IT Final

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

The virtual machine is paused, the state is saved, the role is moved to another node, and the virtual machine is started on the other node.

Quick Migration

You have configured a Failover cluster with two servers as hosts: Srv1 and Srv2. Each server has three network interface cards: NIC1 connects the server to the main network. Clients connect to the cluster through NIC1. NIC2 connects the server to the storage area network (SAN). The SAN is used only for access to the storage. NIC3 is a private network used only by Srv1 and Srv2 for sending out heartbeat signals and performing convergence. You need to configure the networking settings for NIC2 in the Failover Clustering Management console. What should you do?

Choose Do not allow the cluster to use this network.

You are the server administrator for the eastsim.com domain. You have an intranet site for your company using IIS and running on Srv5. You are concerned that this server is a single point of failure--if the server goes down, the intranet site will be unavailable. You would like to add a second server to provide redundancy. Your solution should meet the following requirements: All client requests should be directed to Srv5 if it is available. If Srv5 goes down, all requests should be directed to the new server. Both servers should have a separate copy of the Web site data. Web site content will be managed separately on each server. You install the Web site on a second server named Srv10 and copy the Web site content to the server. You now need to configure a solution to meet the requirements. What should you do? (Select two. Each choice is a required part of the solution.)

Configure both servers with a static IP address. Configure both servers in a Network Load Balancing (NLB) cluster. Configure a port rule with the filtering mode set to Single host. Configure Srv5 with a handling priority of 1 and Srv10 with a handling priority of 2.

Periodic heartbeat signals sent by cluster members to maintain consistent information about cluster membership

Heartbeat

You need to conduct a planned failover of Win7VM virtual machine on your Windows Server hypervisor. Click the virtual machine option you would use in Hyper-V Manager to accomplish this task.

Replication (near bottom)

You are the network administrator for corpnet.com. You have four Windows servers that are members of a failover cluster named Cluster1. The CorpNet finance department uses a legacy application named AcctRecv that was not designed to run in a failover cluster. How can you enable AcctRecv to run in Cluster1?

Run the Add-ClusterGenericApplicationRole cmdlet.

Moves only the virtual machine data to other clustered storage while the virtual machine is still running.

Storage Migration

You are the network administrator for westsim.com. The network consists of a single Active Directory domain. The network contains three Windows servers named FS1, FS2, and FS3. These servers are used for storing files in shared folders. Your users must have access to these shared folders to do their jobs, so you want to implement high availability through failover clustering. However, there is no budget for purchasing a SAN to use as the shared storage in a failover cluster. Which of the following allows you to create a failover cluster without having to purchase a SAN?

Storage Spaces Direct

You are using the CorpFiles16 server as a file server. You can do basic file server management for network users, but you need to be able to perform the following file server management tasks: Define policies that prevent users from saving .wmv files in the home folders stored on the server. Share files with UNIX-based clients. In this lab, your task is to perform the following: Add the File Server Resource Manager (FSRM) role service, which allows you to configure file screens to prevent users from saving specific file types in specific folders. Add the Server for NFS role service to be able to share files with UNIX-based clients.

3.2.5 Install and Configure the File Server Role https://www.youtube.com/watch?v=x1xX0r-SgV0

You work as the IT administrator for a small business and are responsible for the corporate network. The company is growing and has acquired additional space in an adjacent building. You have set up a router between the buildings and have connected a Windows Server 2016 server named CorpServer2 to the network. You have just installed the Hyper-V role on this server which requires you to manually configure the Hyper-V adapter with a static IP address. In this lab, your task is to complete the following: Configure the TCP/IP properties for the vEthernet (External) network to use the following static values for the network in Building B: IP Address: 192.168.10.10 Subnet mask: default subnet mask Default gateway: 192.168.10.5 Preferred DNS server: 192.168.10.11 Alternate DNS server: 192.168.0.11 Use ipconfig to verify the address changes to the server.

4.1.8 Configure IP Settings https://www.youtube.com/watch?v=UQdUDT0bsps

You work as the IT administrator for a small business and are responsible for the corporate network. The company has obtained the registered globally unique IPv6 /48 network address 2620:14F0:45EA. You need to configure your server with this address so you can begin testing IPv6 in your internal network. This is your first network, so you will use a subnet address of 0001. Your network router is not configured for IPv6 yet, so you must manually configure the address for now. To simplify the configuration, use the server's IPv4 address to create the interface ID. In this lab, your task is to configure the external vEthernet network adapter with the following IPv6 address: Prefix: 2620:14F0:45EA:0001 Interface ID: 192:168:0:10 Subnet prefix length: 64 Use ipconfig to verify the information.

4.2.3 Configure IPv6 https://www.youtube.com/watch?v=mGSSkNRetT4

You are the IT security administrator for a small corporate network. You plan to use the CorpServer server as your production server and need to have the most throughput possible. As a result, you must configure NIC Teaming. In this lab, your task is to configure a NIC team on CorpServer as follows: View the current IP configuration for the primary adapter. Create a NIC team with all adapters as members using the following parameters: Team name: NetTeam Teaming Mode: Switch Independent Load balancing mode: Address Hash Standby adapter: Ethernet 3 Configure the NIC team to use same IP address as the primary adapter using the following parameters: IP Address: 192.168.0.10 Subnet mask: 255.255.255.0 Default gateway: 192.168.0.5 Preferred DNS server: 192.168.0.11 Alternate DNS server: 192.168.10.11 Verify the status of the team and your network connection in Network and Sharing Center.

4.4.4 Configure NIC Teaming https://www.youtube.com/watch?v=7iYWCNo5mIw

You work as the IT administrator for a small business and are responsible for the corporate network. Until now, the network has consisted of only workstations accessing the Internet through a consumer-grade switch. You have convinced management to add a server to ease your administrative burden. As a result, you are testing various configurations of the Windows Server 2016 operating system. Currently, CorpServer has two volumes on a single hard disk. You need to install a custom application on the server that must be installed on the System volume. However, the System volume does not have enough free space to install the application. A second unused disk is installed in the server. In this lab, your task is to make more space available on the System volume by mounting a new volume to an empty directory. Ensure that the volume meets the following parameters: Create a folder with the following path: C:\MyApp. Create a new volume named MyApp. Use 400 GB (409600 MB) from Disk 1 for the new volume. Mount the MyApp volume to the folder you created.

5.1.10 Create a Mount Point https://www.youtube.com/watch?v=LAenuGsDllQ

You work as the IT administrator for a small business and are responsible for the corporate network. Until now, the network has consisted only of workstations accessing the Internet through a consumer-grade switch. You have convinced management that adding a server would ease your administrative burden. As a result, you are testing various configurations of the Windows Server 2016 operating system. You installed Windows Server 2016 on a server named CorpServer. During installation, you created a single volume for the operating system using 200 GB on the first disk. You also have two additional unused disks installed in the server. The following restraints impact volume modification: You can extend a volume on a basic disk using only contiguous free space on the same disk. The System C: volume can only be extended on the same disk. A spanned volume uses space from two or more disks. Spanned volumes can only be created on dynamic disks. To create a spanned volume, use one of the following approaches: Convert the disks to dynamic and then create the spanned volume. Create a simple volume, convert that disk to dynamic, and then extend the volume to the other disk. In this lab, your task is to complete the following: Extend the System (C:) volume to use the remaining space on Disk 0. Create a new volume using Disk 1 and Disk 2 using the following settings: Use all of the disk space on Disk 1 and 600 GB (614400 MB) on Disk 2. Use the drive letter M. Use the NTFS file system. Use the volume label Data.

5.1.8 Configure Volumes https://www.youtube.com/watch?v=42bFMb1yYmM&t=2s

You work as the IT administrator for a small business and are responsible for the corporate network. Until now, the network has consisted of only workstations accessing the Internet through a consumer-grade switch. You have convinced management to add a server to ease your administrative burden. As a result, you are testing various configurations of the Windows Server 2016 operating system. You reinstalled the operating system on the CorpServer server. During this installation, you created a single partition that took up the entire first disk. You need to add fault tolerance to the system volume and create an additional fault tolerant volume for storing data, so you've added four additional hard disks in the server. In this lab, your task is to complete the following: On Disk 1, create a mirrored volume of the System (C:) volume to add fault tolerance. Using Disk 2, Disk 3, and Disk 4, create a new volume that provides both fault tolerance and improved performance using the following settings: Volume size: 2 TB Drive letter: R Format: NTFS Volume label: Data

5.1.9 Configure Fault Tolerant Volumes https://www.youtube.com/watch?v=z5tTtIj_kfM&t=1s

After experimenting with various disk configurations, you have decided to create a storage pool. You need a large fault tolerant drive that you can store your Hyper-V virtual machines on. The server has several unallocated drives already installed. In this lab, your task is to configure a storage pool on CorpServer as follows: Create a storage pool that the following parameters: Name the pool HyperPool. Use all available drives in the pool using Automatic allocation. Using the storage pool you just created, create a virtual disk that meets the following parameters: Virtual disk name: HyperDisk Storage layout: Parity Provisioning type: Fixed Virtual disk size: 10 TB Using the virtual disk you just created, configure a volume that meets the following parameters: Volume size: 10 TB Drive Letter: D File System: NTFS Volume label: Hyper-V Verify the status of the new volume in File Explorer.

5.3.7 Create a Storage Pool https://www.youtube.com/watch?v=tH9Sw-sXXls

You work as the IT administrator for a growing corporate network. You need to create a storage area network (SAN). Management would like you to use standard Ethernet hardware to lower the cost of the SAN implementation. In this lab, your task is to create an iSCSI virtual disk on CorpiSCSI using the following settings: Use space on Volume D: Name the disk iSCSIDisk1. Set the size to 5 TB. Set the disk type to Dynamically expanding. Assign a new iSCSI Target called iSCSITarget1. Specify CorpFiles16 as an iSCSI initiator server with access to the virtual disk.

