Skip Navigation Links
 

Microsoft - 70-743: Upgrading Your Skills to MCSA: Windows Server 2016

Sample Questions

Question: 615
Measured Skill: Install and configure Active Directory Domain Services (AD DS)

Your network contains an Active Directory domain named adatum.com. The domain contains the objects shown in the following table.



GroupA has Full Control permissions to a folder named Folder1. GroupB has Full Control permissions to a folder named Folder2.

You run the following PowerShell script:

$m1 = Get-ADUser -Filter {Name -eq 'User01'}
$m2 = Get-ADUser -Filter {Name -eq 'User1'}
Add-ADGroupMember -Identity Group1 -Members $m1
Add-ADGroupMember -Identity Group2 -Members $m2
Add-ADGroupMember -Identity GroupA -Members User01
Add-ADGroupMember -Identity GroupA -Members Group2
Add-ADGroupMember -Identity GroupB -Members User10
Add-ADGroupMember -Identity GroupB -Members Group1


For each of the following statements, select Yes if the statement is true. Otherwise, select No.

(To answer, select the appropriate objects in the answer area.)

www.cert2brain.com

AUser1 has Full Controll permissions to Folder1: Yes
User11 has Full Controll permissions to Folder2: Yes
User01 has Full Controll permissions to Folder2: Yes
B User1 has Full Controll permissions to Folder1: Yes
User11 has Full Controll permissions to Folder2: Yes
User01 has Full Controll permissions to Folder2: No
C User1 has Full Controll permissions to Folder1: Yes
User11 has Full Controll permissions to Folder2: No
User01 has Full Controll permissions to Folder2: Yes
D User1 has Full Controll permissions to Folder1: No
User11 has Full Controll permissions to Folder2: Yes
User01 has Full Controll permissions to Folder2: Yes
E User1 has Full Controll permissions to Folder1: No
User11 has Full Controll permissions to Folder2: No
User01 has Full Controll permissions to Folder2: Yes
F User1 has Full Controll permissions to Folder1: No
User11 has Full Controll permissions to Folder2: No
User01 has Full Controll permissions to Folder2: No

Correct answer: C

Explanation:

User1 is addedd to Group2 (lines 2, 4). In line 6, Group2 is added to GroupA. GroupA has full access to Folder1.

User11 is not added to a group by the script. User11's account is unaffected by the script.

User01 is added to Group1 (line 1, 3). Group1 is added to GroupB (line 8). GroupB has full access to Folder2.

Question: 616
Measured Skill: Implement identity federation and access solutions

You are the network administrator for a company named Contoso, Ltd. Contoso has a partner company named Fabrikam, Inc.

The networks of both companies contain Active Directory forests. The functional level of both forests is Windows Server 2016. Both forests have Active Directory Rights Management Services (AD RMS) and Microsoft Exchange Server 2016 installed.

The users in both forests can access AD RMS and Exchange servers.

You need to ensure that the Contoso users can access rights-protected content of the Fabrikam users. The solution must minimize changes to the AD RMS clients and must eliminate the need to exchange AD RMS private keys.

Which three steps do you perform in sequence?

(To answer, move the appropriate three actions from the list of actions to the answer area and arrange them in the correct order.)

www.cert2brain.com

ASequence: 5, 6, 3
B Sequence: 5, 6, 4
C Sequence: 2, 1, 3
D Sequence: 2, 1, 4

Correct answer: B

Explanation:

In a default AD RMS installation, use licenses are not issued to users whose rights account certificates were issued by a different AD RMS cluster. You can configure AD RMS so that it processes this type of request by importing the trusted user domain of another AD RMS installation.

The trusted user domain must be exported from one AD RMS cluster and then imported into the other. A trusted user domain is required only if the AD RMS clusters are in a different forest.

The following Technet article provide a complete step-by-step guide:

Configure AD RMS to Work Across Forests

Question: 617
Measured Skill: Install and configure Active Directory Domain Services (AD DS)

Your network contains an Active Directory domain named contoso.com. The domain contains the objects shown in the following table.



Server1 has a local user named Admin1 and a local Group Policy that sets the minimum password length to four characters.

The domain has the Group Policy objects (GPOs) shown in the following table.



What is the minimum password length for each user?

(To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.)

www.cert2brain.com

AUser1: 7 characters
User2: 7 characters
Admin1: 7 characters
B User1: 6 characters
User2: 8 characters
Admin1: 7 characters
C User1: 6 characters
User2: 8 characters
Admin1: 4 characters
D User1: 7 characters
User2: 7 characters
Admin1: 5 characters

Correct answer: D

Explanation:

The Default Domain Policy password policy applies to all domain user accounts. These settings have no affect on the local user accounts of the member computers.

