Microsoft 70-411 Administering Windows Server 2012 (MCSA)

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Question No : 88 - Topic 1 Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. Client computers run either Windows 7 or Windows 8. All of the client computers have an application named App1 installed. The domain contains a Group Policy object (GPO) named GPO1 that is applied to all of the client computers. You need to add a system variable named App1Data to all of the client computers. Which Group Policy preference should you configure? A. Environment B. Ini Files C. Data Sources D. Services

A

You have Windows Server 2012 R2 installation media that contains a file named Install.wim. You need to identify the permissions of the mounted images in Install.wim. What should you do? A. Run dism.exe and specify the /get-mountedwiminfo parameter. B. Run imagex.exe and specify the /verify parameter. C. Run imagex.exe and specify the /ref parameter. D. Run dism.exe and specify the/get-imageinfo parameter.

A

You have a DNS server named Served that has a Server Core Installation on Windows Server 2012 R2. You need to view the time-to-live (TTL) value of a name server (NS) record that is cached by the DNS Server service on Server1. What should you run? A. Show-DNSServerCache B. nslookup.exe C. ipconfig.exe /displaydns D. dnscacheugc.exe

A

You have a cluster named Cluster1 that contains two nodes. Both nodes run Windows Server 2012 R2. Cluster1 hosts a virtual machine named VM1 that runs Windows Server 2012 R2. You configure a custom service on VM1 named Service1. You need to ensure that VM1 will be moved to a different node if Service1 fails. Which cmdlet should you run on Cluster1? A. Add-ClusterVmMonitoredItem B. Add-ClusterGenericServiceRole C. Set-ClusterResourceDependency D. Enable VmResourceMetering

A

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the File Server Resource Manager role service installed. Each time a user receives an access-denied message after attempting to access a folder on Server1, an email notification is sent to a distribution list named DL1. You create a folder named Folder1 on Server1, and then you configure custom NTFS permissions for Folder1. You need to ensure that when a user receives an access-denied message while attempting to access Folder1, an email notification is sent to a distribution list named DL2. The solution must not prevent DL1 from receiving notifications about other access-denied messages. What should you do? A. From Server Manager, run the New Share Wizard to create a share for Folder1 by selecting the SMB Share - Advanced option. B. From the File Server Resource Manager console, modify the Access-Denied Assistance settings. C. From the File Server Resource Manager console, modify the Email Notifications settings. D. From Server Manager, run the New Share Wizard to create a share for Folder1 by selecting the SMB Share -Applications option.

A

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Remote Access server role installed. You have a client named Client1 that is configured as an 802. IX supplicant. You need to configure Server1 to handle authentication requests from Client1. The solution must minimize the number of authentication methods enabled on Server1. Which authentication method should you enable? To answer, select the appropriate authentication method in the answer area. A. Extensible authentication protocol (EAP) B. Microsoft encrypted authentication version 2 (MS-CHAP v2) C. Encrypted authentication (CHAP) D. Unencrypted password (PAP) E. Allow machine certificate authentication for IKEv2 F. Allow remote systems to connect without authentication

A

You have a server named Server1 that runs Windows Server 2012 R2. You create a Data Collector Set (DCS) named DCS1. You need to configure DCS1 to log data to D:\logs. What should you do? A. Right-click DCS1 and click Properties. B. Right-click DCS1 and click Export list. C. Right-click DCS1 and click Data Manager. D. Right-click DCS1 and click Save template.

A

Your network contains a Hyper-V host named Server1 that hosts 20 virtual machines. You need to view the amount of memory resources and processor resources each virtual machine uses currently. Which tool should you use on Server1? A. Hyper-V Manager B. Task Manager C. Windows System Resource Manager (WSRM) D. Resource Monitor

A

Your network contains a single Active Directory domain named contoso.com. The domain contains a member server named Server1 that runs Windows Server 2012 R2. Server1 has the Windows Server updates Services server role installed and is configured to download updates from the Microsoft Update servers. You need to ensure that Server1 downloads express installation files from the Microsoft Update servers. What should you do from the Update Services console? A. From the Update Files and Languages options, configure the Update Files settings. B. From the Automatic Approvals options, configure the Update Rules settings. C. From the Products and Classifications options, configure the Products settings. D. From the Products and Classifications options, configure the Classifications settings.

