Your network contains an Active Directory forest. The forest contains one domain named contoso.com. The domain contains two domain controllers named DC1 and DC2. DC1 holds all of the operations master roles

HOTSPOT Your network contains an Active Directory forest. The forest contains one domain named contoso.com. The domain contains two domain controllers named DC1 and DC2. DC1 holds all of the operations master roles. During normal network operations, you run the following commands on DC2: Move-ADDirectoryServerOperationMasterRole -Identity “DC2” -OperationMasterRole PDCEmulator Move-...

November 20, 2018 No Comments READ MORE +

Which command should you run on Server1?

HOTSPOT Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2016. Server1 has IP Address Management (IPAM) installed. Server2 has the DHCP Server role installed. The IPAM server retrieves data from Server2. You create a domain user...

November 20, 2018 No Comments READ MORE +

Which cmdlet should you run?

Your network contains an Active Directory forest named contoso.com. You have an Active Directory Federation Services (AD FS) farm. The farm contains a server named Server1 that runs Windows Server 2012 R2. You add a server named Server2 to the farm. Server2 runs Windows Server 2016. You remove Server1 from...

November 19, 2018 No Comments READ MORE +

Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...

November 19, 2018 No Comments READ MORE +

What should you do?

Your network contains an Active Directory domain named contoso.com. The domain functional level is Windows Server 2012 R2. You need to secure several high-privilege user accounts to meet the following requirements: What should you do?A . Create a universal security group for the user accounts and modify the Security settings...

November 18, 2018 No Comments READ MORE +

Which tool should you use?

Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details provided in a question...

November 18, 2018 No Comments READ MORE +

Which five GPOs will apply to User1 in sequence when the user signs in to Computer1?

DRAG DROP Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in...

November 16, 2018 No Comments READ MORE +

Which GPO or GPOs will apply to User1 when the user signs in to Computer1 after block inheritance is configured?

Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series....

November 16, 2018 No Comments READ MORE +

Which two inbound TCP ports should you open on the firewall?

Your network contains an Active Directory forest named contoso.com. The forest contains a member server named Server1 that runs Windows Server 2016. Server1 is located in the perimeter network. You install the Active Directory Federation Services server role on Server1. You create an Active Directory Federation Services (AD FS) farm...

November 14, 2018 No Comments READ MORE +

What should you do?

You have users that access web applications by using HTTPS. The web applications are located on the servers in your perimeter network. The servers use certificates obtained from an enterprise root certification authority (CA). The certificates are generated by using a custom template named WebApps. The certificate revocation list (CRL)...

November 12, 2018 No Comments READ MORE +