Your network contains an Active Directory domain that has two sites. You need to identify whether logon scripts are replicated to all domain controllers. Which folder should you verify()
Your network contains a server named Server1 that runs Windows Server 2008 R2.You need to identify which processes perform the most disk writes and disk reads per second. Which tool should you use?()
You have an Exchange Server 2010 Mailbox server.You need to identify which users have the largest mailboxes on the server.What should you do?()
You need to identify the types of inbound traffic that should pass through the perimeter firewall while maintaining the security of the network. Which inbound traffic should be allowed?()
You configure and deploy a Group Policy object (GPO) that contains AppLocker settings. You need to identify whether a specific application file is allowed to run on a computer. Which Windows PowerShell cmdlet should you use()
You need to identify a type that meets the following criteria: Is always a number. Is not greater than 65,535. Which type should you choose?()
You have a computer that runs Windows 7. Multiple users share the computer. The computer contains afolder named C:\folder1. You need to identify all of the encrypted files in C:\folder1. Which command shouldyou run?()
You have a computer that runs Windows Vista. You need to identify whether the computer can be upgradedto Windows 7. Which tool should you use?()
You need to identify the types of inbound traffic that should pass through the perimeter firewall while maintaining the security of the network. Which inbound traffic should be allowed? ()
You have a computer named Computer1 that runs Windows 7. You plan to migrate the user state on Computer1 by using User State Migration Tool (USMT) 4.0. You need to identify which user documents willbe included in the migration. What should you do?()
You are planning the consolidation of the application servers. You need to identify the appropriate disk configuration for the VMs based on the company’s planned changes. Which disk configuration should you identify?()
You need to identify the data mining algorithm that meets the requirements of the credit department. Which algorithm should you use?()
You have an Exchange Server 2010 Edge Transport server.You discover that e-mail delivery to an external SMTP host named Host1 fails.You need to identify which SMTP error codes occur when the delivery to Host1 fails. What should you do?()
You configure and deploy a Group Policy object (GPO) that contains AppLocker settings. You need to identify whether a specific application file is allowed to run on a computer. Which Windows PowerShell cmdlet should you use()
You are planning an upgrade strategy for a Windows Azure application. You need to identify changes that will require application downtime. Which change will always require downtime?()
You need to identify potential security threats. Which of the following security breaches might occur under the current IT and security practices?(Choose all that apply)()
You need to identify which operating system must be installed on the Hyper-V server in the new branch office. Which operating system should you identify?()
You have a computer that runs Windows 7. You need to identify the disk, memory, CPU, and networkresources that an application is currently using. Which tool should you use?()
You have an Exchange Server 2010 organization.You plan to enable Federated Sharing.You need to create a DNS record to store the Application Identifier (AppID) of the domain for the federated trust. Which type of record should you create?()
You need to identify the features that will be available immediately after the domain migration to the new environment is complete. Which feature or features will be available?()
A Windows Azure application connects to a SQL Azure database. Connections to the database are being dropped due to throttling. You need to recommend an approach for identifying the root cause of the problem. Which two actions should you recommend?()
An administrator named Admin1 plans to deploy the planned VMs. You need to identify which servers can be converted to VMs by using physical-to-virtual machine (P2V) conversion. Which server or servers should you identify?()
You have a computer that runs Windows 7. You need to identify which hardware is required to create a system repair disc. Which hardware should you identify?()
You have a client computer that runs Windows 7. You need to identify which unsigned drivers have beeninstalled. Which command should you run?()