Server 2012 R2

¡Supera tus tareas y exámenes ahora con Quizwiz!

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. You need to ensure that the local Administrator account on all computers is renamed to L_Admin. Which Group Policy settings should you modify? A. Security Options B. User Rights Assignment C. Restricted Groups D. Preferences

Correct Answer: A Explanation: A. Allows configuration of computers B. User Rights Assignment policies determines which users or groups have logon rights or privileges on thecomputer C. Restricted Groups defines what member or groups should exist as part of a group D. With Preferences, local and domain accounts can be added to a local group without affecting the existingmembers of the group In Group Policy Object Editor, click Computer Configuration, click Windows Settings, click Security Settings,click Local Policies, and then click Security Options. In the details pane, double-click Accounts: Rename administrator account. In Group Policy Object Editor, click Computer Configuration, click Windows Settings, click Security Settings, click Local Policies, and then click Security Options. In the details pane, double-click Accounts: Rename administrator account.

You have a server named Core1 that has a Server Core Installation of Windows Server 2012 R2. Core1 has the Hyper-V server role installed Core1 has two network adapters from different third-party hardware vendors. You need to configure network traffic failover to prevent connectivity loss if a network adapter fails. What should you use? A. New-NetSwitchTeam B. Add-NetSwitchTeamMember C. Install-Feature D. netsh.exe

Correct Answer: A Explanation: A. Creates a new switch team B. Adds a network adapter member to an existing switch team C. Not a valid cmdlet D. Network shell (netsh) is a command-line utility that allows you to configure and display the status of various network communications server role Detailed Description: The New-NetSwitchTeam cmdlet creates a new switch team. A switch team must have a name for the team and must be

You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers in the ABC.com domain, including domain controllers, have Windows Server 2012 R2 installed. ABC.com's user accounts are located in an organizational unit (OU), named ABCStaff. ABC.com's managersbelong to a group, named ABCManagers. You have been instructed to create a new Group Policy object (GPO) that should be linked to the ABCStaffOU, but not affect ABC.com's managers. Which of the following actions should you take? A. You should consider removing the user accounts of the managers from the ABCStaff OU. B. You should consider configuring the new GPO's WMI filter. C. You should consider adding the user accounts of ABC.com's managers to the Admins group. D. You should consider adding the user accounts of ABC.com's managers to the localAdministrators group.

Correct Answer: A

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server 2012. You create a group Manged Service Account named gservice1. You need to configure a service named Service1 to run as the gservice1 account. How should you configure Service1? A. From a command prompt, run sc.exe and specify the config parameter. B. From Windows PowerShell,run Set-Service and specify the -PassThrough parameter C. From Windows PowerShell,run Set-Service and specify the -StartupType parameter D. From Services Console configure the General settings

Correct Answer: A

Your network contains multiple subnets. On one of the subnets, you deploy a server named Server1 that runs Windows Server 2012 R2. You install the DNS Server server role on Server1, and then you create a standard primary zone named contoso.com. You need to ensure that client computers can resolve single-label names to IP addresses. What should you do first? A. Create a reverse lookup zone. B. Convert the contoso.com zone to an Active Directory-integrated zone. C. Configure dynamic updates for contoso.com. D. Create a GlobalNames zone.

Correct Answer: A

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has 2 dual-core processors and 16 GB of RAM. You install the Hyper-V server role in Server1. You plan to create two virtual machines on Server1. You need to ensure that both virtual machines can use up to 8 GB of memory. The solution must ensure that both virtual machines can be started simultaneously. What should you configure on each virtual machine? A. Dynamic Memory B. NUMA topology C. Memory weight D. Ressource Control

Correct Answer: A Correct Answer: A Explanation: A. Dynamic Memory adjusts the amount of memory available to a virtual machine, based on changes in memory demand and values that you specify B. Used for high performance apps like SQL C. Provides Hyper-V with a way to determine how to distribute memory among virtual machines if there is not enough physical memory available in the computer to give every virtual machine its requested amount of memory. D. Resource controls provide you with several ways to control the way that Hyper-V allocates resources to virtual machine.

Your network contains an Active Directory domain named contoso.com. The network contains 500 client computers that run Windows 8. All of the client computers connect to the Internet by using a web proxy. You deploy a server named Server1 that runs Windows Server 2012 R2. Server1 has the DNS Server server role installed. You configure all of the client computers to use Server1 as their primary DNS server. You need to prevent Server1 from attempting to resolve Internet host names for the client computers. What should you do on Server1? A. Create a primary zone named ".". B. Configure the Security settings of the contoso.com zone. C. Create a zone delegation for GlobalNames.contoso.com. D. Create a stub zone named "root".

Correct Answer: A Correct Answer: A Explanation: When you install DNS on a Windows server that does not have a connection to the Internet, the zone for the domain is created and a root zone, also known as a dot zone, is also created. This root zone may prevent access to the Internet for DNS and for clients of the DNS. If there is a root zone, there are no other zones other than those that are listed with DNS, and you cannot configure forwarders or root hint servers. Root domain This is the top of the tree, representing an unnamed level; it is sometimes shown as two empty quotation marks (""), indicating a null value. When used in a DNS domain name, it is stated by a trailing period (.) to designate that the name is located at the root or highest level of the domain hierarchy. In this instance, the DNS domain name is considered to be complete and points to an exact location in the tree of names. Names stated this way are called fully qualified domain names (FQDNs).

Your company has a remote office that contains 1,600 client computers on a single subnet. You need to select a subnet mask for the network that will support all of the client computers. The solution must minimize the number of unused addresses. Which subnet mask should you select? A. 255.255.248.0 B. 255.255.252.0 C. 255.255.254.0 D. 255.255.240.0

Correct Answer: A Explanation: 255.255.252.0 = 11111111.11111111.11111100.00000000 =>( 22 bits 1 .. 10 bits 0 ) => 1111111111 = 1023 255.255.254.0 = 11111111.11111111.11111110.00000000 =>( 23 bits 1 .. 9 bits 0 ) => 111111111 = 511 255.255.255.0 = 11111111.11111111.11111111.00000000 =>( 24 bits 1 .. 8 bits 0 ) => 11111111 = 255 255.255.255.128 = 11111111.11111111.11111111.10000000 =>( 25 bits 1 .. 7 bits 0 ) => 1111111 = 127

You work as an administrator at ENSUREPASS.com. The ENSUREPASS.com network consists of a single domain named ENSUREPASS.com. Subsequent to deploying a Server Core Installation of Windows Server 2012 on a new ENSUREPASS.com server, you are instructed to add a graphical user interface (GUI) to the server. You want to achieve this goal from the command prompt. Which of the following actions should you take? A. You should consider making use of the dism.exe command. B. You should consider making use of the dsquery.exe command. C. You should consider making use of the dsadd.exe command. D. You should consider making use of the dsrm.exe command.

Correct Answer: A Explanation: A. Deployment Image Servicing and Management (DISM) B. dsquery Queries the directory by using search criteria that you specify C. dsadd Adds specific types of objects to the directory. D. dsrm Deletes an object of a specific type or any general object from the directory. The Deployment Image Servicing and Management (DISM) tool replaces the pkgmgr, PEImg, and IntlConfg tools that are being retired in Windows 7. DISM provides a single centralized tool for performing all of the functions of these three tools in a more efficient and standardized way, eliminating the source of many of the frustrations experienced by current users of these tools. Dism /online /enable-feature /featurename:Server-Gui-Mgmt /featurename:Server-Gui-Shell / featurename:ServerCore-FullServer

Your network contains an Active Directory domain named contoso.com. All servers run either Windows Server 2008 R2 or Windows Serve 2012 R2. All client computers run either Windows 7 or Windows 8. The domain contains a member server named Server1 that runs Windows Server 2012 R2. Server1 has the File and Storage Services server role installed. On Server1, you create a share named Share1. You need to ensure that users can use Previous Versions to restore the files in Share1. What should you configure on Server1? A. The Shadow Copies settings B. A Windows Server Backup schedule C. A data recovery agent D. The Recycle Bin properties

Correct Answer: A Explanation: A. Enable and schedule shadow copies for Share1 B. The backup doesn't give users access until files are restored D. No settings for file version

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server! that runs Windows Server 2012 R2. Server1 contains a virtual machine named VM1 that runs Windows Server 2012 R2. You need to ensure that a user named User1 can install Windows features on VM1. The solution must minimize the number of permissions assigned to User1. To which group should you add User1? A. Administrators on VM1 B. Power Users on VM1 C. Hyper-V Administrators on Server1 D. Server Operators on Server1

Correct Answer: A Explanation: In Windows Server 2012 R2, the Server Manager console and Windows PowerShell-cmdlets for ServerManager allow installation of roles and features to local or remote servers, or offline virtual hard disks (VHDs). You can install multiple roles and features on a single remote server or offline VHD in a single Add Roles andFeatures Wizard or Windows PowerShell session. You must be logged on to a server as an administrator to install or uninstall roles, role services, andfeatures. If you are logged on to the local computer with an account that does not have administrator rights onyour target server, right-click the target server in the Servers tile, and then click Manage As to provide anaccount that has administrator rights. The server on which you want to mount an offline VHD must be added toServer Manager, and you must have Administrator rights on that server.

You have a server named Server1 that runs a Server Core installation of Windows Server 2012 R2 Standard. You establish a Remote Desktop session to Server1. You need to identify which task can be performed on Server1 from within the Remote Desktop session. What should you identify? A. Modify the network settings by using Sconfig. B. Join a domain by using the System Properties. C. Disable services by using Msconfig. D. Install a feature by using Server Manger.

Correct Answer: A Explanation: In Windows Server 2012 R2, you can use the Server Configuration tool (Sconfig.cmd) to configure and manage several common aspects of Server Core installations. You must be a member of the Administrators group to use the tool. Sconfig.cmd is available in the Minimal Server Interface and in Server with a GUI mode.

You have a server named Server1 that runs a Server Core installation of Windows Server 2012 R2. Server1 is configured to obtain an IPv4 address by using DHCP. You need to configure the IPv4 settings of the network connection on Server1 as follows: - IP address: 10.1.1.1 - Subnet mask: 255.255.240.0 - Default gateway: 10.1.1.254 What should you run? A. netsh.exe B. netcfg.exe C. msconfig.exe D. ipconfig.exe

Correct Answer: A Explanation: In order to configure TCP/IP settings such as the IP address, Subnet Mask, Default Gateway, DNS and WINS addresses and many other options you can use Netsh.exe. Incorrect: not D: Windows Server 2012 Core still has IPCONFIG.EXE that can be used to view the IP configuration. Modern servers typically come with several network interface ports. This causes IPCONFIG.EXE to scroll off the screen when viewing its output. Consider piping the output if IPCONFIG.EXE to a file and view it with Notepad.exe.

Your company has an Active Directory domain. You log on to the domain controller. The Active Directory Schema snap-in is not available in the Microsoft Management Console (MMC). You need to access the Active Directory Schema snap-in. What should you do? A. Register Schmmgmt.dll. B. Log off and log on again by using an account that is a member of the Schema Admins group. C. Use the Ntdsutil.exe command to connect to the schema master operations master and open the schema for writing. D. Add the Active Directory Lightweight Directory Services (AD/LDS) role to the domain controller by using Server Manager.

Correct Answer: A Explanation: Install the Active Directory Schema Snap-In You can use this procedure to first register the dynamic-link library (DLL) that is required for the Active Directory Schema snap-in. You can then add the snap-in to Microsoft Management Console (MMC). To install the Active Directory Schema snap-in 1. To open an elevated command prompt, click Start , type command prompt and then right-click Command Prompt when it appears in the Start menu. Next, click Run as administrator and then click OK . To open an elevated command prompt in Windows Server 2012 R2, click Start , type cmd , right clickcmd and then click Run as administrator . 2. Type the following command, and then press ENTER: regsvr32 schmmgmt.dll 3. Click Start , click Run , type mmc and then click OK . 4. On the File menu, click Add/Remove Snap-in . 5. Under Available snap-ins , click Active Directory Schema , click Add and then click OK . 6. To save this console, on the File menu, clickSave . 7. In the Save As dialog box, do one of the following: * To place the snap-in in the Administrative Tools folder, in File name , type a name for the snap-in, and then click Save . * To save the snap-in to a location other than the Administrative Tools folder, in Save in , navigate to a location for the snap-in. In File name , type a name for the snap-in, and then click Save .

Your network contains an Active Directory domain named adatum.com. You discover that when users join computers to the domain, the computer accounts are created in the Computers container. You need to ensure that when users join computers to the domain, the computer accounts are automatically created in an organizational unit (OU) named All_Computers. What should you do? A. From a command prompt, run the redircmp.exe command. B. From Windows PowerShell, run the Move-ADObject cmdlet. C. From Ldp, configure the properties of the Computers container. D. From ADSI Edit, configure the properties of the OU1 object.

Correct Answer: A Explanation: Redirects the default container for newly created computers to a specified, target organizational unit (OU) so that newly created computer objects are created in the specific target OU instead of in CN=Computers.

Your network contains an Active Directory domain named contoso.com. You have a starter Group Policy object (GPO) named GPO1 that contains more than 100 settings. You need to create a new starter GPO based on the settings in GPO1. You must achieve this goal by using the minimum amount of administrative effort. What should you do? A. Run the New-GPStarterGPO cmdlet and the Copy-GPO cmdlet. B. Create a new starter GPO and manually configure the policy settings of the starter GPO. C. Right-click GPO1, and then click Back Up. Create a new starter GPO. Right-click the new GPO, and then click Restore from Backup. D. Right-click GPO1, and then click Copy. Right-click Starter GPOs, and then click Paste.

Correct Answer: A Explanation: The New-GPStarterGPO cmdlet creates a Starter GPO with the specified name. If the Starter GPOs folder does not exist in the SYSVOL when the New-GPStarterGPO cmdlet is called, it is created and populated with the eight Starter GPOs that ship with Group Policy. The Copy-GPO cmdlet creates a (destination) GPO and copies the settings from the source GPO to the new GPO. The cmdlet can be used to copy a GPO from one domain to another domain within the same forest. You can specify a migration table to map security principals and paths when copying across domains. You can also specify whether to copy the access control list (ACL) from the source GPO to the destination GPO.