5.4.7 Configure an iSCSI Target https://www.youtube.com/watch?v=qS2z6uafQM0

You work as the IT administrator for a growing corporate network. You created an iSCSI storage area network (SAN) on the CorpiSCSI server. You need to make this storage available to CorpFiles16 users. In this lab, your task is to perform the following: Use the iSCSI initiator to connect to the CorpiSCSI target server. Server name: CorpiSCSI Target name: iSCSITarget1 Use Server Manager to bring the disk online. Create a volume using the following parameters: Use all available storage from the disk Drive letter: G File system: NTFS Volume label: iSCSI

5.4.8 Configure the iSCSI Initiator https://www.youtube.com/watch?v=MOI02vrei1k&t=1s

You have installed Hyper-V on the CorpServer server. You are experimenting with creating virtual machines. In this lab, your task is to create two virtual machines named VM1 and VM2. Use the following settings as specified for each machine: VM1: Virtual machine name: VM1 Virtual machine location: D:\HYPERV Virtual machine generation: Generation 1 Startup memory: 1024 MB - Do not use Dynamic Memory Networking connection: External Virtual hard disk name: VM1.vhdx Virtual hard disk location: D:\HYPERV\Virtual Hard Disks Virtual hard disk size: 50 GB Operating system will be install later VM2: Virtual machine name: VM2 Virtual machine location: D:\HYPERV Generation: Generation 2 Startup memory: 2048 MB - Use Dynamic Memory Networking connection: Internal Virtual hard disk name: VM2.vhdx Virtual hard disk location: D:\HYPERV\Virtual Hard Disks Virtual hard disk size: 250 GB Operating system will be install later Minimum RAM: 512 MB Maximum RAM: 4096 MB

6.2.9 Create Virtual Machines https://www.youtube.com/watch?v=ktLPFq4zqM4&list=PLw6NRVQmiP58i7Ikvmo6DURlIuvcZkIPR&index=14

You have installed Hyper-V on CorpServer. You are experimenting with virtual hard disks. In this lab, use the Hyper-V Manager utility to create two virtual hard disks in the D:\HYPERV\Virtual Hard Disks directory. Name these disks Test1 and Test2. Use the following settings for Test1: Name: Test1 Disk Format: VHD Disk Type: Fixed size File name: Test1.vhd Location: D:\HYPERV\Virtual Hard Disks Size: 500 GB Use the following settings for Test2: Name: Test2 Disk Format: VHDX Disk Type: Dynamically expanding File name: Test2.vhdx Location: D:\HYPERV\Virtual Hard Disks Size: 4 TB (4096 GB)

6.3.7 Create Virtual Hard Disks https://www.youtube.com/watch?v=KWuiRaO4PQI

You installed Hyper-V on the CorpServer server. You are experimenting with virtual hard disks. You plan to run several instances of Windows Server 2016 as virtual machines. Because these virtual machines will use a similar configuration, you are considering using differencing disks to conserve disk space. In this lab, your task is to perform the following: Create a virtual hard disk using the following parameters: Virtual hard disk name: ParentDisk.vhdx Location: D:\HYPERV\Virtual Hard Disks\ParentDisk.vhdx Disk type: Fixed Size: 50 GB Create the parent virtual machine using the following parameters: Virtual machine name: ServerParent Location: D:\HYPERV\ Generation: Generation 1 Startup Memory: 2048 MB Network: Not Connected Configure the virtual hard disk to use the image file D:\ISOs\en_windows_server_2016_x64_dvd.iso

6.3.8 create a parent virtual machine https://www.youtube.com/watch?v=m8RsAeM02tM

You just installed your operating system and applications on the ServerParent virtual machine. This virtual machine will be used to create two child virtual machines that use differencing disks. In this lab, your task is to perform the following: Delete the ServerParent virtual machine. Set the D:\HYPERV\Virtual Hard Disks\ParentDisk.vhdx file to Read-only. Create two new differencing hard disks using the following parameters (each hard disk has a different name, but uses the same disk format, disk type, location, and parent disk): Disk format: VHDX Disk type: Differencing Name: Server1.vhdx and Server2.vhdx Location: D:\HYPERV\Virtual Hard Disks Parent disk: ParentDisk.vhdx Create two new virtual machines using the following parameters (each virtual machine uses a different name and virtual hard disk, but the same location, generation, size, and network): Name: Server1 and Server2 Location: D:\HYPERV\ Generation: Generation 2 Size: 4096 MB Network: External Virtual hard disk: Server1.vhdx and Server2.vhdx (respectively)

6.3.9 Create Child Virtual Machines https://www.youtube.com/watch?v=Fg08iEKccQY

You have installed Hyper-V on CorpServer because you want to create virtual machines. Prior to creating the virtual machines, you are experimenting with virtual switches. In this lab, your task is to create the following virtual switches: Switch 1 must be a private switch. Within a private switch, virtual machines can communicate with each other but cannot communicate with the management operating system or access the physical network. Switch 2 must be an internal switch. Within an internal switch, virtual machines can communicate with one another and with the management operating system but cannot access the physical network.

6.4.6 Create Virtual Switches https://www.youtube.com/watch?v=7k-Fhjpll_w

You work as the IT administrator for a small business and are responsible for the corporate network. You have just installed Active Directory on a new Hyper-V guest server named CorpDC. You need to create an Active Directory organizational structure. The Active Directory structure will be based on the company's departmental structure. In this lab, your task is to create OUs on CorpDC as follows: Beneath the domain, create the following OUs: Accounting Admins Marketing Research-Dev Sales Servers Support Workstations Within the Sales OU, create the following OUs: SalesManagers TempSales Prevent accidental deletion of each OU you create.

7.4.4 Create Organizational Units https://www.youtube.com/watch?v=CelcANnh9pM

You work as the IT administrator for a small business and are responsible for the corporate network. You have just installed Active Directory on a new Hyper-V guest server named CorpDC. You have created an Active Directory structure based on the company's departmental structure. While creating the structure, you added an OU named Workstations in each of the departmental OUs. After further thought, you decide to use one Workstations OU for the company. As a result, you need to delete the departmental workstation OUs. In this lab, your task is to delete the following OUs on CorpDC: Within the Marketing OU, delete the Workstations OU. Within the Research-Dev OU, delete the Workstations OU. Within the Sales OU, delete the Workstations OU.

7.4.5 Delete Organizational Units https://www.youtube.com/watch?v=pQpygmuo8Fs

You work as the IT administrator for a small business and are responsible for the corporate network. You recently added an Active Directory domain to the CorpDC server to manage network resources centrally. You are populating user accounts in the domain. In this lab, your task is to create the following user accounts on CorpDC: User Job Role Juan Suarez Marketing Manager Susan Smith Permanent Sales employee Borey Chan Temporary Sales employee Mark Burnes Sales Manager Use the following user account naming standards and specifications as you create each account: User account name: First name + Last name. Logon name: firstinitial + [email protected]. Original password: 1234abcd$ (must change after the first logon). Place the user account in the departmental OU corresponding to the employee's department. For example: The Marketing\MarketingManagers OU for the Marketing manager The Sales\PermSales OU for the permanent employee The Sales\TempSales OU for the temporary employee The Sales\SalesManagers OU for the Sales manager For the temporary sales employee: Limit the logon hours to allow logon only from 8 am to 5 pm, Monday through Friday. Set the user account to expire on December 31st of the current year.

7.5.7 Create User Accounts https://www.youtube.com/watch?v=sMdqx7vlSoc

You work as the IT administrator for a small business and are responsible for the corporate network. You recently added an Active Directory domain on the CorpDC server to manage network resources centrally. Organizational units in the domain represent departments. User and computer accounts are in their respective departmental OUs. Over the past few days, several personnel changes have occurred that require changes to user accounts. In this lab, your task is to use the following information to make the necessary user account changes on CorpDC: Mark Woods has been fired from the Accounting department. Disable his account until his replacement can be found. Pat Benton is returning to the Research-Dev department from maternity leave. Her account is disabled to prevent logon. Enable her account. Andrea Simmons from the Research-Dev department has recently married. Rename the account Andrea Socko. Change the last name to Socko. Change the display name to Andrea Socko. Change the user logon and the pre-Windows 2000 user logon name to asocko. Mary Barnes from the Accounting department has forgotten her password, and now her account is locked: Unlock the account. Reset the password as 1234abcd$. Require a password change at the next logon. For all users in the Support OU (but not the SupportManagers OU), allow logon only to the Support computer.

7.5.8 Manage User Accounts https://www.youtube.com/watch?v=nKgw6O3NMR0

You work as the IT administrator for a small business and are responsible for the corporate network. The company has ordered several laptop computers for the Sales team. The laptops will arrive with Windows 10 pre-installed and need to be added to the domain. In this lab, your task is to pre-stage the computer accounts used for the Sales team laptops on CorpDC. Create the following computer accounts in the Workstations OU: Sales1 Sales2 Sales3 Sales4 Sales5

7.7.5 Create Computer Accounts https://www.youtube.com/watch?v=1B5Et2t_omQ

You are the IT Administrator for the CorpNet.com domain. You are in the process of implementing a group strategy for your network. You have decided to create global groups as a shadow groups for specific departments in your organization. Each global group will contain all users in the corresponding department. In this lab, your task is to complete the following actions on the CorpDC server: Create a global security group named Accounting in the Accounting OU. Create a global security group named Research-Dev in the Research-Dev OU. Create a global security group named Sales in the Sales OU. Add all user accounts in the corresponding OUs and sub-OUs as members of the newly-created groups.

7.8.4 Create Global Groups https://www.youtube.com/watch?v=THh1RU7qbVo

You are the IT administrator for the CorpNet.com domain. The CorpDC server is the domain controller. You are in the process of implementing a group strategy for your network. Managers in various departments need to send and receive emails intended for other department managers only. In this lab, your task is to perform the following on the CorpDC server: Create a domain local distribution group called Managers in the Users container. Add the following user accounts as members of the group: Juan Suarez Mark Burnes Shelly Emery

7.8.5 Create a Distribution Group https://www.youtube.com/watch?v=WYTklRWmwJ0

You are the IT administrator for the CorpNet.com domain. You recently created a domain local distribution group named Managers in the Users container on CorpDC because department managers need to email other department managers. After creating the group and adding several individual user accounts as members of the group, you decide to use the group to assign permissions to company managers, as well. In this lab, your task is to perform the following: Change the Managers group scope to Global. Change the Managers group type to Security.

7.8.6 Change the Group Scope https://www.youtube.com/watch?v=_gJlDOCIf2E

You are the IT administrator for the CorpNet.com domain. You are in the process of implementing a group strategy for your network. The CorpNet.com domain has a Support OU. All support employees in the domain have user accounts within the Support OU or within the Support sub-OUs. All support employees need access to the support department's shared folders and printers. Your group strategy must minimize administration when: Granting and removing resource access to support employees. Groups of other employees (such as managers) request access to support resources. Support resources are added or removed. Permissions to the resources need to be granted or removed. The recommended group strategy is to: Make user accounts members of global groups. Make global groups members of domain local groups. Assign permissions to the domain local groups. The following table outlines the groups, group scopes, group types, and group memberships required for this lab: Group Name Group Scope Group Type Members Support Global Security All user accounts in the Support OU and the Support sub-OUs Support Resources Domain local Security Support group In this lab, your task is to implement a group strategy that meets the above requirements on CorpDC as follows: Create the following two groups in the Support OU: Support Support Resources For each group, configure an appropriate scope, type, and membership based on the information in the scenario and the purpose suggested by the group name.

7.8.7 Implement a Group Strategy https://www.youtube.com/watch?v=VUXYPfEblYA

You work as the IT administrator for a small business and are responsible for the corporate network. As your network grows, you need to delegate common administrative tasks. You have defined the following administrative roles: PasswordAdmins can reset passwords for any user in the domain and force password change at next logon. ComputerAdmins can join computers to the domain for the entire domain. GPOLinkAdmins can manage GPO links for departmental OUs (Accounting, Marketing, Research-Dev, Sales, and Support). In this lab, your task is to delegate administrative roles on CorpDC as follows: Create the following global security groups in the Users container for each administrative role: PasswordAdmins ComputerAdmins GPOLinkAdmins Use the Delegation of Control wizard to delegate the necessary permissions at the correct level to each group. In the wizard, use the common tasks option for delegating control.

