MCSA Guide to Installing and Configuring Microsoft Windows Server 2012/R2
The hosts file is contained within what directory in Windows?
%systemroot%\System32\drivers\etc
What command option for the dnscmd command lists all zones on the server?
/enumzones
What ipconfig command line option can be used to delete cached DNS information from memory?
/flushdns
Select below the DHCP option that defines the DNS domain name that will be configured on DHCP clients:
015
You have DHCP clients on the network that aren't domain members. You want to be sure these computers can register their hostnames with your DNS servers. Which option should you configure?
015 DNS domain name
Select below the predefined option within DHCP that may be necessary for some configurations of Windows Deployment Server?
060 PXEClient
What is the absolute minimum value the DHCP lease duration can be set to?
1 minute
By default, how many previous logons are cached locally to a computer?
10
Which IP address expressed in CIDR notation has the subnet mask 255.255.255.0?
10.100.44.123/24
Each Group Policy Object is assigned a globally unique identifier (GUID) of what length
128 bits
How long does it take for a change to trigger intrasite replication?
15 seconds, with a 3 second delay between each replication partner
The binary number 11000000 represents what number below in decimal
192
in CIDR notation, the subnet mask 255.255.255.0 is represented by what prefix?
24
The Windows default password complexity settings require at least how many different character types, out of the total four character types possible?
3
What CPU extensions are a prerequisite for installing the Hyper-V role?
32 bit or 64-bit
A DHCPINFORM request sent by a client will receive what message number from a DHCP server?
5
How many checkpoints can be created for a single VM?
50
How many usable host addresses exist within a network with a CIDR prefix of /23?
510
How many bits are in the interface ID of an IPv6 address?
64
A DHCP server that sends information back to a client on what UDP port?
68
Which of the following tunneling protocols requires that the IPv4 address embedded in the tunneling address must be a public address?
6to4
What's the default lease duration on a Windows DHCP server?
8 days
Hyper-V considers one read I/O operation to be how much data?
8 kb
Relay agent information is configured as DHCP option __________.
82
If a DHCP server does not respond to a client's first renewal request, how long will the client keep its current address until initiating the next lease renewal request?
87.5%
Select the special character below that can't be used within a username:
?
You have a DHCP server set up on your network and no DHCP relay agents. You're capturing DHCP packets with a protocol analyzer and see a broadcast packet with UDP source port 68 and UDP destination port 67. Which of the following DHCP message types can the packet be?
A DHCPOFFER to offer an IP address lease
Integrated Scripting Environment (ISE)
A PowerShell development environment that helps in creating PowerShell scripts.
Windows Remote Management (WinRM)
A Windows 2012 feature that provides a command-line interface for performing a variety of remote management tasks.
Which of the following is true about upgrading to Windows Server 2012/R2?
A Windows Server 2008 32-bit edition requires a clean install.
NIC teaming
A feature that allows multiple network interfaces to work in tandem to increase available bandwidth and provide load balancing and fault tolerance.
Minimal Server Interface
A new feature in Windows Server 2012 that takes up less disk space than the Server with a GUI option but more than the Server Core option. Includes Server Manager, MMCs, and some Control Panel applets.
Your company just opened a small branch office where 10 computer users will work. You have installed a single Windows Server 2012 R2 computer configured as a member server for basic file and print server needs. Users require DNS for Internet access and to resolve names of company resources. You decide to install DNS on the existing server. Which of the following types of installations makes the most sense?
A primary server hosting a standard zone
Downlevel Server
A server running an earlier version of the Windows Server OS; usually in the context of managing that server remotely.
Failover
A server's capability o recover from network hardware failure by having redundant hardware that can take over immediately for failed hardware.
Service dependencies
A service that requires another service or Windows component function correctly.
Why might an organization want a single DNS server to make all external queries?
A single DNS server used for external queries limits exposure and allows for the DNS server to create an extensive cache of DNS entries.
How can an administrator make a user template account easily recognizable?
A special character, such as an underscore, can be added to the beginning of a template account's name.
Service
A task or process that runs in the background.
What DNS record type is used for an IPv6 host record?
AAAA
Your DNS server is on the same network as the computer where you enter the following commands: arp -d ipconfig /flushdns nslookup server1 Which of the following protocols is used first as a result of these commands?
ARP
Flexibilty
Active Directory is installed with some predefined objects, such as user accounts and groups, but their properties can be modified, and new objects can be added for a customized solution
domain
Active Directory's core structural unit. It contains OUs and represents administrative, security, and policy boudaries
What cmdlet can be used to add a computer to a Windows domain network?
Add-Computer
Which of the following is a built-in user account? (Choose all that apply.)
Administrator Guest
Which of the following is true when purchasing a motherboard with multiple CPU sockets?
All installed CPUs must be identical.
Load balancing and failing (LBFO)
Another term for NIC teaming.
When installing Active Directory, what must be done to ensure minimal fault tolerance capabilities?
At least two domain controllers and two DNS servers should be used.
Which special identity group specifically includes any user account (except the Guest) logged into a computer or domain with a valid username and password?
Authenticated users
The IP address 129.53.82.20 falls under what class of IP addresses?
B
How can an administrator attempt to automatically fix inconsistencies between DHCP summary lease information kept in the Registry and detailed lease information stored in the DHCP database?
By using the Reconcile All Scopes option
What folder is selected by default for scanning when using the Automatically Generate Rules option in creating AppLocker policies?
C:\Program Files
Where is the smart paging file located on a Windows Server by default?
C:\ProgramData\Microsoft\Windows\Hyper-V
You're having replication problems with your GPOs and suspect that the version numbers have somehow gotten out of sync between the GPT and the GPC. What can you do to verify the version numbers on a GPO?
Check the versionNumber attribute of the GPC and open the GPT.INI file
You have set up an e-mail server that needs to respond to e-mail requests, using mail.coolgadgets.com and mail.niftytools.com in the request URL. How can you do this?
Configure two IP addresses on one NIC. Configure DNS to map one IP address to mail.coolgadgets.com and the other IP address to mail.niftytools.com.
You have several hundred client computers using WINS to resolve names of some enterprise servers. Many of the client computers are laptops used to connect to the network remotely. You're trying to eliminate WINS from your network to reduce the number of protocols and services you must support. What can you do, with the least administrative effort, that allows you to stop using WINS yet still allows clients computers to use a single-label name for accessing enterprise servers?
Create a GlobalNames zone and add CNAME records for enterprise servers.
You have created a GPO named RestrictU and linked it to the Operations OU (containing 30 users) with link order 3. RestrictU sets several policies in the User Configuration node. After a few days, you realize the Operations OU has three users who should be exempt from the restrictions in this GPO. You need to make sure these three users are exempt from RestrictU's settings, but all other policy settings are still in effect for them. What's the best way to proceed?
Create a global group and add the three users as members. Configure GPO security filtering so that the global group is denied access to the GPO
You have just finished a default installation of Windows Server 2012. You know that TCP/IP is installed. How does the server get assigned an IP address?
