Your company has a main office and a branch office. The network contains an Active Directory domain named contoso.com. The domain contains three domain controllers. The domain controllers are configured as shown in the following table. The domain contains two global groups. The groups are configured as shown in the following table. You need to ensure that the RODC is configured to meet the following requirements:
- Cache passwords for all of the members of Branch1Users.
- Prevent the caching of passwords for the members of Helpdesk.
What should you do?
Your company has a main office and a branch office. The network contains an Active Directory domain named contoso.com. The domain contains three domain controllers. The domain controllers are configured as shown in the following table. The domain contains two global groups. The groups are configured as shown in the following table. You need to ensure that the RODC is configured to meet the following requirements:
- Cache passwords for all of the members of Branch1Users.
- Prevent the caching of passwords for the members of Helpdesk.
What should you do?
You need to move the DHCP database. Assuming a standard Windows directory and Program Files path structure and that you've changed the path in the DHCP Manager, what's the default path where the DHCP database is found?
While implementing split scope, you notice that the secondary server is responding to numerous DHCP requests first. What's the best way to handle this situation?
You need to grant access for viewing audit information within IPAM. To which group should you add a user to, to grant that user the minimum level of permission for this task?
When provisioning IPAM servers using GPOs, servers are discovered. After configuring them to be managed in IPAM, what command do you need to run on the server to be managed?
Your network contains an Active Directory domain named contoso.com. The domain contains an organizational unit (OU) named OU1. You have a Group Policy object (GPO) named GP01 that is linked to contoso.com. GPO1 contains custom security settings. You need to design a Group Policy strategy to meet the following requirements:
- The security settings in GPO1 must be applied to all client computers.
- Only GPO1 and other GPOs that are linked to OU1 must be applied to the client computers in OU1.
What should you include in the design? More than one answer choice may achieve the goal. Select the BEST answer.
A new company registers the domain name of contoso.com. The company has a web presence on the Internet. All Internet resources have names that use a DNS suffix of contoso.com. A third- party hosts the Internet resources and is responsible for managing the contoso.com DNS zone on the Internet. The zone contains several hundred records. The company plans to deploy an Active Directory forest. You need to recommend an Active Directory forest infrastructure to meet the following requirements:
- Ensure that users on the internal network can resolve the names of the company's Internet resources.
- Minimize the amount of administrative effort associated with the addition of new Internet servers.
What should you recommend?