A

Your network contains an Active Directory domain named adatum.com. The domain contains a member server named Server1 and 10 web servers. All of the web servers are in an organizational unit (OU) named WebServers_OU. All of the servers run Windows Server 2012 R2. On Server1, you need to collect the error events from all of the web servers. The solution must ensure that when new web servers are added to WebServers_OU, their error events are collected automatically on Server1. What should you do? A. On Server1, create a source computer initiated subscription. From a Group Policy object (GPO), configure the Configure target Subscription Manager setting. B. On Server1, create a source computer initiated subscription. From a Group Policy object (GPO), configure the Configure forwarder resource usage setting. C. On Server1, create a collector initiated subscription. From a Group Policy object (GPO), configure the Configure forwarder resource usage setting. D. On Server1, create a collector initiated subscription. From a Group Policy object (GPO), configure the Configure target Subscription Manager setting.

A

Your network contains an Active Directory domain named contoso.com. All DNS servers host a DNS zone named adatum.com. The adatum.com zone is not Active Directory-integrated. An administrator modifies the start of authority (SOA) record for the adatum.com zone. After the modification, you discover that when you add or modify DNS records in the adatum.com zone, the changes are not transferred to the DNS servers that host secondary copies of the adatum.com zone. You need to ensure that the records are transferred to all the copies of the adatum.com zone. What should you modify in the SOA record for the adatum.com zone? To answer, select the appropriate setting in the answer area. A. Increment Serial number B. Update Refresh interval C. Update Retry interval D. Update Expires after interval E. Update Minimum (default) TTL F. Update TTL for this record

A

Your network contains an Active Directory domain named contoso.com. You need to install and configure the Web Application Proxy role service. What should you do? A. Install the Active Directory Federation Services server role and the Remote Access server role on different servers. B. Install the Active Directory Federation Services server role and the Remote Access server role on the same server. C. Install the Web Server (IIS) server role and the Application Server server role on the same server. D. Install the Web Server (IIS) server role and the Application Server server role on different servers.

A

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. The domain contains 500 client computers that run Windows 8.1 Enterprise and Microsoft Office 2013. You implement a Group Policy central store. You need to modify the default Microsoft Office 2013 Save As location for all client computers. The solution must minimize administrative effort. What should you configure in a Group Policy object (GPO)? A. The Group Policy preferences B. An application control policy C. The Administrative Templates D. The Software Installation settings

A

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2. You create an Active Directory snapshot of DC1 each day. You need to view the contents of an Active Directory snapshot from two days ago. What should you do first? A. Run the dsamain.exe command. B. Stop the Active Directory Domain Services (AD DS) service. C. Start the Volume Shadow Copy Service (VSS). D. Run the ntdsutil.exe command.

A

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2. DC1 is backed up daily. The domain has the Active Directory Recycle Bin enabled. During routine maintenance, you delete 500 inactive user accounts and 100 inactive groups. One of the deleted groups is named Group1. Some of the deleted user accounts are members of some of the deleted groups. For documentation purposes, you must provide a list of the members of Group1 before the group was deleted. You need to identify the names of the users who were members of Group1 prior to its deletion. You want to achieve this goal by using the minimum amount of administrative effort. What should you do first? A. Mount the most recent Active Directory backup. B. Reactivate the tombstone of Group1. C. Perform an authoritative restore of Group1. D. Use the Recycle Bin to restore Group1.

A

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the following role services installed: ✑ DirectAccess and VPN (RRAS) ✑ Network Policy Server Remote users have client computers that run either Windows XP, Windows 7, or Windows 8. You need to ensure that only the client computers that run Windows 7 or Windows 8 can establish VPN connections to Server1. What should you configure on Server1? A. A condition of a Network Policy Server (NPS) network policy B. A constraint of a Network Policy Server (NPS) network policy C. a condition of a Network Policy Server (NPS) connection request policy D. A vendor-specific RADIUS attribute of a Network Policy Server (NPS) connection request policy

A

Your network contains an Active Directory domain named contoso.com. The domain contains more than 100 Group Policy objects (GPOs). Currently, there are no enforced GPOs. A network administrator accidentally deletes the Default Domain Policy GPO. You do not have a backup of any of the GPOs. You need to recreate the Default Domain Policy GPO. What should you use? A. Dcgpofix B. Get-GPOReport C. Gpfixup D. Gpresult E. Gpedit. msc F. Import-GPO G. Restore-GPO H. Set-GPInheritance I. Set-GPLink J. Set-GPPermission K. Gpupdate L. Add-ADGroupMember