DHCP
What server role is installed along with Active Directory Domain Services if no other servers with this role are available?
DNS
You have just typed the commands ipconfig /flushdns and ping server1. Which of the following protocols is used first as a result of these commands?
DNS
What is the name of the mode that allows for repairs to Active Directory in the event of a corruption or accidental deletion?
DRSM
An administrator has discovered that several critical parts of Active Directory have been deleted. What boot mode can be used to perform restoration?
DRSM
Which graphical utility runs in Server Core?
Data and Time Control Panel
Load balancing
Distributing traffic between two or more interfaces, thus increasing the overall network throughput a server is capable of maintaining.
What is the most typically used group type conversion?
Distribution group -> security group
Which of the following options can an administrator enable to improve DNS security?
Do not allow dynamic updates
A computer adds the ____________________ group to the local Administrators group after being joined to an Active Directory domain.
Domain Admins
An account named SrAdmin created an OU named QandA under the Operations OU. Which of the following is true by default?
Domain Admins is the owner of the QandA OU
Select the true statement regarding the conversion of group scope:
Domain local groups can be converted to universal, as long as the domain local group does not contain other domain local groups
You're using a VM with a Windows 8.1 Pro guest OS to run applications that you want isolated from the host computer and the LAN. However, you want to be able to print from the VM to the printer connected to your host and copy files between the host and guest OS. The VM is connected to a private virtual switch. What can you do?
Enable Enhanced Session mode in Hyper-V, and verify that Remote Desktop Services is running on the guest.
What should you define in a scope to prevent the DHCP server from leasing addresses that are already assigned to devices statically?
Exclusion range
A folder can be shared only with a single name and single set of share permissions. True or False?
False
Administrator account should not be re-named, but should at least used a secure password
False
Local storage is rarely direct-attached storage. True or False?
False
The use of WINS forward lookup is enabled by default. True or False?
False
If a domain consists of DCs that are running versions of Windows Server earlier than Windows Server 2008, what replication method is used?
File Replication Service (FRS)
A ____________ is a formatted unit of data that's ready to be transferred to the network medium. It contains a destination and source MAC address and an error-checking code called the frame check sequence (FCS)
Frame
The ____________ file contains version information that is used to determine when a GPO has been modified, and is used during replication to determine if a local copy of a GPO is up to date.
GPT.INI
What cmdlet can be used to get a list of available Windows features via PowerShell?
Get-WindowsFeature
What Active Directory directory partition holds the DNS database?
Global catalog partition
What Active Directory directory partition holds the DNS database?
Global catalog partition
What type of record does DNS create automatically to resolve the FQDN of an NS record?
Glue A records
Settings in the Administrative Templates section of the User Configuration node affect what area of the registry?
HKEY_CURRENT_USER
DNS clients maintain a text file called ____ that can contain static DNS entries
Hosts
DNS clients maintain a text file called ____ that can contain static DNS entries.
Hosts
What utility should always be used in order to delete checkpoints?
Hyper-V manager
When installing an additional DC in an existing domain, which of the following is an option for reducing replication traffic?
IFM
In what server configuration window can the Network Access Protection (NAP) feature be enabled or disabled?
IPv4 Properties
Which IPv6 transition technology requires the netsh command to manually create the tunnel to carry IPv6 traffic over the IPv4 Internet?
IPv6-over-IPv4
Where is a GPT stored?
In a folder named the same as the GUID of the GPO in the SYSVOL share
You're scanning the local cache on a DNS client, and you come across the notation ::1. What does it mean
It's the IPv6 localhost address.
Which type of DNS lookup responds with the best information it has to satisfy the query?
Iterative query
The protocol for accessing Active Directory objects and services is based on which of the following standards?
LDAP
You have created a GPO that defines settings only in the Local Policies node. You want the settings to apply to all computers in the domain and take precedence over any other GPOs. Which of the following is the best approach?
Link the new GPO to the domain, and then right-click the new GPO and click Enforced.
Which of the following represents the correct order in which GPOs are applied to an object that falls within the GPO's scope?
Local GPOs, site, domain, OU
What is a downlevel user logon name used for?
Logging into older Windows OSs or using older Windows applications
You're managing 75 servers from a single Server Manager console and find you're wasting a lot of time scrolling through the list of servers to find the one you want to manage. You have 5 locations with about 15 servers in each location. What can you do to make managing these servers in Server Manager easier?
Make 5 groups and give them meaningful names
The _________ file system is the default file system used during a Windows Server 2012 installation.
NTFS
If the Windows Firewall is enabled, how are rules applied when multiple network connections are available?
Network Location Awareness settings are used to determine whether to apply the Domain, Private, or Public profiles on each individual connection.
server operating systems
OSs designed to emphasize network access performance and run background processes rather than desktop applications
Which of the following is true about organizational units? (Choose all that apply.)
OUs can be nested A group policy can be linked to an OU
You manage the DNS structure on your network. The network security group has decided that only one DNS server should contact the Internet. Under no circumstances should other servers contact the Internet for DNS queries, even if the designated server is down. You have decided that the DNS server named DNS-Int should be the server allowed to contact the Internet. How should you configure your DNS structure to accommodate these requirements?
On each DNS server except DNS-Int, configure a forwarder pointing to DNS-Int. Disable the use of root hints if no forwarders are available. No changes are necessary on DNS-Int.
The Vendor Class uses what option field within a DHCPDISCOVER packet?
Option 60
Four organizing components of Active Directory
Organizational units Domains Trees Forests
Which of the following example passwords meets the minimum password requirements for Windows Server 2012?
P@ssw0rd
Select the operations master role that is responsible for providing backward compatibility with Windows NT servers configured as Windows NT backup domain controllers or member servers:
PDC emulator master
Two aspects of Active Directory structure
Physical Structure Logical Structure
When a DNS server responds to a query with a list of name servers, what is the response called?
Referral
The _____________ cmdlet within PowerShell can be used to rename an object in Active Directory.
Rename-ADObject
A ____________ contains PTR records that map IP addresses to names and is named after the IP network address of the computers whose records it contains.
Reverse lookup zone
The __________ folder is a shared folder containing file-based information that's replicated to other domain controllers
SYSVOL
Which of the following choices is one of the two forest-wide FSMO roles?
Schema master
You have noticed inappropriate use of computers for gaming and Internet downloads by some employees who come in after hours and on weekends. These employees don't have valid work assignments during these times. You have been asked to devise a solution for these employees that doesn't affect other employees or these employees' computers during working hours. What's the best solution?
Set the Logon Hours options for their user accounts.
Your Hyper-V server has a single disk of 300 GB being used as the system disk and to host a dynamically expanding disk for a Windows Server 2012 R2 VM. The VM's virtual disk has a maximum size of 200 GB and is currently 80 GB and growing. You have only about 30 GB free space on the host disk. You have noticed disk contention with the host OS, and the constant need for the virtual disk to expand is causing performance problems. You also have plans to install at least one more VM. You have installed a new 500 GB hard disk on the host and want to make sure the VM doesn't contend for the host's system disk, and the expansion process doesn't hamper disk performance. What should you do?
