Microsoft 70-647 Windows Enterprise Administrator Exam Set 6

You work as an administrator at YYY.com. The YYY.com network has a single domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 R2 installed. YYY.com has its headquarters in New York and is connected to the internet. YYY.com has informed you of their plans to establish a satellite office in Dallas that must be linked to the New York office via a limited Wan link. The Dallas office will not, however, have access to the Internet. You have been given the responsibility of designing a deployment strategy for 50 Windows Server 2008 R2 computers in the Dallas office. You are informed that the deployment and the activation of the new servers should occur without human intervention. You strategy should also allow for Network traffic between the New York and Dallas offices. Which of the following actions should you take? (Choose all that apply.)


Options are :

  • You should consider employing Key Management Service (KMS) in the New York office.
  • You should consider making use of Windows Deployment Services (WDS) in the Dallas office.
  • You should consider deploying a DHCP server in the Dallas office.
  • You should consider deploying a DHCP server in the New York office.
  • You should consider making use of Windows Deployment Services (WDS) in the New York office.
  • You should consider employing Key Management Service (KMS) in the Dallas office.

Answer :You should consider making use of Windows Deployment Services (WDS) in the Dallas office. You should consider deploying a DHCP server in the Dallas office. You should consider employing Key Management Service (KMS) in the Dallas office.

You work as the network administrator at YYY.com. The YYY.com network has a domain named YYY.com. The servers on the YYY.com network are configured to run Windows Server 2008 and all client computers either Windows XP Professional or Windows Vista. A new YYY.com security policy only allows the administrators to install removable devices. You need to make sure that all users adhere to this policy. Which actions should you take?


Options are :

  • You should use the Netsh tool.
  • You should create a group policy object (GPO) that specifies the device installation restrictions.
  • You should implement the Microsoft Application Compatibility Toolkit (ACT).
  • You should use MAC addressing as the conditions for device installation.
  • You should implement a Deny Full Control access policy.

Answer :You should create a group policy object (GPO) that specifies the device installation restrictions.

70-247 Configuring and Deploying a Private Cloud Exam Set 1

You work as the Enterprise administrator at YYY.com. The YYY.com network consists of a single Active Directory domain named YYY.com. You are responsible for managing a Windows Server 2008 server named ABC-SR11. ABC-SR11 is configured to run Microsoft SQL Server 2005 and contains two RAID 1 arrays as well as a RAID 5 array. You are in the process of configuring the data storage space to enhance the performance and ensure that data is not lost or the write performance reduced should a hard disk drive on ABC-SR11 fail. How can this be ensured?


Options are :

  • You should use the RAID 1 arrays for OS files and SQL transaction logs and the RAID 5 array for SQL database files.
  • You should use the RAID 5 array for SQL transaction logs and the RAID 1 array for the storage subsystem.
  • You should configure the RAID 1 and RAID 2 arrays to host the SQL database files, the OS files and the SQL transaction logs.
  • You should use RAID 1 for the SQL database and RAID 5 for the SQL transaction logs.

Answer :You should use the RAID 1 arrays for OS files and SQL transaction logs and the RAID 5 array for SQL database files.

You work as the network administrator at YYY.com. The YYY.com network has an Active Directory domain named YYY.com. All servers on the YYY.com network, including domain controllers have Windows Server 2008 R2 installed and all workstations have Windows 7 installed. YYY.com has its headquarters in New York, and numerous satellite offices located in various countries. You have received instructions to implement Windows Server Update Services (WSUS) in YYY.com's environment. You have to make sure that your solution allows for the distribution of updates from the New York office. Furthermore, you are informed that a server failing should not prevent YYY.com's workstations from receiving updates. You start by setting up a Microsoft SQL Server 2008 failover cluster, and arranging 2 WSUS servers in a Network Load Balancing cluster. Which of the following actions should you take?


Options are :

  • You should consider having WSUS set up to make use of the remote SQL Server 2008 database instance.
  • You should consider configuring the WSUS servers to include mirrored virtual disks.
  • You should consider configuring the WSUS servers to include mirrored physical disks.
  • You should consider having WSUS set up to make use of the local database.

Answer :You should consider having WSUS set up to make use of the remote SQL Server 2008 database instance.