7.9.4 Delegate Administrative Control https://www.youtube.com/watch?v=Kh4Vv0GMFKk

You are the IT security administrator for a small corporate network. You are using Group Policy to enforce settings for certain workstations on your network. You have prepared and tested a security template file that contains policies that meet your company's requirements. In this lab, your task is to configure Group Policy on CorpDC as follows: Create a GPO named Workstation Settings. Link the Workstation Settings GPO to the following OUs: The TempMarketing OU (in the Marketing OU) The TempSales OU (in the Sales OU) The Support OU Import security settings from the security template (ws_sec.inf) located in C:\Templates for the Workstation Settings GPO.

8.1.7 Create and Link a GPO https://www.youtube.com/watch?v=PB7WwB6JM-4

You are the IT administrator of a large network. You need to create a starter GPO to use as a template and then create a new GPO using that starter GPO. In this lab, your task is to complete the following on the CorpDC server: Enable the Administrative Templates central store by creating a Starter GPOs folder. Create a starter GPO named DNS Settings. Configure the DNS Settings policies: DNS Servers: 192.168.0.11 and 192.168.10.11 (use a space to separate the two addresses) Primary DNS Suffix: CorpNet.com Register PTR Records: Enabled with a value of Register Dynamic update: Enabled Turn off Multicast Name Resolution: Enabled (enabling the policy turns off LLMNR) Create a new GPO named CommonGPO using the new starter GPO you created. Do not link the GPO at this time. Verify that the starter GPO settings were applied to the CommonGPO.

8.1.8 Create a Starter GPO https://www.youtube.com/watch?v=EWZgeiaTJfw

You work as the IT administrator for a small business and are responsible for the corporate network. You must configure a password policy for the domain. In this lab, your task is to edit the default domain policy on CorpDC using Group Policy Management and configure the account policy settings to meet the following requirements: Passwords must be at least 10 characters long. Passwords must contain uppercase letter, lowercase letter, number, and symbol characters. Users must change passwords every 90 days. Users cannot change a new password for at least 14 days. New passwords must be different than the previous 10 passwords. If five incorrect passwords are entered within a ten-minute interval, the account will lock. Keep accounts locked for 1 hour and then unlock the account automatically.

8.3.4 Configure Account Password Policies https://www.youtube.com/watch?v=XYjTk_sqyRg

You work as the IT administrator for a small business and are responsible for the corporate network. The Accounting OU contains workstations that store sensitive data. Only accounting department employees should use these workstations. As part of securing the workstations, you want to audit who logs on or attempts to log on to the accounting workstations for any user. In this lab, your task is to configure auditing policies in AccountingGPO on CorpDC to meet the following requirements: In the audit policy of the GPO, enable the Audit logon events policy. This records logon to the local computer and records an event in the workstation's Security log. Auditing for account logon tracks logon to a user account and records the event on the domain controller used for authentication. In the Audit logon events policy, audit for both Success and Failure. In this scenario, you want to know when someone is able to log on and when logon is denied. In Security Options, enable the Audit: Shut down system immediately if unable to log security audits policy, which causes the computer to shut down if it can't log audit entries. In Event Log, enable the Retention method for security log policy and configure it to Do not overwrite events (clear log manually).

8.4.4 Configure Audit Policies https://www.youtube.com/watch?v=y83Pz28Adu4

You work as the IT administrator for a small business and are responsible for the corporate network. You are working on improving the security of network resources. When adding users or groups, remember the following: To add a local user or group, type the name of the group you want to add. To add a domain user or group, include the domain name in the object name (for example, domain_name\Sales). In this lab, your task is to add the following group to the associated User Rights Assignment policy in the ServerGPO policy object from the CorpDC server: User Rights Assignment Policy Group Allow log on locally Administrators Allow log on through Remote Desktop Services Administrators Manage auditing and security log Auditors Perform volume maintenance tasks Administrators Shut down the system Administrators

8.5.4 Configure User Rights https://www.youtube.com/watch?v=IAhjiD5duBk

You work as the IT administrator for a small business and are responsible for the corporate network. After a security review, you have decided to improve network security. In this lab, your task is to configure the following security options on the CorpDC server using Group Policy. You work as the IT administrator for a small business and are responsible for the corporate network. After a security review, you have decided to improve network security. In this lab, your task is to configure the following security options on the CorpDC server using Group Policy. Group Policy Object Policy Setting Default Domain Policy Accounts: Guest account status Disabled Accounts: Rename administrator account skycaptain Interactive logon: Do not display last user name Enabled Network access: Allow anonymous SID/Name translation Disabled Network access: Do not allow anonymous enumeration of SAM accounts Enabled Network access: Do not allow anonymous enumeration of SAM accounts and shares Enabled SupportGPO Interactive logon: Number of previous logons to cache 0 Interactive logon: Require Domain Controller authentication to unlock workstation Enabled Network security: Force logoff when logon hours expire Enabled Shutdown: Allow system to be shut down without having to log on Disabled Modify User configuration settings in the GPO settings Disabled You also need to disable the User Configuration portion of the GPO because all GPO settings in the SupportGPO are in the Computer Configuration portion.

8.6.3 Configure Security Options https://www.youtube.com/watch?v=mBqOThVFvoc

You work as the IT administrator for a small business and are responsible for the corporate network. The company has a single Active Directory domain named CorpNet.com. You need to increase the domain's authentication security. You need to make sure that User Account Control (UAC) settings are consistent throughout the domain and in accordance with industry recommendations. In this lab, your task is to configure the following UAC settings in the Default Domain Policy on CorpDC: User Account Control Setting Admin Approval Mode for the Built-in Administrator account Enabled Allow UIAccess applications to prompt for elevation without using the secure desktop Disabled Behavior of the elevation prompt for administrators in Admin Approval mode Prompt for credentials Behavior of the elevation prompt for standard users Automatically deny elevation requests Detect application installations and prompt for elevation Enabled Only elevate UIAccess applications that are installed in secure locations Enabled Only elevate executables that are signed and validated Disabled Run all administrators in Admin Approval Mode Enabled Switch to the secure desktop when prompting for elevation Enabled Virtualize file and registry write failures to per-user locations Enabled

8.6.8 Enforce User Account Control https://www.youtube.com/watch?v=nHzTSJcgeIM

You are the IT security administrator for a small corporate network. A group of desktop administrators needs administrative rights to all of the workstations in the domain. The workstations are located in the Workstations OU. In this lab, your task is to perform the following on CorpDC: Create a global security group named Desktop Admins in the Admins OU. (Members of the group will be added later.) Configure a restricted group policy in the WorkstationGPO object that adds the domain Desktop Admins group to the local Administrators group on all the workstations.

8.7.4 Configure Restricted Groups https://www.youtube.com/watch?v=60dq1qDe5W0

You work as the IT administrator for a small business and are responsible for the corporate network. You are increasing network security by implementing AppLocker. Your first step is to prevent applications from running on computers that are not located in the Windows directory or the Program Files directory. In addition, there is a custom call center application used by the support team. The call center application runs from C:\CallCenter\CallStart.exe and must be allowed to run. You also want future versions of the call center application to run without having to change any settings. In this lab, your task is to configure AppLocker in the WorkstationGPO on CorpDC using the following parameters. Create default executable rules to ensure you maintain access to: All files located in the Program Files folder All files located in the Windows folder Configure a Publisher rule that allows future updates from the same vendor. Allow the support group to run the call center software. Do not add exclusions to the rule.

8.8.4 Configure AppLocker https://www.youtube.com/watch?v=kzkYuAcpA9w

The CorpWeb server is running Windows Server 2012. You previously configured the server with a static IP address. Now you need to configure a DNS server address. You also want to use sales.private, mrktg.private, and private as search suffixes when simple names are submitted for DNS name resolution. In this lab, your task is to complete the following: Configure 192.168.0.11 as the DNS server address. Configure the following domain suffixes so that the server searches the domains: sales.private mrktg.private private

9.1.4 Configure Search Suffixes https://www.youtube.com/watch?v=PzM8uItehzc

You work as the IT administrator for a small business and are responsible for the corporate network. The server CorpDC is your domain controller and DNS server. This server hosts the CorpNet.com zone. For name resolution requests in other zones, you want CorpDC to forward requests to name servers at the ISP. In this lab, your task is to configure the DNS service on CorpDC using the following settings: Forward name resolution requests outside of the CorpNet.com domain to the following ISP DNS servers: 163.128.80.93 163.128.78.93 Use root hints for requests if the ISP DNS servers are unavailable.

9.2.6 Configure Forwarders https://www.youtube.com/watch?v=3DD9Pk7Sv2M

You work as the IT administrator for a small business and are responsible for the corporate network. A partner company has asked you to help configure their DNS server. PartnerServer is a Windows Server 2012 server that holds the primary copy of the PartnerNet.org domain. The server is in a demilitarized zone (DMZ) and provides name resolution for the domain for Internet hosts. The partner company wants to prevent PartnerServer from performing name resolution requests for domains other than the PartnerNet.org domain. In other words, they do not want Internet hosts to be able to obtain name resolution from PartnerServer for domains outside the company. In this lab, your task is to perform the following: Create a root zone on PartnerServer. Create a primary forward lookup zone named . (a dot to represent the root zone). Do not allow dynamic updates. Verify that root hints are no longer configured on the server.

9.2.7 Create a Root Zone https://www.youtube.com/watch?v=kf5eI4IBw_A

You work as the IT administrator for a small business and are responsible for the corporate network. The marketing department wants to create an intranet site that is only accessible from the private network. You have selected mrktg.private as the domain name that will hold all records for the zone. You want all client computers in the domain to update their records automatically using DNS. Because security is important, you need to make sure that only the computer that created the DNS record can update it. You also need to create an Active Directory-integrated zone to store the zone data in Active Directory. Using an Active Directory-integrated zone lets you use a multi-master approach to storing zone data. These types of zones also support secure dynamic DNS updates. You can only create Active Directory-integrated zones on DNS servers that are domain controllers. In this lab, your task is to complete the following: Create the mrktg.private zone on the CorpDC DNS server. Configure the mrktg.private zone as a Primary zone. Configure the mrktg.private zone as an Active Directory-integrated zone. Replicate data to all DNS servers in the forest. Allow only secure dynamic updates.

9.3.7 Create an Active Directory-Integrated Zone https://www.youtube.com/watch?v=h2XM22HGtFE

You have configured a failover cluster with two servers as hosts, Srv1 and Srv2. You have configured the DHCP service as a clustered service. You configure Srv1 as the preferred owner for the DHCP service. You simulate a failure of Srv1 by taking it offline. The DHCP service does not switch to Srv2. How can you make sure that Srv2 is used for the DHCP service if Srv1 is not available?

Add Srv2 as a possible owner

You are the network administrator for westsim.com. The network consists of a single Active Directory domain. The network contains two servers named FS11 and FS12. Both servers are running Windows Server 2016 Datacenter edition.You have implemented Storage Replica as a disaster recovery solution with FS11 and FS12 as replication partners. The FS11 server is located in your main office. The FS12 server is located in a branch office in another city. Your offices are connected by a WAN link where latency is usually higher than five milliseconds. Which replication type should be used between FS11 and FS12?

Asynchronous

You are the network administrator for Corpnet.com. You have created a Network Load Balancing cluster to provide high availability for the intranet website. The NLB luster consists of three web servers; Web1, Web2 and Web3. Each web server has one network card installed. After configuring the NLB cluster, you determine that the web servers in the cluster are unable to communicate with each other. You must reconfigure the cluster to allow communication between the cluster members. What should you do?