You install Windows Server 2012 R2 on a standalone server named Server1. You configure Server1 as a VPN server. You need to ensure that client computers can establish PPTP connections to Server1. Which two firewall rules should you create? (Each correct answer presents part of the solution. Choose two.) A. An inbound rule for protocol 47 B. An outbound rule for protocol 47 C. An inbound rule for TCP port 1723 D. An inbound rule for TCP port 1701 E. An outbound rule for TCP port 1723 F. An outbound rule for TCP port 1701

Correct Answer: AC Explanation: To enable VPN tunnels between individual host computers or entire networks that have a firewall between them, you must open the following ports: PPTP To allow PPTP tunnel maintenance traffic, open TCP 1723. To allow PPTP tunneled data to pass through router, open Protocol ID 47. http://www.windowsitpro.com/article/pptp/which-ports-do-you-need-to-open-on-a-firewall-to- allow-pptp-andl2tp-over-ipsec-vpn-tunnels-46811 If you use a personal firewall or a broadband router, or if there are routers or firewalls between the VPN client and the VPN server, the following ports and protocol must be enabled for PPTP on all firewalls and routers that are between the VPN client and the VPN server: Client ports Server port Protocol

Your network contains an Active Directory domain named contoso.com. The domain contains 500 servers that run Windows Server 2012 R2. You have a written security policy that states the following: - Only required ports must be open on the servers. - All of the servers must have Windows Firewall enabled. - Client computers used by Administrators must be allowed to access all of the ports on all of the servers. - Client computers used by the Administrators must be authenticated before the client computers can access the servers. You have a client computer named Computer1 that runs Windows 8. You need to ensure that you can use Computer1 to access all of the ports on all of the servers successfully. The solution must adhere to the security policy. Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.) A. On Computer1, create a connection security rule B. On all of the servers, create an outbound rule and select the Allow the connection if it is secureoption. C. On all of the servers, create an inbound rule and select the Allow the connection if it is secureoption. D. On Computer1, create an inbound rule and select the Allow the connection if it is secureoption. E. On Computer1, create an outbound rule and select the Allow the connection if it is secureoption F. On all of the servers, create a connection security rule

Correct Answer: ACF Explanation: http://technet.microsoft.com/en-us/library/cc772017.aspx Unlike firewall rules, which operate unilaterally, connection security rules require that both communicating computers have a policy with connection security rules or another compatible IPsec policy. http://technet.microsoft.com/en-us/library/cc753463.aspx Traffic that matches a firewall rule that uses the Allow connection if it is secure setting bypasses Windows Firewall. The rule can filter the traffic by IP address, port, or protocol. This method is supported on Windows Vista or Windows Server 2008.

You work as a senior administrator at Lead2pass.com. The Lead2pass.com network consists of a single domain named Lead2pass.com. All servers on the Lead2pass.com network have Windows Server 2012 R2 installed. You are running a training exercise for junior administrators. You are currently discussing storage pools. Which of the following are TRUE with regards to storage pools? A. It allows you to group physical disks into one or more containers. B. It prevents you from grouping physical disks into one or more containers. C. It allows you to easily add storage with minor impact on users. D. It allows you to easily add storage without impacting users.

Correct Answer: AD Explanation: A. Storage Space subsystem now virtualizes storage by abstracting multiple physical disks into a logical construct with specified capacity D. Thin provisioning Windows Server 2012 R2 Storage Space subsystem now virtualizes storage by abstracting multiple physical disks into a logical construct with specified capacity. The process is to group selected physical disks into a container, the so-called storage pool. Some of the goals of Storage Spaces include the ability to: Obtain and easily manage reliable and scalable storage with reduced cost Aggregate individual drives into storage pools that are managed as a single entity Utilize simple inexpensive storage with or without external storage 've created Provision storage as needed from pools of storage you Grow storage pools on demand Use PowerShell to manage Storage Spaces for Windows 8 clients or Windows Server 2012 R2 Delegate administration by specific pool Use diverse types of storage in the same pool: SATA, SAS, USB, SCSI Use existing tools for backup/restore as well as VSS for snapshots Designate specific drives as hot spares Automatic repair for pools containing hot spares with sufficient storage capacity to cover what was lost Management can be local, remote, through MMC, or PowerShell Limitations: Not supported on boot, system, or CSV volumes (Storages Spaces formatted with ReFS can't be used for a CSV) Drives must be 10GB or larger When you introduce a drive into a storage pool, the contents of the drive being added will be lost. Add only un-formatted/un-partitioned drives A simple storage pool must consist of at least one drive A mirrored pool must have at least 2 drives. For 3-way mirroring there is an obvious need for more Three drive minimum for using Parity All drives in a pool must use the same sector size Fibre-channel and iSCSI are not supported Storage must be storport.sys compatible Virtual disks to be used with a failover cluster that emanate from a storage pool must use the NTFS file system. ReFS or third-party file systems may be used for other purposes Thin provisioning is an end-to-end storage provisioning solution. It requires planning for storage deployment and execution on the host and client application. Windows thin provisioning features serve as the interfaces between the thin provisioning-capable storage and the host server. Windows thin provisioning features include thin provisioning logical unit (LUN) identification, thresholdnotification, handles for resource exhaustion, and space reclamation for delivering highly availableand scalable storage provisioning service to end users. Storage Spaces can virtualize storage to create what are called storage pools. A storage pool is an aggregation of unallocated space on physical disks installed in or connected to servers (These disks could be installed inside servers on your network or within just-a-bunch-of-disks (JBOD) enclosures). Storage pools are flexible and elastic, allowing you to add or remove disks from the pool as your demand for storage grows or shrinks. Once you've created a storage pool using Storage Spaces, you can provision storage from the pool by creating virtual disks. A virtual disk behaves exactly like a physical disk except that it can span multiple physical disks within the storage pool. Virtual disks can host simple volumes or volumes with resiliency (mirroring or parity) to increase the reliability or performance of the disk. A virtual disk is sometimes called a LUN. Storage Spaces is fully remoteable and scriptable. This increases the Operational simplicity. Management is permitted through the Windows Storage Management API, WMI, and Windows PowerShell. And, Storage Spaces can be easily managed through the File Services role in Server Manager.

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has six network adapters. Two of the network adapters are connected to a network named LAN1, two of the network adapters are connected to a network named LAN2, and two of the network adapters are connected to a network named LAN3. You create a network adapter team named Team1 from the two adapters connected to LAN1. You create a network adapter team named Team2 from the two adapters connected to LAN2. A company policy states that all server IP addresses must be assigned by using a reserved address in DHCP. You need to identify how many DHCP reservations you must create for Server1. How many reservations should you identify? A. 3 B. 4 C. 6 D. 8

Correct Answer: B Explanation : 2 Adapters = LAN1 = Team1 = 1 IP 2 Adapters = LAN2 = Team2 = 1 IP 2 Adapters = LAN3 = No Team = 2 IP 1 + 1 + 2 = 4

Your network contains two Active Directory forests named contoso.com and adatum.com. All servers run Windows Server 2012 R2. A one-way external trust exists between contoso.com and adatum.com. Adatum.com contains a universal group named Group1. You need to prevent Group1 from being used to provide access to the resources in contoso.com. What should you do? A. Modify the Managed By settings of Group1. B. Modify the Allowed to Authenticate permissions in adatum.com. C. Change the type of Group1 to distribution. D. Modify the name of Group1.

Correct Answer: B Explanation: * Accounts that require access to the customer Active Directory will be granted a special right called Allowed to Authenticate. This right is then applied to computer objects (Active Directory domain controllers and AD RMS servers) within the customer Active Directory to which the account needs access. * For users in a trusted Windows Server 2008 or Windows Server 2003 domain or forest to be able to access resources in a trusting Windows Server 2008 or Windows Server 2003 domain or forest where the trust authentication setting has been set to selective authentication, each user must be explicitly granted the Allowed to Authenticate permission on the security descriptor of the computer objects (resource computers) that reside in the trusting domain or forest.

Your network contains an Active Directory domain named contoso.com. You discover that when you join client computers to the domain manually, the computer accounts are created in the Computers container. You need to ensure that new computer accounts are created automatically in an organizational unit (OU) named Corp. Which tool should you use? A. net.exe B. redircmp.exe C. regedit.exe D. dsadd.exe

Correct Answer: B Explanation: A. Used to stop/start protocols B. Redirects the default container for newly created computers to a specified, target organizational unit C. Modify local registry entries D. Adds specific types of objects to the directory Redirects the default container for newly created computers to a specified, target organizational unit (OU) so that newly created computer objects are created in the specific target OU instead of in CN=Computers. You must run the redircmp command from an elevated command prompt. Redircmp.exe is located in the C:WindowsSystem32 folder. You must be a member of the Domain Admins group or the Enterprise Admins group to use this tool.

Your network contains an Active Directory domain named contoso.com. The domain contains a print server named Server1 that runs Windows Server 2012 R2. Server1 contains a local group named Group1. You share a printer named Printer1 on Server1. You need to configure Printer1 to meet the following requirements: - Ensure that the members of Group1, the Server Operators group, the Administrators group, and the Print Operators group can send print jobs to Printer1. - Prevent other users from sending print jobs to Printer1. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) A. Assign the Print permission to the Server Operators group B. Remove the permissions for the Creator Owner group. C. Remove the permissions for the Everyone group. D. Assign the Print permission to Group1. E. Assign the Print permission to the Administrators group.

Correct Answer: CD Explanation: C: To prevent other users from sending print jobs to Printer1 D: To enable Group1 to send print jobs. Note: The Server Operators group, the Administrators group, and the Print Operators group are all built-in and already have permissions to send print jobs.

Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. The domain contains a server named Server1. You install the Windows PowerShell Web Access gateway on Server1. You need to provide administrators with the ability to manage the servers in the domain by using the Windows PowerShell Web Access gateway. Which two cmdlets should you run on Server1? (Each correct answer presents part of the solution. Choose two.) A. Set-WSManQuickConfig B. Set-WSManInstance C. Add-PswaAuthorizationRule D. Set-BCAuthentication E. Install-PswaWebApplication

Correct Answer: CE Explanation: A. Configures the local computer for remote management. B. Modifies the management information that is related to a resource. C. Adds a new authorization rule to the Windows PowerShell Web Access authorization rule set. D. Specifies the BranchCache computer authentication mode.

You have a server named Server1 that runs Windows Server 2012 R2. You plan to enable Hyper-V Network Visualization on Server1. You need to install the Windows Network Virtualization Filter Driver on Server1. Which Windows PowerShell cmdlet should you run? A. Set-NetVirtualizationGlobal B. Set-NetAdapterVmq C. Add-WindowsFeature D. Enable-NetAdapterBinding

Correct Answer: D

Your infrastructure divided in 2 sites. You have a forest root domain and child domain. There is only one DC on site 2 with no FSMO roles. The link goes down to site 2 and no users can log on. What FSMO roles you need on to restore the access? A. Infrastructure master B. RID master C. Domain Naming master D. PCD emulator

Correct Answer: D Explanation: D. The PDC emulator is used as a reference DC to double-check incorrect passwords and it also receives new password changes. PDC Emulator is the most complicated and least understood role, for it runs a diverse range of critical tasks. It is a domain-specific role, so exists in the forest root domain and every child domain. Password changes and account lockouts are immediately processed at the PDC Emulator for a domain, to ensure such changes do not prevent a user logging on as a result of multi-master replication delays, such as across Active Directory sites. multi-master directory concept

Your network contains two Hyper-V hosts that run Windows Server 2012 R2. The Hyper-V hosts contains several virtual machines that run Windows Server 2012 R2. You install the Network Load Balancing feature on the virtual machines. You need to configure the virtual machines to support Network Load Balancing (NLB). Which virtual machine settings should you configure? A. Port mirroring B. DHCP guard C. Router guard D. MAC address

Correct Answer: D Explanation: For NLB to be configured you need to enable MAC address spoofing.

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2. You need to create 3-TB virtual hard disk (VHD) on Server1. Which tool should you use? A. New-StorageSubsytemVirtualDisk B. File Server Resource Manager (FSRM) C. Server Manager D. Computer Management

Correct Answer: D Explanation: For other questions to create a VHD (file) you can use computer management. - Share and storage management (2008 only) - New-storagesubsystemVirtualDisk (this is a virtual disk, NOT a virtual hard disk) - Server Manager (you would use this to create virtual disks, not virtual hard disks)

Your network contains an Active Directory domain named contoso.com. An organizational unit (OU) named OU1 contains user accounts and computer accounts. A Group Policy object (GPO) named GP1 is linked to the domain. GP1 contains Computer Configuration settings and User Configuration settings. You need to prevent the User Configuration settings in GP1 from being applied to users. The solution must ensure that the Computer Configuration settings in GP1 are applied to all client computers. What should you configure? A. the Group Policy loopback processing mode B. the Block Inheritance feature C. the Enforced setting D. the GPO Status

Correct Answer: D Explanation: GP1 is linked to the domain, thus, it will apply to OU1 (where there are users and computers). You need GP1's computer settings to apply, but not its user settings. A. The Group Policy loopback processing mode - If you use group policy loopback processing you have two choices: merge and replace. If you use merge the user settings will still apply to users, but with merge with user settings from other GPOs. If you instead choose replace, the user settings of GP1 will replace any user settings from another GPO that applies to users. Either way, the user settings of GP1 are still applying to users. Thus, A is incorrect. B. The Block Inheritance feature - If you block the inheritance of GP1, the user settings will not apply to the users, but it will also keep the computer settings from applying. Thus, B is incorrect. C. The Enforced setting - This will enforce the group policy of GP1 and keep it from being overruled by another group policy. Thus, C is incorrect. D. The GPO Status - You can disable the user settings, so that it is applying just computer settings. This meets the requirement of applying the computer settings still, but not applying the user settings of GP1 to users. Thus, D is correct.

Your network contains an Active Directory domain named adatum.com. The computer accounts for all member servers are located in an organizational unit (OU) named Servers. You link a Group Policy object (GPO) to the Servers OU. You need to ensure that the domain's Backup Operators group is a member of the local Backup Operators group on each member server. The solution must not remove any groups from the local Backup Operators groups. What should you do? A. Add a restricted group named adatumBackup Operators. Add Backup Operators to the This group is a member of list. B. Add a restricted group named adatumBackup Operators. Add Backup Operators to the Members of this group list. C. Add a restricted group named Backup Operators. Add adatumBackup Operators to the This group is a member of list. D. Add a restricted group named Backup Operators. Add adatumBackup Operators to the Members of this group list.

Correct Answer: A Explanation: A. The Member Of list specifies which other groups the restricted group should belong to B. Needs to be added to member of list C. Wrong group D. Wrong group Restricted groups allow an administrator to define two properties for security-sensitive groups (that is,"restricted" groups). The two properties are Members and Member Of . The Members list defines who should and should not belongto the restricted group. The Member Of list specifies which other groups the restricted group should belong to. When a restricted Group Policy is enforced, any current member of a restricted group that is not on theMembers list is removed. Any user on the Members list which is not currently a member of the restrictedgroup is added. The Restricted Groups folder is available only in Group Policy objects associated with domains, OUs,and sites. The Restricted Groups folder does not appear in the Local Computer Policy object. If a Restricted Group is defined such that it has no members (that is, the Members list is empty), then allmembers of the group are removed when the policy is enforced on the system. If the Member Of list is emptyno changes are made to any groups that the restricted group belongs to. In short, an empty Members listmeans the restricted group should have no members while an empty Member Of list means "don't care" whatgroups the restricted group belongs to.