You work as the network administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers on the YYY.com network run Windows Server 2008 and all client computers run Windows Vista. You are responsible for managing three servers that are configured to host database applications. You want to be able to administer the servers remotely. Additionally, you need to ensure that the database developers are able to set up features without granting them too much permissions. What actions should you take?


Options are :

  • The Web developers should be granted administrative privileges on the Web server as soon as they log on.
  • The Web developers should be added to the Domain Admins group.
  • The Web developers on the Web servers should have Read & Execute privileges established.
  • The Web developers on the Web servers should have authorization rules established.

Answer :The Web developers on the Web servers should have authorization rules established.

70-247 Configuring and Deploying a Private Cloud Exam Set 1

You work as the network administrator at YYY.com. The YYY.com network has a forest named YYY.com. All domain controllers on the YYY.com network run Windows Server 2003 and Windows Server 2008. You have to implement a backup and recovery plan for the domain controllers that supports the recovery of deleted Active Directory objects up to a year ago. How should you accomplish this?


Options are :

  • You should have the tombstone lifetime increased for the forest.
  • You should have a GPO implemented with the appropriate permissions.
  • You should use of an ADMX file.
  • You should use of a RAID 1 mirror.

Answer :You should have the tombstone lifetime increased for the forest.

You work as the network administrator at YYY.com. The YYY.com network has a domain named YYY.com. The servers on the YYY.com network have Windows Server 2008 R2 installed and all workstations have Windows 7 installed. YYY.com has recently acquired 30 new servers that either have one CPU, one dual core CPU, or two quad core CPUs. All of these servers have 64-bit hardware installed. You have been instructed to install Windows Server 2008 R2 on the new servers using Windows Deployment Services (WDS). You also have to make sure that the installation makes use of as little install images as possible. Which of the following is the amount of images required to complete this task?


Options are :

  • 6
  • 1
  • 15
  • 30

Answer :1

You work as a Network Administrator at YYY.com. The network consists of a single Active Directory Domain Services (AD DS) domain named YYY.com. All servers run Windows Server 2008 R2. The functional level of the YYY.com domain is Windows Server 2008. A top level organizational unit (OU) is named Departments. The Departments OU contains three OUs named Managers, Production and Development. The Managers OU contains the user accounts for the company managers. The Production OU contains the user accounts for the Production users. The Development OU contains the user accounts for the Development team. A global security group named Helpdesk contains the user accounts of the Helpdesk team. You need to provide the Helpdesk team the ability to change passwords for all company users except for company managers using the minimum amount of administrative effort. How can you accomplish this task?


Options are :

  • By delegating the required permissions to the Helpdesk group on the Departments OU.
  • By delegating the required permissions to the Helpdesk group on the Production OU and the Development OU.
  • By delegating the required permissions to the Helpdesk group on the Departments OU and blocking Group Policy Object (GPO) inheritance on the Managers OU.
  • By delegating the required permissions to the Helpdesk group on the domain and blocking Group Policy Object (GPO) inheritance on the Managers OU.

Answer :By delegating the required permissions to the Helpdesk group on the Production OU and the Development OU.

70-513 WCF Development with Microsoft .NET Framework 4 Exam Set 3

You work as the network administrator at YYY.com. The YYY.com network has a domain named YYY.com. The servers on the YYY.com network are configured to run Windows Server 2008 and the client computers Windows XP Service Pack 1. You are preparing to install Distributed File System (DFS) into the YYY.com network. You need to make allowance for failover if a server should go offline as well as keeping the cost as low as possible. You thus create a domain-based DFS namespace as well as an additional namespace server. Thereafter you allow the client fail back to the preferred target option. What actions should you take next? (Select two. Each correct answer will present a part of the answer)


Options are :

  • You should use DFS replication on a stand-alone DFS namespace.
  • You should upgrade the client computers to Windows XP Service Pack 2.
  • You should install a Windows Server 2008 Datacenter Edition server.
  • You should use folder redirection on a domain-based DFS namespace

Answer :You should upgrade the client computers to Windows XP Service Pack 2.

You work as the network administrator at YYY.com. The YYY.com network has a forest with four domains. The functional level of the forest is set at Windows Server 2008. The YYY.com domain controllers also function as DNS servers. YYY.com wants the Windows Internet Name Service (WINS) service to be removed from the network. Thus only DNS will be used for name resolution of IPv4 and IPv6 systems in all domains. What should you take to implement a name resolution strategy that reduces traffic of NetBIOS over TCP/IP (NetBT)?


