Routing role service on Server2.
Server1 has four DNS zones configured as shown in the following table.

image067 - 
Which two actions should you perform?
You need to ensure that when a computer is removed from the network, the associated records are deleted automatically after 15 days.
Which two actions should you perform? Each correct answer presents part of the solution.
A. Create a scheduled task that runs the Remove-Computer cmdlet.
B. Modify the Zone Aging/Scavenging Properties of the zone.
C. Modify the Time to live (TTL) value of the start of authority (SOA) record.
D. Set the Scavenging period of Server1.
E. Modify the Expires after value of the start of authority (SOA) record.

Answer: B,D
Explanation:
https://technet.microsoft.com/en-us/library/cc771362(v=ws.10).aspx

Leave a Reply

Which two actions should you perform?

You are the desktop administrator for a small company.
Your workgroup environment consists of Windows 10 Enterprise computers. You want to prevent 10 help desk computers from sleeping.
However, you want the screens to shut off after a certain period of time if the computers are not being used.
You need to configure and apply a standard power configuration scheme for the 10 help desk computers on your network.
Which two actions should you perform? Each correct answer presents part of the solution.
A. Import the power scheme by using POWERCFG /IMPORT on each of the remaining help desk computers. Set the power scheme to Active by using POWERCFG /S.
B. Use POWERCFG /X on one help desk computer to modify the power scheme to meet the requirements. Export the power scheme by using POWERCFG /EXPORT.
C. Use POWERCFG /S on one help desk computer to modify the power scheme to meet the requirements. Export the power scheme by using POWERCFG /EXPORT.
D. Import the power scheme by using POWERCFG /IMPORT on each of the remaining help desk computers. Set the power scheme to Active by using POWERCFG /X.

Answer: A,B
Explanation:
You can use the Powercfg.exe tool to control power settings and configure computers to default to Hibernate or Standby modes.
In this question, we use POWERCFG /X on one help desk computer to modify the power scheme to meet our requirements. After configuring the required settings, we can export the power scheme settings to a file by using POWERCFG /EXPORT.
We can then import the power scheme from the file on each of the remaining help desk computers by using POWERCFG /IMPORT. After importing the power scheme on the remaining computers, we need to set the new power scheme to be the active power scheme by using POWERCFG /S.

Leave a Reply