Shut down the VM. Convert the dynamically expanding disk to a fixed-size disk, being sure to place the fixed-size disk on the new host drive. Connect the VM to the fixed-size disk in place of the dynamically expanding disk. Delete the old virtual disk.
Checkpoints for your test VMs are taking up too much space on the host's system disk. You have two test VMs running, each with one checkpoint to represent the baseline testing environment. You're finished with your current testing and are ready for another round of testing, but you want to make sure your checkpoints are stored on another volume. What should you do?
Shut down the VMs. Apply the checkpoint to each VM, and delete all checkpoints in Hyper-V Manager. Change the path of the checkpoint files to the other volume, and create a new checkpoint for each VM.
Which of the following best describes a directory service?
Similar to a database program but with the capability to manage objects
Over the past several months, Tom, who has access to sensitive company information, has logged on to computers in other departments and left them without logging off. You have discussed the matter with him, but the problem continues to occur. You're concerned that someone could access these sensitive resources easily. What's the best way to solve this problem?
Specify which computers Tom can log on to in the domain by using the Log On To option in his account's properties.
What protocol in the TCP/IP suite provides reliable data transfer between applications at the transport-layer?
TCP
What network protocol is the most widely used, and installed by default on Windows Server 2012 R2?
TCP/IPv4
Which of the following is not a standard component of Teredo tunneling?
Teredo proxy
How do routers recognize 6to4 IPv6 packets?
The 2002::/16 prefix is used to identify 6to4 addresses. The first 16 bits are always 2002, and the next 32 bits represent an IPv4 address.
Which of the following statements is not true regarding the built-in Administrator account?
The Administrator account can't be renamed, but it can be deleted
A valid comma separated value file that can be imported using csvde must have what option below on the first line?
The FQDN of the target domain
If a GPO's link status is "disabled", what affect does this have on the GPO?
The GPO is listed under the container object and the link is disabled, however, the GPO itself may still be enabled on a different container object.
What is an Organizationally Unique Identifier (OUI)?
The OUI is the first 24 bits of a MAC address, and is used to identify the manufacturer of the NIC.
In a zone's Properties dialog box, what option is unavailable under Dynamic updates for only standard zones?
The Secure option only
You're the administrator of a file server. Tom, who is on vacation, had created a file that Mary needs access to, but neither her account nor the Administrator account has permissions to access the file. What is the best way to allow Mary to access the file?
The administrator account can take ownership of the file, grant Mary the permissions she needs in order to access the file and then give ownership back to Tom.
Which of the following scenarios is not ideal for the deployment of a single domain structure?
The domain structure must be able to utilize different name identities
The responsible person section of an SOA record contains what information?
The e-mail address of the responsible person
You have an Active Directory forest of two trees and eight domains. You haven't changed any operations master domain controllers. On which domain controller is the schema master?
The first domain controller in the forest root domain
What happens if a security group that's an ACE in a shared folder is converted to a distribution group?
The group remains in the DACL, but the ACE has no effect on members' access to the resource.
Although the hosts file is no longer used for localhost name resolution, what else can the hosts file be used for?
The hosts file can be used to store permanent IP address to host mappings outside of the DNS database, and can be used to create a rudimentary web filter.
How are Active Directory objects added to special identity groups?
The membership details of special identity groups is handled dynamically by Windows, and can't be changed manually by an administrator.
What can a DHCP server do to enable active conflict detection?
The server can attempt to ping an IP address to ensure that an address isn't already in use before it is assigned.
Disabling a binding has what affect on a DHCP server?
The server no longer listens to UDP port 67 on the disabled binding
Under what circumstances would a multi-domain structure not be an ideal choice?
The structure should facilitate easier access to resources
A user-specific local GPO takes precedence over a site-linked GPO. True or False?
True
A zone that is not integrated into Active Directory is referred to as a standard zone, and the zone data is stored in a text file.
True
Configuration policies are uploaded to a computer when the OS starts and are updated every 90 minutes thereafter. True or False?
True
DNS recursion is enabled on Windows DNS servers by default. True or False?
True
Every GPO has a GPT associated with it. True or False?
True
Every IP address configuration requires the use of a subnet mask, and all hosts on the same network must share the same network ID in their IP addresses.
True
GPOs linked to a site object can facilitate IP address based policy settings.
True
IP addresses can be leased for an unlimited period. True or False?
True
Information within an OU can be hidden using permissions, and administration of an OU can be delegated to a non-administrative account.
True
Permission inheritance can be configured such that permissions are only inherited by specific types of child object types.
True
The DHCP server service can be configured to automatically discard A and PTR records when a lease is deleted.
True
The MX record type is used to designate mail exchangers, or mail servers for e-mail. True or False?
True
The Windows Server DHCP relay agent function is configured as part of the Routing role service of the Remote Access server role. True or False?
True
The best method for configuring updates to servers and domain member computers is via group policy.
True
The most likely problem with GPO replication is a delay in clients receiving changes in policy settings. True or False?
True
When selecting disk subsystems for enterprise or servers accessed 24/7, SAS is a preferred technology.
True
You can convert a Server Core installation to a Minimal Server Interface installation but not vice versa. True or False?
True
Some of your non-Windows clients aren't registering their hostnames with the DNS server. You don't require secure updates on the DNS server. What option should you configure on the DHCP server so that non-Windows clients names are registered?
Update DNS records dynamically for DHCP clients that don't request updates.
All your domain controllers are running Windows Server 2012 R2. You're noticing problems with GPT replication. What should you check?
Verify that DFSR is operating correctly.
What Group Policy feature should you use if you have a policy linked to an OU that contains computer accounts but want the policy to affect only computers running Windows 7? You don't know exactly which computer accounts represent the computers running Windows 7.
WMI filtering
At what point does a client send a unicast packet to the DHCP server to request a lease renewal for its current IP address?
When the lease is 50% expired
In the DHCP server's statistics, you notice that a lot of DHCPNAK packets have been transmitted. What's the most likely reason?
You changed the range of addresses in a scope recently.
Which term identifies an operation that copies all or part of a zone from one DNS server to another and occurs because of a secondary server requesting the transfer from another server.
Zone transfer
Foundation Edition
a Windows Server 2012/R2 edition intended as an entry-level server edition. Its an OEM-only version that supports only 15 users and can only be purchased already installed on a server
Standard Edition
a Windows Server 2012/R2 edition suitable for most businesses that need a full-featured server and might need to use virtualization on a moderate scale
Essentials Edition
a Windows Server 2012/R2 edition suitable for small businesses with 25 or fewer users. This edition doesn't support Hyper-C, and some services, such as Active Directory and DNS, are installed automatically during OS installation
Datacenter Edition
a Windows Server 2012/R2 edition, intended primarily for organizations using virtualization on a large scale.