Change the cluster operation mode to Multicast

You are the server administrator for the eastsim.com domain. You have a DHCP server named DHCP-Srv1 configured with a single scope. You are concerned that a failure of the DHCP server could cause disruptions on the network. You would like to provide redundancy for the DHCP server. You install DHCP on a second server named DHCP-Srv2. Your solution should meet the following requirements: DHCP-Srv1 should continue to respond to all client requests. If a DHCP-Srv1 is down, DHCP-Srv2 should be able to respond to clients. DHCP-Srv2 should be aware of all leases granted by DHCP-Srv1. Following a failure, when DHCP-Srv1 comes back online, it should resume responding to all DHCP requests. What should you do?

Configure DHCP-Srv1 and DHCP-Srv2 in a Failover Clustering cluster.

You are assisting the administrator of the CorpNet.com domain. Your company has three office locations, Main, Branch1, and Branch2. All of the locations are connected to each other using wide area network (WAN) links. Domain controllers have been installed for each location, but each domain controller is still located in the Default-First-Site-Name site. In this lab, your task is to create sites and subnets that correspond to the physical structure of your network as follows: Rename the Default-First-Site-Name site to Main-Site. Create Branch1-Site and Branch2-Site. Move the BranchDC1 and BranchDC2 servers into their respective sites. Create each subnet and choose the corresponding site object. Configure sites and subnets using the following table: Location Site Name Server Subnet Main Main-Site CorpDC CorpDC2 CorpDC3 CorpDC4 192.168.0.0/24 192.168.10.0/24 Branch1 Branch1-Site BranchDC1 192.168.20.0/24 Branch2 Branch2-Site BranchDC2 192.168.30.0/24

Configure Sites https://www.youtube.com/watch?v=sZiRY2tXXCI

You have configured a failover cluster with three servers as hosts, Srv1, Srv2, and Srv3. You have configured the DHCP service as a clustered service. You want to use Srv1 and Srv2 for the DHCP service. Srv1 should be the primary server used to respond to DHCP requests. If Srv1 is unavailable, Srv2 should take over the DHCP service. Srv3 should never be used for the DHCP service. What should you do?

Configure Srv1 and Srv2 as possible owners. Configure Srv1 as a preferred owner.

Your company is responsible for processing payroll for other businesses. Because the pay days for many businesses are the same, your servers experience heavy loads during some days, with light loads on other days. Payroll processing is done by a custom application running on an application server. To handle the load, you configure Failover Clustering on a cluster of six servers. You want the cluster to keep operating even in the event of a failure of up to three of the nodes. If more than three nodes fail, the cluster should stop. What should you do?

Configure a witness disk. Use node and disk majority for the quorum mode.

You are the server administrator for the eastsim.com domain. Srv5 is an application server that runs an application used by the Sales team. You are concerned that this server is a single point of failure--if the server goes down, the application will be unavailable. You would like to add a second server to provide redundancy. Your solution should meet the following requirements: All client requests should be directed to Srv5 if it is available. If Srv5 goes down, all requests should be directed to the new server. Both servers should use the same set of data files. You want to configure Srv10 to provide redundancy for Srv5. Both Srv5 and Srv10 are configured to use DHCP for IP addressing information. You need to configure a solution to meet the requirements. What should you do?

Configure both servers in a Failover Cluster cluster. Configure a storage area network for the application data.

You are the server administrator for the eastsim.com domain. You have an intranet site for your company using IIS and running on Srv5. Because of recent growth, this server is becoming unable to process all incoming requests in a timely manner. You would like to add a second server to run the application. Your solution should meet the following requirements: New client requests should be directed to either of the two servers. Because of differences in hardware between the two serves, two-thirds of the client requests should be directed to Srv5, with the remaining going to the new server. If one server goes down, all requests should go to the other server. If the same client computer creates multiple sessions at the same time, all sessions should be created on the same server. You install the Web site on the second server and copy the Web site content to the server. You now need to configure a solution to meet the requirements. What should you do?

Configure both servers in a Network Load Balancing (NLB) cluster. Configure a port rule with client affinity set to Single.

Members of the accounting department use a custom application for entering payroll and tracking accounts receivable and accounts payable. The application runs on an application server and is cluster-aware. You would like to use Failover clustering to provide redundancy, fault tolerance, and load balancing for the application. Your solution should meet the following requirements: All cluster nodes should be active and respond to client requests. When a cluster node fails, requests should be redistributed between the remaining cluster members. The cluster should continue to operate as long as there are more than half of the cluster members still available. You install Failover Clustering on five servers. Following Microsoft's recommendations, how should you configure the cluster? (Select two. Each choice is a required part of the solution.)

Configure the application as a multiple-instance application. Use node majority for the quorum mode.

You are the server administrator for the eastsim.com domain. You have an intranet site for your company using IIS and running on Srv5. Because of recent growth, this server is becoming unable to process all incoming requests in a timely manner. You decide to use Network Load Balancing (NLB) as your solution. You add a second server named Srv10. Both Srv5 and Srv10 have similar hardware, with a single network adapter. Your NLB should meet the following requirements: New client requests should be directed to either of the two servers. Because of differences in hardware between the two servers, two-thirds of the client requests should be directed to Srv5, with the remaining going to the new server. Both Srv5 and Srv10 must be able to support peer-to-peer communications. You need to configure a solution to meet the requirements. What should you do? (Select two. Each choice is a required part of the solution.)

Configure the cluster to operate in multicast mode. Configure a port rule with the filtering mode set to Multiple host. Configure Srv5 with a weight of 60 and Srv10 with a weight of 30.

The process that cluster members use to reach a consistent state

Convergence

The CorpDC server currently stores the sales.private standard primary DNS zone. You need to configure the sales.private zone to store all the data in Active Directory. In this lab, your task is complete the following: Convert the sales.private zone to an Active Directory-integrated zone. Change the replication scope to store data on all DNS servers in the domain.

Convert a Zone to Active Directory-integrated https://www.youtube.com/watch?v=XsuMQNDAxag

You are the network administrator for Corpnet.com. You have created a Network Load Balancing cluster for the intranet web site. The NLB cluster consists of three Windows Server 2012 R2 servers named Web1, Web2, and Web3. Users access the intranet webs site using the URL Http://Intranet.corpnet.com. Management would like to use SSL to secure the intranet web site. During the test phase, only Web1 will service SSL requests. You have installed a certificate on the Web1 server and modified the bindings in IIS. You need to configure Network Load Balancing to ensure that only the Web1 server services SSL requests for the intranet web site. What should you do? (Choose three.)

Create a new port rule that runs from port 443 to port 443. Set the Affinity for the new port rule to Single Host. On the Web1 server, set the Handling Priority for the new port rule to 1.

You are the network administrator for Corpnet.com. Management has requested that the intranet website, intranet.corpnet.com be configured for high availability. You have two Windows Server 2012 R2 servers named Web1 and Web2. IIS has been installed and configured with a copy of the website on both servers. The Network Load Balancing feature has also been installed on both servers. You need to prepare the environment to create a Network Load Balancing cluster to provide high availability for the intranet web site. Clients must be able to access the website using the URL http://intranet.corpnet.com. What should you do? (Choose two.)

Create an A record in DNS that maps intranet.corpnet.com, to the IP address reserved for the NLB cluster. Reserve an unused valid IP address on the network to be assigned to the NLB cluster.

You are the network administrator for Corpnet.com. You have created a Network Load Balancing cluster to provide high availability for the intranet website. You have three web servers, Web1.corpnet.com, Web2.corpnet.com, and Web3.corpnet.com. You have preformed the following configuration tasks: Each server has one network card installed. Each server has its own disk storage. Each server has the same data. Each server has a static IP address. Each server has the IIS role installed. Each server has the NLB feature installed. Each server has been added to the cluster. The cluster has been assigned its own IP address. When you test access to www.corpnet.com, you get a message that the site can't be reached. Which step still needs to be done?

Create an A record in DNS that points www.corpnet.com to the cluster's IP address.

You are the network administrator for westsim.com. The network consists of a single Active Directory domain. All of the servers run Windows Server 2012 R2 and all of the clients run Windows 7. The company has a mission-critical database application. You must design a high availability solution to support this application. You have four servers that connect to Ethernet switches. Your solution should meet the following requirements: Allocate storage to the servers as needed Utilize the existing network infrastructure Maximize fault tolerance What should you do?

Deploy the servers in a failover cluster. Deploy an iSCSI storage area network (SAN).

You are the network administrator for Corpnet.com. All the servers run Windows Server 2012 R2. You are in the process of building a Failover cluster with six nodes. You need the cluster to recalculate the quorum on the fly so that the cluster can continue to run even if the number of nodes remaining in the cluster is less than 50%. What kind of quorum should you use?

Dynamic Quorum

You are the network administrator for westsim.com. The network consists of a single Active Directory domain. The network contains three Windows servers named FS1, FS2, and FS3. These servers are used for storing files in shared folders. You want to implement failover clustering to make these servers highly available for your users, so you have installed the Failover Clustering feature on each server. You are using Storage Spaces Direct (SSD) to set up the shared storage for the cluster, so you install new SATA hard drives in each server and leave them blank, offline, and uninitialized.You used PowerShell cmdlets to verify that the new drives can be added to an SSD pool, and then you created a cluster named FileServ with FS1, FS2, and FS3 as the cluster nodes.From the drop-down list, select the cmdlet you would now enter to enable SSD on the FileServ cluster.

Enable-ClusterStorageSpacesDirect

You have configured a failover cluster with three servers as hosts, FS1, FS2, and FS3. You named the cluster FSCluster1 and configured it to host the general purpose file server role, which is named FileServ. FS1 is configured as the preferred owner of the file server role. FS2 and FS3 are configured as possible owners. The role is configured for immediate failback. You begin the process of configuring continuously available shares (CAFS) on top of this general-purpose file server. The process requires you to define the share location by indicating the name of the server and the share location. Which of the following is the server name you must use in this CAFS configuration?

FileServ

You are the server administrator for the eastsim.com domain. You have an application server named Srv5 that is used by members of the Sales team. The server runs three applications: App1, App2, and App3. Each application uses a different TCP/IP port. Because of recent growth, this server is becoming unable to process all incoming requests in a timely manner. You decide to use Network Load Balancing (NLB) as your solution. You add a second server named Srv10. Your NLB should meet the following requirements: Requests for App1 and App2 should be evenly distributed between Srv5 and Srv10. Because App3 is not running on Srv10, all requests for that application should be sent to Srv5. Requests should never be directed to Srv10. You need to configure a solution to meet the requirements. What should you do?

For App3, configure a port rule with the filtering mode set to Multiple host. Configure Srv5 with a weight of 30 and Srv10 with a weight of 0.

You are the network administrator for Corpnet.com. You have six Windows servers that are members of a Failover Cluster named Cluster1. This cluster is a stretch cluster because three nodes are grouped at the main office site, while the other three nodes are grouped at the branch office site. The main office is located on the east coast. while the branch office is located on the west coast. The WAN link between the main office and the branch office has occasional issues with latency, especially during normal business hours. What measures can you take to make sure cluster performance is optimized for these conditions? (select two)

Increase the CrossSubnetThreshold value. Configure asynchronous replication between the main office site and the branch office site.