Options are :

  • You should set up an Active Directory Integrated stub zone on the global catalog servers.
  • You should configure Remote Server Administration Tools (RSAT) on the DNS servers in the forest.
  • You should deploy a DHCP server in to the network.
  • You should create a GlobalNames zone on the global catalog servers.

Answer :You should create a GlobalNames zone on the global catalog servers.

You work as the network administrator at YYY.com. The YYY.com network has a domain named YYY.com. The servers on the YYY.com network run Windows Server 2008 and all client computers either run Windows Vista or Windows XP Professional. A new YYY.com security policy stipulates that no USB devices should be installed on the Vista Computers. Only administrators and senior helpdesk staff members are exempted from this security policy. Which actions should you take to make allowance for this exemption?


Options are :

  • You should add a Group Policy object (GPO) on the client computers.
  • You should add folder redirection on the client computers.
  • You should add Internet Protocol security (IPsec) on the domain controllers.
  • You should add Key Management Service (KMS) on the client computers.

Answer :You should add a Group Policy object (GPO) on the client computers.

Microsoft Windows Server 2016 Certification: Exam 70-741 Set 6

You work as the network administrator at YYY.com. The YYY.com network consists of a domain named YYY.com. The YYY.com network servers run Windows Server 2008 and the client computers run Microsoft Windows Vista. You are in the process of installing a distributed application that uses several servers. You decide to implement a storage solution that use the network infrastructure and assign hard disk space as the need arise. You also want to have the data accessible in the event of a hard disk failure. What should you add to your plan?


Options are :

  • You should add the Microsoft System Center Configuration Manager (SCCM).
  • You should enable the Network Device Enrollment Service (NDES).
  • You should establish a storage subsystem as a RAID 5 array.
  • You should establish an iSCSI disk storage subsystem that will permit Virtual Disk Service (VDS). .

Answer :You should establish a storage subsystem as a RAID 5 array. You should establish an iSCSI disk storage subsystem that will permit Virtual Disk Service (VDS). .

You work as a Network Administrator at YYY.com. The network consists of a single Active Directory Domain Services (AD DS) domain. You are configuring a virtual environment for the company. You have an iSCSI storage disk array that will be used to store virtual machines (VMs). You install a server named ABC-Host1 that runs a Server Core Installation of Windows Server 2008 R2. You need to configure ABC-Host1 to store to VMs on the iSCSI disk array. Which two of the following tools could you use?


Options are :

  • You could use Disk Management
  • You could use iSCSICLI.exe.
  • You could use Diskpart.exe.
  • You could use iSCSICPL.exe.

Answer :You could use iSCSICLI.exe. You could use iSCSICPL.exe.

You work as the network administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers on the YYY.com network, including domain controllers, have Windows Server 2008 R2 installed and all workstations have Windows 7 installed. You have been instructed to design a strategy that allows Certificate Services to issue YYY.com's intranet users certificates automatically. The strategy should also allow resources that employ certificate based authentication to be available to YYY.com's Internet users. Furthermore, you have to make sure that the certificate infrastructure of YYY.com's network has optimum protection. You decide to have an offline standalone root certification authority (CA) and an online enterprise subordinate CA deployed. You have to make sure that your task is completed successfully. Which of the following actions should you take?


Options are :

  • You should consider having an online standalone subordinate CA deployed.
  • You should consider having an offline standalone subordinate CA deployed.
  • You should consider having an online enterprise subordinate CA deployed.
  • You should consider having an offline enterprise subordinate CA deployed.

Answer :You should consider having an online standalone subordinate CA deployed.

70-662 Microsoft Exchange Server 2010 Configuring Exam Set 4

You work as the Enterprise administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers on the YYY.com network run Windows Server 2008 and all client computers run Windows Vista. The YYY.com network has of a Finance division. You create an OU named FinancialData1 that contains the user and computer accounts of the Finance Division. You want to install a new in-house Finance application on the client computer in the Finance division. Other YYY.com users must not have access to the application. What actions should you take?


