You have a failover cluster named Cluster1 that contains three nodes.
You plan to add two file server cluster roles named File1 and File2 to Cluster1. File1 will use the File Server for general use role. File2 will use the Scale-Out File Server for application data role.
What is the maximum number of nodes for File1 and File2 that can concurrently serve client connections? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.

Your network contains two Active Directory Domain Services (AD DS) forests named contoso.com and fabtikam.com. Contoso.com includes the groups shown in the following table.

You need to migrate the groups to fabrikam.com by using ADMT.
Which groups can be migrated and which groups can have the sIDHistory attribute populated after the migration?

You have multiple servers that run Windows Server.
You plan to use System Insights to collect information about your environment and systems.
How many default System Insights capabilities can you use for capacity forecasting?
You have an on-premises Active Directory Domain Services (AD DS) domain that syncs with an Azure Active Directory (Azure AD) tenant.
The AD DS domain contains a domain controller named DC1. DC1 does NOT have internet access.
You need to configure password security for on-premises users. The solution must meet the following requirements:
Prevent the users from using known weak passwords.
Prevent the users from using the company name in passwords.
What should you do? To answer, drag the appropriate configurations to the correct targets. Each configuration may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
NOTE: Each correct selection is worth one point.

You have two Azure virtual networks named Vnet1 and Vnet2.
You have a Windows 10 device named Client1 that connects to Vnet1 by using a Point-to-Site (P2S) IKEv2 VPN.
You implement virtual network peering between Vnet1 and Vnet2. Vnet1 allows gateway transit Vnet2 can use the remote gateway.
You discover that Client1 cannot communicate with Vnet2.
You need to ensure that Client1 can communicate with Vnet2.
Solution: You enable BGP on the gateway of Vnet1.
Does this meet the goal?
Your network contains an Active Directory Domain Services (AD DS) domain named contoso.com. Contoso.com contains a member server named Server1 .contoso.com.
You cannot resolve the FQDN of server1.contoso.com.
You verify that Windows Defender Firewall is configured correctly and that you can ping server1.contoso.com successfully by using the server ' s IP address.
You need to validate that the DNS record for server1.contoso.com exists.
Which command should you run?
You have an Azure virtual machine named VM1. Crash dumps for a process named Process1 are enabled for VM1.
When process1.exe on VM1 crashes, a technician must access the memory dump files on the virtual machine. The technician must be prevented from accessing the virtual machine.
To what should you provide the technician access?
You have a server that runs Windows Server.
You plan to back up the server to an Azure Recovery Services vault once per week starting on the next Saturday.
You need to schedule the weekly backup and perform the initial backup as soon as possible.
In which order should you perform the actions? To answer, move all actions from the list of actions to the answer are and arrange them in the correct order.

You have a server named Server1 that runs Windows Server. You install System Insights on Server 1.
You need to modify the schedule for storage consumption forecasting. What should you use?
Your network contains an Active Directory Domain Services (AD DS) domain that contains the servers shown in the following table.

Server1 and Server2 are authorized as DHCP servers in the domain. You need to migrate the DHCP Server role from Server1 to Server2. Which five actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

You have two on-premises Hyper-V hosts named Server1and Served Server 1 hosts a virtual machine named VM1 that uses a static IP address. VM1 replicates to Server2 by using Hyper-V Replica.
You plan to perform a failover test for VM1.
You need to configure the Failover TCP/IP settings and the virtual switch for the failover.
Where should you configure the Failover TCP/IP settings, and where should you configure the virtual switch? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.

You deploy Azure Migrate to an on-premises network.
You have an on-premises physical server named Server1 that runs Windows Server and has the following configuration.
Operating system disk 600 GB
Data disic 3 TB
NIC Teaming: Enabled
Mobility service: installed
Windows Firewall: Enabled
Microsoft Defender Antivirus: Enabled
You need to ensure that you can use Azure Migrate to migrate Server1.
Solution: You disable Windows Firewall on Server1.
Does this meet the goal?
You have two servers named Server1 and Server2 that run Windows Server and have the Hyper-V role installed. You plan to deploy Hyper-V Replica between Server1 and Server2. The deployment will use certificate-based authentication. You need to configure the prerequisites for the Hyper-V Replica deployment.
Which two actions should you perform on each server? Each correct answer presents part of the solution. NOTE: Each correct answer is worth one point.
You have a failover cluster named Cluster1 that hosts an application named App1.
The General tab in App1 Properties is shown in the General exhibit (Click the General Tat)
The failover tab in App1 Properties is shown in the failover exhibit (Click the Failover tab.)
Server 1 shuts down unexpectedly.
You need to ensure that when you start Server 1. App1 continues to run on Server2
Solution: From the General settings, you increase the priority of Server2 in the Preferred Owners list.
Does this meet the goal?
You have an Azure subscription that contains an Azure key vault named Vault 1.
You deploy Azure Disk Encryption.
You configure Vault to support Azure Disk Encryption.
You need to ensure that you can encrypt Azure Disk Encryption artifacts before they are written to Vault 1. The solution must provide the highest level of encryption.
How should you complete the command? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.

Your network contains an Active Director/ Domain Services {AD DS) domain named contoso.com. The domain contains two sites named Site1 and Site2 and servers that run Windows Server and are configured as shown in the following table.

The domain contains a group named Group1 that contains Server3.
RODC1 has the Password Replication Policy shown in the following exhibit.