You are the network administrator for westsim.com. The network consists of a single Active Directory domain. The network contains three Windows servers named FS1, FS2, and FS3. These servers are used for storing files in shared folders. You plan to implement high availability through Failover Clustering and to use Storage Spaces Direct to set up the shared storage for the cluster. Your file servers have been in production for a while. Their data disks use varying sizes of SATA drives and have varying amounts of space available.What must you do before you can implement Storage Spaces Direct? (Select two.)

Install new hard drives in each server and leave the drives blank, offline, and uninitialized. Install the Failover Clustering feature on each server.

You are the network administrator for westsim.com. The network consists of a single Active Directory domain. The network contains two Windows servers named HV1 and HV2 that have the Hyper-V role installed. If HV1 fails, you need the virtual machines hosted by HV1 to be migrated to HV2, and you need them to remain available during the migration.What should you do?

Install the Failover Cluster feature on HV1 and create a failover cluster with HV2. Then enable Live Migration.

Ownership of the clustered virtual machine is moved to another node without pausing the role.

Live Migration

Cluster hosts retain their network adaptor's original hardware MAC address

Multicast mode

You are the network administrator for Corpnet.com. You have created a Network Load Balancing cluster to provide high availability for the intranet website. You have three web servers, Web1, Web2, and Web3, which are configured as follows: Each server has one network card installed. Each server has its own disk storage. Each server has the same data. Each server receives an IP address dynamically from the DHCP server. Each server has the IIS role installed. Each server has the NLB feature installed. Are you ready to configure these servers into an NLB cluster?

No. Each server should be assigned a static IP address.

You are the network administrator for westsim.com. The network consists of a single Active Directory domain. The network contains two servers named FS1 and FS2. You want to implement Storage Replica as a disaster recovery solution. FS1 and FS2 will be replication partners with FS1 as the source server and FS2 as the destination server. These servers are configured as follows: OS:Windows Server 2016>Windows Server 2016 Edition:Datacenter>Datacenter RAM:16.00 GB>32.00 GB Disk 0 (C:):500 GB>700 GB Disk 1 (Data D:):1.5 TB>2.2 TB Network adapter:1.0 Gbps>1.0 Gbps Can you implement a Storage Replica partnership between these two servers?

No. The Disk 1 (Data D:) disks are not exactly the same size.

You are the network administrator for westsim.com. The network consists of a single Active Directory domain. The network has two sites. One site is located in your main office, and the other site is located in a branch office in another city. A WAN link with occasional latency issues is used for the network connection between the two locations. All servers in your network are running Windows Server 2016 Datacenter edition.The main office and branch office sites each have three servers. There are users at both offices that rely on the same mission-critical server application to perform their jobs. If a disaster happens at either site, your manager wants you to be prepared so that all data can be recovered. Your manager also wants the users at either site to be able to keep on working if something happens to the network at the other site or the network connection between sites goes down. Which plan could you follow to accomplish what your manager wants you to do?

Plan 1 • Configure two SANs, one at each location, for the servers to use as shared storage .• Implement Failover Clustering and create one cluster for the main office site and one for the branch office site. • Set up Storage Replica in a stand-alone configuration to replicate the data between clusters. Plan 3 • Configure two SANs, one at each location, for the servers to use as shared storage .• Implement Failover Clustering and place all the servers from both sites in the same cluster (a stretch cluster) .• Set up Storage Replica in a stretch cluster configuration to replicate the data between sites.

You need to failover a virtual machine running on a Windows Server 2012 R2 hypervisor host using the following parameters: The latest changes made to the primary virtual machine must be replicated to its replica virtual machine. The primary virtual machine must be brought down. The replica virtual machine starts, transferring the workload from the primary server to the replica server with no loss of information. Which type of failover should you use?

Planned

You are the network administrator for westsim.com. The network consists of a single Active Directory domain. The network contains two servers named FS11 and FS12. Both servers are running Windows Server 2016 Datacenter edition.You have implemented Storage Replica as a disaster recovery solution with FS11 and FS12 as replication partners. When a user makes changes to a file that is stored in a shared folder on FS11 and then saves those changes, the following process takes place:• FS11 writes the changes to its data disk but does not acknowledge the write operation to the user's application. • FS11 replicates the write operation to FS12.• FS12 writes the change to its data disk and acknowledge the write operation back to FS11.• FS11 sends an acknowledgement to the user's application, letting it know the write operation was successful. Which replication type is being used between FS11 and FS12?

Synchronous

You need to failover a virtual machine running on a Windows Server 2012 R2 hypervisor host using the following parameters: A temporary copy of the virtual machine must be created and run on the replica server. The original virtual machine on the primary server must remain running to service client requests. The test virtual machine must not be connected to any network to prevent conflicts with the original virtual machine on the primary server. When you are finished, the temporary virtual machine must be deleted. Which type of failover should you use?

Test

Drag the hypervisor type on the left to the failover that is initiated from it on the right.

Test Failover: Replica Server Planned Failover: Primary Server Unplanned Failover: Replica Server

You are the network administrator for corpnet.com. The network has two Windows servers named HV1 and HV2. Both servers are running the Hyper-V Role and the Failover Cluster feature. The servers are configured as nodes in a failover cluster named Cluster1. The Hyper-V Replication Broker role is installed in Cluster1. A third server named HV3 also has the Hyper-V role installed, but is not a member of Cluster1. You need to ensure that Cluster1 can be a replica server for HV3 so that any virtual machines hosted on HV3 can be replicated to Cluster1. Which tools should you use? (Choose two.)

The Hyper-V Manager console on HV3. The failover cluster manager console on Cluster1.

Specific services running within clustered virtual machines can be monitored in Failover Cluster Manager. Before Failover Cluster Manager can be configured to monitor services, you must allow apps and features through the Windows firewall on the virtual machines you want to monitor.The image below shows the Allow apps and features dialog in Windows Server VM. Select the boxes in this dialog that must be enabled to allow Failover Cluster Manager to monitor services on this VM. (Select two.)

Virtual Machine Monitoring Domain (Virtual Machine Monitoring)

You are the network administrator for corpnet.com. You have three Windows servers that are members of a failover cluster named Cluster1. All three nodes are running Windows Server 2012. You build three new servers running Windows Server 2016. You install the Failover Cluster feature on the three new nodes and then use them to create a new failover cluster named Cluster2. How can you move the applications from Cluster1 to Cluster2?

on a server in Cluster2, click Migrate Roles.

For security reasons, you want to know if anyone saves any files on the D: drive using the domain guest account for CorpFiles12. Disk quotas have already been enabled. You also need to set a warning level for the guest account at 1 KB. Using File Explorer, your task is to perform the following for the guest user: Create a new quota entry. Set the quota limit to 500 MB. Set the warning level to 1 KB.

10.1.10 Create a Quota Entry https://www.youtube.com/watch?v=WMoL-QNaw8M

While the CorpFiles12 server was configured, a 5 MB disk quota warning for the D: drive was applied to the Administrators account. As a result, the server logs many warning messages. In this lab, your task is to use File Explorer to remove all quota limits for the Administrators account.

10.1.11 Modify Quota Limits https://www.youtube.com/watch?v=HQJW2kz27MQ

You need to manage the permissions assigned to various folders. Department data is stored on CorpFiles16 in a folder named D:\Departments. Within the Departments folder, each department has a subfolder where they can publish files to the rest of the company. The default permissions inherited by the D:\Departments folder and each subfolder currently allow all users to read and execute files. In this lab, your task is to configure permissions for each departmental subfolder so that only users within each department can change their department's files. To complete this task, assign the permissions specified in the following table: Folder Domain Local Group Permissions D:\Departments\Accounting Accounting Resources Full Control D:\Departments\Research Research Resources Full Control D:\Departments\Sales Sales Resources Full Control D:\Departments\Support Support Resources Full Control

10.1.7 Configure NTFS Permissions https://www.youtube.com/watch?v=CiQxIeGC5Is

Confidential personnel data is stored on the CorpFiles16 file server in a shared directory named Personnel. You need to configure NTFS permissions for this folder so that only managers are authorized to access the folder. In this lab, your task is to perform the following: Grant the Managers group the Full Control permission to the D:\Personnel folder. Remove all inherited permissions that are flowing to the D:\Personnel folder.

10.1.8 Remove Inherited Permissions https://www.youtube.com/watch?v=dT8MQfdDDvg

You work as the IT administrator for a small business and are responsible for the corporate network. Recently, you installed Windows Server 2012 on a new server called CorpFiles12. This server will host the home directories for users. Management is concerned that some users will use a large amount of disk space. To prevent this from happening, you need to enable quota management on the shared drive. In this lab, your tasks is to use Explorer to perform the following tasks: Enable quota management on the D: drive. Limit disk usage to 500 MB per new user and give users a warning at 450 MB. Deny additional space to users exceeding the quota limit. Log an event each time a user hits the warning level.

10.1.9 enable Quota Restrictions https://www.youtube.com/watch?v=ekx4_tsLrJI

You have several shared folders on the H:\ drive of the CorpFiles16 server. To improve fault tolerance and allow open file backups, you need to enable shadow copies for the drive. In this lab, your task is to complete the following: Enable shadow copies on H: drive. Store the copies on the D: drive. Configure a 24000 MB limit for shadow copies. Configure a single schedule to run once a day at 8:00 pm. Delete all other schedules.

10.2.4 Enable Shadow Copies https://www.youtube.com/watch?v=LXLRS2VhD44

The bookkeeper in your organization inadvertently deleted a large portion of a departmental expense report and then saved the file. The report contained very important information, and the user needs you to restore the file. The file is located in the Reports share located in the H:\Finances\Reports directory on the CorpFiles16 server. No other files in the directory should be changed. In this lab, your task is to restore a previous version of the 2016report.xlsx file to the H:\Finances\Reports directory on the CorpFiles16 server. To restore a previous version of the file on a Windows Server 2016 system, use the Previous Versions tab on the file's Properties page.

10.2.5 restore Previous Version 1 https://www.youtube.com/watch?v=BJ_lnL8fqiY

The director of the accounting department has requested a copy of the 2016 purchase order reports located in the POs share. The files are located in the D:\Finances\POs directory on the CorpFiles12 server. You need to retrieve a previous version of the POs folder without affecting any of the current files or folders in D:\Finances. In this lab, your task is to copy the POs folder in the D:\Finances directory of CorpFiles12 to the D:\Temp folder on the same system.

10.2.6 Restore Previous Version 2 https://www.youtube.com/watch?v=pml8xReMqU4

You are configuring the file system of a Windows Server 2012 server. You shared the D:\Shared folder on CorpFiles12 for common file access. The Everyone group has complete NTFS permissions to the folder (except permission to change file and folder permissions). Network users report that they can only read data in the Shared folder. They should be able to create, edit, and delete all folders and files. You want to enable these permissions using the least administrative effort. In this lab, your task is to fix a user access problem by granting the Everyone group the Change share permission for the Shared folder.

10.3.10 Configure Share Permissions https://www.youtube.com/watch?v=LFO2xksei_Y

You are configuring the file system of a Windows Server 2012 computer named CorpFiles12. The D:\Users folder is shared using the share name Users. You want the D:\Users folder to be accessible using the share name Home Folders as well. In this lab, your task is to add Home Folders as a share name for the D:\Users folder using File Explorer. Keep the default user limits, share permissions, and offline files settings.