A

Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. All domain controllers run Windows Server 2012 R2. The domain contains two domain controllers. The domain controllers are configured as shown in the following table. Domain Controller Name....Server Type....Scheduled task DC1...................Physical server....Daily snapshotsof Active Directory DC2...................Hyper-V virtual machine....Daily snapshots of the virtual machine, Daily backups of the system state Active Directory Recycle Bin is enabled. You discover that a support technician accidentally removed 100 users from an Active Directory group named Group1 an hour ago. You need to restore the membership of Group1. What should you do? A. Recover the items by using Active Directory Recycle Bin. B. Modify the Recycled attribute of Group1. C. Perform tombstone reanimation. D. Perform an authoritative restore. E. Perform a non- authoritative restore.

A

Your network contains an Active Directory forest named contoso.com. The functional level of the forest is Windows Server 2008 R2. All of the user accounts in the marketing department are members of a group named Contoso\MarketingUsers. All of the computer accounts in the marketing department are members of a group named Contoso\MarketingComputers. A domain user named User1 is a member of the Contoso\MarketingUsers group. A computer named Computer1 is a member of the Contoso\MarketingComputers group. You have five Password Settings objects (PSOs). The PSOs are defined as shown in the following table. Password Setting.....Directly applies to.....Precedence.....Minimum password length PSO1.....Contoso\Domain Users.....16......14 PSO2.....Contoso\MarketingUsers.....20.....11 PSO3.....Contoso\MarketingComputers.....10.....12 PSO5.....User1.....1.....10 When User1 logs on to Computer1 and attempts to change her password, she receives an error message indicating that her password is too short. You need to tell User1 what her minimum password length is. What should you tell User1? A. 10 B. 11 C. 12 D. 14

A

Your network contains two Active Directory forests named contoso.com and dev.contoso.com. The contoso.com forest contains a domain controller named DC1. The dev.contoso.com forest contains a domain controller named DC2. Each domain contains an organizational unit (OU) named OU1. Dev.contoso.com has a Group Policy object (GPO) named GPO1. GPO1 contains 200 settings, including several settings that have network paths. GPO1 is linked to OU1. You need to copy GPO1 from dev.contoso.com to contoso.com. What should you do first on DC2? A. From the Group Policy Management console, right-click GPO1 and select Copy. B. Run the mtedit.exe command and specify the /Domaintcontoso.com /DC: DC 1 parameter. C. Run the Save-NetGpocmdlet. D. Run the Backup-Gpocmdlet.

A

Your network contains two servers named Server1 and Server2 that run windows Server 2012 R2. Server1 and 5erver2 have the Windows Server Update Services server role installed. Server1 synchronizes from Microsoft Update. Server2 is a Windows Server Update Services (WSUS) replica of Server1. You need to configure replica downstream servers to send Server1 summary information about the computer update status. What should you do? A. From Server1, configure Reporting Rollup. B. From Server2, configure Reporting Rollup. C. From Server2, configure Email Notifications. D. From Server1, configure Email Notifications.

A

Your network contains two servers named Server1 and Server2. Both servers run Windows Server 2012 R2 and have the DNS Server server role installed. On Server1, you create a standard primary zone named contoso.com. You need to ensure that Server2 can host a secondary zone for contoso.com. What should you do from Server1? A. Add Server2 as a name server. B. Create a trust anchor named Server2. C. Convert contoso.com to an Active Directory-integrated zone. D. Create a zone delegation that points to Server2.

