Topic 2
2, Weyland Technical Solutions (WTS) Ltd.
Company Background
Weyland Technical Solutions is an IT company who provide hosted or managed services to small
to medium-sized companies in central USA
The company is located in a single site in Weyland,
Kansas.
The company currently has 1500 employees.
Existing Environment
Existing Active Directory Environment
The network consists of a single Windows Server 2008 R2 Active Directory Domain Services (AD
DS) domain named WTSltd.com. The forest functional level is Windows Server 2008.
The network contains four physical domain controllers. All domain controllers are configured as
DNS Servers.
Network Infrastructure
The network is divided into four subnets. All servers are located in a data center located in the
WTS site.
The data center includes the following servers:
Four physical Windows Server 2008 R2 DHCP Servers.
Eight physical Windows Server 2008 R2 file servers.
Six physical Windows Server 2008 R2 print servers.
Four physical Windows Server 2008 R2 domain controllers.
One physical Windows Server 2008 R2 HyperV host server.
All client computers run either Windows 7 or Windows 8.
Business Requirements
Planned Changes
Deploy new Windows Server 2012 Hyper-V host servers.
Implement a VPN solution for external workers.
Implement RADIUS authentication for the VPN connections.
Implement Network Access Protection (NAP).
Implement Active Directory Recycle Bin
Technical Requirements
Weyland Technical Solutions has the following technical requirements:
Migrate all servers to Windows Server 2012.
Virtualize existing physical servers where possible.
Deploy virtual domain controllers using virtual machine cloning.
DHCP IP address leases must be logged centrally.
Centrally manage Network Access Protection (NAP) policies.
************************************************************
You work for a company named Testking.com. Your role of Network Administrator includes the
management of the companys Windows 2012 Active Directory Domain Services (AD DS) domain.
All servers in the network run Windows Server 2012.
Users in the domain have portable laptop computers that run Windows 7. Client computers have
computer accounts spread across several organizational units (OUs).
Several group policy objects (GPOs) are applied at the domain level. A GPO named
AllClientsGPO contains settings that should be applied to the client computers.
The company opens a new Research department. All client computers in the Research
department have computer accounts in an OU named ResearchClients.
You configure a GPO named ResearchClientsGPO that has security settings for the client
computers in the Research department. You link the GPO to the Research OU.
You need to ensure that only AllClientsGPO and ResearchClientsGPO are applied to the client
computers in the Research department. No other GPOs linked at the domain level should apply to
the client computers in the Research department.
Which two of the following actions should you perform? (Choose two).
A.
Select the Block Inheritance option on the ResearchClients OU.
B.
Link ResearchClientsGPO to the domain.
C.
Disable the domain-level link for AllClientsGPO and link it to the ResearchClients OU.
D.
Enable the Enforced option on ResearchClientsGPO.
E.
Enable the Enforced option on AllClientsGPO.