Home
16.
You are a network administrator for Proseware, which has a main offce and a branch offce. The company network consists of a single Active Directory domain, Proseware. com. All servers are running Windows Server 2012 R2, and all clients are running Windows 8.1.
You confgure a fle server at the main offce as a BranchCache content server. You now want to confgure clients at the branch offce for BranchCache.
You create a new GPO for the branch offce. Which of the following Group Policy settings do you need to confgure in the GPO to enable the clients for BranchCache? (Choose all that apply.)
  • A.
    Turn On BranchCache
  • B.
    Set BranchCache Distributed Cache Mode
  • C.
    Set BranchCache Hosted Cache Mode
  • D.
    Confgure BranchCache For Network Files
  • Answer & Explanation
  • Report
Answer : [A and B]
Explanation :
  • A. Correct: You need to use this policy setting to enable BranchCache on clients that fall within the scope of the policy.
  • B. Correct: You need to use this policy setting to enable clients for BranchCache if no hosted cache server is present in the branch offce.
  • C. Incorrect: This policy setting is used to enable clients with the name of a single hosted cache server. It is not used to confgure BranchCache clients to use Distributed Cache mode.
  • D. Incorrect: This policy setting is used to defne the network latency threshold beyond which clients will attempt to retrieve content from a local cache instead of from a remote source over a WAN link. You can’t use this policy setting to confgure BranchCache clients to use Distributed Cache mode.
Report
Name Email  
17.
You are a network administrator for Adatum.com. The Adatum.com network consists of a single domain that spans branch offces in New York and London. Within the Adatum.com domain, the users and computers within the New York offce are contained in an OU named US; the users and computers within the London offce are contained in an OU named UK.
You want to be able to classify data as originating from either the New York offce or the London offce. You create a resource property named Country/Region and confgure the suggested values “US” and “UK.” You want administrators in both the New York and London offces to see the Country/Region resource property appear on the Classifcation tab of fles and folder properties. What should you do next?
  • A.
    Run the Update-FSRMClassifcationPropertyDefnition cmdlet.
  • B.
    Enable the Country/Region resource property.
  • C.
    Create a classifcation rule.
  • D.
    Add the Country/Region property to a resource property list.
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
  • A. Incorrect: You should run this cmdlet after you add the new resource property to a resource property list.
  • B. Incorrect: You don’t need to enable new resource properties that you create. They are already enabled when you create them.
  • C. Incorrect: Optionally, you can create a classifcation rule to classify fles and folders automatically. However, you can take this step only later, after you have updated fle and folder objects.
  • D. Correct: After you create or enable a resource property, you need to add it to a resource property list. Only then can you update fle and folder objects so that they include this resource property on the Classifcation tab.
Report
Name Email  
18.
Your organization’s network consists of a single Active Directory domain. All servers are running Windows Server 2012 R2 and all clients are running Windows 8.1. You want to enable claims-based access authorization for users in your domain. Which of the following steps should you take to take to achieve this goal?
  • A.
    Enable the policy setting KDC Support For Claims, Compound Authentication And Kerberos Armoring in a GPO at the domain controllers OU level.
  • B.
    Enable the policy setting KDC Support For Claims, Compound Authentication And Kerberos Armoring in a GPO at the domain level.
  • C.
    Enable the policy setting Kerberos Support For Claims, Compound Authentication And Kerberos Armoring in a GPO at the domain controllers OU level.
  • D.
    Enable the policy setting Kerberos Support For Claims, Compound Authentication And Kerberos Armoring in a GPO at the domain level.
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
  • A. Correct: To enable claims-based authorization in your domain, you should enable this policy setting at the domain controller level.
  • B. Incorrect: You should enable this policy setting at the domain controller level, not at the domain level.
  • C. Incorrect: This policy setting enables computers to request claims. It is used for policy auditing, not for enabling claims-based authorization.
  • D. Incorrect: This policy setting enables computers to request claims. It is used for policy auditing, not for enabling claims-based authorization.
Report
Name Email  
19.
You are a network administrator for Proseware.com. The Proseware.com network consists of a single Active Directory domain. All servers in the network are running Windows Server 2012 R2 and all clients are running Windows 8.1
On a fle server named FileSrv1, your manager has created fve new fle shares named Finance, Marketing, Sales, Operations, and Legal. On each share, your manager has assigned Full Control to Authenticated Users for both the NTFS and share permissions.
Your manager now asks you to confgure permissions to the contents of each departmental fle share so that Full Control access is restricted to members of the corresponding department and that no other users are allowed any access.
Your manager also wants you to ensure that fles within each departmental share can be traced to their origin even when they are moved from their original share location. Which of the following steps will allow you to meet these stated goals? (Choose two. Each answer represents part of the solution.)
  • A.
    On each new shared folder, remove all currently confgured NTFS permissions and then grant Full Control NTFS permissions to a security group that includes all the members of the corresponding department only.
  • B.
    On each new shared folder, remove all currently confgured share permissions and then grant Full Control share permissions to a security group that includes all the members of the corresponding department only.
  • C.
    On each department’s shared folder, confgure a Department classifcation property value that corresponds to the name of the department.
  • D.
    On each department’s shared folder, apply a central access policy that assigns to members of the appropriate department Full Control permissions on fles assigned with a matching Department value classifcation.
  • Answer & Explanation
  • Report
Answer : [C,D]
Explanation :
  • A. Incorrect: Changing the NTFS permissions will restrict access to members of the appropriate department, but it will not provide any information about fles that will allow them to be traced when they are moved outside of the shared folder.
  • B. Incorrect: Changing the share permissions will restrict access to members of the appropriate department when they connect over the network, but it will not provide any information about fles that will allow them to be traced when they are moved outside of the shared folder.
  • C. Correct: Confguring a Department property value will allow you to classify the fles in each departmental shared folder as belonging to that department, even when they leave that folder.
  • D. Correct: Applying this type of central access policy to each shared folder will confgure the fles within these folders with appropriate access permissions.
Report
Name Email  
20.
You are a network administrator for Adatum.com. You are deploying a new application server named App1, and you need to provision storage for App1 from an active iSCSI target on a server named Storage1.
You enable the iSCSI Initiator service on App1. What should you do next?
  • A.
    Run the Iscsicli command.
  • B.
    Run the Iscsicpl command.
  • C.
    Add App1 to the iSCSI target on Storage1.
  • D.
    Point the iSCSI Initiator on App1 to the iSCSI target on Storage1.
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
  • A. Incorrect: Iscsicli is a command-line utility used to manage iSCSI Initiator. Used without any parameters, the command will provide the IQN of the local iSCSI Initiator. However, the next step you need to take is to add the local initiator to the iSCSI target.
  • B. Incorrect: Running the Iscsicpl command will launch the iSCSI Initiator tool in the GUI. However, your next step is not to confgure the local iSCSI Initiator but to confgure the iSCSI target (by adding the initiator to the target).
  • C. Correct: You need to modify the properties of the target by adding App1 to its list of iSCSI initiators. Only then should you point the initiator to the target.
  • D. Incorrect: You need to add the initiator to the target on Storage1 before you point the initiator toward the target on App1.
Report
Name Email