A

Your network contains an Active Directory domain named contoso.com. The domain contains three member servers named Server1, Server2, and Server3. All servers run Windows Server 2012 R2 and have the Windows Server Update Services (WSUS) server role installed. Server1 and Server2 are configured as replica servers that use Server3 as an upstream server. You remove Servers from the network. You need to ensure that WSUS on Server2 retrieves updates from Server1. The solution must ensure that Server1 and Server2 have the latest updates from Microsoft. Which command should you run on each server? To answer, select the appropriate command to run on each server in the answer area. A. set-wsusserversynchronization -syncfrommmu B. set-wsusserversynchronization -useservername server1 C. set-wsusserversynchronization -useservername server2 D. wsusutil.exe movecontent \\server1\c$ E. wsusutil.exe movecontent \\server2\c$

A, B

Your network contains an Active Directory domain named contoso.com. The network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Network Policy and Access Services server role installed. You plan to deploy additional servers that have the Network Policy and Access Services server role installed. You must standardize as many settings on the new servers as possible. You need to identify which settings can be standardized by using Network Policy Server (NPS) templates. Which three settings should you identify? (Each correct answer presents part of the solution. Choose three.) A. IP filters B. shared secrets C. health policies D. network policies E. connection request policies

A, B, C

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. You have a Group Policy object (GPO) named GPO1 that contains hundreds of settings. GPO1 is linked to an organizational unit (OU) named OU1. OU1 contains 200 client computers. You plan to unlink GPO1 from OU1. You need to identify which GPO settings will be removed from the computers after GPO1 is unlinked from OU1. Which two GPO settings should you identify? (Each correct answer presents part of the solution. Choose two.) A. The managed Administrative Template settings B. The unmanaged Administrative Template settings C. The System Services security settings D. The Event Log security settings E. The Restricted Groups security settings

A, D

You are a network administrator of an Active Directory domain named contoso.com. You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the DHCP Server server role and the Network Policy Server role service installed. You enable Network Access Protection (NAP) on all of the DHCP scopes on Server1. You need to create a DHCP policy that will apply to all of the NAP non-compliant DHCP clients. Which criteria should you specify when you create the DHCP policy? A. The client identifier B. The user class C. The vendor class D. The relay agent information

B

You have a DNS server named DN51 that runs Windows Server 2012 R2. On DNS1, you create a standard primary DNS zone named adatum.com. You need to change the frequency that secondary name servers will replicate the zone from DNS1. Which type of DNS record should you modify? A. Name server (NS) B. Start of authority (SOA) C. Host information (HINFO) D. Service location (SRV)

B

You have a server named Server1 that runs Windows Server 2012 R2. On Server1, you configure a custom Data Collector Set (DCS) named DCS1. DCS1 is configured to store performance log data in C:\Logs. You need to ensure that the contents of C:\Logs are deleted automatically when the folder reaches 100 MB in size. What should you configure? A. A File Server Resource Manager (FSRM) file screen on the C:\Logs folder B. The Data Manager settings of DCS1 C. A schedule for DCS1 D. A File Server Resource Manager (FSRM) quota on the C:\Logs folder

B

Your network contains a RADIUS server named Server1. You install a new server named Server2 that runs Windows Server 2012 R2 and has Network Policy Server (NPS) installed. You need to ensure that all accounting requests for Server2 are forwarded to Server1. On Server2, you configure a Connection Request Policy. What else should you configure on Server2? To answer, select the appropriate node in the answer area. A. RADIUS Clients B. Remote RADIUS Server Groups C. Connection Request Policies D. Network Policies E. Health Policies F. System Health Validators G. Remediation Server Groups

B

Your network contains a server named Server1 that has the Network Policy and Access Services server role installed. All of the network access servers forward connection requests to Server1. You create a new network policy on Server1. You need to ensure that the new policy applies only to connection requests from the 192.168.0.0/24 subnet. What should you do? A. Set the Client IP4 Address condition to 192.168.0.0/24. B. Set the Client IP4 Address condition to 192.168.0. C. Set the Called Station ID constraint to 192.168.0.0/24. D. Set the Called Station ID constraint to 192.168.0.

B

Your network contains a single Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that hosts the primary DNS zone for contoso.com. All servers dynamically register their host names. You install three new Web servers that host identical copies of your company's intranet website. The servers are configured as shown in the following table. Server name.....IP address WEB1.contoso.com ..... 10.0.0.20 WEB2.contoso.com ..... 10.0.0.21 WEB3.contoso.com ..... 10.0.0.22 You need to use DNS records to load balance name resolution queries for intranet.contoso.com between the three Web servers. What is the minimum number of DNS records that you should create manually? A. 1 B. 3 C. 4 D. 6

B

Your network contains an Active Directory domain named contoso.com. A user named User1 creates a central store and opens the Group Policy Management Editor as shown in the exhibit. (Click the Exhibit button.) You need to ensure that the default Administrative Templates appear in GPO1. What should you do? A. Link a WMI filter to GPO1. B. Copy files from %Windir%\Policydefinitions to the central store. C. Configure Security Filtering in GPO1. D. Add User1 to the Group Policy Creator Owners group.

