1.
Your company has three offices. Each office is configured as an Active Directory site. The network consists of one Active Directory domain. All domain controllers run Windows Server 2008 R2. The company has five departments. You use a domain-level Group Policy object (GPO) to install Microsoft Office on all client computers. You need to deploy a GPO strategy to meet the following requirements:
2.
Your company has three offices. Each office is configured as an Active Directory site. The network consists of one Active directory domain. All domain controllers run Windows Server 2008. The company has five departments. You use a domain-level Group Policy object (GPO) to install Microsoft Office on all client computers. You need to deploy a GPO strategy to meet the following requirements: - Install a custom application in one of the departments. - Restrict access to removable storage devices for all users. - Implement separate Windows Internet Explorer proxy settings for each physical location. - The strategy must maintain all settings applied by the existing GPOs. What should you do?
3.
Your network consists of one Active Directory domain. The functional level of the domain is Windows Server 2008 R2. Your company has three departments named Sales, Marketing, and Engineering. All users in the domain are in an organizational unit (OU) named AllUsers. You have three custom applications. You deploy all custom applications by using a Group Policy object (GPO) named AppInstall. The Sales department purchases a new application that is only licensed for use by the Sales department. You need to recommend a solution to simplify the distribution of the new application. The solution must meet the following requirements:
4.
Your company named Contoso, Ltd. and another company named Fabrikam, Inc. establish a partnership. The Contoso network consists of one Active Directory forest named contoso.com. The Fabrikam network consists of one Active Directory forest named fabnkam.com. Users from contoso.com plan to share files with users from fabrikam.com. You need to prepare the environment so that users from contoso.com can protect confidential files from being copied or forwarded to unauthorized users. What should you do?
5.
Your network consists of one Active Directory domain. All domain controllers run Windows Server 2008 R2. You need to deploy Active Directory Certificate Services on the network to support the following requirements:
6.
Your company has one main office and four branch offices. Each branch office has a read-only domain controller (RODC). The network consists of one Active Directory domain. All domain controllers run Windows Server 2008 R2. Some branch office users work in a department named Sales. Sales department users must be able to log on to all computers in their respective branch offices, even if a wide area network (WAN) link fails. The company security policy has the following requirements:
7.
Your network contains servers that run Windows Server 2008 R2 and client computers that run Windows 7. You deploy a public key infrastructure by using Certificate Services servers that run Windows Server 2008 R2. You need to plan the implementation of smart card authentication on the network. The solution must meet the following requirements:
8.
Your network consists of one Active Directory domain that contains only domain controllers that run Windows Server 2008 R2. All domain controllers run DNS and DHCP services. All DNS zones are standard primary zones. You need to plan a solution that allows administrators to perform routine maintenance on domain controllers. The solution must meet the following requirements:
9.
Your network consists of one Active Directory domain. All servers run Windows Server 2008 R2. You plan to publish a Web site on two Web servers. You need to recommend a solution for the deployment of the two Web servers. The solution must provide the following requirements:
10.
Your company has three offices. Each office contains servers that run Windows Server 2008 R2. The servers are configured as file servers. Users regularly travel between offices and require access to corporate data stored on file servers in their home offices. You need to plan a data access policy for the users. The solution must ensure that users can access corporate data from a local server when they are traveling. What should you include in your plan?