10.3.6 Share a folder with a second name https://www.youtube.com/watch?v=mnkwlSaF9c0

You are configuring the file system of a Windows Server 2016 server named CorpFiles16. The H:\Projects folder is shared using two share names, Projects and Builds. You no longer want the H:\Projects folder to be accessible through the share name Builds. In this lab, your task is to use File Explorer to remove the share name Builds from the H:\Projects folder.

10.3.7 remove a shared folder https://www.youtube.com/watch?v=In1cNCogyoo

You are configuring a Windows Server 2016 computer's file system. The H:\Archives folder is shared, and users have read-only access to the Archives shared folder. When a client computers accesses a file in the Archives shared folder, you want to automatically cache a copy to the user's workstation. This will optimize system performance by preventing unnecessary network use when files are accessed in the future. In this lab, your task is to perform the following on CorpFiles16: Make all files and programs that users open from the shared folder available offline automatically. Optimize performance by caching programs and files.

10.3.8 Enable share caching https://www.youtube.com/watch?v=5wgyHP_Xavg

You need to configure the file system of a Windows Server 2016 computer named CorpFiles16. You want to make sure that no data from the D:\Confidential shared folder ever gets cached to local computers. In this lab, your task is to edit the share properties for the Confidential folder using File Explorer. Disable caching for the folder using the No files or programs from the shared folder are available offline option.

10.3.9 Disable Share Caching https://www.youtube.com/watch?v=1JqG5J_1Dj4

You work as the IT administrator for a small business and are responsible for the corporate network. You are creating a share for the H:\Components folder on the CorpFiles16 server. Research and Development department employees need to store programming components in this shared folder. Data in a shared folder on an NTFS partition has two sets of permissions (share permissions and NTFS permissions). Each user's data access is determined by the most restrictive of these two permissions. You need to secure the data in the folder as follows: Members of the Research Resources group should have full control over the folder. All other users should be able to view the contents of the folder. Permissions should apply to both network access through the share and local access. In this lab, your task is to implement a combined share and NTFS permission strategy as follows: Share the H:\Components folder using the default share name. Configure share permissions by giving the Everyone group Full Control share permissions. Configure NTFS permissions for the H:\Components folder by giving the Research Resources group Full Control permissions. Keep the remaining NTFS permissions. This allows administrators full control and allows all other users to read the folder contents.

10.5.4 Configure NTFS and Share Permissions 1 https://www.youtube.com/watch?v=26z6f7K4zjk

You work as the IT administrator for a small business and are responsible for the corporate network. You created a folder for old data on the CorpFiles16 server. You need to configure share and NTFS permissions so that the Research Resources group has Full Control permissions. Data in a shared folder on an NTFS partition has two sets of permissions (share permissions and NTFS permissions). Each user's data access is determined by the most restrictive of the two permissions. Configure permissions as follows: Make data accessible over the network through a share named Archives. Enable all members of the Research and Development department to add to in the H:\Archives folder. Enable administrators to manage the folder and the share. Ensure permissions apply both locally and when accessed over the network. In this lab, your task is to perform the following on CorpFiles16: Share H:\Archives using the default share name. Configure share permissions to grant Full Control to Everyone. Configure NTFS permissions for the H:\Archives folder and give the Research Resources domain local group the Full Control NTFS permission.

10.5.5 Configure NTFS and Share Permissions 2 https://www.youtube.com/watch?v=tnV7I3TFjOs

You have added a new printer to the office. The printer is used by members of the Accounting department for printing forms and reports. The printer was not auto-detected, so you need to add the printer manually. The Print Server role service has been installed on CorpFiles16 already. In this lab, your task is to create a new TCP/IP printer on CorpFiles16 using the following settings: IP address: 192.168.0.24 Driver: HP LaserJet P4015X PCL6 Printer name: AcctPrinter Share name: AcctPrinter Location: Building 1 (include a space) List the printer in Active Directory Configure printer permissions as follows: Remove Everyone to prevent everyone from using the printer Add the Accounting group and assign the Print permission Add the Mary Barnes user account and assign the Manage Documents permission

11.1.6 Create and Share a Printer https://www.youtube.com/watch?v=tM_AJomSHVc

You have installed the LaserJet4240 printer and shared it on CorpFiles16 using the share name ResearchPrinter. The LaserJet4240 printer is connected to the Standard TCP/IP Port 192.168.0.20. Due to an increase in the workload on the printer, you added a second print device for the research team to use. The second print device is connected to a Standard TCP/IP Port on 192.168.0.21. You want to automatically load balance print jobs between the two print devices. You do not want to install a second printer to client systems or require users choose between two printers Printer pooling allows a single logical printer object to represent two or more physical print devices. In this lab, your task is to perform the following: Enable printer pooling on the LaserJet4240 printer. Configure the LaserJet4240 printer to use both of the following print device connections: Standard TCP/IP Port 192.168.0.20 Standard TCP/IP Port 192.168.0.21

11.2.3 Configure Printer Pooling https://www.youtube.com/watch?v=yFTRAt8cZTw

You are configuring a failover cluster. You have installed the failover clustering feature on the CorpCluster1 and CorpCluster2 servers. You are currently working at the console of the CorpCluster1 server. You have already successfully validated the servers in the cluster. In this lab, your task is to complete the following: Create a failover cluster with CorpCluster1 and CorpCluster2 in the cluster that meets the following parameters: Name the cluster CorpCluster Set the IP address as 192.168.0.25 Don't add storage to the cluster at this time Create an A record for the failover cluster in the CorpNet.com zone on CorpDC3 using the cluster name and IP address.

15.3.8 Create a Failover Cluster

The CorpFiles16 server has a new printer installed with the following settings: Printer name: KonicaColor Port: 192.168.0.22 (Standard TCP/IP Port) Driver: KONICA MINOLTA PS Color Laser Class Driver Share name: ColorPrinter The printer can be used by everyone. Unfortunately, this has caused the following problems: Members of the Marketing Department often send large print jobs for marketing proofs to the printer. As these jobs print, other users must wait a long time before the printer is available again. In addition, user print jobs end up in the middle of two large marketing print jobs, and the print jobs often get lost. Managers use the print device for printing reports used in planning meetings. They would like these jobs to print as soon as they are sent without waiting behind other documents in the queue. In this lab, your task is to resolve these problems as follows: Create a new printer called MrktgPrinter using the existing port and driver. Share the printer with the same name. Do not list in Active Directory. Make the printer available from 12 am to 4 am. Deploy the printer to computers in the Marketing OU using the MarketingGPO. Set the existing KonicaColor printer to be available between 4 am and 12 am. Create a new printer called MgrPrinter using the existing port and driver. Share the printer with the same name. Do not list in Active Directory. Set the printer priority to 99. Prevent the Everyone group from printing to the printer. Allow members of the Managers group to print.

11.2.4 Restrict Printer Access https://www.youtube.com/watch?v=HORXdimoXR8

The CorpFiles16 server has two printers installed. One printer is for members of the accounting department, and the other printer is for members of the sales team. To simplify adding printer objects on client computers, you need to deploy these printers using Group Policy. In this lab, your task is to perform the following: Deploy the AcctPrinter printer to all computers in the Accounting OU using the existing AccountingGPO Group Policy object. Deploy the SalesPrinter printer to all users in the Sales OU using the existing SalesGPO Group Policy object.

11.2.5 Deploy Printers with Group Policy https://www.youtube.com/watch?v=gWt_SwMi7hk

You work as the IT administrator for a small business and are responsible for the corporate network. You use the Windows Server Update service to help manage computer updates for the CorpNet.com domain. You want to use computer groups to configure different update settings for various computers in Building A and connected branch offices. In this lab, your task is to create computer groups on CorpWSUS1 and add members to them as follows: Computer Group Members Domain Controllers CorpDC CorpDC2 BranchDC1 BranchDC2 Servers CorpWeb CorpFiles12 CorpFiles16 CorpDHCP CorpServer Workstations Exec ITAdmin Office1 Office2 Support

12.1.10 Configure Computer Groups https://www.youtube.com/watch?v=RA8j_luxKnU

You work as the IT administrator for a small business and are responsible for the corporate network. You recently installed CorpWSUS2 in Building B as a downstream server to help with updates. Building B is occupied primarily by the accounting department. You would like to use client-side targeting to ensure that computers in the accounting department get the appropriate updates. In this lab, your task is to perform the following: Configure the WSUS console as follows: Enable client-side targeting. Create a computer group named Accounting (do not add computers to this group. This will be done automatically through Group Policy). Configure the following policies in the AccountingGPO linked to the Accounting OU on CorpDC4: Configure automatic updates to download updates and schedule the installation automatically. Install updates every Sunday at 2:00 am. Point all client computers to http://CorpWSUS2.CorpNet.com both for updates and statistics. Allow power management to wake up computers to install updates. Prevent non-administrators from getting update notifications. Enable client-side targeting and name the group Accounting.

12.1.11 Configure Client-side Targeting https://www.youtube.com/watch?v=PIcsS2oTdNs

You work as the IT administrator for a small business and are responsible for the corporate network. You would like to back up the system state of your domain controllers to ensure that, in the event of a disaster, Active Directory is backed up. You want to configure regular backups on CorpDC4. In this lab, your task is to perform the following using Windows Server Backup on CorpDC4: Create a regular backup schedule for the CorpDC4 server using the following settings: Items to back up: System State Backup schedule: Once a day at 1:00 AM Backup location: \\CorpFiles12\Backup Take an immediate backup using the following custom settings: Items to back up: System State and C: drive Backup location: \\CorpFiles12\Backup

12.3.5 Back Up a Server https://www.youtube.com/watch?v=BYMXpylKWqI

You work as the IT administrator for a small business and are responsible for the corporate network. You recently expanded the network to a second building. In doing so, you removed the consumer-grade Internet router and installed a network router. You have decided to use CorpDHCP as a DHCP server to replace the DHCP service provided by the consumer-grade router. In this lab, your task is to complete the following: Install the DHCP role. Authorize CorpDHCP as a DHCP server. Configure the DHCP scope as follows: Name: Subnet1 Address range: 192.168.0.1 to 192.168.0.254 Subnet mask: 255.255.255.0 Length: 24 Lease duration: 5 days Activate the DHCP scope. Do not configure exclusions or options at this time.