B

Your network contains an Active Directory domain named contoso.com. All user accounts reside in an organizational unit (OU) named OU1. You create a Group Policy object (GPO) named GPO1. You link GPO1 to OU1. You configure the Group Policy preference of GPO1 to add a shortcut named Link1 to the desktop of each user. You discover that when a user deletes Link1, the shortcut is removed permanently from the desktop. You need to ensure that if a user deletes Link1, the shortcut is added to the desktop again. What should you do? A. Enforce GPO1. B. Modify the Link1 shortcut preference of GPO1. C. Enable loopback processing in GPO1. D. Modify the Security Filtering settings of GPO1.

B

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. Administrators use client computers that run Windows 8 to perform all management tasks. A central store is configured on a domain controller named DC1. You have a custom administrative template file named App1.admx. App1.admx contains application settings for an application named Appl. From a client computer named Computer1, you create a new Group Policy object (GPO) named GPO1. You discover that the application settings for App1 fail to appear in GPO1. You need to ensure that the App1 settings appear in all of the new GPOs that you create. What should you do? A. From the Default Domain Controllers Policy, add App1.admx to the Administrative Templates. B. Copy App1.admx to \\Contoso.com\SYSVOL\Contoso.com\Policies\PolicyDefinitions\. C. From the Default Domain Policy, add App1.admx to the Administrative Templates. D. Copy App1.admx to \\Contoso.com\SYSVOL\Contoso.com\StarterGPOs.

B

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. An organizational unit (OU) named OU1 contains 200 client computers that run Windows 8 Enterprise. A Group Policy object (GPO) named GPO1 is linked to OU1. You make a change to GPO1. You need to force all of the computers in OU1 to refresh their Group Policy settings immediately. The solution must minimize administrative effort. Which tool should you use? A. The Secedit command B. The Invoke-GpUpdate cmdlet C. Group Policy Object Editor D. Server Manager

B

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. In a remote site, a support technician installs a server named DC10 that runs Windows Server 2012 R2. DC10 is currently a member of a workgroup. You plan to promote DC10 to a read-only domain controller (RODC). You need to ensure that a user named Contoso\User1 can promote DC10 to a RODC in the contoso.com domain. The solution must minimize the number of permissions assigned to User1. What should you do? A. From Active Directory Users and Computers, run the Delegation of Control Wizard on the contoso.com domain object. B. From Active Directory Administrative Center, pre-create an RODC computer account. C. From Ntdsutil, run the local roles command. D. Join DC10 to the domain. Run dsmod and specify the /server switch.

B

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that has the Remote Access server role installed. DirectAccess is implemented on Server1 by using the default configuration. You discover that DirectAccess clients do not use DirectAccess when accessing websites on the Internet. You need to ensure that DirectAccess clients access all Internet websites by using their DirectAccess connection. What should you do? A. Configure a DNS suffix search list on the DirectAccess clients. B. Configure DirectAccess to enable force tunneling. C. Disable the DirectAccess Passive Mode policy setting in the DirectAccess Client Settings Group Policy object (GPO). D. Enable the Route all traffic through the internal network policy setting in the DirectAccess Server Settings Group Policy object (GPO).

B

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2008 R2. You plan to test Windows Server 2012 R2 by using native-boot virtual hard disks (VHDs). You attach a new VHD to Server1. You need to install Windows Server 2012 R2 in the VHD. What should you do? A. Run imagex.exe and specify the /append parameter. B. Run dism.exe and specify the /apply-image parameter. C. Run imagex.exe and specify the /export parameter. D. Run dism.exe and specify the /append-image parameter.