Server Core
a Windows Server 2012/R2 installation option that doesn't have a traditional GUI
domain controller
a Windows server that has Active Directory installed and is responsible for allowing client computers access to domain resources
stand-alone server
a Windows server that isn't a domain controller or a member of a domain
member service
a Windows server that's in the management scope of a Windows domain but doesn't have Active Directory installed
Directory Services Restore Mode (DSRM)
a boot mode used to perform restore operations on Active Directory if it becomes corrupted or parts of it are deleted accidentally
private cloud
a cloud computing service provided by a company's internal IT department (see also cloud computing)
public cloud
a cloud computing service provided by a third party
network connection
a collection of components consisting of a network interface, network protocols, and network client and server software that work together to connect a Windows computer to a network
forest
a collection of one or more Active Directory trees. A forest can consist of a single tree with a single domain, or it can contain several trees, each with a hierarchy of parent and child domains
cloud computing
a collection of technologies for abstracting the details of how applications, storage, network, and other computing resources are delivered to users.
PowerShell
a command-line interactive scripting environment that provides the commands needed for most management tasks in a Windows Server 2012/R2 environment
Directory Service
a database that stores information about a computers network and offers features for retrieving and managing that information
fully qualified domain name (FQDN)
a domain name that includes all parts of the name, including the top-level domain
New Technology File Systems (NTFS)
a file system used on Windows OSs that supports compression, encryption, and fine-tuned permissions
Windows domain
a group of Windows computers that share common management and are subject to rules and policies that an administrator defines
tree
a grouping of domains that share a common naming structure
client access licenses (CALS)
a license required by law for each user who logs on to a Windows Server 2012/R2 Standard or Datacenter Edition server.
server role
a major function or service that a sever performs
site
a physical location in which domain controllers communicate and replicate information regurarly
Lightweight Directory Access Protocol (LDAP)
a protocol that runs over TCP/IP and is designed to facilitate access to directory services and directory objects. It's based on a suite of protocols called X.500, developed by the International Telecommunication Union
virtual desktop infrastructure (VDI)
a rapidly growing sector of private cloud computing whereby users access their desktops through a private cloud; the OS and applications run on servers in a corporate data center rather than on the local computer
SYSVOL folder
a shared folder containing file-based information that's replicated to other domain controllers
virtualization
a technology that uses software to emulate multiple hardware environments, allowing multiple operating systems to run on the same physical server simultaneously
Which option can you add to the Install-WindowsFeature command that shows you what the results would be but doesn't actually perform the installation task? a. -What If b. -TestOnly c. -ShowResults d. -NoInstall
a. -What If
Which MMC is added after Active Directory installation? (Choose all that apply.) a. Active Directory Domains and Trusts b. Active Directory Groups and Sites c. ADSI Edit d. Active Directory Restoration Utility
a. Active Directory Domains and Trusts c. ADSI Edit
Which of the following can be used to create shares? (Choose all that apply.) a. Advanced sharing b. Disk management c. Simple file sharing d. File and Storage Services
a. Advanced sharing c. Simple file sharing d. File and Storage Services
Which of the following is associated with an Active Directory forest? (Choose all that apply.) a. Can contact trees with different naming structures b. Allows independent domain administration c. Contains domains with different schemas d. Represents the broadest element is Active Directory
a. Can contact trees with different naming structures b. Allows independent domain administration d. Represents the broadest element is Active Directory
Which of the following is a default folder object? a. Computers b. Domain Controllers c. Groups d. Sites
a. Computers
You see something named "primordial" in the File and Storage Services. What can you do with it? a. Create a storage pool b. Create a virtual disk c. Format it d. Create a new volume
a. Create a storage pool
An expensive color laserjet printer is shared by a group of managers and some other employees. The managers complain that they often have to wait for their print jobs until other employees' large jobs have finished. Usually, the managers' print jobs are small and needed immediately, but other employees rarely need their print jobs in a hurry. What can you do to help solve this problem without buying additional equipment? a. Create two printers and assign them different priorities and permissions b. Create another printer and configure a printer tool c. Buy another printer and configure permissions so that only managers can access it d. Make the printer available only during the hours managers are working
a. Create two printers and assign them different priorities and permissions
You need to prevent members of a group from accessing a subfolder of a folder the group does have access to. What's the best way to do this? (Choose two answers. Each correct answer represents part of the solution.) a. Disable permission inheritance on the subfolder, and convert existing permissions b. Add each member of the group to the subfolder's DACL, and assign a Deny permission to each member c. Create a new group, and add members of the existing group to this new group. Add the new group to the subfolder's DACL with a Deny permission d. Remove the group from the subfolder's DACL
a. Disable permission inheritance on the subfolder, and convert existing permissions d. Remove the group from the subfolder's DACL
You have installed a shared printer with the default permissions and want users to be able to manage their own documents in the printer queue. What do you need to do? a. Do nothing b. Assign the Everyone special identity the Manage documents permission c. Assign the Everyone special identity the Manage printers permission d. Add Domain Users to the Printer Operators group
a. Do nothing
Which of the following is a directory partition? (Choose all that apply.) a. Domain directory partition b. Group policy partition c. Schema directory partition d. Configuration partition
a. Domain directory partition c. Schema directory partition d. Configuration partition
You need to protect sensitive files from unauthorized users even if the disk is stolen. What feature should you use and on what file system? a. EFS, NTFS b. Disk compression, ReFS c. Quotas, NTFS d. Shadow copies, ReFS
a. EFS, NTFS
Which of the following is a feature of Active Directory? (Choose all that apply.) a. Fine-grained access controls b. Can be distributed among many servers c. Can be installed on only one server per domain d. Has a fixed schema
a. Fine-grained access controls b. Can be distributed among many servers
You have installed a new disk and created a volume on it. What should you do before you can store files on it? a. Format it b. Partition it c. Initialize it d. Erase it
a. Format it
Which of the following is TRUE about a page file? a. It should be stored on a separate disk from the Windows folder b. It's usually stored in fast random access memory c. Windows stores frequently accessed drivers in it d. The page file is usually smaller than 50 MB
a. It should be stored on a separate disk from the Windows folder
You need to stop a service so that you can do some troubleshooting. Before you stop it, you need to see whether any other services will be affected by this action. What should you do? a. Look at the Dependencies tab b. View the service startup type c. Right-click the service and click Show Requirements d. Set the service recovery options
a. Look at the Dependencies tab
Which of the following is an example of long-term storage? (Choose all that apply) a. Magnetic tape b. CPU cache c. SSD d. RAM