You deploy Azure Migrate to an on-premises network.
You have an on-premises physical server named Server1 that runs Windows Server and has the following configuration.
* Operating system disk 600 GB
* Data disic 3 TB
* NIC Teaming: Enabled
* Mobility service: installed
* Windows Firewall: Enabled
* Microsoft Defender Antivirus: Enabled
You need to ensure that you can use Azure Migrate to migrate Server1.
Solution: You disable NIC Teaming on Server1.
Does this meet the goal?
You have an Azure subscription. The subscription contains a virtual machine named VM1 that runs Windows Server. You enable Microsoft Defender for Servers Plan 2. You need to implement File Integrity Monitoring (FIM). What should you create first?
You have an Azure virtual machine named VM1 that runs Windows Server.
You plan to deploy a new line-of-business (LOB) application to VM1.
You need to ensure that the application can create child processes.
What should you configure on VM1?
Your network contains an Active Directory Domain Services (AD DS) domain. The domain contains three servers named Server1, Server2, and Server3 that run Windows Server. All the servers are on the same network and have network connectivity.
On Server1, Windows Defender Firewall has a connection security rule that has the following settings:
• Rule Type: Server-to-server
• Endpoint 1: Any IP address
• Endpoint 2: Any IP address
• Requirements: Require authentication for inbound connections and request authentication for outbound connections
• Authentication Method: Computer (Kerberos V5)
• Profile: Domain, Private, Public
• Name: Rule1
For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.

You have an Azure subscription that contains an Azure key vault named Vault1.
You plan to deploy a virtual machine named VM1 that will run Windows Server.
You need to enable encryption at host for VM1. The solution must use customer-managed keys.
Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

Your network contains an Active Directory Domain Services (AD DS) domain. The functional level of the domain is Windows Server 2012 R2.
You need to create and link an authentication policy silo.
What should you do first?
You have an on premises Hyper-V host named Server 1. Server! contains a virtual machine named VM1. You have a non-domain joined Hyper-V server named Server2 that is hosted in a remote location. You plan to replicate VM1 to Server2 by using Hyper-V Replica. You need to configure replication on Server1. Which authentication method can you use?
Your network contains an Active Directory Domain Services (AD DS) domain. The domain contains the servers shown in the following table.

The Failover Clustering tools are NOT installed on the servers.
You plan to enable Cluster-Aware Updating (CAU).
On which servers should you install the Failover Clustering tools to implement CAU in self-updating mode, and on which servers should you install the Failover Clustering tools to implement remote-updating mode? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.

You have an Azure subscription. The subscription contains a virtual machine named VM1 that runs Windows Server. The subscription contains the storage accounts shown in the following table.

You plan to enable boot diagnostics for VM1.
You need to configure storage for the boot diagnostics logs and snapshots.
Which storage account should you use?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a server named Server1 that runs Windows Server.
You need to ensure that only specific applications can modify the data in protected folders on Server1.
Solution: From Virus & threat protection, you configure Controlled folder access.
Does this meet the goal?
The servers run Windows Server and have the network configurations shown in the following table.


Server3 is configured as a NAT gateway. All the servers allow ICMP requests.
Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
NOTE: Each correct selection is worth one point.

You need to meet the technical requirements for Cluster2.
Which four actions should you perform in sequence before you can enable replication? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

What is the effective minimum password length for User1 and Admin1? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.

You need to meet the technical requirements for User1.
To which group in contoso.com should you add User1?
You need to meet technical requirements for Share1.
What should you use?
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.

Which domain controller should be online to meet the technical requirements for DC4?
You need to back up Server 4 to meet the technical requirements.
What should you do first?
You need to configure BitLocker on Server4.
On which volumes can you turn on BitLocker, and on which volumes can you turn on auto-unlock? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.

With which servers can Server1 and Server3 communicate? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.

You need to meet the technical requirements for Cluster3.
What should you include in the solution?
You are evaluating the technical requirements tor Cluster2.
What is the minimum number of Azure Site Recovery Providers that you should install?
You need to implement alerts for the domain controllers. The solution must meet the technical requirements.
What should you do on the domain controllers, and what should you create on Azure? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.

You are planning the data share migration to support the on-premises migration plan.
What should you use to perform the migration?
You are planning the website migration to support the Azure migration plan.
How should you configure WebApp1? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.

You are planning the europe.fabrikam.com migration to support the on-premises migration plan-Where should you install the Password Export Server (PES) service, where should you generate the encryption key? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.

You need to implement a security policy solution to authorize the applications. The solution must meet the security requirements.
Which service should you use to enforce the security policy, and what should you use to manage the policy settings? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.

You are planning the implementation of Cluster2 to support the on-premises migration plan.
You need to ensure that the disks on Cluster2 meet the security requirements.
In which order should you perform the actions? To answer, move all actions from the list of actions to the answer area and arrange them in the correct order.

You are planning the DHCP1 migration to support the DHCP migration plan.
Which two PowerShell cmdlets should you run on DHCP1, and which two PowerShell cmdlets should you run on DHCP2? To answer, drag the appropriate cmdlets to the correct servers. Each cmdlet may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
NOTE: Each correct selection is worth one point.

You are planning the migration of APP3 and APP4 to support the Azure migration plan.
What should you do on Cluster1 and in Azure before you perform the migration? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.

You are planning the migration of Archive1 to support the on-premises migration plan.
What is the minimum number of IP addresses required for the node and cluster roles on Cluster3?
You are planning the deployment of Microsoft Sentinel.
Which type of Microsoft Sentinel data connector should you use to meet the security requirements?
You are remediating the firewall security risks to meet the security requirements.
What should you configure to reduce the risks?