Options are :

  • You should implement the Background Intelligent Transfer Service (BITS) settings.
  • You should implement a DFS Namespace.
  • You should implement the Key Management Service (KMS) on all computers in FinancialData1.
  • You should implement a Group Policy object (GPO) for FinancialData1.

Answer :You should implement a Group Policy object (GPO) for FinancialData1.

You work as the Enterprise administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 R2 installed and all workstations have Windows 7 Enterprise installed. When YYY.com informs you that they are opening a few new branch offices, they request that 800 workstations containing network cards that support Pre-boot Execution Environment (PXE) be installed in these offices. Furthermore, they inform you that the workstations must have Windows 7 Enterprise installed. You have to devise a deployment solution that will allow you to install Windows 7 Enterprise on 100 workstations at the same time, with little effect to the YYY.com network. Your solution should also allow for the installation of Windows 7 Enterprise to be as fast as possible. Which combination of the following should form part of your solution? (Choose all that apply.)


Options are :

  • The deployment of the Transport Server feature.
  • The deployment of the Terminal Server feature.
  • A Windows Deployment Services (WDS) server role deployment.
  • The use of a static multicast address range for the Transport Server.
  • The deployment of the Desktop Experience feature.
  • A Key Management Service (KMS) server role deployment.

Answer :The deployment of the Transport Server feature. A Windows Deployment Services (WDS) server role deployment. The use of a static multicast address range for the Transport Server.

You work as the Enterprise administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers on the YYY.com network have Windows Server 2008 R2 installed and all workstations have Windows 7 Enterprise installed. A router that meets the RFC 1542 standard is used to link two subnets that make up YYY.com's network. You have been instructed to deploy 5 new Windows Server 2008 R2 servers, which are configured to support PreBoot Execution Environment (PXE), via Windows Deployment Services (WDS). You have also been instructed to make sure that the method you use allows for WDS to be installed on the minimum required servers, and for the Windows Server 2008 R2 servers to be deployed on both subnets using WDS. You start by deploying a single server configured to run WDS and DHCP. Which of the following actions should you take to successfully complete your task?


Options are :

  • You should consider having the Hyper-V feature deployed.
  • You should consider having group policy filtering enabled.
  • You should consider having the Key Management Service (KMS) server role deployed.
  • You should consider having the IP Helper tables configured on the router.

Answer :You should consider having the IP Helper tables configured on the router.

Microsoft 70-243 Administering Deploying System Manager Exam Set 1

You work as the network administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers are configured to run Windows Server 2008 and the client computers Windows Vista. YYY.com users store their files in the My Documents folder on their client computers. You want to implement a backup strategy that allows you to backup the files in the users' My Documents folders with the least amount of administration. Which option should you use in your backup strategy? (Choose all that apply.)


Options are :

  • You should add the Windows Recover Disk feature to allow you to backup information with the least amount of effort.
  • You should apply folder redirection using a Group Policy objects (GPO).
  • You should add the Windows Automated Installation Kit (WAIK) to allow you to backup information with the least amount of effort.
  • You should then have the folder redirection target backed up.
  • You should then add Folder redirection to allow you to backup information with the least amount of effort.

Answer :You should add the Windows Automated Installation Kit (WAIK) to allow you to backup information with the least amount of effort. You should then have the folder redirection target backed up.

You work as the Enterprise administrator at YYY.com. The YYY.com network has a domain named YYY.com. The servers on the YYY.com network are configured to run Windows Server 2008 and the client computers run Windows Vista. YYY.com has its headquarters in Paris and branch offices in London and Stockholm. You are in the process of devising a file sharing policy to ensure standardization throughout the network. Your policy needs to ensure that the YYY.com offices are able to access the files using the universal Naming Convention (UNC) path. In the event of a server failure files should still be accessible and the minimum bandwidth needs to be utilized. You need to determine the components that need to be added to your policy?


Options are :

  • You should use failover clusters with three servers, one for each office.
  • You should add a DFS namespace that is server-based and uses replication.
  • You should add a DFS namespace that is domain-based and uses replication.
  • You should add the Hyper-V feature to your policy.

Answer :You should add a DFS namespace that is domain-based and uses replication.