a. Magnetic tape c. SSD
Which of the following is an example of what a server uses storage for? (Choose all that apply.) a. Page file b. Virtual machines c. Working memory d. Documents
a. Page file b. Virtual machines d. Documents
You right-click a Server-Core server in Server Manager and click Computer Management. You see an error indicating that the server can't be managed. What should you do to solve the problem? a. Run configure-SMRemoting.exe -Enable on the local computer b. Configure Windows Firewall on the remote computer c. Install the Minimal Server Interface on the remote computer d. Disable WinRM on the local computer
a. Run configure-SMRemoting.exe -Enable on the local computer
Which of the following is a file-sharing protocol supported by Windows Server 2012/R2 File and Storage Services role? (Choose all the apply.) a. SMB b. FTP c. TFTP d. NFS
a. SMB b. FTP d. NFS
Which features must be installed to convert a server from Server Core to the full GUI? (Choose all the apply.) a. Server-GUI-Shell b. Server-MMC-Enable c. Server-Full-Interface d. Server-GUI-Mgmt-Infra
a. Server-GUI-Shell
which of the following is a task you should preform before installing roles and features? (choose all that apply.) a. Set a strong Administration password b. read the Windows Server 2012 user manual c. configure static IP address d. Make sure security updates are current
a. Set a strong Administration password c. configure static IP address d. Make sure security updates are current
What type of storage layout does Storage Spaces support? (Choose all that apply.) a. Simple space b. Mirror space c. Parity space d. Striped space
a. Simple space b. Mirror space c. Parity space
What type of volumes or partitions can be created on a basic disk? (Choose all the apply.) a. Spanned volume b. Striped partition c. Extended partition d. Simple volume
a. Spanned volume d. Simple volume
Which of the following is the responsibility of a domain controller? (Choose all the apply.) a. Storing a copy of the domain data b. Providing data search and retrieval functions c. Servicing multiple domains d. Providing authentication services
a. Storing a copy of the domain data b. Providing data search and retrieval functions d. Providing authentication services
What's created automatically when you install Windows Server 2012 R2 on a system with a disk drive that has never had an OS installed on it before? a. System volume b. Dynamic Disk c. GPT d. Extended partition
a. System volume
Which of the following ways can a user become a files owner? (Choose all that apply.) a. Take ownership of the file b. Create the file c. Belong to the File Owner special identity d. Be assigned as the owner by an administrator
a. Take ownership of the file b. Create the file d. Be assigned as the owner by an administrator
Which of the following uses dynamically expanding storage? a. Thin provisioning b. Primordial pools c. Parity volumes d. Resilient File System
a. Thin provisioning
A user needs to create files and make changes to file contents. Aside from the Read permissions, what other permissions should the user be granted without allowing more access than is necessary? a. Write b. Full control c. Modify d. Create
a. Write
What feature, once activated, can't be disabled without reinstalling all domain controllers within a forest?
active directory recycle bin
Policy-based administration
administrators can define policies to ensure a secure and consistent environment for users yet maintain the flexibility to apply different rules for departments, locations, or user classes as needed.
What folder under Policies within the Computer Configuration Node of a GPO contains the Control Panel, Network, Printers, System, and Windows Component folders?
adminstrative templates
Which of the following is not one of the five folder objects that are created when Active Directory is installed?
adminstrators
Scalability
advanced indexing technology provides high-performance data access, whether Active Directory consists of a few dozen or a few million objects
Centralized but distributed database
all network data is centrally located, but it can be distributed among many servers for fast, easy access to information from any location. Automatic replication of information also provides load balancing and fault tolerance.
Windows workgroup
also called a peer-to-peer network, it's a small collection of Windows computers whose users typically have something in common, such as the need to share files or printers with each other. No computer has authority or control over another. Logons, security, and resource sharing are decentralized
organizational unit (OU)
an Active Directory container used to organize a network's users and resources into logical administrative units
What type of IPv6 address should you use when you have multiple routers on a subnet and want hosts to use the nearest router for packets that should be delivered to remote networks?
anycast
How can an administrator remove all audit policy subcategories so that auditing is controlled only by Group Policy?
auditpol/clear
After you install the DHCP Server role on a member server, what must you do before the server can begin providing DHCP services?
authorize the server
Checkpoint files utilize what file name extension?
avhd
Which of the following must be installed if you want to remotely manage a Windows Server 2012 server from a Windows Server 2012 R2 server? a. Performance updates b. .Net Framework 4.5 c. Windows Management Framework 4.0 d. A full GUI
b. .Net Framework 4.5
Which of the following is NOT associated with an Active Directory tree? a. A group of domains b. A container object that can be linked to a GPO c. A common naming structure d. Parent and Child domains
b. A container object that can be linked to a GPO
Which of the following is not true about disk quotas? a. Users can be prevented from saving files on a volume b. An event can be generated when a user exceeds the quota limit c. Quotas can be overridden for groups d. Quotas can be set without denying disk space to users
b. An event can be generated when a user exceeds the quota limit
The Tsmith user account has been granted the Read share permissions. Tsmith is a member of the Sales group, which has been granted the Change share permission. In the shared folder's Security tab, Sales has been granted full control, and the Users group has been granted Read permission. Which of the following can Tsmith do in the share when accessing it from the network? (Choose all that apply.) a. Change permission on all files b. Delete all files c. Take ownership of all files d. Create files
b. Delete all files d. Create Files
To which of the following can a GPO be linked? (Choose all that apply.) a. Trees b. Domains c. Folders d. Sites
b. Domains d. Sites
Which load-balancing mode should you choose if you need to balance heavy traffic flow over multiple NICs? a. Address Hash b. Dynamic c. LACP d. Hyper-V Port
b. Dynamic
Which command shows a list of installed roles and features? a. Installed-WindowsFeature -Show b. Get-WindowsFeature | where Installed c. List-InstalledFeature d. Show-Features .if. Installed
b. Get-WindowsFeature | where Installed
Which of the following is true about an SSD? a. Uses magnetic platters b. Has no moving parts c. Uses a proprietary interface d. Uses EPROM
b. Has no moving parts
The protocol for access Active Directory objects and services is based on which of the following standards? a. DNS b. LDAP c. DHCP d. ICMP
b. LDAP
Which type of account is NOT found in Active Directory? a. Domain user account b. Local user account c. Built-in user account d. Computer account
b. Local user account
Which of the following is the correct sequence of steps for creating a volume with Storage Spaces? a. Disk pool, volume, virtual disk b. Primordial pool, virtual disk, volume c. Virtual disk, disk pool, volume d. Disk pool, virtual disk, volume
b. Primordial pool, virtual disk, volume
Which of the following specifies what types of actions a user can perform on a computer or network? a. Attributes b. Rights c. Permissions d. Classes
b. Rights
You have four servers that need access to shared storage because you're configuring them in a cluster. Which storage solution should you consider for this application? a. NAS b. SAN c. SCSI d. DAS
b. SAN