B

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Remote Access server role installed. You log on to Server1 by using a user account named User2. From the Remote Access Management Console, you run the Getting Started Wizard and you receive a warning message as shown in the exhibit. (Click the Exhibit button.) Warning: The current user does not have the required permissions to configure WMI filtering in the domain. Verify permissions. You need to ensure that you can configure DirectAccess successfully. The solution must minimize the number of permissions assigned to User2. To which group should you add User2? A. Enterprise Admins B. Administrators C. Account Operators D. Server Operators

B

Your network contains an Active Directory domain named contoso.com. The domain contains an organizational unit (OU) named IT and an OU named Sales. All of the help desk user accounts are located in the IT OU. All of the sales user accounts are located in the Sales OU. The Sales OU contains a global security group named G_Sales. The IT OU contains a global security group named G_HelpDesk. You need to ensure that members of G_HelpDesk can perform the following tasks: ✑ Reset the passwords of the sales users. ✑ Force the sales users to change their password at their next logon. What should you do? A. Run the Set-ADAccountPasswordcmdlet and specify the -identity parameter. B. Right-click the Sales OU and select Delegate Control. C. Right-click the IT OU and select Delegate Control. D. Run the Set-ADFineGrainedPasswordPolicycmdlet and specify the -identity parameter.

B

Your network contains one Active Directory domain named contoso.com. The forest functional level is Windows Server 2012. All servers run Windows Server 2012 R2. All client computers run Windows 8.1. The domain contains 10 domain controllers and a read-only domain controller (RODC) named RODC01. All domain controllers and RODCs are hosted on a Hyper-V host that runs Windows Server 2012 R2. You need to identify which user accounts were authenticated by RODC1. Which cmdlet should you use? A. Get-ADGroupMember B. Get-ADDomainControllerPasswordReplicationPolicy C. Get-ADDomainControllerPasswordReplicationPolicyUsage D. Get-ADDomain E. Get-ADOptionalFeature F. Get-ADAccountAuthorizationGroup

B

Your network contains two Active Directory domains named contoso.com and adatum.com. The network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the DNS Server server role installed. Server1 has a copy of the contoso.com DNS zone. You need to configure Server1 to resolve names in the adatum.com domain. The solution must meet the following requirements: Prevent the need to change the configuration of the current name servers that host zones for adatum.com. Minimize administrative effort. Which type of zone should you create? A. Secondary B. Stub C. Reverse lookup D. Primary

B

Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server1. All servers run Windows Server 2012 R2. You need to collect the error events from all of the servers on Server1. The solution must ensure that when new servers are added to the domain, their error events are collected automatically on Server1. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) A. On Server1, create a collector initiated subscription. B. On Server1, create a source computer initiated subscription. C. From a Group Policy object (GPO), configure the Configure target Subscription Manager setting. D. From a Group Policy object (GPO), configure the Configure forwarder resource usage setting.

B, C

Your network contains an Active Directory domain named contoso.com. The domain contains client computers that run either Windows XP or Windows 8. Network Policy Server (NPS) is deployed to the domain. You plan to create a system health validator (SHV). You need to identify which policy settings can be applied to all of the computers. Which three policy settings should you identify? (Each correct answer presents part of the solution. Choose three.) A. Antispyware is up to date. B. Automatic updating is enabled. C. Antivirus is up to date. D. A firewall is enabled for all network connections. E. An antispyware application is on.

B, C, D

You manage a server that runs Windows Server 2012 R2. The server has the Windows Deployment Services server role installed. You start a virtual machine named VM1 as shown in the exhibit. (Click the Exhibit button.) Hyper-V PXE Network Boot 09.14.2011 (c) Copyright 2001 Microsoft Corporation. All Rights Reserved. CLIENT MAC ADDR: 00 15 5D 00 0F 13 GUID: 979708BF-C04B-4525-9FE0-C4150BB6C618 You need to configure a pre-staged device for VM1 in the Windows Deployment Services console. Which two values should you assign to the device ID? (Each correct answer presents a complete solution. Choose two.) A. 979708BFC04B45259FE0C4150BB6C618 B. 979708BF-C04B-4525-9FE0-C4150BB6C618 C. 00155D000F1300000000000000000000 D. 0000000000000000000000155D000F13 E. 00000000-0000-0000-0000-C4150BB6C618

B, D

Your network contains an Active Directory domain named contoso.com. The domain contains servers named Server1 and Server2. Both servers have the DFS Replication role service installed. You need to configure the DFS Replication environment to meet the following requirements: ✑ Increase the quota limit of the staging folder. ✑ Configure the staging folder cleanup process to provide the highest amount of free space possible. Which cmdlets should you use to meet each requirement? To answer, select the appropriate options in the answer area. A. Set-DfsrGroupSchedule B. Set-DfsrMembership C. Set-DfsrReplicatedFolder D. Set-DfsrServiceConfiguration