13.1.5 Install and Configure a DHCP Server https://www.youtube.com/watch?v=DY3mSo_qEM4

You have just configured a scope on the CorpDHCP server to service the 192.168.0.0/24 subnet. You need to configure additional TCP/IP parameters for all clients serviced by the CorpDHCP server. In this lab, your task is to complete the following: Configure the following DHCP options for the CorpDHCP server (not on the Subnet1 scope): 006 DNS Servers = 192.168.0.11 and 192.168.10.11 (in that order) 015 DNS Domain Name = CorpNet.com Configure Subnet1 scope options as follows: 003 Router (default gateway) as 192.168.0.5

13.1.6 Configure DHCP Options https://www.youtube.com/watch?v=0mh8XqAKnTg

You have just configured a scope on the CorpDHCP server to service the 192.168.0.0/24 subnet. You defined a scope to distribute IP addresses between 192.168.0.1 and 192.168.0.254. Now you need to prevent the DHCP server from assigning addresses to the servers and network devices. Create an exclusion range to exclude addresses 192.168.0.1 to 192.168.0.29

13.2.4 Create Exclusion Range

You have several printers on Subnet1 that need static IP addresses assigned. In this lab, your task is to configure the CorpDHCP server so that these machines always get the same IP addresses. Additionally, configure each reservation for DHCP only. Use the values in the table below to configure the reservations. Reservation Name IP Address MAC Address LaserJet4240-1 192.168.0.101 aa-61-82-df-04-54 LaserJet4240-2 192.168.0.102 ce-fd-48-90-06-23 KonicaColor 192.168.0.103 c8-ba-99-cd-80-12 AcctPrinter 192.168.0.104 f1-a9-3e-f7-7d-3b SalesPrinter 192.168.0.105 df-a9-99-cd-80-61

13.2.5 Create Client Reservations

You just installed the DHCP service on the CorpDHCP server. You configured two scopes. The scope for Building A, Subnet1, is configured on 192.168.0. The scope for Building B, Subnet2, is configured on 192.168.10. After activating the scopes, you find that clients on Subnet1 receive IP addressing information from the DHCP server, but clients on Subnet2 have IP addresses in the 169.254.0.0/16 range. You realize that DHCP messages are not being forwarded through the router. In this lab, your task is to complete the following: Use Routing and Remote Access to configure CorpServer2 as a DHCP relay agent by performing the following: Add the DHCP relay agent routing protocol. Add NetTeam as a DHCP relay agent interface. Set the boot threshold to 0. Configure the DHCP relay agent properties to identify 192.168.0.14 as the DHCP server. Renew the TCP/IP information on Exec2 (the client machine in Building B). Verify that Exec2 has a network connection.

13.3.5 Configure a DHCP Relay Agent https://www.youtube.com/watch?v=RDXJvEAWKoI

The CorpDHCP server is the only DHCP server for clients on the 192.168.0.0/24 subnet. It has a scope that distributes addresses between 192.168.0.1 and 192.168.0.254, and an exclusion for static addresses for servers from 192.168.0.01 to 192.168.0.29. To provide DHCP fault tolerance for this subnet, you plan to split the scope with the CorpDHCP2 server (located on subnet 192.168.10.0/24 in Building B). Routers have been configured to pass DHCP requests between subnets. In this lab, your task is to complete the following: Explore the DHCP configuration on CorpDHCP. Identify which scopes, exclusions, and options are currently configured. Add the CorpDHCP2 server to the DHCP console. Explore the DHCP configuration on CorpDHCP2. Identify which scopes, exclusions, and options are configured. On CorpDHCP, use the Split-Scope wizard to split the Subnet1 scope between CorpDHCP and CorpDHCP2. Configure CorpDHCP to handle 85 percent of the IP addresses. Configure CorpDHCP2 to handle 15 percent of the IP addresses. Configure a 2-millisecond delay for the target server response. Identify which exclusions have been added to the CorpDHCP server. Identify which scopes, exclusions, and options have changed on the CorpDHCP2 server. Activate the backup scope for Subnet1 on CorpDHCP2. This lab begins on CorpDHCP. In the DHCP Console, right-click DHCP and select Add Server to add CorpDHCP2 to the console.

13.3.6 Create a Split DHCP Scope https://www.youtube.com/watch?v=U7i2uo7XJoM

You work as the IT administrator for a small business and are responsible for the corporate network. The receptionist in your office has a laptop that runs Windows 7. She took it home and configured a static connection to her home network. Now she cannot connect to the office network, which uses a DHCP server for IP address configuration. You need to configure the laptop to work on both networks. In this lab, your task is to configure the Internet Protocol Version 4 (TCP/IPv4) properties with the following settings: On the General tab, set the following parameters: Obtain an IP address automatically Obtain DNS server address automatically On the Alternate Configuration tab, set the following parameters: IP Address: 172.16.0.12 Subnet Mask: 255.255.0.0 Default Gateway: 172.16.255.254 Preferred DNS Server: 198.60.22.2 The Alternate Configuration tab does not show up until Obtain an IP address automatically is selected.

13.4.5 Configure Automatic and Alternate Addressing

You are configuring a Network Load Balancing (NLB) cluster. You have installed the Network Load Balancing feature on the CorpNLB1 and CorpNLB2 servers. You are currently working at CorpNLB1 server console. In this lab, your task is to create an NLB cluster using the CorpNLB1 and CorpNLB2 servers and define port rules to customize how the servers respond. You can configure both cluster hosts from CorpNLB1. Create a new cluster using the following parameters: Cluster host: CorpNLB1 Interface name: Corp Priority (host identifier): 1 Cluster IP address: 192.168.10.25/24 Full Internet name: CorpNLB.CorpNet.com Cluster operation mode: unicast Edit or create the following port rules: Ports Protocols Filtering mode Client affinity 0 to 1023 Both Multiple host None 6066 Both Multiple host None 32187 Both Single host N/A 49152 to 65535 Both Disable this port range N/A Add CorpNLB2 as a cluster host using the following parameters: Cluster host: CorpNLB2 Interface name: Corp Priority (host identifier): 2 Edit CorpNLB2 ports using the following parameters: For port 6066, configure a load weight of 100. For port 32187, configure a handling priority of 2. For CorpNLB1, edit the port rule for port 6066 with a load weight of 0. On CorpDC3, use the DNS console to create an A record using the following parameters: Zone: CorpNet.com Host name: CorpNLB IP address: 192.168.10.25

15.2.4 Configure an NLB Cluster 1

You would like to improve the availability of applications in the branch office by configuring it in a network load balancing (NLB) cluster. You have installed the Network Load Balancing feature on the BranchNLB1 and BranchNLB2 servers. Now you need to design and implement a solution. In this lab, your tasks are to create an NLB cluster using the two servers and define port rules to meet the requirements below. You do not need to configure host records in DNS. You are working at the console of BranchNLB1. Use the following parameters to create a cluster and configure port rules: Cluster hosts: BranchNLB1 and BranchNLB2 Cluster IP address: 192.168.30.25 Subnet mask: 255.255.255.0 Full Internet name: BranchNLB.Branch2.CorpNet.com Cluster operation mode: Multicast Priority (host identifier) values: BranchNLB1: 2 (or higher) BranchNLB2: 1 Port rules: Protocols, Filtering Mode, and Affinity You would like to improve the availability of applications in the branch office by configuring it in a network load balancing (NLB) cluster. You have installed the Network Load Balancing feature on the BranchNLB1 and BranchNLB2 servers. Now you need to design and implement a solution. In this lab, your tasks are to create an NLB cluster using the two servers and define port rules to meet the requirements below. You do not need to configure host records in DNS. You are working at the console of BranchNLB1. Use the following parameters to create a cluster and configure port rules: Cluster hosts: BranchNLB1 and BranchNLB2 Cluster IP address: 192.168.30.25 Subnet mask: 255.255.255.0 Full Internet name: BranchNLB.Branch2.CorpNet.com Cluster operation mode: Multicast Priority (host identifier) values: BranchNLB1: 2 (or higher) BranchNLB2: 1 Port rules: Protocols, Filtering Mode, and Affinity Ports Protocols Filtering Mode Affinity 0 to 1023 Both Multiple host Single 1066 TCP Single host N/A 1777 TCP Multiple host Single 2000 to 2999 Both Disable this port range N/A 5055 Both Multiple host [Any] Port rules: Load Weight and Handling Priority Ports Load Weight Handling Priority 0 to 1023 Equal N/A 1066 N/A BranchNLB1 = 1 BranchNLB2 = 2 (or higher) 1777 BranchNLB1 = 15 BranchNLB2 = 45 N/A 2000 to 2999 N/A N/A 5055 BranchNLB1 = 0 BranchNLB2 = any value other than 0 N/A These port rules allow the following to happen: Peer-to-peer servers communicate cluster status information. All requests for TCP and UDP ports 0 to 1023 are equally divided between both servers. Multiple connections from a single client are sent to the same server. All requests for TCP port 1066 are sent to BranchNLB1 and then to BranchNLB2 if BranchNLB1 is unavailable. For TCP port 1777, 75% of the requests go to BranchNLB2 and 25% of the requests go to BranchNLB1. Multiple connections from a single client are sent to the same server. All requests for TCP and UDP ports 2000 to 2999 are not processed by the cluster. All requests for TCP and UDP port 5055 are sent to BranchNLB2 and never sent to BranchNLB1. Any traffic not controlled by a port rule goes to BranchNLB2, and to BranchNLB1 only if BranchNLB2 is unavailable. When configuring priority values, configure one of the servers with a value of 1 and configure the other server with any other value that is necessary to meet the requirements.

15.2.5 Configure an NLB Cluster 2

You are configuring a failover cluster. CorpCluster1 and CorpCluster2 are nodes in the cluster. Now you need to add storage to the cluster. You want both servers to share the storage. In this lab, complete the following tasks on CorpCluster1: Use the iSCSI initiator to connect to the CorpiSCSI server and its ClusterTarget1 target. Bring the iSCSI disk online. Create a volume using the following parameters: Use all the storage available. Do not assign to a drive letter or a folder. Use an NTFS file system. Label the volume iSCSI. Add the storage to the cluster. Make the storage available to both cluster servers.

15.3.10 Add Storage to a Cluster

You have created a failover cluster using the CorpCluster1 and CorpCluster2 servers. The current quorum configuration is Node Majority. You need to add a quorum witness. You are currently working at the CorpCluster1 server console. In this lab, your task is to configure a file share witness for CorpCluster on \\CorpServer\Witness using the Failover Cluster Manager console.

15.3.9 Configure Cluster Quorum Settings

You have created a failover cluster using the CorpCluster1 and CorpCluster2 servers. The current quorum configuration is Node Majority. You need to add a quorum witness. You are currently working at the CorpCluster1 server console. In this lab, your task is to configure a file share witness for CorpCluster on \\CorpServer\Witness using the Failover Cluster Manager console.

15.3.9 Configure Cluster Settings https://www.youtube.com/watch?v=HPU4yAkrdv8

You are configuring a failover cluster and need to add a role to the cluster. You need to provide high availability for server applications. You are working at the console of the CorpCluster1 server. In this lab, your task is to add a role to CorpCluster using the following settings: Server role: File Server Server type: Scale-Out File Server Client Access Point Name: CorpApps

15.5.5 Add a Failover Cluster Role https://www.youtube.com/watch?v=W9c-RpyG2SY

You are configuring failover clustering. You installed the CorpApps file server role on the cluster, and now you need to configure the role settings. In this lab, your task is to configure role settings using the following parameters: Preferred owner: CorpCluster2 Placement in the list of preferred owners: top Priority: high Maximum failures: one Period: two hours Failback hours: between 8:00 pm and 5:00 am

15.5.6 Configure Failover and Preference Settings

The CorpServer server is the host for several virtual machines running in Hyper-V. The CorpFiles12 server is accumulating a lot of files. You would like to move CorpFiles12's storage to another volume on the Hyper-V host. In this lab, your task is to move the storage for the CorpFiles12 virtual machine to G:\HyperV.

15.6.8 Migrate Virtual Machine Storage

The CorpServer server is the host for several virtual machines running in Hyper-V. The CorpFiles16 server shares files that are required by departments in Building B. You would like to move this server to a Hyper-V host that is on the same network as the users who access the files. CorpServer2 is the Hyper-V host in Building B. In this lab, your task is to complete the following: Explore the Hyper-V configuration on CorpServer. Which virtual machines are running on this host? Explore the Hyper-V configuration on CorpServer2. Which virtual machines are running on this host? Move the CorpFiles16 virtual machine and all of its storage to the CorpServer2 Hyper-V host server. Move all data for the CorpFiles 16 virtual machine to D:\HYPERV on the target machine. Verify that CorpFiles16 was moved to CorpServer2. Which virtual machines are running on this host now?

15.6.9 Migrate a Virtual Machine

You work as the IT administrator for a small business and are responsible for the corporate network. You have two servers and a DNS server that use static IP addresses on the 192.168.0.0/24 subnet. You plan to install three more servers soon, so you need to create DNS records for these servers on the CorpDC server. In this lab, your task is to perform the following: Create an IPv4 Active Directory-integrated primary reverse lookup zone for subnet 192.168.0.0/24. Be sure to accept the default replication and dynamic updates settings. Create A records and PTR records for the following hosts: Host Name IP Address CorpServer 192.168.0.10 CorpFiles16 192.168.0.12 CorpFiles12 192.168.0.13 CorpDHCP 192.168.0.14 CorpWeb 192.168.0.15

9.4.4 Create a Zone and Add Records https://www.youtube.com/watch?v=MIkuNDJ9w5M

The sales department wants to create an intranet for all sales employees. Internet Information Services (IIS) is installed on CorpWeb and will be used to host the intranet site. Employees need the ability to access the web server using any of the following URLs: http://sales.private http://intranet.sales.private http://www.sales.private You created the sales.private zone on the CorpDC server. Now you need to allow clients to connect to the web server by creating the following records in the zone: Create an ALIAS (CNAME) record leaving the name blank. (This allows users to connect to the server using the sales.private URL.) Create an ALIAS (CNAME) record named intranet. Create an ALIAS (CNAME) record named www.

9.4.5 Create CNAME Records https://www.youtube.com/watch?v=rCVAEcPY_E0

You are the server administrator for the eastsim.com domain. Srv5 is an application server that runs an application used by the Sales team. You are concerned that this server is a single point of failure--if the server goes down, the application will be unavailable. You would like to add a second server to provide redundancy. Your solution should meet the following requirements: All client requests should be divided between both servers. If either server goes down, client requests should be redirected to the other server. If the application stops but the server is up, the server should automatically try to restart the application to make it available. You want to configure Srv10 to provide redundancy for Srv5 based on the stated requirements. What should you do?

Configure Failover Clustering with node and disk majority.

Mark this question for reviewYou have configured a failover cluster with two servers as hosts, Srv1 and Srv2. You have configured the DHCP service as a clustered service. Srv1 should be the primary server used to respond to DHCP requests. If Srv1 is unavailable, Srv2 should take over the DHCP service. Once Srv1 comes back online, the DHCP service should continue to run on Srv2 unless manually moved. How do you configure the cluster service to behave this way?

Configure Srv1 and Srv2 as possible owners. Configure Srv1 as the preferred owner. Disable failback.

You are the server administrator for the eastsim.com domain. You have implemented a Network Load Balancing (NLB) cluster for several application servers. Client computers use several proxy servers to connect to the NLB cluster. You would like client connections to be directed to a cluster node based on the Class C subnet address. What should you do?

Configure a port rule with the filtering mode set to Multiple host. Configure Network for the client affinity.

You are the server administrator for the eastsim.com domain. You have an application server named Srv12 that runs a stateless Web application using IIS. Because of recent growth, this server is becoming unable to process all incoming requests in a timely manner. You would like to add a second server to run the application. Your solution should meet the following requirements: Client requests should be divided evenly between the two servers. If one server goes down, all requests should go to the other server. All application data will be stored on internal parallel SCSI drives on each server. You install the application on the second server. You now need to configure a solution to meet the requirements. What should you do?

Configure both servers in a Network Load Balancing (NLB) cluster.

Performs a live migration of all running virtual machines to another cluster node if the node is shut down without first being put into maintenance mode.

Drain the shutdown

You manage an NLB cluster named Cluster1. You need to perform some maintenance on Cluster1. You need to stop the cluster, but do not want to disrupt current connections. You want the cluster to continue processing current connections, but not accept any new ones. Once all active connections are ended, the cluster should stop. What should you do?

Drainstop the cluster.

You are the network administrator for westsim.com. the network consists of a single Active Directory domain. All of the servers run Windows Server 2012 R2 and all of the clients run Windows 8. The network contains a Storage Area Network (SAN). The network contains two servers, CS1 and CS2. Both servers have the Hyper-V role installed. You create a new cluster named Cluster1 and add both servers to Cluster1. You plan to create multiple virtual machines on the new cluster. You need to ensure that each virtual machine can be moved between CS1 and CS2 independently of the other virtual machines. What should you do?

Enable cluster shared volumes.

You have configured a Failover Cluster with two servers as hosts: Srv1 and Srv2. Each server has two network interface cards: NIC1 connects the server to the main network. Clients connect to the cluster through NIC1. NIC2 connects the server to the storage area network (SAN). This network is also used for sending out heartbeat signals and performing convergence. How should you configure NIC2 in the Failover Clustering Management console? (Select two. Each choice is a required part of the solution.)

For NIC1, choose Allow the cluster to use this network and select the Allow clients to connect through this network option. For NIC2, choose Allow the cluster to use this network and clear the Allow clients to connect through this network option.

You are the network administrator for westsim.com. The network consists of a single Active Directory domain. The network contains three Windows servers named FS1, FS2, and FS3. These servers are used for storing files in shared folders. You want to implement failover clustering to make these servers highly available for your users, so you have installed the Failover Clustering feature on each server and have created a cluster with FS1, FS2, and FS3 as the cluster nodes.You are using Storage Spaces Direct (SSD) to set up the shared storage for the cluster, so you install new SATA hard drives in each server and leave them blank, offline, and uninitialized. You open a PowerShell session to begin the SSD implementation. From the drop-down list, select the command you would enter to identify all storage devices that can be added to an SSD pool.

Get-PhysicalDisk -CanPool $True

You are the network administrator for corpnet.com. You have two windows servers that are members of a failover cluster named Cluster1. When a server in the cluster receives an update from Microsoft, a failover is triggered in Cluster1. What can you do to prevent cluster failovers caused by automatic updates?

Implement cluster-aware updating on the cluster.

You are the network administrator for Corpnet.com. You have two Windows Server 2012 R2 servers that are members of a Failover Cluster named Cluster1. One node is located in the main office and the other node is located in a branch office. The sites communicate using IPSec in tunnel mode. After changing ISPs, you discover that the rate of failover increases. You suspect this may be due to latency on the new WAN link. You need to ensure that slow connectivity between the sites does not cause failover. What should you do?

Increase the CrossSubnetThreshold on Cluster1.

You want to create a cluster using two virtual machines. You perform the following steps:• Create two virtual machines on the same Hyper-V host.• Configure a private virtual switch and connect each VM to it. • Install the Windows Server operating system on each VM. • Add the Failover Clustering role on each VM.• Launch Failover Cluster Manager.• Begin the validation process for this configuration by selecting the two VMs as nodes in the cluster. When you run the validation tests, will this configuration pass?

No. There is no shared storage device configured for the cluster nodes to use.

You are the network administrator for corpnet.com. The network has two Windows servers named HV1 and HV2. Both servers are running the Hyper-V Role. The network does not have a storage area network (SAN). HV1 has a virtual machine named VM1. You need to ensure that you can start VM1 on HV2 if HV1 fails. What should you do? (Select two.)

Open the Hyper-V settings on HV1 and modify the Replication Settings. In the properties of VM1, enable replication.

You are the network administrator for Corpnet.com. You have four Windows servers that are members of a Failover Cluster named Cluster1. You need to schedule the installation of Windows Updates on the cluster. The solution must minimize the amount of downtime for nodes during the application updates. What should you do?

Run the Add-CauClusterRole cmdlet.

You need to add additional servers to your network. You have decided to use virtual machines and Hyper-V to create these servers. Hyper-V is installed on the CorpServer server. Be aware of the following concerning this lab: Virtual disks created with the virtual machine are dynamically expanding disks. To create a fixed-size disk, create the disk before creating the virtual machine. When creating the network, use the internal type. This allows the virtual machine to communicate with the host computer, but not with other computers on the production network. When booting a virtual machine from the network, add the legacy network adapter to the virtual machine and make sure to change the boot order to boot from the network. In this lab, your task is to create a virtual machine that will be used to install a domain controller for the network. Use the following settings: Use the Hyper-V Manager utility to create a virtual hard disk named CorpDC in the D:\HYPERV\Virtual Hard Disks directory. Select the format that allows for maximum backwards compatibility. Configure the disk for best performance. Configure a size of 500 GB. Create a virtual machine named CorpDC. Save the virtual machine in the D:\HYPERV folder. Use 2048 MB of startup memory for the virtual machine. Use dynamic memory. Configure the network adapter to remain disconnected for now. Use the existing CorpDC virtual hard disk file that you created. Do not install an operating system (the operating system will be installed from an image later). Create a Test Network virtual switch. Configure the virtual machine network settings. Other network hosts should not be able to use this network. Add a legacy network adapter to the virtual machine. Configure the adapter to use the network you created. Configure the virtual machine to boot from the network. Configure dynamic memory settings: Minimum RAM: 512 MB Maximum RAM: 4096 MB Memory buffer: 30%

Prepare a Production Virtual Machine https://www.youtube.com/watch?v=MTIMwqA9d5c

You are the network administrator for westsim.com. The network consists of a single Active Directory domain. The network contains two servers named FS1 and FS2. Both servers are running Windows Server 2016 Datacenter edition.You want to implement Storage Replica as a disaster recovery solution. FS1 and FS2 will be replica partners with FS1 as the source server and FS2 as the destination server. Which of the following must be completed before you can configure this replica partnership? (Select two.)

The storage replica feature must be installed on FS1 and FS2 The File Server role must be installed on FS1 and FS2

MAC addresses used by cluster hosts are replaced by a single cluster MAC address

Unicast Mode


Set pelajaran terkait

NR 464 - Exam 1 (Saunders) - Liver, Pancreas, Gallbladder

View Set

Women's health/Disorders & Childbearing

View Set

Pharm. Chap. 17 Adrenergic Agonists

View Set

ESL - ESL3 - Level 3 - English Language Vocabulary for ALL Speakers

View Set

CHEM 2211L Experiment 1 - Recrystallization: Identification of a Impure Unknown

View Set

DoD Cyber Awareness 2023 (Knowledge Check)

View Set

Combo with GMAT Math 1 and 19 others

View Set

INS test 41) Which of the following statements is (are) true with respect to annuities? I. Annuities are the opposite of life insurance. II. The fundamental purpose of annuities is to replace lost income in case of premature death. A) I only B) II only C)

View Set