Which administrative share does Active Directory use for replications? a. NETLOGON b. SYSVOL c. Admin$ d. IPC$
b. SYSVOL
All domains in the same forest have which of the following common? (Choose all that apply.) a. Domain name b. Schema c. Domain administrator d. Global catalog
b. Schema d. Global catalog
Which of the following is a method for adding a server to Server Manager? (Choose all that apply.) a. Query NetBIOS b. Search Active Directory c. Import a file d. Search DNS
b. Search Active Directory c. Import a file d. Search DNS
Which of the following is true about share and NTFS permissions? a. NTFS permissions are applied only to local file access b. Share permissions take precedence over NTFS permissions c. Share permissions are applied to network and local file access d. NTFS permissions are applied to network access
b. Share permissions take precedence over NTFS permissions
Which of the following best describes a directory service? a. Similar to a list of information in a text file b. Similar to a database program but with the capability to manage objects c. A program for managing the user interface on a server d. A program for managing folders, files, and permissions on a distributed server
b. Similar to a database program but with the capability to manage objects
What command can you put in a batch file to allow users to access the Public share on the ServPub1 server, using the drive letter P? a. net share P: \\ServPub1\Public b. net use P: \\ServPub1\Public c. share \\ServPub1\Public P: d. share P: \\ServPub1\Public
b. net use P: \\ServPub1\Public
By default, when are policies set in the User Configuration node applied? a. Every 5 minutes b. Immediately c. At user logon d. At computer restart
c. At user logon
Which of the following is NOT part of Active Directory's logical structure? a. Tree b. Forest c. DC d. OU
c. DC
Which of the following is the core logical structure container in Active Directory? a. Forest b. OU c. Domain d. Site
c. Domain
Which is responsible for management of adding, removing, and renaming domains in a forest? a. Schema master b. Infrastructure master c. Domain naming master d. RID master
c. Domain naming master
You have been getting quite a few calls with requests to restore files from a backup because the file was accidentally deleted from a share or because the user needed a previous version of a file that was overwritten. Restoring the files has become a burden, and sometimes you need to repeat the process several times until you find the version the user needs. What can you do the users a way to access the files they need and reduce your administrative burden? a. Adjust permissions on the shares so that the users can't delete files except their own. Tell users to backup their own files to local backup media b. Enable shadow copies for each share c. Enable shadow copies on the volumes where the shares are hosted d. Give each user a backdrop program and an external hard drive
c. Enable shadow copies on the volumes where the shares are hosted
Which of the following is associated with installing the first domain controller in a forest? a. RODC b. Child domain c. Global catalog d. DHCP
c. Global catalog
You want to install a feature to an offline VHD file. What do you do first? a. Commit the changes b. Install the feature by using dism c. Mount the image d. Import the .wim file
c. Mount the image
You want shared network storage that's easy to set up and geared toward file sharing with several file-sharing protocols, but you don't want the device to be dedicated to file sharing, What should you consider buying? a. SAN b. DAS c. NAS d. LAS
c. NAS
You want to be able to manage a Server Core computer's firewall by using the Windows Firewall with Advanced Security snap-in. What should you do? a. On the local computer, disable the Windows Firewall Remote Management rule group. b. On the remote computer, enter the command Configure-SMRemoting -ConfigureFirewallRules c. On the remote computer, use the PowerShell command Set-NetFirewallRule -DisplayGroup "Windows Firewall Remote Management" -enabled True d.On the local computer, enable the COM+ Network Access firewall rule
c. On the remote computer, use the PowerShell command Set-NetFirewallRule -DisplayGroup "Windows Firewall Remote Management" -enabled True
You need to create a share containing confidential information that only a select group of people should know about. You don't want this share to appear in users' network browse lists. What can you do that involves the least administrative effort and disruption? a. Disable network discovery on all computers b. Disable network discovery on the computers of users who you don't want to see the share c. Put a $ character at the end of the share name d. Put a @ character a the beginning of the share name
c. Put a $ character at the end of the share name
You need a disk system that provides the best performance for a new application that frequently reads and writes data to the disk. You aren't concerned about disk fault tolerance because the data will be backed up each day; performance is the main concern. What type of volume arrangement should you use? a. Spanned volume b. RAID 1 volume c. RAID 0 volume d. RAID 5 volume
c. RAID 0 volume
You're planning to install a new database application that uses an enormous amount of disk space. You need this application to be highly available, so you need a disk system with the capability to auto-correct from disk errors and data corruption. Which of the following is the best option? a. MBR disk with chkdsk b. NTFS format with EFS c. ReFS format and Storage Spaces d. GPT disk with shadow copies
c. ReFS format and Storage Spaces
Which of the following defines the types of information in an Active Directory object? a. GPOs b. Attribute values c. Schema attributes d. Schema classes
c. Schema attributes
Which of the following is a component of Active Directory's physical structure? a. Organizational units b. Domains c. Sites d. Folders
c. Sites
Which of the following is true about NIC teaming? a. You need a minimum of two NICs to create a NIC team b. In failover mode, one NIC is always in standby mode c. Static teaming is used mainly for load balancing d. LACP is the default teaming mode
c. Static teaming is used mainly for load balancing
Which of the following is a new feature in Windows Server 2012 R2 that combines the speed of SSDs with the low cost and capacity of HDDs? a. JBOD b. Thin provisioning c. Storage tiering d. Resilient spaces
c. Storage tiering
You have an Active Directory forest of two trees and eight domains. You haven't changed any operations master domain controllers. On which domain controller is the schema master? a. All domain controllers b. The last domain controller installed c. The first domain controller in the forest root domain d. The first domain controller in each tree
c. The first domain controller in the forest root domain
Which of the following is true about GPT disks? a. They support a maximum volume size of 2 TB b. GPT is the default when initializing a disk in Disk Management c. They use CRC protection for the partition table d. You can't convert a GPT disk to MBR
c. They use CRC protection for the partition table
Which of the following is NOT a standard NTFS permission? a. Read & execute b. Change c. Write d. List folder contents
c. Write
Which of the following is true about installing roles and features in windows server 2012/R2? a. you can't install a server role by using the command line b. All server role installations require a server restart c. You can install more than one role at a time d. server roles can be installed only on online drives
c. You can install more than one role a
A ____________ is a partial copy of a VM made at a particular moment.
checkpoint
server features
components you can install that provide functions to enhance or support an installed role or add a stand-alone feature
You're reviewing DHCP server statistics and notice that the server has received many DHCPDECLINE messages. What should you configure on the server to reduce the number of DHCPDECLINE messages?
conflict detection
You have a network of 150 computers and notice that a computer you don't recognize has been leasing an IP address. You want to make sure this computer can't lease an address from your server. What's the best solution that takes the least administrative effort?
