SIMULATION
Task 6
You need to use Azure File Sync 10 replicate the contents of C:\app on SRV1 to an Azure file share named sharel1.
The required source files are located in a folder named \\dc1.contoso.com\install.
Correct : A
To use Azure File Sync to replicate the contents of C:\app on SRV1 to an Azure file share named sharel1, with the source files located in \\dc1.contoso.com\install, follow these steps:
Step 4: Install the Azure File Sync Agent Download and install the Azure File Sync agent on SRV11.
By following these steps, you should be able to replicate the contents of C:\app on SRV1 to the Azure file share sharel1 using Azure File Sync. Ensure that you have the necessary permissions to perform these actions and that SRV1 is properly configured to communicate with Azure services.
Start a Discussions
SIMULATION
Task 7
You need to collect the recommended Windows Performance Counters from SRV1 in a Log Analytics workspace.
The required tiles are stored in a shared folder named \dc\install.
Correct : A
To collect the recommended Windows Performance Counters from SRV1 in a Log Analytics workspace, you can follow these steps:
Step 1: Access the Log Analytics Workspace Log in to the Azure portal and navigate to your Log Analytics workspace.
Step 3: Add Performance Counters Select the counters you want to collect. You can add common counters quickly by checking the boxes next to them. For specific counters, enter the name of the counter in the format object(instance)\counter. For example, to collect the Processor Time counter for all instances of the Processor object, specify Processor(_Total)\% Processor Time.
Step 4: Set Sample Interval When adding a counter, you can set the sample interval, which is the frequency at which data is collected. The default is 10 seconds, but you can change this to a higher value if needed.
Step 5: Apply Configuration After adding the desired performance counters, select Apply at the top of the screen to save the configuration.
Step 6: Install and Configure the Agent Ensure that the Microsoft Monitoring Agent (MMA) is installed on SRV1. Configure the agent to report to your Log Analytics workspace by specifying the workspace ID and key during setup.
Step 7: Verify Data Collection After the agent is configured, it will start collecting the specified performance counters. You can verify the data collection in the Log Analytics workspace by running queries against the collected data.
By following these steps, you should be able to collect the recommended Windows Performance Counters from SRV1 in your Log Analytics workspace. Ensure that you have the necessary permissions and that SRV1 has network connectivity to Azure services.
Start a Discussions
SIMULATION
Task 8
You need to deploy a new primary DNS zone named fabrikam.com to DC1. The zone must be signed.
Correct : A
To deploy a new primary DNS zone named fabrikam.com to DC1 and sign the zone, you can follow these steps:
Step 1: Create the Primary DNS Zone Use the Add-DnsServerPrimaryZone PowerShell command to create the primary zone:
Add-DnsServerPrimaryZone -Name 'fabrikam.com' -ZoneFile 'fabrikam.com.dns' -DynamicUpdate Secure
This command creates a primary zone for fabrikam.com with a DNS file named fabrikam.com.dns and allows secure dynamic updates.
Step 2: Sign the Zone To sign the zone, you can use the DNS Manager or Windows PowerShell. Here's how to sign the zone using PowerShell:
Add-DnsServerSigningKey -ZoneName 'fabrikam.com' -Type KeySigningKey -CryptoAlgorithm RsaSha256
Set-DnsServerDnsSecZoneSetting -ZoneName 'fabrikam.com' -DenialOfExistence NSEC3 -NSEC3Parameters 1,0,10,''
These commands add a signing key to the zone and set DNSSEC settings with NSEC3 parameters.
Step 3: Publish the Signed Zone After signing the zone, ensure that it is published and available for DNS queries. You can verify the zone signing status using the following command:
Get-DnsServerZone -Name 'fabrikam.com'
By following these steps, you should be able to deploy and sign the new primary DNS zone fabrikam.com on DC1.
Start a Discussions
SIMULATION
Task 9
You need to ensure that all the computers in the domain use DNSSEC to resolve names in the adatum.com zone.
Correct : A
To ensure that all computers in the domain use DNSSEC to resolve names in the adatum.com zone, you'll need to configure both the DNS servers and the client computers. Here's how you can do it:
Step 1: Sign the adatum.com Zone First, you need to sign the adatum.com DNS zone. This can be done using the DNS Manager or PowerShell. Here's a PowerShell example:
Add-DnsServerSigningKey -ZoneName 'adatum.com' -CryptoAlgorithm RsaSha256
Set-DnsServerDnsSecZoneSetting -ZoneName 'adatum.com' -DenialOfExistence NSEC3 -NSEC3Parameters 1,0,10,''
This will add a signing key and configure DNSSEC for the zone with NSEC3 parameters.
Step 2: Configure DNS Servers Ensure that your DNS servers are configured to support DNSSEC. This includes setting up trust anchors for the zones that you want to validate and configuring the DNS servers to provide DNSSEC validation for DNS queries.
Step 3: Configure DNS Clients For DNSSEC validation to occur on the client side, the client computers must be configured to trust the DNS server's validation process. This typically involves configuring the client's DNS settings to point to a DNS server that supports DNSSEC.
Step 4: Validate Configuration You can validate that DNSSEC is working correctly by using tools like nslookup or dig to query DNS records and check for the presence of DNSSEC signatures in the responses.
By following these steps, you should be able to ensure that all computers in your domain use DNSSEC to resolve names in the adatum.com zone.
Start a Discussions
SIMULATION
Task 10
You use a Group Policy preference to map \\dd.contoso.com\instal1 as drive H for all users. If a user already has an existing drive mapping for H. the new drive mapping must take precedence.
Correct : A
To map\\dd.contoso.com\instal1as drive H for all users using Group Policy Preferences and ensure that the new drive mapping takes precedence over any existing mappings, follow these steps:
Step 1: Open Group Policy Management ConsoleOpen the Group Policy Management Console (GPMC) on a machine that has administrative privileges over the domain.
Step 2: Create or Edit a GPOCreate a new Group Policy Object (GPO) or edit an existing one that applies to the users who need the drive mapping.
Step 3: Navigate to Drive MappingsIn the GPO Editor, navigate to:
User Configuration -> Preferences -> Windows Settings -> Drive Maps
Step 4: New Drive MappingRight-click on Drive Maps and selectNew->Mapped Drive.
Step 5: Configure Drive MappingIn the New Drive Properties window, configure the following settings:
Action: SelectReplace. This action will overwrite any existing mappings with the same drive letter.
Location: Enter the UNC path\\dd.contoso.com\instal1.
Drive Letter: ChooseH:from the drop-down menu.
Reconnect: Check this option if you want the drive mapping to persist across logon sessions.
Label As: Optionally, provide a label for the drive mapping.
Hide/Show this drive: Set according to your preference.
Hide/Show all drives: Set according to your preference.
Step 6: Common TabGo to theCommontab and configure the following:
Run in logged-on user's security context (user policy option): Check this option.
Item-level targeting: Click onTargetingand set up any specific criteria if needed.
Step 7: Apply the GPOClickApplyand thenOKto save the drive mapping configuration.
Step 8: Link the GPOLink the GPO to an Organizational Unit (OU) or domain that contains the users who should receive the drive mapping.
Step 9: Update Group PolicyInstruct users to log off and log back on, or use thegpupdate /forcecommand to refresh Group Policy on their computers.
Start a Discussions