You have a file server named Server1 that runs Windows Server 2012 R2. You need to ensure that a user named User1 can use Windows Server Backup to create a complete backup of Server1. What should you configure? A. The local groups by using Computer Management B. A task by using Authorization Manager C. The User Rights Assignment by using the Local Group Policy Editor D. The Role Assignment by using Authorization Manager

Correct Answer: A Explanation: A. User needs to be added to local Backup Operator group B. AzMan is a role-based access control (RBAC) framework that provides an administrative tool to manage authorization policy and a runtime that allows Applications to perform access checks against that policy. C. User Rights Assignment policies determines which users or groups have logon rights or privileges on the computer D. AzMan is a role-based access control (RBAC) framework that provides an administrative tool to manage authorization policy and a runtime that allows Applications to perform access checks against that policy.

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2 that run Windows Server 2012 R2. You log on to Server1. You need to retrieve the IP configurations of Server2. Which command should you run from Server1? A. winrs -r:server2 ipconfig B. winrm get server2 C. dsquery *-scope base-attr ip, server2 D. ipconfig > server2.ip

Correct Answer: A Explanation: A. Windows Remote Management allows you to manage and execute programs remotely C. dsquery * finds any objects in the directory according to criteria using a LDAP query. D. Would output server1 ipconfig info to server2.ip file

You have a network printer connected to print server. You need to be able to print if print server goes down. What should you chose? A. brach office direct printing B. printer pooling C. spooling D. Print forwarding

Correct Answer: A Explanation: Branch Office Direct Printing can reduce Wide Area Network (WAN) usage by printing directly to a print device instead of a server print queue. This feature can be enabled or disabled on a per printer basis and is transparent to the user. It is enabled by an administrator using the Print Management Console or Windows PowerShell on the server. The printer information is cached in the branch office, so that if the print server is unavailable for some reason (for example if the WAN link to the data center is down), then it is still possible for the user to print. Branch Office Direct Printing requires the following operating systems: Windows Server 2012 Windows 8

Your network contains an Active Directory domain named contoso.com. The domain contains a server namedServer1. Server1 runs Windows Server 2012 R2 and has the HyperV server role installed. You need to log the amount of system resources used by each virtual machine. What should you do? A. From Windows PowerShell, run the Enable-VMResourceMeteringcmdlet. B. From Windows System Resource Manager, enable Accounting. C. From Windows System Resource Manager, add a resource allocation policy. D. From Windows PowerShell, run the Measure-VM cmdlet.

Correct Answer: A Explanation: Enable-VMResourceMetering - The Enable-VMResourceMeteringcmdlet starts collecting resourceutilization data for a virtual machine or resource pool.

Server 1 and Server2 host a load-balanced Application pool named AppPool1. You need to ensure thatAppPool1 uses a group Managed Service Account as its identity. Which 3 actions should you perform? A. Install a domain controller that runs Windows Server 2012 R2, Run the New- ADServiceAccountcmdlet, Modify the settings of AppPool1. B. Configure the Security settings of the contoso.com zone. C. Add a second legacy network adapter, and then run the Set-VMNetworkAdoptercmdlet. D. From Windows Powershell, run Get-DNSServerDiagnostics.

Correct Answer: A Explanation: For the application pool to use a group Managed Service account as its identity you will have to make sure that there is a domain controller where you can add the account and then modify the application pool accordingly. Thus you should use the New- ADServiceAccount on the domain controller that will create a new Active Directory service account.

Your network contains an Active Directory domain named contoso.com. The network contains a member server named Server1 that runs Windows Server 2012 R2. Server1 has the DNS Server server role installed and has a primary zone for contoso.com. The Active Directory domain contains 500 client computers. There are an additional 20 computers in a workgroup. You discover that every client computer on the network can add its record to the contoso.com zone. You need to ensure that only the client computers in the Active Directory domain can register records in the contoso.com zone. What should you do first? A. Move the contoso.com zone to a domain controller that is configured as a DNS server B. Configure the Dynamic updates settings of the contoso.com zone C. Sign the contoso.com zone by using DNSSEC D. Configure the Security settings of the contoso.com zone.

Correct Answer: A Explanation: If you install DNS server on a non-DC, then you are not able to create AD-integrated zones. DNS update security is available only for zones that are integrated into AD DS. When you directory- integrate a zone, access control list (ACL) editing features are available in DNS Managerso that you can add or remove users or groups from the ACL for a specified zone or resource record. http://technet.microsoft.com/en-us/library/cc771255.aspx http://social.technet.microsoft.com/Forums/en-US/winserverNIS/thread/9b041bbc-07654eed- bd1cd65027f05e9f/ http://blogs.msmvps.com/acefekay/2012/11/19/ad-dynamic-dns-updates-registration-rulesof- engagement/ 1. Active Directory's DNS Domain Name is NOT a single label name ("DOMAIN" vs the minimal requirement of"domain.com." "domain.local," etc). 2. The Primary DNS Suffix MUST match the zone name that is allowing updates. Otherwise the client doesn'tknow what zone name to register in. You can also have a different Conneciton Specific Suffix in addition to thePrimary DNS Suffix to register into that zone as well. 3. AD/DNS zone MUST be configured to allow dynamic updates, whether Secure or Secure and Non-Secure. For client machines, if a client is not joined to the domain, and the zone is set to Secure, it will not registereither. 4. You must ONLY use the DNS servers that host a copy of the AD zone name or have a reference to get tothem. Do not use your ISP's, an external DNS adddress, your router as a DNS address, or any other DNS thatdoes not have a copy of the AD zone. Internet resolution for your machines will be accomplished by the Rootservers (Root Hints), however it's recommended to configure a forwarder for efficient Internet resolution. . 5. The domain controller is multihomed (which means it has more than one unteamed, active NIC, more thanone IP address, and/or RRAS is installed on the DC). 6. The DNS addresses configured in the client's IP properties must ONLY reference the DNS server(s) hostingthe AD zone you want to update in. This means that you must NOT use an external DNS in any machine's IP property in an AD environment. You can't mix them either. That's because of the way the DNS Client side resolver service works. Even if youmix up internal DNS and ISP's DNS addresses, the resolver algorithm can still have trouble asking the correctDNS server. It will ask the first one first. If it doesn't get a response, it removes the first one from the eligibleresolvers list and goes to the next in the list. It will not go back to the first one unless you restart the machine,restart the DNS Client service, or set a registry entry to cut the query TTL to 0. The rule is to ONLY use yourinternal DNS server(s) and configure a forwarder to your ISP's DNS for efficient Internet resolution. This is the reg entry to cut the query to 0 TTL: The DNS Client service does not revert to using the first server ...The Windows 2000 Domain Name System (DNS) Client service (Dnscache) follows a certain algorithm when it decides the order in which to use the DNSservers ... http://support.microsoft.com/kb/286834 For more info, please read the following on the client side resolver service: DNS, WINS NetBIOS & the Client Side Resolver, Browser Service, Disabling NetBIOS, Direct Hosted SMB(DirectSMB), If One DC is Down Does a Client logon to Another DC, and DNS Forwarders Algorithm if youhave multiple forwarders. http://msmvps.com/blogs/acefekay/archive/2009/11/29/dns-wins-netbios-amp-the-clientside- resolver-browserservice-disabling-netbios-direct-hosted-smb-directsmb-if-one-dc-isdown-does-a- client-logon-to-another-dcand-dns-forwarders-algorithm.aspx 7. For DHCP clients, DHCP Option 006 for the clients are set to the same DNS server. 8. If using DHCP, DHCP server must only be referencing the same exact DNSserver(s) in it's own IP properties in order for it to 'force' (if you setthat setting) registration into D NS. Otherwise, how would it know which DNSto send the reg data to? 9. If the AD DNS Domain name is a single label name, such as "EXAMPLE", and not the proper format of"example.com" and/or any child of that format, such as "child1.example.com", then we have a real big problem. DNS will not allow registration into a single label domain name. This is for two reasons: 1. It's not the proper hierachal format. DNS is hierarchal, but a single label name has no hierarchy. It's just asingle name. 2. Registration attempts causes major Internet queriesto the Root servers. Why? Because it thinks thesingle label name, such as "EXAMPLE", is a TLD(Top Level Domain), such as "com", "net", etc. Itwill now try to find what Root name server out therehandles that TLD. In the end it comes back to itselfand then attempts to register. Unfortunately it doe NOTask itself first for the mere reason it thinks it's a TLD. (Quoted from Alan Woods, Microsoft, 2004): "Due to this excessive Root query traffic, which ISC found from a study that discovered Microsoft DNS serversare causing excessive traffic because of single label names, Microsoft, being an internet friendly neighbor andwanting to stop this problem for their neighbors, stopped the ability to register into DNS with Windows 2000SP4, XP SP1, (especially XP,which cause lookup problems too), and Windows 2003. After all, DNS ishierarchal, so therefore why even allow single label DNS domain names?" The above also *especially* App1ies to Windows Vista, &, 2008, 2008 R2, and newer. 10. 'Register this connection's address" on the client is not enabled under the NIC's IP properties, DNS tab. 11. Maybe there's a GPO set to force Secure updates and the machine isn't a joined member of the domain. 12. ON 2000, 2003 and XP, the "DHCP client" Service not running. In 2008/Vista and newer, it's the DNSClient Service. This is a requirement for DNS registration and DNS resolution even if the client is not actuallyusing DHCP. 13. You can also configure DHCP to force register clients for you, as well as keep the DNS zone clean of old orduplicate entries. See the link I posted in my previous post.

Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. The domain contains a server named Server1. You open Review Options in the Active Directory Domain Services Configuration Wizard, and then you click View script. You need to ensure that you can use the script to promote Server1 to a domain controller. Which file extension should you use to save the script? A. .ps1 B. .bat C. .xml D. .cmd

Correct Answer: A Explanation: The View Script button is used to view the corresponding PowerShell script The PowerShell script extension is .psi, The Answer could logically be either a .cmd file or a .bat file. According to http://www.fileinfo.com/: PAL - Settings file created by Corel Painter or Palette of colors used by Dr. Halo bitmap images BAT - DOS batch file used to execute commands with the Windows Command Prompt (cmd.exe); contains aseries of line commands that typically might be entered at the DOS command prompt; most commonly used tostart programs and run maintenance utilities within Windows. XML - XML (Extensible Markup Language) data file that uses tags to define objects and object attributes;formatted much like an .HTML document, but uses custom tags to define objects and the data within eachobject; can be thought of as a text-based database. CMD - Batch file that contains a series of commands executed in order; introduced with Windows NT, but canbe run by DOS or Windows NT systems; similar to a .BAT file, but is run by CMD.EXE instead of COMMAND.COM.

You have external virtual switch with srv-io enabled with 10 Virtual Machines on it. You need to make the Virtual Machines able to talk only to each other. A. remove the vswitch and recreate it as private. B. add new vswitch C. remove vswitch and recreate it as public D. adjust srv-io settings

Correct Answer: A Explanation: There are three possible modes for the Hyper-V switch: private, internal, and public. Do not confuse these with IP addressing schemes or any other networking configuration in a different technology. Private Switch The private switch allows communications among the virtual machines on the host and nothing else. Even the management operating system is not allowed to participate. This switch is purely logical and does not use any physical adapter in any way. "Private" in this sense is not related to private IP addressing. You can mentally think of this as a switch that has no ability to uplink to other switches. Internal Switch The internal switch is similar to the private switch with one exception: the management operating system can have a virtual adapter on this type of switch and communicate with any virtual machines that also have virtual adapters on the switch. This switch also does not have any matching to a physical adapter and therefore also cannot uplink to another switch. External Switch This switch type must be connected to a physical adapter. It allows communications between the physical network and the management operating system and virtual machines. Do not confuse this switch type with public IP addressing schemes or let its name suggest that it needs to be connected to a public-facing connection. You can use the same private IP address range for the adapters on an external virtual switch that you're using on the physical network it's attached to

Your company has a remote office that contains 600 client computers on a single subnet. You need to select a subnet mask for the network that will support all of the client computers. The solution must minimize the number of unused addresses. Which subnet mask should you select? A. 255.255.252.0 B. 255.255.254.0 C. 255.255.255.0 D. 255.255.255.128

Correct Answer: A Explanation: Using a subnet mask of 255.255.252.0 will result in the fewest number of unused IP addresses.

You work as an administrator at ENSUREPASS.com. The ENSUREPASS.com network consists of a single domain named ENSUREPASS.com. All servers on the ENSUREPASS.com network have Windows Server 2008 R2 installed. Some of ENSUREPASS.com's workstations have Windows 7 installed, while the rest have Windows 8 installed. After installing a new Windows Server 2012 computer in the ENSUREPASS.com domain, you configure it to run the File and Storage Services server role. You are instructed to create a shared folder on the new server, and configure the use of Previous Versions for restoring files located in the shared folder. Which of the following actions should you take? A. You should consider configuring the Shadow Copies settings on the new server. B. You should consider configuring the Snapshot settings on the new server. C. You should consider configuring the Background Copy settings on the new server. D. You should consider configuring the Permission settings on the new server.

Correct Answer: A Explanation: What are previous versions? Previous versions are either backup copies (copies of files and folders that you back up by using the Back Up Files wizard, or shadow copies) copies of files and folders that Windows automatically saves as part of a restore point. (Shadow copies can be copies of files on your computer or shared files on acomputer on a network.) You can use previous versions of files to restore files that you accidentally modified or deleted, or that were damaged. Depending on the type of file or folder, you can open, save to a different location, or restore a previous version. ATT: ( nothing to do with question but cool to know ) File Server Volume Copy Shadow Service (VSS) Agent Service Enables consistency of application snaphots (shadow copies). With previous versions of Windows Server, VSS only supported shadow copies of data on the local server. With WS2012, Microsoft has added VSS for SMB File Shares which extends shadow copy support for network volumes.Administrators install the FS VSS Agent on the file server where the application data is located. They then install the VSS provider in the server where the application is located. The provider talks to the agent using the new File Server Remote VSS protocol in order to manage the shadow copies of the data.