create a deny filter
Which SMB share option should you enable if you don't want user's to see files they don't have at least Read permission to? a. Offline files b. Hidden shares c. Branch cache d. Access-based enumeration
d. Access-based enumeration
You have a server with Windows Server 2012 R2 installed on Disk 0, a basic disk. You're using the server to store user's documents. You have two more disks that you can install in the server. What should you do if you want to provide fault tolerance for user's documents? a. Convert Disk 0 to dynamic. Create a striped volume using Disk 0, Disk 1 and Disk 2 b. Create a RAID 1 volume from Disk 1 and Disk 2 c. Convert the new disks to GPT. Created a spanned volume using Disk 1 and Disk 2 d. Create a RAID 5 volume from Disk 0, Disk 1 and Disk 2
d. Create a RAID 5 volume from Disk 0, Disk 1 and Disk 2
Which feature in Storage Spaces finds the data on a volume that exists multiple times and reduces it to a single space? a. Disk quotas b. Storage tiering c. Fixed provisioning d. Data deduplication
d. Data deduplication
Which of the following is defined as a physical component with a disk interface connector? a. Format b. Partition c. Volume d. Disk Drive
d. Disk Drive
Which container has a default GPO linked to it? a. Users b. Printers c. Computers d. Domains
d. Domains
You add a server to Server Manager but see the error message "WinRM Negotiation authentication error." What should you do? a. Add the server with different credentials b. Add the server to the TrustedHosts list c. Install .NET Framework 4.5 d. Enter the Configure-SMRemoting command
d. Enter the Configure-SMRemoting command
Which cmdlet shows a list of services related to Hyper-V? a. List-Services Hyper-V -all b. Show-Service -ServiceType Hyper* c. Get-Help Service Hyper-V d. Get-Service -DisplayName Hy*
d. Get-Service -DisplayName Hy*
When installing an additional DC in an existing domain, which of the following is an option for reducing replication traffic? a. New site b. Child domain c. GC server d. IFM
d. IFM
You want to switch automatically identify the links between NICs on a NIC team and the switch so that teams can be created dynamically. What option should you set on the NIC team, and what feature should you look for on the switch? a. LACP, 802.3ad b. Static Teaming, LACP c. Switch Independent, Address Hashing d. LACP, 802.1ax
d. LACP, 802.1ax
Which of the following is true about the three server modes? a. Server Core uses the most resources b. Server with a GUI doesn't have PowerShell c. Minimal Server Interface can't run MMCs d. Minimal Server Interface doesn't have File Explorer
d. Minimal Server Interface doesn't have File Explorer
You come across a file with a .vhd extension on your server's hard disk. What should you do to see the file's contents? a. Right-click the file and click Open b. Open the file in Notepad c. Burn the file to a DVD d. Mount the file
d. Mount the file
You're seeing heavy use on one of your shared printers, and users often have to wait in line to get their print jobs. What printing feature can you use to best alleviate the problem? a. Printer prioritization b. Change availability hours c. Change spooling options d. Printer pooling
d. Printer pooling
Which disk interface technology transfers data over a parallel bus? a. SATA b. USB c. SAS d. SCSI
d. SCSI
Which of the following defines the types of objects in Active Directory? a. GPOs b. Attribute values c. Schema attributes d. Schema classes
d. Schema classes
Which of the following is considered a leaf object? (Choose all that apply.) a. Computer account b. Organizational unit c. Domain controller d. Shared folder
d. Shared folder
What must be running to allow you to manage a server remotely with PowerShell? a. Windows Firewall b. LBFO c. Telnet d. WinRm
d. WinRm
Which feature of Windows file sharing should you configure if you want users to be able to access their files securely from mobile devices without having to set up a VPN or configure the firewall? a. Client-side caching b. Offline files c. Access-based enumeration d. Work Folders
d. Work Folders
What type of interface are you likely to find on a DAS device for connecting the device to the server that uses it? a. SATA b. IDE c. PATA d. eSATA
d. eSATA
Which of the following is not one of the four different ways an application can be designated as an exception to a Software Restriction Policy?
developer
If an administrator wants to extend an existing volume, what command should be used?
diskpart
What command can be used to change the server edition from Standard to Datacenter after an installation?
dism
Which Windows command line utility below can be used to check for resource records on a server, verify delegations, verify resource records needed for AD replication, and perform e-mail connectivity tests?
dnslint
Which of the following is the core logical structure container in Active Directory?
domain
You have Windows Server 2012 R2 DNS servers, Windows Server 2008 DNS servers, and two old Windows 2000 DNS servers in a Windows domain. You just created a new zone, newzone.com, that you want replicated by Active Directory to all DNS servers. Where should you store the zone?
domain partition
child domain
domains that share at least the top-level and second-level domain name structure as an existing domain in the forest; also called "subdomains"
The __________ command finds and displays objects in Active Directory that meet specified criteria.
dsquery
Which commands can you use together to change attributes of several users at once?
dsquery and dsmod
Administrators can use ________________, which are virtual hard disks files that grow as data is written to the file.
dynamically expanding disks
A superscope is a special type of scope that allows a DHCP server to service multiple IPv4 subnets on multiple physical networks, using IPv4 or IPv6.
false
Generation 2 virtual machines support legacy adapters
false
Legacy network adapters and synthetic network adapters provide equivalent performance. True or False?
false
Routing tables are static items, in that entries within the table never change, and no new entries are ever added.
false
Server options take precedence over scope options. True or False?
false
Settings in local GPOs that are inherited from domain GPOs can be changed on the local computer. True or False?
false
The IP address 10.240.0.0/8 cannot be assigned to a host. True or False?
false
The Microsoft best practice recommendation is to modify the two default GPOs in a domain for making password policy changes.
false
Virtual machines are more economical because they do not require individual licenses. True or False?
false
Virtual machines must use the same OS as the host. True or False?
false
Security
fine-grained access controls enable administrators to control access to each directory object and its properties. Active Directory also supports secure authentication protocols to maximize compatibility with Internet applications and other systems.
If a virtual machine will be running disk intensive applications, what type of virtual disks should be used?
fixed size
You're installing a new VM in Hyper-V that requires excellent disk performance for the installed applications to perform well. The applications require a virtual disk of about 200 GB. The host has two drives: one used as the Windows system drive and the other as a data drive of 500 GB. It's currently running a VM that uses a virtual disk stored on the host's data drive. This VM requires little disk access, uses only 20 GB of the host's data drive, and will max out at 40 GB. What type of disk should you use for the new VM you're installing?
fixed-sized disk
Which of the following is not a directory partition?
group policy partition
The _____________ determines the reach of a group's application in a domain or forest: which security principals in a forest can be group members and to which forest resources a group can be assigned rights or permissions.
group scope
Which of the following accurately represents an FQDN?
host.subdomain.domain.top-level-domain
Where is a local user account stored in a domain environment?
in the SAM database
Select the operations master role responsible for ensuring that changes made to object names in one domain are updated in references to the object in other domains:
infrastructure master
You have three VMs that must communicate with one another and with the host computer but not be able to access the physical network directly. What type of virtual network should you create?
internal
You have just changed the IP address on a computer named computer5 in your domain from 172.31.1.10/24 to 172.31.1.110/24. You were communicating with this computer from your workstation fine right before you changed the address. Now when you try the command ping computer5 from your workstation, you don't get a successful reply. Other computers on the network aren't having a problem communicating with the computer. Which command might help solve the problem?
ipconfig /flushdns
In the New Connection Security Rule Wizard, which connection security rule restricts connections based on authentication criteria, such as domain membership or health status?
isolation
Which type of connection security rule should you configure if you want to prevent computers in your domain from connecting to computers outside the domain?
isolation
Which of the following is a user account category? (Choose all that apply.)