You work as an administrator at YYY.com. The YYY.com network has 3 Active Directory forests that have forest trust relationships configured between them. All servers on the YYY.com network, including domain controllers, have Windows Server 2008 R2 installed. Each YYY.com forest and its Group Policy objects (GPOs) are administered by a different administrator. You are preparing to create standard GPOs for each forest. You are then informed that user configuration and computer configuration settings should be included in separate standard GPOs, without creating excessive GPOs. You, therefore, create a GPO that is configured to make use of the required user configurations, as well as a GPO that is configured to make use of the required computer configurations. Which of the following actions should you take NEXT?


Options are :

  • You should consider having the new GPOs exported to .exe files
  • You should consider having the new GPOs exported to .cab files.
  • You should consider having the new GPOs exported to .config files
  • You should consider having the new GPOs exported to .inf files

Answer :You should consider having the new GPOs exported to .cab files.

Microsoft 70-243 Administering Deploying System Manager Exam Set 1

You work as the network administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers on the YYY.com network run Windows Server 2008. Half the client computers run Windows XP Professional Service Pack 2, and the rest run Windows Vista. You need to make sure that network traffic is reduced when employees log on and off and that their EFS certificates are available from any work station. It is imperative that the EFS certificates are accessible when a disk gets corrupted. How can you deploy Encrypting File System (EFS) to meet all the goals?


Options are :

  • You should use Smart cards.
  • You should use Roaming user profiles.
  • You should use Credential roaming.
  • You should use an internal certificate authority.
  • You should use universal caching.

Answer :You should use Credential roaming.

You work as the Enterprise administrator at YYY.com. The YYY.com network has a domain named YYY.com. Due to company growth, YYY.com is planning to open a few branch offices and install 800 Windows Vista Enterprise Edition computers with network cards that support Pre-boot Execution Environment (PXE), to these offices. You have to devise a deployment strategy that will allow you to install 100 computers at the same time with little effect to the YYY.com network. You decide to install the Windows Deployment Services (WDS) server role and use a static multicast address range. Which other server should you add to your strategy in order to use the static multicast address range?


Options are :

  • You should add a Transport Server to your strategy plan.
  • You should add a Terminal Server to your strategy plan.
  • You should add a Unified Messaging Server to your strategy plan.
  • You should add a Client Access Server to your strategy plan.

Answer :You should add a Transport Server to your strategy plan.

You work as the Enterprise administrator at YYY.com. The YYY.com network consists of a single Active Directory domain named YYY.com. The YYY.com network servers run Windows Server 2008 and the client computers run Windows Vista. YYY.com has acquired a distributed application that requires that the storage traffic is separate from the network and that sufficient storage space is available. It is imperative that the stored information is readily available even in the event of disk or controller failure. You decide to make use of a Fibre Channel (FC) disk storage subsystem that will support Microsoft Multipath I/O. Which of the following options should you add to your plan?


Options are :

  • You should set up the storage subsystem as a RAID 10 array.
  • You should use a stand-alone DFS namespace.
  • You should use a two node failover cluster.
  • You should set up the storage subsystem as a RAID 5 array.

Answer :You should set up the storage subsystem as a RAID 5 array.

70-662 Microsoft Exchange Server 2010 Configuring Exam Set 4

You work as the network administrator at YYY.com. The YYY.com network has a domain named YYY.com. The functional level of the domain is set at Windows Server 2008. YYY.com consists of a Marketing department that utilizes a folder named KINGDATA. KINGDATA is configured to hold data files. You want to use Group Policy to establish roaming user profiles for users in the Marketing department. To ensure productivity you need to make sure that least amount of time is used by users who utilize the roaming profiles when logging on or off. How can this be achieved?


Options are :

  • The Group Policy object (GPO) should be changed to contain the Shared Folders permissions.
  • The Group Policy object (GPO) should be changed to contain folder redirection
  • The Remote Server Administration Tools (RSAT) should be installed on computers in the marketing department.
  • The client computers of the marketing department should have Credential Roaming configured.

Answer :The Group Policy object (GPO) should be changed to contain folder redirection

You work as the network administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers on the YYY.com network run Windows Server 2008. All the client computers run Windows Vista. Due to your increased workload you are assigned three assistants that will help you create and manage Group Policy Objects (GPOs) at the domain level. You have a provide the assistants with a GPO with set permissions to allow the assistants to generate new GPOs. How should you configure the GPO? (Choose TWO. Each answer forms part of the solution.)