You have a virtual machine named VM1. You install Windows Server 2012 R2 on VM1. You plan to use VM1 as an image that will be distributed to sales users to demonstrate the features of a custom application. The custom application only requires the Web Server (IIS) server role to be installed. You need to ensure that the VHD file for VM1 only contains the required Windows Server 2012 R2 source files. Which tool should you use? A. dism.exe B. ocsetup.exe C. imagex.exe D. servermanagercmd.exe

Correct Answer: A Explanation: You can use DISM to: Add, remove, and enumerate packages and drivers. Enable or disable Windows features. Apply changes based on the offline servicing section of an unattend.xml answer file. Configure international settings. Upgrade a Windows image to a different edition. Prepare a Windows PE image. Take advantage of better logging. Service down-level operating systems like Windows Vista with SP1 and Windows Server 2008. Service all platforms (32-bit, 64-bit, and Itanium). Service a 32-bit image from a 64-bit host and service a 64-bit image from a 32-bit host. Make use of old Package Manager scripts.

You have a server named Server1. Server1 runs Windows Server 2012 R2 and is located in a perimeter network. You need to configure a custom connection security rule on Server1. The rule must encrypt network communications across the Internet to a computer at another company. Which authentication method should you configure in the connection security rule? A. Advanced B. User (Kerberos V5) C. Computer (Kerberos V5) D. Computer and user (Kerberos V5) E. Default

Correct Answer: A Explanation: You need to make use of Advanced authentication method to ensure that communication is encrypted over the network to the other company from your custom connection security rule on Server1.

You work as an administrator at ENSUREPASS.com. The ENSUREPASS.com network consists of a single domain named ENSUREPASS.com. All servers on the ENSUREPASS.com network have Windows Server 2012 R2 installed. ENSUREPASS.com has a server, named ENSUREPASS-SR07, which has two physical disks installed. The C: drive hosts the boot partition, while the D: drive is not being used. Both disks are online. You have received instructions to create a virtual machine on ENSUREPASS-SR07. Subsequent to creating the virtual machine, you have to connect the D: drive to the virtual machine. Which of the following is TRUE with regards to connecting a physical disk to a virtual machine? A. The physical disk should not be online. B. The physical disk should be uninstalled and re-installed. C. The physical disk should be configured as a striped disk. D. The physical disk should be configured as a mirrored disk.

Correct Answer: A Explanation: Your virtual machines can also be connected to physical hard disks on the virtualization server virtual hard disks. (This is sometimes referred to as having a "pass-through" disk connected to a virtual machine.) The physical hard disk that you connect to a virtual machine can also be a network-attached disk, like a logical unit number (LUN) in a storage area network (SAN). A common example is an iSCSI LUN that has been mapped to the virtualization server by using Microsoft iSCSI Initiator. Because the virtualization server sees network-attached storage as local disks, the iSCSI LUN can be connected to a virtual machine. The most important limitation about having a physical hard disk connected to a virtual machine is that it cannot be connected to the virtualization server or to other virtual machines at the same time. The virtual machine must have exclusive access to the physical hard disk. Pass-through Disk Configuration Hyper-V allows virtual machines to access storage mapped directly to the Hyper-V server without requiring the volume be configured. The storage can either be a physical disk internal to the Hyper-V server or it can be a Storage Area Network (SAN) Logical Unit (LUN) mapped to the Hyper-V server. To ensure the Guest has exclusive access to the storage, it must be placed in an Offline state from the Hyper-Vserver perspective

Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Print and Document Services server role installed. You connect a new print device to the network. The marketing department and the sales department will use the print device. You need to provide users from both departments with the ability to print to the network print device. The solution must ensure that if there are multiple documents queued to print, the documents from the sales users print before the documents from the marketing users. What should you do on Server1? A. Add two printers. Modify the priorities of each printer and the security settings of each printer B. Add two printers and configure printer pooling C. Add one printer and configure printer pooling. D. Add one printer. Modify the printer priority and the security settings

Correct Answer: A Explanation: http://technet.microsoft.com/en-us/library/cc738090(v=ws.10).aspx To set different print priority to different groups Open Printers and Faxes. Right-click the printer you want to set, click Properties, and then click the Advanced tab. In Priority, click the up or down arrows, and then click OK. Or, type a priority level, where 1 is the lowest level and 99 is the highest, and then click OK. Click Add Printer to add a second logical printer for the same physical printer. For instructions, see Related Topics. Click the Advanced tab. In Priority, set a priority higher than that of the first logical printer. Instruct the regular group of users to use the first logical printer name and the group with higher priority to use the second logical printer name. Set the appropriate permissions for the different groups.

You perform a Server Core Installation of Windows Server 2012 R2 on a server named Server1. You need to add a graphical user interface (GUI) to Server1. Which tool should you use? A. the dism.exe command B. the Add-WindowsFeature cmdlet C. the imagex.exe command D. the setup.exe command E. the ocsetup.exe command F. the Add-WindowsPackage cmdlet G. the Install-Module cmdlet H. the Install-RoleService cmdlet

Correct Answer: AB Explanation: Add-WindowsFeature -The Add-WindowsFeature cmdlet allows you to install specified roles, role services, and features on a computer that is running Windows Server 2008 R2. Install-WindowsFeature -Installs one or more Windows Server roles, role services, or features on either the local or a specified remote server that is running Windows Server 2012 R2. This cmdlet is equivalent to and replaces Add-WindowsFeature, the cmdlet that was used to install roles, role services, and features in Windows Server 2008 R2. dism /online /get-features PS C:> Install-WindowsFeature -Name Web-Server - IncludeAllSubFeature -ComputerName Server1 -WhatIf

You work as an administrator at ENSUREPASS.com. The ENSUREPASS.com network consists of a single domain named ENSUREPASS.com. All servers on the ENSUREPASS.com network have Windows Server 2012 R2 installed. You have received instructions to convert a basic disk to a GPT disk. Which of the following is TRUE with regards to GPT disks? (Choose all that apply.) A. To convert a basic disk to a GPT disk, the disk must not contain any partitions or volumes. B. You can convert a basic disk to a GPT disk, regardless of partitions or volum es. C. GPT is required for disks larger than 2 TB. D. GPT is required for disks smaller than 2 TB. E. The GPT partition style can be used on removable media. F. GPT disks make use of the standard BIOS partition table.

Correct Answer: AC Explanation: A. For a drive to be eligible for conversion to dynamic, all basic data partitions on the drive must be contiguous C. GPT allows a much larger partition size greater than 2 terabytes (TB) D. 2 terabytes is the limit for MBR disks. E. Dynamic disks are not supported on portable computers, removable disks, detachable disks that use USB or IEEE 1394 interfaces F. Windows only supports booting from a GPT disk on systems that contain Unified Extensible Firmware Interface (UEFI) boot firmware. Master boot record (MBR) disks use the standard BIOS partition table. GUID partition table (GPT) disks use unified extensible firmware interface (UEFI). One advantage of GPT disks is that you can have more than four partitions on each disk. GPT is also required for disks larger than 2 terabytes. Portable computers and removable media. Dynamic disks are not supported on portable computers, removable disks, detachable disks that use Universal Serial Bus (USB) or IEEE 1394 (also called FireWire) interfaces, or on disks connected to shared SCSI buses. If you are using a portable computer and right-click a disk in the graphical or list view in Disk Management, you will not see the option to convert the disk to dynamic. Dynamic disks are a separate form of volume management that allows volumes to have noncontiguous extents on one or more physical disks. Dynamic disks and volumes rely on the Logical Disk Manager (LDM) and Virtual Disk Service (VDS) and their associated features. These features enable you to perform tasks such as converting basic disks into dynamic disks, and creating fault-tolerant volumes. To encourage the use of dynamic disks, multi-partition volume support was removed from basic disks, and is now exclusively supported on dynamic disks. GPT disks can be converted to MBR disks only if all existing partitioning is first deleted, with associated loss of data. Q. What happens when a basic disk is converted to dynamic? A. For a drive to be eligible for conversion to dynamic, all basic data partitions on the drive must be contiguous. If other unrecognized partitions separate basic data partitions, the disk cannot be converted. This is one of the reasons that the MSR must be created before any basic data partitions. The first step in conversion is to separate a portion of the MSR to create the configuration database partition. All non-bootable basic partitions are then combined into a single data container partition. Boot partitions are retained as separate data container partitions. This is analogous to conversion of primary partitions. Windows XP and later versions of the Windows operating system differs from Windows 2000 in that basic and extended partitions are preferentially converted to a single 0x42 partition, rather than being retained as multiple distinct 0x42 partitions as on Windows 2000.

You work as a senior administrator at You work as a senior administrator at ENSUREPASS.com. The ENSUREPASS.com network consists of a single domain named ENSUREPASS.com. All servers on the ENSUREPASS.com network have Windows Server 2012 installed, and all workstations have Windows 8 installed. You are running a training exercise for junior administrators. You are currently discussing the Always Offline Mode. Which of the following is TRUE with regards to the Always Offline Mode? (Choose all that apply.) A. It allows for swifter access to cached files and redirected folders. B. To enable Always Offline Mode, you have to satisfy the forest and domain functional-level requirements, as well as schema requirements. C. It allows for lower bandwidth usage due to users are always working offline. D. To enable Always Offline Mode, you must have workstations running Windows 7 or Win dows Server 2008 R2.

Correct Answer: AC Explanation: Offline Files have four modes of operation: Online Slow link Auto offline Manual offline Offline Files transition between the three modes online, slow link and auto offline depending on connection speed. The user can always override the automatic mode selection by manually switching to manual offline mode. To determine the connection speed two pings with default packet size are sent to the file server. If the average round-trip time is below 80 ms (Windows 7) or 35 ms (Windows 8), the connection is put into online mode, otherwise into slow link mode. The latency value of 35/80 ms is configurable through the Group Policy setting Configure slow-link mode. Reads, Writes and Synchronization In online mode, changes to files are made on the file server as well as in the local cache (this induces a performance hit - see this article for details). Reads are satisfied from the local cache (if in sync). In slow link mode, changes to files are made in the local cache. The local cache is background-synchronized with the file server every 6 hours (Windows 7) or 2 hours (Windows 8), by default. This can be changed through the Group Policy setting Configure Background Sync. . In auto offline mode, all reads and writes go to the local cache. No synchronization occurs. . In manual offline mode, all reads and writes go to the local cache. No synchronization occurs by default, but background synchronization can be enabled through the Group Policy setting Configure Background Sync.

You have a new server named Server1 that runs Windows Server 2012 R2. Server1 has two dual-core processors and 32 GB of RAM. You install the Hyper-V server role on Server1. You create two virtual machines on Server1 that each have 8 GB of memory. You need to minimize the amount of time it takes for both virtual machines to access memory. What should you configure on each virtual machine? A. Resource control B. Dynamic Memory C. NUMA topology D. Memory weight

Correct Answer: B Explanation: * Dynamic Memory is a new Hyper-V feature that helps you use physical memory more efficiently. With Dynamic Memory, Hyper-V treats memory as a shared resource that can be reallocated automatically among running virtual machines. Dynamic Memory adjusts the amount of memory available to a virtual machine, based on changes in memory demand and values that you specify. Dynamic Memory is available for Hyper-V in Windows Server 2008 R2 Service Pack 1 (SP1). * Dynamic Memory helps you use memory resources more efficiently. Before this feature was introduced, changing the amount of memory available to a virtual machine could be done only when the virtual machine was turned off. With Dynamic Memory, Hyper-V can provide a virtual machine with more or less memory dynamically in response to changes in the amount of memory required by the workloads or applications running in the virtual machine. As a result, Hyper-V can distribute memory more efficiently among the running virtual machines configured with Dynamic Memory. Depending on factors such as workload, this efficiency can make it possible to run more virtual machines at the same time on one physical computer. Reference: Hyper-V Dynamic Memory Configuration Guide

You have a domain controller named Server1 that runs Windows Server 2012 R2 and has the DNS Server server role installed. Server1 hosts a DNS zone named contoso.com and a GlobalNames zone. You discover that the root hints were removed from Server1. You need to view the default root hints of Server1. What should you do? A. From Event Viewer, open the DNS Manager log. B. From Notepad, open the Cache.dns file. C. From Windows Powershell, run Get-DNSServerDiagnostics. D. From nslookup, run root server1.contoso.com

Correct Answer: B Explanation: A. Allows you to troubleshoot DNS issues B. DNS Server service implements root hints using a file, Cache.dns, stored in the systemrootSystem32Dnsfolder on the server C. Gets DNS event logging details

Your network contains a production Active Directory forest named contoso.com and a test Active Directory forest named contoso.test. A trust relationship does not exist between the forests. In the contoso.test domain, you create a backup of a Group Policy object (GPO) named GPO1. You transfer the backup of GPO1 to a domain controller in the contoso.com domain. You need to create a GPO in contoso.com based on the settings of GPO1. You must achieve this goal by using the minimum amount of Administrative effort. What should you do? A. From Windows PowerShell, run the Get-GPO cmdlet and the Copy- GPO cmdlet. B. From Windows PowerShell, run the New-GPO cmdlet and the Import- GPO cmdlet. C. From Group Policy Management, create a new starter GPO. Right-click the new starter GPO, and then click Restore from Backup. D. From Group Policy Management, right-click the Croup Policy Objects container, and then click Manage Backups.

Correct Answer: B Explanation: A. Copy-GPO requires domain trust / copy from one domain to another domain within the same forest. B. The Import-GPO cmdlet imports the settings from a GPO backup into a specified target GPO. Thetarget GPO can be in a different domain or forest than that from which the backup was made and itdoes not have to exist prior to the operation. C. D: You can also restore GPOs. This operation takes a backed-up GPO and restores it to the same domain from rom the GPO's original which it was backed up. You cannot restore a GPO from backup into a domain different f domain. The New-GPO cmdlet creates a new GPO with a specified name. By default, the newly created GPO is not linked to a site, domain, or organizational unit (OU). The Import-GPO cmdlet imports the settings from a GPO backup into a specified target GPO. The target GPO can be in a different domain or forest than that from which the backup was made and it does not have to exist prior to the operation. The Restore-GPO cmdlet restores a GPO backup to the original domain from which it was saved. If the original domain is not available, or if the GPO no longer exists in the domain, the cmdlet fails.

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2. You need to configure a central store for the Group Policy Administrative Templates. What should you do on DC1? A. From Server Manager, create a storage pool. B. From Windows Explorer, copy the PolicyDefinitions folder to the SYSVOLcontoso.compolicies folder. C. From Server Manager, add the Group Policy Management feature D. From Windows Explorer, copy the PolicyDefinitions folder to the NETLOGON share.