local domain
In what order are group policy settings applied?
local, site, domain, OU
A server that is connected to different IP networks using two or more NICs is considered to be a _________ server.
multihomed
What command allows Echo Request packets through the firewall?
netsh firewall set icmpsetting 8
What command can be used to send test queries to a target DNS server?
nslookup
You want to verify whether a PTR record exists for the server1.csmtech.local host, but you don't know the server's IP address. Which of the following commands should you use to see whether a PTR record exists for server1.csmtech.local?
nslookup server1.csmtech.local, and then nslookup IPAddress returned from the first nslookup
Microsoft site
one or more IP subnets connected by high-speed LAN technology
The ____________________ is a container used to organize users and resources into logical administrative units, and often mimics an organization's administrative structure.
organizational unit
Which of the following account options can't be set together? (Choose all that apply.)
password never expires user must change password at next logon
You have just finished setting up your DNS infrastructure, and the DNS process seems to be working well. You want to be able to create a baseline of performance data so that if slowdowns occur later, you have information for comparison purposes. Which tool should you use?
performance monitor
Which of the following choices is not a valid resource pool type?
power
The default location for computer accounts that are created automatically after joining the domain can be changed using which command?
redircmp
The ______________ policy allows an administrator to control the membership of both domain groups and local groups on member computers.
restricted groups
Which of the following specifies what types of actions a user can perform on a computer or network?
rights
What Active Directory partition contains the information needed to define objects and object attributes for all domains in the forest?
schema directory
When data within a zone changes, what information in the SOA record changes to reflect that the zone information should be replicated?
serial number
In the New Connection Security Rule Wizard, what option can be used to set up a rule that requires authentication between two computers, between IP subnets, or between a specific computer and a group of computers in a subnet?
server-to-server
What is the term used by Microsoft to describe a collection of bug fixes and security updates made since an OS release?
service pack
Which of the following choices is not one of the three user account types defined in Windows Server 2012?
service user account
role services
services that can be installed in Server Manager to add functions to the main role
Which one of the following is not the responsibility of a domain controller?
servicing multiple domains
Which of the following is a component of Active Directory's physical structure?
sites
A _______________ file can be used on a host computer from temporary memory storage when memory requirements suddenly increase beyond the physical amount of memory available
smart paging
network protocol
software that specifies the rules and format of communication between devices on a network
You want high availability for DHCP services, a primary server to handle most DHCP requests, and a secondary server to respond to client requests only if the primary server fails to in about a second. The primary server has about 85% of the IP addresses to lease, leaving the secondary server with about 15%. You don't want the servers to replicate with each other. What should you configure?
split scope
Which Windows Server 2012/R2 edition includes the license for one virtual instance of Windows Server 2012/R2?
standard edition
Which of the following is not a valid option when configuring automatic start?
start saved virtual machine state
Which PowerShell cmdlet can be used to start a virtual machine?
start-VM
Active Directory
the Windows directory service that enables administrators to create and manage users and groups, set network-wide user and computer policies, manage security, and organize network resources
After a template account has been created, what can be done to ensure that the template account does not pose a security risk?
the account should be disabled
root domain controller
the first domain controller installed in an Active Directory forest
guest OS
the operation system running in a virtual machine installed on a host computer (see also virtual machine VM)
network server software
the part of the OS that receives requests for shared network resources and makes these resources available to a network client
network client
the part of the OS that sends request to a server to access network resources
host computer
the physical computer on which virtualization software is installed and virtual machines run
virtualization software
the software for creating and managing virtual machines and creating the virtual environment in which a guest OS is installed
Active Directory replication
the transfer of information between all domain controllers to make sure they have consistent and up-to-date information
virtual machine (VM)
the virtual environment that emulates a physical computer's hardware and BIOS
hypervisor
the virtualization software component that creates and monitors the virtual hardware environment, which allows multiple virtual machines to share physical hardware resources
Hierarchical organization
this structure makes management of network resources and administration of security policies easier
Why might you need to create predefined options with code 060?
to support WDS clients
.com, .net, and .edu are all examples of what level of the DNS naming hierarchy?
top-level domains
The ____________ command is known as the trace route command, because it displays the route packets take between two computers.
tracert
Active Directory's use of multimaster replication ensures that changes to AD objects are automatically replicated to all domain controllers.
true
After a checkpoint has been created for a virtual machine, the checkpoint location for the VM can't be changed.
true
All hosts on the same network must share the same network ID. True or False?
true
Physical machines can be converted to virtual machines. True or False?
true
Resource metering in Hyper-V can be used to measure use of VM resources for customer billing. True or False?
true
The Active Directory Recycle Bin is disabled by default, and can be enabled in the Active Directory Administrative Center (ADAC)
true
The Logon Hours window selections will not affect a user who is already logged into their system, unless an additional GPO settings are used. True or False?
true
The recommended minimum number of Active Directory domain controllers in a domain environment is two
true
A Group Policy Container (GPC) stores GPO properties and status information, but no actual policy settings.
true
Storage Quality of Service allows administrators to specify minimum and maximum performance values for virtual hard disks.
true
A _________ hypervisor implements OS virtualization by running on the host computer's hardware, and it controls and monitors guest OSs. It controls access to the host's hardware and provides device drivers for guest OSs.
type 1
What type of IPv6 address specifies a single interface on a device?
unicast
What are the four different character types that can make up a Windows password?
uppercase letters, lowercase letters, numerals, and special symbols
When creating a new user, the "User cannot change password" option can't be used in conjunction with what other option?
user must change password at next logon
A user can use their ___________, which follows the format username@domain, to log into a computer on a domain.
user principal name UPN
How can an administrator create subnets, or boradcast domains, on a single external or internal virtual switch?
virtual LANS
What value can be used to determine what percentage of assigned processing power can be used by a VM?
virtual machine limit
The "hypervisor" is also known as:
virtual machine monitor
Where are DHCP database backups stored by default?
%systemroot%\System32\dhcp\backup\DhcpCfg
Select below the prefix used by all Teredo related addresses:
2001::/32
Which of the following is a valid IPv6 address?
2001::1
What Active Directory replication method makes use of remote differential compression (RDC)?
Distributed File System Replication (DFSR)
Select below the built-in group that facilitates anonymous access to web resources by Internet Information Services
IIS_IUSRS
What type of DNS query causes a DNS server to respond with the best information it currently has in its local database?
Iterative query
Which PowerShell cmdlet can be used to create a resource pool for measuring memory usage?
New-VMResourcePool
An administrator working on a Windows Server 2012 R2 Server Core installation needs to disable DHCP all interfaces on the server. What PowerShell command should be used?
Set-NetIPInterface
In a ping response packet, what does the TTL field indicate?
Time to live, which indicates how many hops the packet can go through before the packet is expired and discarded.
How should an administrator test the functionality of DNS operation on a domain controller, as well as troubleshoot issues with DNS forwarders, delegation, dynamic updates, and record registration?
Using dcdiag /test:dns