Options are :

  • You should create a new Starter GPO.
  • You should add the technicians to the Domain Administrators group.
  • You should create a custom network profile for the technicians.
  • You should grant the technician administrative permissions.
  • You should add the technicians to the Group Policy Creator Owners group.

Answer :You should create a new Starter GPO. You should add the technicians to the Group Policy Creator Owners group.

You work as the Enterprise administrator at YYY.com. The YYY.com network has forest with two domains named us.YYY.com and uk.YYY.com. The functional level of the forest is set at Windows Server 2008. A new YYY.com security policy requires that the local guest accounts and administrator accounts should be renamed. You have to ensure that the local guest accounts are disabled after it has been renamed. How can this be achieved?


Options are :

  • By using a ServerManagerCMD tool for the root main.
  • By using a custom network profile.
  • By using a Group Policy object (GPO) for every domain.
  • By using a folder redirection on all the root domain controllers.

Answer :By using a Group Policy object (GPO) for every domain.

Microsoft 98-367 & 98-368 Certification Practical Exam Set 1

You work as the Enterprise administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers on the YYY.com network run Windows Server 2008. You are responsible for managing two servers named ABC-SR10 and ABC-SR11 as well as two printers that are the same. Management wants you to make sure that the print queues can be managed centrally and that printing services is available in the event of a printer failure. How can this be accomplished? (Choose THREE. Each answer forms part of the solution.)


Options are :

  • By installing a printer on ABC-SR10 to install and share a printer and enable printer pooling.
  • By installing a Microsoft Multipath I/O.
  • By sharing a printer on ABC-SR10.
  • By setting the printer on ABC-SR11 as the primary printing device.
  • By enabling printer pooling.

Answer :By installing a printer on ABC-SR10 to install and share a printer and enable printer pooling. By sharing a printer on ABC-SR10. By enabling printer pooling.

You work as the Enterprise administrator at YYY.com. The YYY.com network consists of a domain named YYY.com. The network servers run Windows Server 2008 and the client computers are running Windows Vista. The YYY.com network does not have Internet connectivity. YYY.com contains a file server named ABC-SR18 that hosts shared folders which the users use to save their files that needs to be shared. You receive an instruction to ensure that productivity continues by permitting the users access to the files in the shared folders on ABC-SR18 even if ABC-SR18 is not connected to the network. How should you configure ABC-SR18?


Options are :

  • You should set up folder redirection on ABC-SR18.
  • You should set up a Group Policy for remote users on ABC-SR18.
  • You should set up caching on the shared folder in ABC-SR18.
  • You should set up offline files to use encryption

Answer :You should set up caching on the shared folder in ABC-SR18.

You work as the network administrator at YYY.com. The YYY.com network has a domain named YYY.com. The YYY.com network servers run Windows Server 2008 and the client computers run Microsoft Windows Vista. A new YYY.com security policy requires that a legal notice pops up as soon as an employee connects to the YYY.com domain. Due to your increased workload you need to implement this policy. You thus decide to create and link a new Group Policy Object (GPO) in the domain. Identify your subsequent step which can be performed with minimal administration?


Options are :

  • You should enable the group policy filtering.
  • You should enable folder redirection on all computers located in the network.
  • You should enable the Key Management Service (KMS).
  • You should enforce the new GPO.

Answer :You should enforce the new GPO.

70-642 Windows Server 2008 Network Infrastructure Exam Set 3

You work as the network administrator at YYY.com. The YYY.com network has a domain named YYY.com. All servers on the YYY.com network, including domain controllers, have Windows Server 2008 R2 installed and all workstations have Windows 7 installed. YYY.com has recently employed part-time staff and issued them with user accounts, as well as workstations that are not members of the YYY.com domain. Either a wireless or wired link will be used by the part-time staff to access the YYY.com network. However, the part-time staff requires the most recent OS updates to access the network. You have to make sure that YYY.com's network security is suitably configured to allow this. Which of the following actions should you take?


Options are :

  • You should consider making use of the Remote Desktop Connection Broker role service.
  • You should consider making use of Active Directory Rights Management Services (AD RMS).
  • You should consider making use of Background Intelligent Transfer Service (BITS).
  • You should consider making use of Network Access Protection (NAP).

Answer :You should consider making use of Network Access Protection (NAP).

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions