NO.1 You need to recommend a solution that meets the security requirements.
Which schema attribute properties should you recommend modifying?
*Scenario: Confidential attributes must not be replicated to the Chicago office.
*Applies To: Windows Server 2008, Windows Server 2012 This topic includes procedures for adding
an attribute to the filtered attribute set (FAS) for a readonly domain controller (RODC) and marking
the attribute as confidential data. You can perform these procedures to exclude specific data from
replicating to RODCs in the forest. Because the data is not replicated to any RODCs, you can be
assured that the data will not be revealed to an attacker who manages to successfully compromise an
RODC. In most
cases, adding an attribute to the RODC FAS is completed by the developer of the application that
added the attribute to the schema.
Determine and then modify the current searchFlags value of an attribute
Verify that an attribute is added to the RODC FAS
-Determine and then modify the current searchFlags value of an attribute To add an attribute to an
RODC FAS, you must first determine the current searchFlags value of the attribute that you want to
add, and then set the following values for searchflags:
To add the attribute to the RODC FAS, set the 10th bit to 0x200.
To mark the attribute as confidential, set the 7th bit to 0x080.
Reference: Adding Attributes to the RODC Filtered Attribute Set
NO.2 Your company has a main office, ten regional datacenters and 100 branch offices. You are
designing the site topology for an Active Directory forest named contoso.com. The forest will contain
the following servers:
*In each regional datacenter and in the main office, a domain controller that runs Windows Server
*In each branch office, a file server that runs Windows Server 2012
You have a shared folder that is accessed by using the path \\contoso.com\shares\software. The
folder will be replicated to a local file server in each branch office by using Distributed File System
You need to recommend an Active Directory site design to meet the following requirements:
*Ensure that users in the branch offices will be authenticated by a domain controller in the closest
*Ensure that users automatically connect to the closest file server when they access
How many Active Directory sites should you recommend?
One site for the main office, one site for each regional office (10 in total) as users must connect to the
closest domain server which is located at the regional office level, and one site for each branch office
(100 in total as users must connect to the closest file server which are located at the branch office
level. This adds up to 111.
NO.3 You need to generate the required report
Which tool should you use?
A. Microsoft Deployment Toolkit (MDT)
B. Application Compatibility Toolkit (ACT)
C. Microsoft Desktop Optimization Pack (MDOP)
D. Microsoft Assessment and Planning Toolkit (MAP)
Scenario: Consolidation reports The company requires a report that describes the impact of
consolidation. The report must provide the following information:
An inventory of the existing physical server environment
Visual charts that show the reduction of physical servers
Reference: Microsoft Assessment and Planning (MAP) Toolkit for Hyper-V
NO.4 DRAG DROP
Your network contains an Active Directory domain named contoso.com. The domain contains a
server named Server1 that runs Windows Server 2012. Server1 resides in the perimeter network and
has the Remote Access server role installed.
Some users have laptop computers that run Windows 7 and are joined to the domain. Some users
work from home by using their home computers. The home computers run either Windows XP,
Windows Vista/ Windows 7, or Windows 8.
You need to configure the computers for remote access.
Which three actions should you perform?
To answer, move the three appropriate actions from the list of actions to the answer area and
arrange them in the correct order.
Box 1: Installing CMAK
CMAK is an optional component that is not installed by default. You must install CMAK to create
connection profiles that your users can install to access remote networks.
Box 2: The Connection Manager Administration Kit (CMAK) is a tool that you can use to customize the
remote connection experience for users on your network by creating predefined connections to
remote servers and networks. To create and customize a connection for your users, you use the
Box 3: Distributing your completed connection profile
Running the CMAK wizard produces a connection profile that is stored in an executable file. Running
that file on a client computer equips that computer with everything needed to establish the network
connection that you designed.
試験科目：Deploying Enterprise Voice with Skype for Business 2015 (beta)
試験科目：Designing and Implementing a Server Infrastructure