Correct Answer: B Explanation: A. Create Disk Storage Pool B. PolicyDefinitions folder in SYSVOL C. Group Policy Management is a console for GPO Mgmt D. Folder is for logon scripts PolicyDefinitions folder within the SYSVOL folder hierarchy. By placing the ADMX files in this directory,they are replicated to every DC in the domain; by extension, the ADMX-aware Group Policy ManagementConsole in Windows Vista, Windows 7, Windows Server 2008 and R2 can check this folder as an additionalsource of ADMX files, and will report them accordingly when setting your policies. By default, the folder is not created. Whether you are a single DC or several thousand, I would stronglyrecommend you create a Central Store and start using it for all your ADMX file storage. It really does work well. The Central Store To take advantage of the benefits of .admx files, you must create a Central Store in the SYSVOL folder ona domain controller. The Central Store is a file location that is checked by the Group Policy tools. The GroupPolicy tools use any .admx files that are in the Central Store. The files that are in the Central Store are laterreplicated to all domain controllers in the domain. To create a Central Store for .admx and .adml files, create a folder that is named PolicyDefinitions in thefollowing location: \FQDNSYSVOLFQDNpolicies Note: FQDN is a fully qualified domain name.

You have a server named Server1 that runs Windows Server 2012 R2. You promote Server1 to domain controller. You need to view the service location (SVR) records that Server1 registers on DNS. What should you do on Server1? A. Open the Srv.sys file B. Open the Netlogon.dns file C. Run ipconfig/displaydns D. Run Get-DnsServerDiagnostics

Correct Answer: B Explanation: A. Timestamp server driver B. Netlogon service creates a log file that contains all the locator resource records stored in netlogon. C. used to display current resolver cache content D. Gets DNS event logging details

You have a server named Server1 that runs Windows Server 2012 R2. You connect three new hard disks to Server1. You need to create a storage space that contains the three disks. The solution must meet the following requirements: - Provide fault tolerance if a single disk fails. - Maximize the amount of files that can be stored in the storage space. What should you create? A. A simple space B. A spanned volume C. A mirrored space D. A parity space

Correct Answer: D Explanation: A. Stripes data across a set of pool disks, and is not resilient to any disk failures. B. A spanned volume is a dynamic volume consisting of disk space on more than one physical disk and not fault tolerant C. Fault tolerant but Not max space D. Fault tolerant and better space ratio Parity spaces are designed for capacity efficiency and increased resiliency. Parity spaces are best suited for archival data and streaming media, such as music and videos.

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Print and Document Services server role installed. Server1 is connected to two identical print devices. You need to ensure that users can submit print jobs to the print devices. The solution must ensure that if one print device fails, the print jobs will print automatically on the other print device. What should you do on Server1? A. Add two printers and configure the priority of each printer. B. Add one printer and configure printer pooling. C. Install the Network Load Balancing (NLB) feature, and then add one printer. D. Install the Failover Clustering feature, and then add one printer

Correct Answer: B Explanation: A. expedite documents that need to be printed immediately B. A printing pool is one logical printer connected to multiple printers through multiple ports of theprint server. The printer that is idle receives the next document sent to the logical printer. Whenprinting to a printer pool, the spooler will send waiting jobs to alternate ports. If the original or alternateports are not available C. NLB for printing is not supported D. Would need 2 nodes A printing pool is one logical printer connected to multiple printers through multiple ports of the print server. The printer that is idle receives the next document sent to the logical printer. This is useful in a network with a high volume of printing because it decreases the time users wait for theirdocuments. A printing pool also simplifies administration because multiple printers can be managed from the same logicalprinter on a server. If one device within a pool stops printing, the current document is held at that device. The succeedingdocuments print to other devices in the pool, while the delayed document waits until the nonfunctioningprinter is fixed. Efficient printer pools have the following characteristics: All printers in the pool are the same model. Printer ports can be of the same type or mixed (parallel, serial, and network). It is recommended that all printers be in one location. Because it is impossible to predict which printer willreceive the document, keep all printers in a pool in a single location. Otherwise, users might have a hard timefinding their printed document. http://technet.microsoft.com/en-us/library/cc757086(v=ws.10).aspx http://technet.microsoft.com/en-us/library/cc784619(v=ws.10).aspx http://technet.microsoft.com/en-us/library/cc958172.aspx You can create a printing pool to automatically distribute print jobs to the next available printer. A printing poolis one logical printer connected to multiple printers through multiple ports of the print server. The printer that isidle receives the next document sent to the logical printer.

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. You create and enforce the default AppLocker executable rules. Users report that they can no longer execute a legacy application installed in the root of drive C. You need to ensure that the users can execute the legacy application. What should you do? A. Modify the action of the existing rules. B. Create a new rule. C. Add an exception to the existing rules. D. Delete an existing rule.

Correct Answer: B Explanation: AppLocker is a feature that advances the functionality of the Software Restriction Policies feature. AppLocker contains new capabilities and extensions that reduce administrative overhead and help administrators control how users can access and use files, such as executable files, scripts, Windows Installer files, and DLLs. By using AppLocker, you can: Define rules based on file attributes that persist across application updates, such as the publisher name (derived from the digital signature), product name, file name, and file version. You can also create rules based on the file path and hash. Assign a rule to a security group or an individual user. Create exceptions to rules. For example, you can create a rule that allows all users to run all Windows binaries except the Registry Editor (Regedit.exe). Use audit-only mode to deploy the policy and understand its impact before enforcing it. . Create rules on a staging server, test them, export them to your production environment, and then import them into a Group Policy Object. Simplify creating and managing AppLocker rules by using Windows PowerShell cmdlets for AppLocker. AppLocker default rules AppLocker allows you to generate default rules for each of the rule types. Executable default rule types: Allow members of the local Administrators group to run all applications. Allow members of the Everyone group to run applications that are located in the Windows folder. Allow members of the Everyone group to run applications that are located in the Program Filesfolder. Windows Installer default rule types: Allow members of the local Administrators group to run all Windows Installer files. Allow members of the Everyone group to run digitally signed Windows Installer files. Allow members of the Everyone group to run all Windows Installer files located in the WindowsInstaller folder. Script default rule types: Allow members of the local Administrators group to run all scripts. Allow members of the Everyone group to run scripts located in the Program Files folder. Allow members of the Everyone group to run scripts located in the Windows folder. DLL default rule types:( this on can affect system performance ) Allow members of the local Administrators group to run all DLLs. Allow members of the Everyone group to run DLLs located in the Program Files folder. Allow members of the Everyone group to run DLLs located in the Windows folder. You can apply AppLocker rules to individual users or to a group of users. If you apply a rule to a group of users, all users in that group are affected by that rule. If you need to allow a subset of a user group to use an application, you can create a special rule for that subset. For example, the rule "Allow Everyone to run Windows except Registry Editor" allows everyone in the organization to run the Windows operating system, but it does not allow anyone to run Registry Editor. The effect of this rule would prevent users such as Help Desk personnel from running a program that is necessary for their support tasks. To resolve this problem, create a second rule that applies to the Help Desk user group: "Allow Help Desk to run Registry Editor." If you create a deny rule that does not allow any users to run Registry Editor, the deny rule will override the second rule that allows the Help Desk user group to run Registry Editor.

You work as a senior administrator at ENSUREPASS.com. The ENSUREPASS.com network consists of a single domain named ENSUREPASS.com. All servers on the ENSUREPASS.com network have Windows Server 2012 R2 installed, and all workstations have Windows 8 installed. You are running a training exercise for junior administrators. You are currently discussing a Windows PowerShell cmdlet that activates previously de-activated firewall rules. Which of the following is the cmdlet being discussed? A. Set-NetFirewallRule B. Enable-NetFirewallRule C. Set-NetIPsecRule D. Enable-NetIPsecRule

Correct Answer: B Explanation: Enable-NetFirewallRule - Enables a previously disabled firewall rule.

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2. You need to create 3-TB virtual hard disk (VHD) on Server1. Which tool should you use? A. Server Manager B. Diskpart C. New-StoragePool D. New-VirtualDisk

Correct Answer: B Explanation: New-VirtualDisk - Creates a new virtual disk in the specified storage pool. Although the new Server Manager UI in Windows Server 2012 R2 provides a very convenient and intuitive workflow to provision and manage Storage, interaction with PowerShell is required to access many of the advanced features. If I then create a simple 200GB Virtual Disk via the UI named VDiskSimpleUI, the resulting Virtual Disk leverages 8 columns and maintains 1 copy of the data. But when creating the Virtual Disk via PowerShell, I can force the tripping across all nine of the disks and optimize performance. New-VirtualDisk -StoragePoolFriendlyName Pool01 - ResiliencySettingName Simple - Size 200GB - FriendlyName VDiskSimplePS - ProvisioningType Fixed - NumberOfDataCopies 1 - NumberOfColumns 9 And creating a mirrored 200GB Virtual Disk via the UI named VDiskMirrorUI produces a Virtual Disk with 4 columns and 2 data copies. But with PowerShell, I can create a slightly different configuration, increasing the data protection (and also the disk footprint): New-VirtualDisk -StoragePoolFriendlyName Pool01 -ResiliencySettingName Mirror -Size 200GB - FriendlyName VDiskMirrorPS -ProvisioningType Fixed -NumberOfDataCopies 3 -NumberOfColumns 3

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2. Server1 runs Windows Server 2012 R2. Server2 runs Windows Server 2008 R2 Service Pack 1 (SP1) and has the DHCP Server server role installed. You need to manage DHCP on Server2 by using the DHCP console on Server1. What should you do first? A. From Windows PowerShell on Server2, run Enable-PSRemoting cmdlet. B. From Windows PowerShell on Server1, run Install-WindowsFeature. C. From Windows Firewall with Advanced Security on Server2, create an inbound rule. D. From Internet Explorer on Server2, download and install Windows Management Framework 3.0.

Correct Answer: B Explanation: Original answer is A. When the DHCP role is installed, it appears that the firewall rules are automatically added. This means you only need to add the DHCP Manager MMC snap-in which is a Role Administration Tool feature. So the correct answer must be B.

Your network contains an active directory domain named Contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. You create a group Managed Service Account named gservice1. You need to configure a service named service1 to run as the gservice1 account. How should you configure service1? A. From Services Console configure the recovery settings B. From a command prompt ,run sc.exe and specify the config parameter C. From Windows PowerShell,run Set-Service and specify the -PassThrough parameter D. From a command prompt ,run sc.exe and specify the sdset parameter

Correct Answer: B Explanation: Sc config, Modifies the value of a service's entries in the registry and in the Service Control Manager database. obj= {<AccountName> | <ObjectName>} Specifies a name of an account in which a service will run, or specifies a name of the Windows driver object in which the driver will run. The default setting is LocalSystem. password= <Password> Specifies a password. This is required if an account other than the LocalSystem account is used.

Your network contains an active directory forest. The forest functional level is Windows server 2012. The forest contains a single domain. The domain contains a member server named Server1 that run windows server 2012. You purchase a network scanner named Scanner1 that supports Web Services on Devices (WDS). You need to share the network scanner on Server1 Which server role should you install on Server1? A. Web Server (IIS) B. Fax Server C. File and Storage Services D. Print and Document Services

Correct Answer: D Explanation: Print and Document Services enables you to centralize print server and network printer tasks. With this role, you can also receive scanned documents from network scanners and route the documents to a shared network resource, Windows SharePoint Services site, or email addresses. Windows Server 2012 uses Web Services on Devices (WSD) technologies to integrate scanning devices into the system

Your network contains an Active Directory domain named contoso.com. You need to prevent users from installing a Windows Store app named App1. What should you create? A. An application control policy executable rule B. An application control policy packaged app rule C. A software restriction policy certificate rule D. An application control policy Windows Installer rule

Correct Answer: B Explanation: Windows 8 is coming REALLY SOON and of course one of the big new things to computer with that is the newPackaged Apps that run in the start screen. However these apps are very different and do not install liketraditional apps to a path or have a true "executable" file to launch the program. Ofcourse enterprises need a way to control these packaged apps and therefore Microsoft has added a newfeature Packaged Apps option to the App1ocker feature. A. For .exe or .com B. A publisher rule for a Packaged app is based on publisher, name and version C. You can create a certificate rule that identifies software and then allows or does not allow the software torun, depending on the security level. D. For .msi or .msp Packaged apps (also known as Windows 8 apps) are new to Windows Server 2012 R2 and Windows 8. They are based on the new app model that ensures that all the files within an app package share the sameidentity. Therefore, it is possible to control the entire Application using a single App1ocker rule as opposed to the nonpackagedapps where each file within the app could have a unique identity. Windows does not support unsigned packaged apps which implies all packaged apps must be signed. App1ocker supports only publisher rules for Packaged apps. A publisher rule for a Packaged app is based on the following information: Publisher of the package Package name Package version Therefore, an App1ocker rule for a Packaged app controls both the installation as well as the running of theapp. Otherwise, the publisher rules for Packaged apps are no different than the rest of the rule collections; theysupport exceptions, can be increased or decreased in scope, and can be assigned to users and groups. Apps run in the start screen. However these apps are very different and do not install like traditional apps to a path or have a true"executable" file to launch the program. Enterprises need a way to control these packaged apps and therefore Microsoft has added a new featurePackaged Apps option to the App1ocker feature.

Your network contains an Active Directory domain named contoso.com. The domain contains two servers that run Windows Server 2012 R2. You create a security template named template 1 by using the Security Templates snap-in. You need to apply Template 1 to Server2. Which tool should you use? A. Authorization Manager B. Local Security Policy C. Certificate Templates D. System Configuration

Correct Answer: B Explanation: A security policy is a combination of security settings that affect the security on a computer. You can use your local security policy to edit account policies and local policies on your local computer.

Your network contains an Active Directory domain named contoso.com. The network contains 500 client computers that run Windows 8. All of the client computers connect to the Internet by using a web proxy. You deploy a server named Server1 that runs Windows Server 2012 R2. Server1 has the DNS Server server role installed. You configure all of the client computers to use Server1 as their primary DNS server. You need to prevent Server1 from attempting to resolve Internet host names for the client computers. What should you do on Server1? A. Configure the Security settings of the contoso.com zone. B. Remove all root hints. C. Create a primary zone named ".". D. Create a primary zone named "root". E. Create a primary zone named "GlobalNames". F. Create a forwarder that points to 169.254.0.1. G. Create a stub zone named "root". H. Create a zone delegation for GlobalNames.contoso.com.

Correct Answer: BC Explanation: B. necessary to remove the default root hints files C. Create a primary zone named "." ( dot zone, root ) When you install DNS on a Windows server that does not have a connection to the Internet, the zone for the domain is created and a root zone, also known as a dot zone, is also created. This root zone may prevent access to the Internet for DNS and for clients of the DNS. If there is a root zone, there are no other zones other than those that are listed with DNS, and you cannot configure forwarders or root hint servers. Root domain This is the top of the tree, representing an unnamed level; it is sometimes shown as two empty quotation marks (""), indicating a null value. When used in a DNS domain name, it is stated by a trailing period (.) to designate that the name is located at the root or highest level of the domain hierarchy. In this instance, the DNS domain name is considered to be complete and points to an exact location in the tree of names. Names stated this way are called fully qualified domain names (FQDNs).

You work as a senior administrator at ENSUREPASS.com. The ENSUREPASS.com network consists of a single domain named ENSUREPASS.com. All servers on the ENSUREPASS.com network have Windows Server 2012 R2 installed. You are running a training exercise for junior administrators. You are currently discussing the new VHD format called VHDX. Which of the following is TRUE with regards to VHDX? (Choose all that apply.) A. It supports virtual hard disk storage capacity of up to 64 GB. B. It supports virtual hard disk storage capacity of up to 64 TB. C. It does not provide protection against data corruption during power failures. D. It has the ability to store custom metadata about the file that the user might want to record.

Correct Answer: BD Explanation: The main new features of the VHDX format are: Support for virtual hard disk storage capacity of up to 64 TB. Protection against data corruption during power failures by logging updates to the VHDX metadata structures. Improved ali gnment of the virtual hard disk format to work well on large sector disks. The VHDX format also provides the following features: Larger block sizes for dynamic and differencing disks, which allows these disks to attune to the needs of the workload. A 4-KB logical sector virtual disk that allows for increased performance when used by applications and workloads that are designed for 4-KB sectors. The ability to store custom metadata about the file that the user might want to record, such as operating system version or patches applied. Efficiency in representing data (also known as "trim"), which results in smaller file size and allows the underlying physical storage device to reclaim unused space. (Trim requires physical disks directly attached to a virtual machine or SCSI disks, and trim-compatible hardware.) VHDX Format - Features and Benefits VHDX format features provide features at the virtual hard disk as well as virtual hard disk file layers and is optimized to work well with modern storage hardware configurations and capabilities. At the virtual hard disk layer, benefits include the ability to represent a large virtual disk size up to 64 TB, support larger logical sector sizes for a virtual disk up to 4 KB that facilitates the conversion of 4 KB sector physical disks to virtual disks, and support large block sizes for a virtual disk up to 256 MB that enables tuning block size to match the IO patterns of the application or system for optimal performance. At the virtual hard disk file layer, the benefits include the use of a log to ensure resiliency of the VHDX file to corruptions from system power failure events and a mechanism that allows for small pieces of user generated data to be transported along with the VHDX file. On modern storage platforms, the benefits include optimal performance on host disks that have physical sector sizes larger than 512 bytes through improved data alignment and capability to use the information from the UNMAP command, sent by the application or system using the virtual hard disk, to optimize the size of the VHDX file. The format is designed so that additional features could be introduced in the future by Microsoft or extended by other parser implementations. The format provides parsers the ability to detect features in a VHDX file that a parser does not understand.

You work as an administrator at ENSUREPASS.com. The ENSUREPASS.com network consists of a single domain named ENSUREPASS.com. All servers on the ENSUREPASS.com network have Windows Server 2012 installed. You are in the process of installing a Server Core installation of Windows Server 2012 on a new ENSUREPASS.com server, named ENSUREPASS-SR13. Which of the following is TRUE with regards to a installing a Server Core installation of Windows Server 2012? (Choose all that apply.) A. The Server Graphical Shell is installed, but not enabled. B. Server roles can be configured locally via the command prompt using Windows PowerShell. C. Server roles can be configured locally via Server Manager. D. You are able to access the Microsoft Management Console locally. E. The Desktop Experience is not available.

Correct Answer: BE Explanation: A. There is no Windows shell and very limited GUI functionality B. The Server Core interface is a command prompt with PowerShell support. C. Only Remotely using Server Manager D. Microsoft Management Console is not available locally E. Desktop Experience is not available Server Core is a minimal server installation option for computers running on the operating system. Server Core provides a low-maintenance server environment with limited functionality. The minimal nature of Server Core creates limitations: There is no Windows shell and very limited GUI functionality. The Server Core interface is a command prompt with PowerShell support. There is limited MSI support (unattended mode only). Server Graphical Shell is not installed Microsoft Management Console: not available locally. Desktop Experience: not available.

Your network contains an active directory domain named Contoso.com. The domain contains 100 user accounts that reside in an organizational unit (OU) named OU1. You need to ensure that user named user1 can link and unlink Group Policy Objects(GPOs) to OU1. The solution must minimize the number of permissions assigned to user1. What should you do? A. Run the Delegation of Control Wizard on the Policies containers B. Run the Set-GPPermission cmdlet C. Run the Delegation of Control Wizard on OU1 D. Modify the permission on the user1 account

Correct Answer: C Explanation: A. Not minimum permissions B. Grants a level of permissions to a security principal for one GPO or all the GPOs in a domain C. Minimizes delegated permission to a single OU D. Will not allow GPO changes to the OU Delegation of Control Wizard The following are common tasks that you can select to delegate control of them: Create, delete, and manage user accounts Reset user passwords and force password change at next logon Read all user information Modify the membership of a group Join a computer to a domain Manage Group Policy links Generate Resultant Set of Policy (Planning) Generate Resultant Set of Policy (Logging) Create, delete, and manage inetOrgPerson accounts Reset inetOrgPerson passwords and force password change at next logon Read all inetOrgPerson information

You have a server named Server1. Server1 runs Windows Server 2012 R2 and has the File and Storage Services server role installed. You attach four 500-GB disks to Server1. You need to configure the storage to meet the following requirements: - Storage for an application named Application1 must be provided. Application1 requires 20 GB and will require a maximum of 800 GB in three years. - Storage for an application named Application2 must be provided. Application2 requires 20 GB and will require a maximum of 900 GB in three years. - The solution must provide the ability to dynamically add storage without requiring configuration changes to the applications. - The storage must be available if a single disk fails. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) A. From File and Storage Services, create virtual disks by using fixed provisioning. B. From File and Storage Services, create a storage pool that uses all four disks. C. From Disk Management, create two new mirror volumes that use two disks each. D. From Disk Management, create a new RAID-5 volume that uses all four disks. E. From File and Storage Services, create virtual disks by using thin provisioning.

Correct Answer: BE Explanation: Original answer is AB. But the correct answer is B and E. it can't be A, because a fixed disk can't get expanding. Correct Answer: BE Explanation: Original answer is AB. But the correct answer is B and E. it can't be A, because a fixed disk can't get expanding.

A company has a forest with 4 sites. Subnets are as follows: - MainOffice 172.16.1.0 Subnet: 255.255.255.0 Gateway 172.16.1.254 - Site1 192.168.12.0 Subnet: 255.255.255.0 - Site 2 192.168.13.0 Subnet: 255.255.255.0 - Site 3 192.168.14.0 Subnet: 255.255.255.0 - Site 4 192.168.15.0 Subnet: 255.255.255.0 You add a new server to the MainOffice and it needs to be able to communicate to all sites. Which route command would you run? A. route add -p 192.168.8.0 netmask 255.255.252.0 172.16.1.254 B. route add -p 192.168.0.0 netmask 255.255.248.0 172.16.1.254 C. route add -p 192.168.12.0 netmask 255.255.252.0 172.16.1.254 D. route add -p 192.168.12.0 netmask 255.255.240.0 172.16.1.254

Correct Answer: C

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2008 R2. One of the domain controllers is named DCI. The network contains a member server named Server1 that runs Windows Server 2012 R2. You need to promote Server1 to a domain controller by using install from media (IFM). What should you do first? A. Create a system state backup of DC1. B. Create IFM media on DC1. C. Upgrade DC1 to Windows Server 2012 R2. D. Run the Active Directory Domain Services Configuration Wizard on Server1. E. Run the Active Directory Domain Services Installation Wizard on DC1.

Correct Answer: C Explanation: A. Backs up system state data to be restored C. Only valid option. You could install ADDS role on Server 1 and run ADDS configuration wizard andadd DC to existing domain D. Need to add ADDS role first E. Wrong server Installation from media does not work across different operating system versions. In other words, you must use a Windows Server 2012 R2 domain controller to generate installation media to usefor another Windows Server 2012 R2 domain controller installation. We can use the Install from media (IFM) option to install an Additional Domain Controller in an existing domainis the best option such as a branch office scenario where network is slow, unreliable and costly. IFM will minimize replication traffic during the installation because it uses restored backup files to populate theAD DS database. This will significantly reduce the amount of traffic copied over the WAN link. Things to remember: If you are deploying your first Domain Controller in the domain, you cannot use IFM. The OS will need to match the IFM media. (If you create a 2008 R2 IFM, promote a 2008 R2 DC) If you are creating a DC that will be a Global Catalog Server, create your IFM on a Global Catalog Server. If you are creating a DC that will be a DNS Server, create your IFM on a DNS Server. If you want to copy the SYSVOL, the DC on which you generate the installation media and the new DC mustbe at least running Windows Server 2008 with Service Pack 2 or Windows Server 2008 R2. Membership of the Domain Admins group is the minimum required to complete IFM. used by the IFM option is created with Windows Server Backup or Ntdsutil.exe from another existingWindows Server 2012 R2 computer only You cannot use a Windows Server 2008 R2 or previous operating system to create media for a Windows Server 2012 R2 domain controller.

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Windows Server 2012 R2. You create a group Managed Service Account named gservice1. You need to configure a service named Service1 to run as the gservice1 account. How should you configure Service1? A. From the Services console, configure the General settings. B. From Windows PowerShell, run Set-Service and specify the -StartupType parameter. C. From a command prompt, run sc.exe and specify the config parameter. D. From a command prompt, run sc.exe and specify the privs parameter.

Correct Answer: C Explanation: A. General settings only allow you to stop, start and set type/paramaters B. Set-Service provides a way for you to change the Description, StartupType, or DisplayName of a service C. Modifies service configuration D. Sets the response/action on service failure http://windows.microsoft.com/en-us/windows-vista/using-system-configuration

A network technician installs Windows Server 2012 R2 Standard on a server named Server1. A corporate policy states that all servers must run Windows Server 2012 R2 Enterprise. You need to ensure that Server1 complies with the corporate policy. You want to achieve this goal by using the minimum amount of administrative effort. What should you perform? A. a clean installation of Windows Server 2012 R2 B. an upgrade installation of Windows Server 2012 R2 C. online servicing by using Dism D. offline servicing by using Dism

Correct Answer: C Explanation: A. Not least effort B. Not least effort C. dism /online /set-edition D. offline would be less ideal and more workex: DISM /online /Set- Edition:ServerEnterprise/ProductKey:489J6-VHDMP-X63PK-3K798-CPX3YWindows Server 2008 R2/2012 contains a command-line utility called DISM (Deployment Image Servicing andManagement tool). This tool has many features, but one of those features is the ability to upgrade the edition ofWindows in use. Note that this process is for upgrades only and is irreversible. You cannot set a Windowsimage to a lower edition. The lowest edition will not appear when you run the /Get- TargetEditions option. If the server is running an evaluation version of Windows Server 2012 R2 Standard or Windows Server 2012 R2 Datacenter, you can convert it to a retail version as follows: If the server is a domain controller, you cannot convert it to a retail version. In this case, install an additionaldomain controller on a server that runs a retail version and remove AD DS from the domain controller thatruns on the evaluation version. From an elevated command prompt, determine the current edition name with the command DISM /online /Get-CurrentEdition. Make note of the edition ID, an abbreviated form of the edition name. Then run DISM /online /Set-Edition:<edition ID> /ProductKey:XXXXXXXXXX-XXXXX-XXXXX- XXXXX/AcceptEula,providing the edition ID and a retail product key. The server will restart twice.

Your network contains an active directory domain named contoso.com. The domain contains a domain controller named DCS. DCS has a server core installation of windows server 2012. You need to uninstall Active Directory from DCS manually. Which tool should you use? A. The Remove-WindowsFeature cmdlet B. the dsamain.exe command C. the ntdsutil.exe command D. the Remove-ADComputer cmdlet

Correct Answer: C Explanation: A. Removes Roles and Features to remove DC use Uninstall-addsdomaincontroller B.Exposes Active Directory data that is stored in a snapshot or backup as a Lightweight Directory Access Protocol (LDAP) server C. Manually removes a domain controller D. Removes AD computer object

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that hosts the primary DNS zone for contoso.com. All client computers are configured to use DC1 as the primary DNS server. You need to configure DC1 to resolve any DNS requests that are not for the contoso.com zone by querying the DNS server of your Internet Service Provider (ISP). What should you configure? A. Name server (NS) records B. Condition& forwarders C. Forwarders D. Naming Authority Pointer (NAPTR) DNS resource records (RR)

Correct Answer: C Explanation: A. Specifies a name server for the domain, which allows DNS lookups within various zones. Each primary andsecondary name server should be declared through this record. B. http://windowsitpro.com/networking/q-whats-conditional-dns-forwarding C. manage the Domain Name System (DNS) traffic between your network and the Internet D.Configure forwarders to send DNS queries directly to your ISP's DNS server or other DNS servers. Most of the time, when you configure forwarders, DNS performance and efficiency increases, but thisconfiguration can also introduce a point of failure if the forwarding DNS server is experiencing problems. A forwarder is a Domain Name System (DNS) server on a network used to forward DNS queries for externalDNS names to DNS servers outside of that network. A DNS server on a network is designated as a forwarder by having the other DNS servers in the networkforward the queries they cannot resolve locally to that DNS server. By using a forwarder, you can manage name resolution for names outside of your network, such as names onthe Internet, and improve the efficiency of name resolution for the computers in your network.

Your network contains an Active Directory domain named contoso.com. The domain contains 100 servers. The servers are contained in a organizational unit (OU) named ServersOU. You need to create a group named Group1 on all of the servers in the domain. You must ensure that Group1 is added only to the servers. What should you configure? A. a Local Users and Groups preferences setting in a Group Policy linked to the Domain Controllers OU B. a Restricted Groups setting in a Group Policy linked to the domain C. a Local Users and Groups preferences setting in a Group Policy linked to ServersOU D. a Restricted Groups setting in a Group Policy linked to ServersOU

Correct Answer: C Explanation: A. This would add the group to the wrong OU B. This would affect the whole domain and would effect member of the group C. allows you to centrally manage local users and groups on domain member computers and is this isthe correct OU for the GPO change D. Restricted Groups defines what member or groups should exist as part of a group Why use Group Policy preferences? Unlike Group Policy settings, which App1y to both local computer policy and Active Directory policy, GroupPolicy preferences only App1y to Active Directory policy. You use preferences to configure many areas of theOS, including: System devices, such as USB ports, floppy drives and removable media Network shares and mapping network shares to drive letters System and user environment variables User and group accounts for the local computer VPN and dial-up networking connections Printer configuration and mapping Registry settings, schedule tasks and system services Settings for Folder Options, Internet Options and Regional and Language Options Settings for power schemes and power management Start Menu properties and menu items

Your network contains an Active Directory domain named adatum.com. The domain contains several thousand member servers that run Windows Server 2012 R2. All of the computer accounts for the member servers are in an organizational unit (OU) named ServersAccounts. Servers are restarted only occasionally. You need to identify which servers were restarted during the last two days. What should you do? A. Run dsquery computer and specify the -stalepwd parameter B. Run dsquery server and specify the -o parameter. C. Run Get-ADComputer and specify the lastlogon property. D. Run Get-ADComputer and specify the SearchScope parameter

Correct Answer: C Explanation: A. dsquery computer -stalepwdnumber_of_days - Searches for all computers that have not changed theirpassword for the specified number_of_days. B. dsquery server -o {dn | rdn | samid} - Specifies the format in which the list of entries found by the search willbe displayed: dn distinguished name of each entry, default; rdn relative distinguished name of each entry; samid SAM account name of each entry computer group server user; upn user principal name of each entryuser C. Gets one or more Active Directory computers lastLogondate should be used D. SearchScope specifies the scope of an Active Directory search. Possible values for this parameter are: Base or 0; OneLevel or 1; Subtree or 2 - A Base query searches only the current path or object. AOneLevelquery searches the immediate children of that path or object. A Subtree query searches the current path orobject and all children of that path or object.

Your network contains an Active Directory domain named contoso.com. The network contains a domain controller named DC1 that has the DNS Server server role installed. DC1 has a standard primary DNS zone for contoso.com. You need to ensure that only client computers in the contoso.com domain will be able to add their records to the contoso.com zone. What should you do first? A. Modify the Security settings of Dc1 B. Modify the Security settings of the contoso.com zone. C. Store the contoso.com zone in Active Directory D. Sign the contoso.com zone.

Correct Answer: C Explanation: C. Only Authenticated users can create records when zone is stored in AD Secure dynamic updates allow an administrator to control what computers update what names and preventunauthorized computers from overwriting existing names in DNS. If you have an Active Directory infrastructure, you can only use Active Directory - integrated zones on ActiveDirectory domain controllers. If you are using Active Directory - integrated zones, you must decide whether or not to store Active Directory - integrated zones in the Application directory partition. To configure computers to update DNS data more securely, store DNS zones in Active Directory DomainServices (AD DS) and use the secure dynamic update feature. Secure dynamic update restricts DNS zone updates to only those computers that are authenticated and joinedto the Active Directory domain where the DNS server is located and to the specific security settings that aredefined in the access control lists (ACLs) for the DNS zone.

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server 1. Server1 runs Windows Server 2012 R2. You need to create 3-TB virtual hard disk (VHD) on Server1. Which tool should you use? A. New-StorageSubsytemVirtualDisk B. Share and Storage Management C. Computer Management D. File Server Resource Manager (FSRM)

Correct Answer: C Explanation: For other questions to create a VHD (file) you can use computer management. - Share and storage management (2008 only) - New-storagesubsystemVirtualDisk (this is a virtual disk, NOT a virtual hard disk) - Server Manager (you would use this to create virtual disks, not virtual hard disks)

In an isolated test environment, you deploy a server named Server1 that runs a Server Core Installation of Windows Server 2012 R2. The test environment does not have Active Directory Domain Services (AD DS) installed. You install the Active Directory Domain Services server role on Server1. You need to configure Server1 as a domain controller. Which cmdlet should you run? A. Install-ADDSDomainController B. Install-ADDSDomatn C. Install-ADDSForest D. Install-WindowsFeature

Correct Answer: C Explanation: Install-ADDSDomainController - Installs a domain controller in Active Directory. Install-ADDSDomain - Installs a new Active Directory domain configuration. Install-ADDSForest - Installs a new Active Directory forest configuration. Install-WindowsFeature - Installs one or more Windows Server roles, role services, or features on either thelocal or a specified remote server that is running Windows Server 2012 R2. This cmdlet is equivalent to andreplaces Add-WindowsFeature, the cmdlet that was used to install roles, role services, and features. C:PS>Install-ADDSForest -DomainName corp.contoso.com -CreateDNSDelegation DomainMode Win2008 - ForestMode Win 2008 R2 -DatabasePath "d:NTDS" -SysvolPath "d:SYSVOL" -LogPath "e:Logs"Installs a new forest named corp.contoso.com, creates a DNS delegation in the contoso.com domain, setsdomain functional level to Windows Server 2008 R2 and sets forest functional level to Windows Server 2008,installs the Active Directory database and SYSVOL on the D: drive, installs the log files on the E: drive andhas the server automatically restart after AD DS installation is complete and prompts the user to provide andconfirm the Directory Services Restore Mode (DSRM) password.

You have two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 and Server2 are part of a workgroup. On Server1, you add Server2 to Server Manager. When you attempt to connect to Server2 from Server Manager, you receive the following error message: "Credentials not valid." You need to ensure that you can manage Server2 from Server1 by using Server Manager on Server1. What should you do? A. On Server 2, run the Configure-SmRemotingcmdlet. B. On Server 1, run the Set-NetFirewallRulecmdlet. C. On Server 1, run the Set-Item cmdlet. D. On Server 2, install the Remote Server Administration Tools (RSAT).

Correct Answer: C Explanation: On the computer that is running Server Manager, add the workgroup server name to the TrustedHosts list. This is a requirement of NTLM authentication. To add a computer name to an existing list of trusted hosts, add the Concatenate parameter to the command. For example, to add the Server01 computer to an existing list of trusted hosts, use the following command. Set-Item wsman:localhostClientTrustedHosts Server01 -Concatenate -Force

Your network contains a domain controller that is configured as a DNS server. The server hosts an Active Directory-integrated zone for the domain. You need to reduce how long it takes until stale records are deleted from the zone. What should you do? A. From the configuration directory partition of the forest, modify the tombstone lifetime. B. From the configuration directory partition of the forest, modify the garbage collection interval. C. From the aging properties of the zone, modify the no-refresh interval and the refresh interval. D. From the start of authority (SOA) record of the zone, modify the refresh interval and the expire interval.

Correct Answer: C Explanation: Scavenging automates the deletion of old records. When scavenging is enabled, then you should also change the no-refresh and refresh intervals of the aging properties of the zone else it may take too long for stale records to be deleted and the size of the DNS database can become large and have an adverse effect on performance.

You have an existing Active Directory site named Site1. You create a new Active Directory site and name it Site2. You need to configure Active Directory replication between Site1 and Site2. You install a new domain controller. You create the site link between Site1 and Site2. What should you do next? A. Use the Active Directory Sites and Services console to configure a new site link bridge object. B. Use the Active Directory Sites and Services console to decrease the site link cost between Site1 and Site2. C. Use the Active Directory Sites and Services console to assign a new IP subnet to Site2. Move the new domain controller object to Site2. D. Use the Active Directory Sites and Services console to configure the new domain controller as a preferred bridgehead server for Site1.

Correct Answer: C Explanation: http://www.enterprisenetworkingplanet.com/netsysm/article.php/624411/Intersite-Replication.htm Inter-site Replication The process of creating a custom site link has fivebasic steps: 1. Create the site link. 2. Configure the site link's associated attributes. 3. Create site link bridges. 4. Configure connection objects. (This step is optional.) 5. Designate a preferred bridgehead server. (This step is optional)

Your network contain an active directory domain named Contoso.com. The domain contains two servers named server1 and server2 that run Windows Server 2012 R2. You create a security template named template1 by using the security template snap-in. You need to apply template1 to server2. Which tool should you use? A. Security Templates B. Computer Management C. Security Configuration and Analysis D. System Configuration

Correct Answer: C Explanation: A. Template was already created - Provide standard security option to use in security policies B. Needs to be applied at the GP level C. Security templates are inactive until imported into a Group Policy object or the SecurityConfiguration and Analysis D. Tool to ID windows problems

Your network contains an Active Directory domain named contoso.com. The domain contains a member server named HVServer1. HVServer1 runs Windows Server 2012 R2 and has the Hyper-V server role installed. HVServer1 hosts two virtual machines named Server1 and Server2. Both virtual machines connect to a virtual switch named Switch1. On Server2, you install a network monitoring application named App1. You need to capture all of the inbound and outbound traffic to Server1 by using App1. Which two commands should you run from Windows PowerShell? (Each correct answer presents part of the solution. Choose two.) A. Get-VM "Server2" | Set-VMNetworkAdapter -IovWeight 1 B. Get-VM "Server1" | Set-VMNetworkAdapter -Allow/Teaming On C. Get-VM "Server1" | Set-VMNetworkAdapter -PortMirroring Source D. Get-VM "Server2" | Set-VMNetworkAdapter -PortMirroring Destination E. Get-VM "Server1" | Set-VMNetworkAdapter -IovWeight 0 F. Get-VM "Server2" | Set-VMNetworkAdapter-AllowTeaming On

Correct Answer: CD Explanation: C: Catching the traffic from Server1 D: Catching the traffic to Server1. Note: * Get-VM Gets the virtual machines from one or more Hyper-V hosts. -ComputerName<String[]> Specifies one or more Hyper-V hosts from which virtual machines are to be retrieved. NetBIOS names, IP addresses, and fully-qualified domain names are allowable. The default is the local computer — use "localhost" or a dot (".") to specify the local computer explicitly. * Set-VMNetworkAdapter Configures features of the virtual network adapter in a virtual machine or the management operating system. * -PortMirroring<VMNetworkAdapterPortMirroringMode> Specifies the port mirroring mode for the network adapter to be configured. Allowed values are None, Source, and Destination. If a virtual network adapter is configured as Source, every packet it sends or receives is copied and forwarded to a virtual network adapter configured to receive the packets. If a virtual network adapter is configured as Destination, it receives copied packets from the source virtual network adapter. The source and destination virtual network adapters must be connected to the same virtual switch. Specify None to disable the feature. Reference: Set-VMNetworkAdapter; Get-VM

You have a server named Server 1 that runs Windows Server 2012 R2. Server 1 has the Hyper-V server role installed. You have fixed-size VHD named Files.vhd. You need to make the contents in Files.vhd available to several virtual machines. The solution must meet the following requirements: - Ensure that if the contents are changed on any virtual machine, the changes are not reflected on the other virtual machines. - Minimize the amount of disk space used. What should you do? A. Create a fixed-size VHDX. Transfer the information from Files.vhd to the new VHDX file. B. Convert Files.vhd to a dynamically expanding VHD? C. Create a dynamically expanding VHDX. Transfer the information from Files.vhd to the new VHDX file. D. Create differencing VHDs that use Files.vhd as the parent disk.

Correct Answer: D Explanation: A. A conversion would be needed from VHD to VHDX. Not available to multiple VM's B. Single VHD not available to multiple VM's. Changes wouldn't be reflected C. A conversion would be needed from VHD to VHDX. Not available to multiple VM's D. Child disk for multiple VM's with Files.vhd as parent A differencing disk is associated with another virtual hard disk that you select when you create the differencing disk. This means that the disk to which you want to associate the differencing disk must exist first. This virtual hard disk is called the "parent" disk and the differencing disk is the "child" disk. The parent disk can be any type of virtual hard disk. The differencing disk stores all changes that would otherwise be made to the parent disk if the differencing disk was not being used. The differencing disk provides an ongoing way to save changes without altering the parent disk. You can use the differencing disk to store changes indefinitely, as long as there is enough space on the physical disk where the differencing disk is stored. The differencing disk expands dynamically as data is written to it and can grow as large as the maximum size allocated for the parent disk when the parent disk was created.

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. The domain contains a server named Server1 that runs Windows Server 2012 R2. You need to ensure that when users log on to Server1, their user account is added automatically to a local group named Group1 during the log on process. Which Group Policy settings should you modify? A. Restricted Groups B. Security Options C. User Rights Assignment D. Preferences

Correct Answer: D Explanation: A. If a Restricted Groups policy is defined and Group Policy is refreshed, any current member not on the Restricted Groups policy members list is removed B. Security settings incorporated into policies are rules that administrators configure on a computer or multiple computers for the purpose of protecting resources on a computer C. User Rights Assignment policies determines which users or groups have logon rights or privileges on the computer D. With Preferences, local and domain accounts can be added to a local group without affecting the existing members of the group

You have a server named Server1 that has a Server Core installation of Windows Server 2008 R2. Server1 has the DHCP Server server role and the File Server server role installed. You need to upgrade Server1 to Windows Server 2012 R2 with the graphical user interface (GUI). The solution must meet the following requirements: • Preserve the server roles and their configurations. • Minimize Administrative effort. What should you do? A. On Server1, run setup.exe from the Windows Server 2012 R2 installation media and select Server with a GUI. B. Start Server1 from the Windows Server 2012 R2 installation media and select Server Core Installation. When the installation is complete, add the Server Graphical Shell feature. C. Start Server1 from the Windows Server 2012 R2 installation media and select Server with a GUI. D. On Server1, run setup.exe from the Windows Server 2012 R2 installation media and select Server Core Installation. When the installation is complete, add the Server Graphical Shell feature

Correct Answer: D Explanation: A. Server is on 2008 R2 core, must install 2012 R2 core and then GUI B. Not least effort C. Not least effort D. Upgrade to 2012 R2 and install GUI shell http://technet.microsoft.com/en-us/library/jj574204.aspx Upgrades that switch from a Server Core installation to the Server with a GUI mode of Windows Server 2012 R2 in one step (and vice versa) are not supported. However, after upgrade is complete, Windows Server 2012 R2 allows you to switch freely between Server Core and Server with a GUI modes. For more information about these installation options, how to convert between them, and how to use the new Minimal Server Interface and Features on Demand

Your network contains an Active Directory domain named contoso.com. All client computers run Windows 8. You deploy a server named Server1 that runs Windows Server 2012 R2. You install a new client-server application named App1 on Server1 and on the client computers. The client computers must use TCP port 6444 to connect to App1 on Server1. Server1 publishes the information of App1 to an intranet server named Server2 by using TCP port 3080. You need to ensure that all of the client computers can connect to App1. The solution must ensure that the application can connect to Server2. Which Windows Firewall rule should you create on Server1?

Correct Answer: D Explanation: A. Server2 needs inbound on 3080 B. All ports outbound allowed by default D. Server1 gets request from Client PC's it needs a inbound rule for 6444 By default, Windows Firewall with Advanced Security blocks all unsolicited inbound networktraffic, and allows all outbound network traffic. For unsolicited inbound network traffic to reach your computer, you must create an allow rule to permit that type of network traffic. If a network program cannot get access, verify that in the Windows Firewall with Advanced Security snap-in there is an active allow rule for the current profile. To verify that there is an active allow rule, double-click Monitoring and then click Firewall. If there is no active allow rule for the program, go to the Inbound Rules node and create a new rule for that program. Create either a program rule, or a service rule, or search for a group that applies to the feature and make sure all the rules in the group are enabled. To permit the traffic, you must create a rule for the program that needs to listen for that traffic. If you know the TCP or UDP port numbers required by the program, you can additionally restrict the rule to only those ports, reducing the vulnerability of opening up all ports for the program.

You have a file server named Server1 that runs Windows Server 2012 R2. Server1 has following hardware configurations: - 16GB of RAM - A single quad-core CPU - Three network teams that have two network adapters each You add additional CPUs and RAM to Server 1. You repurpose Server1 as a virtualization host. You install the Hyper-V server role on Server1. You need to create four external virtual switches in Hyper-V. Which cmdlet should you run first? A. Set-NetAdapter. B. Add-Net1.bfoTeamNic C. Add-VMNetworkAdapter D. Remove-NetLbfoTeam

Correct Answer: D Explanation: A. Sets adapter properties B. Add new interface to NIC Team C. Adds vadapter to vm D. Removed NIC from host You need 4 virtual switches but currently only have 3 teams available. You would need to break a team first.

Your network contains an active directory domain named Contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the Hyper-V server role installed. You have a virtual machine named VM1. VM1 has a snapshot. You need to modify the Snapshot File Location of VM1. What should you do First? A. Copy the snapshot file B. Pause VM1 C. Shut down VM1 D. Delete the snapshot

Correct Answer: D Explanation: How are snapshots stored? Snapshot data files are stored as .avhd files. Taking multiple snapshots can quickly consume storage space. In the first release version of Hyper-V (KB950050) and in Hyper-V in Windows Server 2008 Service Pack 2, snapshot, snapshot data files usually are located in the same folder as the virtual machine by default. In Hyper-V in Windows Server 2008 R2, the files usually are located in the same folder as the virtual hard disk. The following exceptions affect the location of the snapshot data files: If the virtual machine was imported with snapshots, they are stored in their own folder. If the virtual machine has no snapshots and you configure the virtual machine snapshot setting, all snapshots you takeafterwards will be stored in the folder you specify. Caution Do not delete .avhd files directly from the storage location. Instead, use Hyper-V Manager to select the virtual machine, and then delete the snapshots from the snapshot tree. Do not expand a virtual hard disk when it is used in a virtual machine that has snapshots. Doing so will make the snapshots unusable.

Your company has an Active Directory forest. Not all domain controllers in the forest are configured as Global Catalog Servers. Your domain structure contains one root domain and one child domain. You modify the folder permissions on a file server that is in the child domain. You discover that some Access Control entries start with S-1-5-21 and that no account name is listed. You need to list the account names. What should you do? A. Move the RID master role in the child domain to a domain controller that holds the Global Catalog. B. Modify the schema to enable replication of the friendlynames attribute to the Global Catalog. C. Move the RID master role in the child domain to a domain controller that does not hold the Global Catalog. D. Move the infrastructure master role in the child domain to a domain controller that does not hold the Global Catalog.

Correct Answer: D Explanation: If the IM Flexible Single Master Operation (FSMO) role holder is also a global catalog server, the phantom indexes are never created or updated on that domain controller. (The FSMO is also known as the operations master.) This behavior occurs because a global catalog server contains a partial replica of every object in Active Directory. The IM does not store phantom versions of the foreign objects because it already has a partial replica of the object in the local global catalog. For this process to work correctly in a multidomain environment, the infrastructure FSMO role holder cannot be a global catalog server. Be aware that the first domain in the forest holds all five FSMO roles and is also a global catalog. Therefore, you must transfer either role to another computer as soon as another domain controller is installed in the domain if you plan to have multiple domains.

Your network contains two Hyper-V hosts named Host1 and Host2. Host1 contains a virtual machine named VM1. Host2 contains a virtual machine named VM2. VM1 and VM2 run Windows Server 2012 R2. You install the Network Load Balancing feature on VM1 and VM2. You need to ensure that the virtual machines are configured to support Network Load Balancing (NLB). Which virtual machine settings should you configure on VM1 and VM2? A. Router guard B. DHCP guard C. Port mirroring D. MAC address

Correct Answer: D Explanation: In Hyper-V, the VM host prevents dynamic MAC address updates as an extra layer of security in thedatacenter. This is because the VM may have full administrator rights, yet it may be untrusted in thedatacenter, for example when the VM hosting is provided by an independent hosting company. In this scenario,we need to make sure that one VM cannot cause a DOS or information disclosure attack against another VM. If a VM is able to spoof its MAC address, then it can spoof the MAC addresses of other VMs and impactother VMs on that host. The physical switches have similar protections and it is up to the admin to enable thatprotection or not. If you do not enable spoofing of MAC address prior to configuring NLB on the VM you could potentially haveproblems with the NLB cluster. When configuring NLB in unicast mode on Hyper-V with enable spoofing of MAC Address disabled you maysee some of the following symptoms: When initially configuring NLB you will lose network connectivity on the network adaptor NLB was configuredon. ?There will be an NLB error event in the Windows Event Log stating that the network adaptor does not supportdynamic MAC address updates. After rebooting the server, NLB will appear to be bound to the network adapter, but the cluster VIP will nothave been added to the network adaptor. ?The cluster MAC address will still be the original MAC address associated with the network adaptor prior toconfiguring NLB. Use CMD>ipconfig /all to view the MAC address. It should start with "02-BF-***" If you ignore all previous symptoms and manually add the VIP you could get an IP conflict if there are othernodes in the cluster that have the same VIP. With that said, to allow VM guests to run NLB you need to set the VM property for "Enable spoofing of MACAddress". To enable spoofing of MAC Addresses open the Hyper-V management console. Make sure the VM is stoppedopen the properties of the VM. Select the Network Adaptor for the NLB VM and check the "Enable spoofing ofMAC Address" and click OK. Then start the VM.

You have a server named Server1 that runs Windows Server 2012 R2. You add a 4-TB disk named Disk 5 to Server1. You need to ensure that you can create a 3-TB volume on Disk 5. What should you do? A. Create a storage pool. B. Convert the disk to a dynamic disk. C. Create a VHD, and then attach the VHD. D. Convert the disk to a GPT disk.

Correct Answer: D Explanation: MBR max is 2TB, the disk must be GPT For any hard drive over 2TB, we need to use GPT partition. If you have a disk larger than 2TB size, the rest ofthe disk space will not be used unless you convert it to GPT. An existing MBR partition can't be converted to GPT unless it is completely empty; you must either deleteeverything and convert or create the partition as GPT. It is not possible to boot to a GPT partition, impossible to convert MBR to GPT without data loss.

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. The disks on Server1 are configured as shown in the exhibit. (Click the Exhibit button.) You create a virtual machine on Server1. You need to ensure that you can configure a pass-through disk for the virtual machine. What should you do? A. Delete partition E. B. Convert Disk 1 to a GPT disk C. Convert Disk 1 to a dynamic disk. D. Take Disk 1 offline.

Correct Answer: D Explanation: Pass-Through Disk must be offline Pass-through Disk Configuration Hyper-V allows virtual machines to access storage mapped directly to the Hyper-V server without requiring thevolume be configured. The storage can either be a physical disk internal to the Hyper-V server or it can be aStorage Area Network (SAN) Logical Unit (LUN) mapped to the Hyper-V server. To ensure the Guest hasexclusive access to the storage, it must be placed in an Offline state from the Hyper-V serverperspective

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. You need to configure storage for a virtual machine to meet the following requirements: - Support up to 3 TB of data on a single hard disk. - Allocate disk space as needed. - Use a portable storage format. What should you configure? A. A pass-through disk B. A fixed-size VHD C. A dynamically expanding VHD D. A fixed-size VHDX E. A dynamically expanding VHDX

Correct Answer: E Explanation: http://technet.microsoft.com/en-us/library/hh831446.aspx Support for virtual hard disk storage capacity of up to 64 TB. vhd max is 2TB

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2. Server1 runs Windows Server 2012 R2. Server2 runs Windows Server 2008 R2 Service Pack 1 (SP1) and has the DHCP Server server role installed. You need to manage DHCP on Server2 by using the DHCP console on Server1. What should you do first? A. B. From Internet Explorer on Server2, download and install Windows Management Framework 3.0. C. From Server Manager on Server1, install a feature. D. From Windows PowerShell on Server2, run Enable PSRemoting.

Correct Answer: D Explanation: The Enable-PSRemoting cmdlet configures the computer to receive Windows PowerShell remote commands that are sent by using the WS-Management technology. On Windows Server 2012 R2, Windows PowerShell remoting is enabled by default. You can use Enable-PSRemoting to enable Windows PowerShell remoting on other supported versions of Windows and to re-enable remoting on Windows Server 2012 if it becomes disabled. You need to run this command only once on each computer that will receive commands. You do not need to run it on computers that only send commands. Because the configuration activates listeners, it is prudent to run it only where it is needed. Note: (not B) You can use Server Manager to manage remote servers that are running Windows Server 2008 and Windows Server 2008 R2, but the following updates are required to fully manage these older operating systems. / Windows Management Framework 3.0 / Performance Updates Reference: Enable-PSRemoting

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 contains a single virtual machine named VM1. You need to ensure that a user named User1 can manage the virtual machine settings of VM1. The solution must minimize the number of permissions assigned to User1. To which group should you add User1? A. Server Operators B. Administrators C. Power Users D. Hyper-V Administrators

Correct Answer: D Explanation: This group can reduce the number of users that belong to the local Administrators group while providing users with access to Hyper-VSimplified authorization: The Hyper-V Administrators group is introduced and is implemented as a local security group. What value does this change add? This group can reduce the number of users that belong to the local Administrators group while providingusers with access to Hyper-V. What works differently? The Hyper-V Administrators group is a new local security group. Add users to this group instead of thelocal Administrators group to provide them with access to Hyper-V. Members of the Hyper-V Administrators have complete and unrestricted access to all features of Hyper-V.

Your network contains an Active Directory forest named contoso.com. The forest contains a child domain named corp.contoso.com. The network has Microsoft Exchange Server 2010 deployed. You need to create a mail-enabled distribution group. Which type of group should you create? A. Domain local B. Global C. Local D. Universal

Correct Answer: D Explanation: Universal groups Groups that are used to grant permissions on a wide scale throughout a domain tree or forest. Members of global groups include accounts and groups from any domain in the domain tree or forest. Microsoft Exchange Server 2007: Implementation and Administration By Jim McBee, Benjamin Craig page 248: Only universal groups should be used as mail-enabled groups.

Your network contains a production Active Directory forest named contoso.com and a test Active Directory forest named contoso.test. A trust relationship does not exist between the forests. In the contoso.test domain, you create a backup of a Group Policy object (GPO) named GPO1. You transfer the backup of GPO1 to a domain controller in the contoso.com domain. You need to create a GPO in contoso.com based on the settings of GPO1. You must achieve this goal by using the minimum amount of administrative effort. What should you do? A. From Group Policy Management, right-click the Group Policy Objects container, and then click Manage Backups. B. From Group Policy Management, right-click the Starter GPOscontainer, and then click Manage Backups. C. From Group Policy Management, create a new starter GPO. Right-click the new starter GPO, and then click Restore from Backup. D. From Group Policy Management, create a new GPO. Right-click the new GPO, and then click Import Settings. E. From Windows PowerShell, run the Copy-GPOcmdlet and the Restore-GPOcmdlet. F. From Windows PowerShell, run the New-GPOcmdlet and the Import-GPOcmdlet. G. From Windows PowerShell, run the New-GPOcmdlet and the Restore-GPOcmdlet. H. From Windows PowerShell, run the Get-GPOcmdlet and the Copy-GPOcmdlet.

Correct Answer: DF Explanation: The New-GPO cmdlet creates a new GPO with a specified name. By default, the newly created GPO is notlinked to a site, domain, or organizational unit (OU). The Import-GPO cmdlet imports the settings from a GPO backup into a specified target GPO. The targetGPO can be in a dif ferent domain or forest than that from which the backup was made and it does nothave to exist prior to the operation. The Restore-GPO cmdlet restores a GPO backup to the original domain from which it was saved. If theoriginal domain is not available, or if the GPO no longer exists in the domain, the cmdlet fails.

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. An iSCSI SAN is available on the network. Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. You create a LUN on the SAN. You need to provide VM1 with access to the LUN. The solution must prevent other virtual machines from accessing the LUN. What should you configure? A. A fixed-size VHDX B. A fixed-size VHD C. A dynamically expanding VHD D. A dynamically expanding VHDX E. A pass-through disk

Correct Answer: E Explanation: You can use physical disks that are directly attached to a virtual machine as a storage option on themanagement operating system. This allows virtual machines to access storage that is mapped directly to theserver running Hyper-V without first configuring the volume. The storage can be either a physical disk which isinternal to the server, or a SAN logical unit number (LUN) that is mapped to the server (a LUN is a logicalreference to a portion of a storage subsystem). The virtual machine must have exclusive access to thestorage, so the storage must be set in an Offline state in Disk Management. The storage is not limited insize, so it can be a multiterabyte LUN. When using physical disks that are directly attached to a virtual machine, you should be aware of the following: This type of disk cannot be dynamically expanded. You cannot use differencing disks with them. You cannot take virtual hard disk snapshots. Att: If you are installing an operating system on the physical disk and it is in an Online state before the virtualmachine is started, the virtual machine will fail to start. You must store the virtual machine configuration file inan alternate location because the physical disk is used by the operating system installation. For example,locate the configuration file on another internal drive on the server running Hyper-V.


Conjuntos de estudio relacionados

Vistas Volume 2: Chapter 8 - ¿Qué comida es?, Categorías, & ¿Cuándo lo comes?

View Set

Assessment and Management of Patients With Hepatic Disorders

View Set

VHL Chapters/Unidades 1-14 Spanish 1-3 Vocab

View Set

Unit 4: Chapter 12 (Nervous System III)

View Set

Intro to Business Chapter 8 Vocab.

View Set

Chapter 16 - Financial Leverage and Capital Policy

View Set

Reflexive Verbs: Spanish Week 10 Review Part & Week 11 Review (Module 3)

View Set