Password policies that are configured in GPOs that are linked to organizational units affect the local user accounts of the computers that are contained in the respective OU and override locally configured settings.

Question: 618
Measured Skill: Implement high availability

Note: This question is part of a series of questions that present the same scenario. Each questions in the series contains a unique solution that might meet the stated goals. Some questions sets might have more than one correct solution, while others might not have a correct solution. Determine whether the solution meets the stated goals.

You have two servers that run Windows Server 2016. You plan to create a Network load Balancing (NLB) cluster that will contain both servers.

You need to configure the network cards on the servers for the planned NLB configuration.

Solution: You configure the network cards to be on the same subnet and lo have dynamic IP addresses. You configure the cluster to use multicast.

Does this meet the goal?

AYes
B No

Correct answer: B

Explanation:

The Network Load Balancing (NLB) feature distributes traffic across several servers by using the TCP/IP networking protocol. By combining two or more computers that are running applications into a single virtual cluster, NLB provides reliability and performance for web servers and other mission-critical servers.

The servers in an NLB cluster are called hosts, and each host runs a separate copy of the server applications. NLB distributes incoming client requests across the hosts in the cluster. You can configure the load that is to be handled by each host. You can also add hosts dynamically to the cluster to handle increased load. NLB can also direct all traffic to a designated single host, which is called the default host.

NLB allows all of the computers in the cluster to be addressed by the same set of IP addresses, and it maintains a set of unique, dedicated IP addresses for each host. For load-balanced applications, when a host fails or goes offline, the load is automatically redistributed among the computers that are still operating. When it is ready, the offline computer can transparently rejoin the cluster and regain its share of the workload, which allows the other computers in the cluster to handle less traffic.

To run an NLB cluster, the following are software requirements:

  • Only TCP/IP can be used on the adapter for which NLB is enabled on each host. Do not add any other protocols (for example, IPX) to this adapter.

  • The IP addresses of the servers in the cluster must be static.

NLB does not support Dynamic Host Configuration Protocol (DHCP). NLB disables DHCP on each interface that it configures.



Question: 619
Measured Skill: Implement high availability

Note: This question is part of a series of questions that present the same scenario. Each questions in the series contains a unique solution that might meet the stated goals. Some questions sets might have more than one correct solution, while others might not have a correct solution. Determine whether the solution meets the stated goals.

You have two servers that run Windows Server 2016. You plan to create a Network load Balancing (NLB) cluster that will contain both servers.

You need to configure the network cards on the servers for the planned NLB configuration.

Solution: You configure the network cards to be on the same subnet and to have static IP addresses. You configure the cluster to use unicast.

Does this meet the goal?

AYes
B No

Correct answer: A

Explanation:

The Network Load Balancing (NLB) feature distributes traffic across several servers by using the TCP/IP networking protocol. By combining two or more computers that are running applications into a single virtual cluster, NLB provides reliability and performance for web servers and other mission-critical servers.

The servers in an NLB cluster are called hosts, and each host runs a separate copy of the server applications. NLB distributes incoming client requests across the hosts in the cluster. You can configure the load that is to be handled by each host. You can also add hosts dynamically to the cluster to handle increased load. NLB can also direct all traffic to a designated single host, which is called the default host.

NLB allows all of the computers in the cluster to be addressed by the same set of IP addresses, and it maintains a set of unique, dedicated IP addresses for each host. For load-balanced applications, when a host fails or goes offline, the load is automatically redistributed among the computers that are still operating. When it is ready, the offline computer can transparently rejoin the cluster and regain its share of the workload, which allows the other computers in the cluster to handle less traffic.

To run an NLB cluster, the following are software requirements:

  • Only TCP/IP can be used on the adapter for which NLB is enabled on each host. Do not add any other protocols (for example, IPX) to this adapter.

  • The IP addresses of the servers in the cluster must be static.

NLB does not support Dynamic Host Configuration Protocol (DHCP). NLB disables DHCP on each interface that it configures.

Unicast mode
If you are using unicast mode, the servers will replace their individual MAC address with the virtual NLB MAC address. The nodes will use identical MAC addresses on the NLB network adapters. If each server has only one network card, this will result in a problem, because the nodes can´t communicate direct with other hosts on the network or with each other.

If you use unicast mode, it is required to add a second network adapter to support direct communication with each cluster node.





 
Tags: exam, examcollection, exam simulation, exam questions, questions & answers, training course, study guide, vce, braindumps, practice test
 
 

© Copyright 2014 - 2020 by cert2brain.com