B, D

Your network contains an Active Directory domain named contoso.com. The domain contains three servers. The servers are configured as shown in the following table. Server name.....Role Server1.....Direct Access and VPN Server2.....File Server Server3.....Hyper-V You need to ensure that end-to-end encryption is used between clients and Server2 when the clients connect to the network by using DirectAccess. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) A. From the Remote Access Management Console, reload the configuration. B. Add Server2 to a security group in Active Directory. C. Restart the IPSec Policy Agent service on Server2. D. From the Remote Access Management Console, modify the Infrastructure Servers settings. E. From the Remote Access Management Console, modify the Application Servers settings.

B, E

You have Windows Server 2012 R2 installation media that contains a file named Install.wim. You need to identify which images are present in Install.wim. What should you do? A. Run imagex.exe and specify the /ref parameter. B. Run dism.exe and specify the /get-mountedwiminfo parameter. C. Run dism.exe and specify the /get-imageinfo parameter. D. Run imagex.exe and specify the /verify parameter.

C

You have a file server that has the File Server Resource Manager role service installed. You open the File Server Resource Manager console as shown in the exhibit. (Click the Exhibit button.) You need to ensure that all of the folders in Folder1 have a 100-MB quota limit. What should you do? A. Run the Update FsrmQuotacmdlet. B. Run the Update-FsrmAutoQuotacmdlet. C. Create a new quota for Folder1. D. Modify the quota properties of Folder1.

C

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the File Server Resource Manager role service installed. Server1 has a folder named Folder1 that is used by the human resources department. You need to ensure that an email notification is sent immediately to the human resources manager when a user copies an audio file or a video file to Folder1. What should you configure on Server1? A. a storage report task B. a file screen exception C. a file screen D. a file group

C

Your network contains a Hyper-V host named Hyperv1. Hyperv1 runs Windows Server 2012 R2. Hyperv1 hosts four virtual machines named VM1, VM2, VM3, and VM4. AH of the virtual machines run Windows Server 2008 R2. You need to view the amount of memory resources and processor resources that VM4 currently uses. Which tool should you use on Hyperv1? A. Windows System Resource Manager (WSRM) B. Task Manager C. Hyper-V Manager D. Resource Monitor

C

Your network contains an Active Directory domain named adatum.com. A network administrator creates a Group Policy central store. After the central store is created, you discover that when you create new Group Policy objects (GPOs), the GPOs do not contain any Administrative Templates. You need to ensure that the Administrative Templates appear in new GPOs. What should you do? A. Add your user account to the Group Policy Creator Owners group. B. Configure all domain controllers as global catalog servers. C. Copy files from %Windir%\Policydefinitions to the central store. D. Modify the Delegation settings of the new GPOs.

C

Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. The domain contains a server named Server1 that has the Network Policy Server server role and the Remote Access server role installed. The domain contains a server named Server2 that is configured as a RADIUS server. Server1 provides VPN access to external users. You need to ensure that all of the VPN connections to Server1 are logged to the RADIUS server on Server2. What should you run? A. Add-RemoteAccessRadius -ServerNameServer1 -AccountingOnOffMsg Enabled - SharedSecret "Secret" -Purpose Accounting B. Set-RemoteAccessAccounting -AccountingOnOffMsg Enabled -AccountingOnOffMsg Enabled C. Add-RemoteAccessRadius -ServerName Server2 -AccountingOnOffMsg Enabled - SharedSecret "Secret" -Purpose Accounting D. Set-RemoteAccessAccounting -EnableAccountingType Inbox -AccountingOnOffMsg Enabled

C

Your network contains an Active Directory domain named contoso.com. The Active Directory Recycle bin is enabled for contoso.com. A support technician accidentally deletes a user account named User1. You need to restore the User1 account. Which tool should you use? A. Ldp B. Esentutl C. Active Directory Administrative Center D. Ntdsutil

C

Your network contains an Active Directory domain named contoso.com. The domain contains a Web server named www.contoso.com. The Web server is available on the Internet. You implement DirectAccess by using the default configuration. You need to ensure that users never attempt to connect to www.contoso.com by using DirectAccess. The solution must not prevent the users from using DirectAccess to access other resources in contoso.com. Which settings should you configure in a Group Policy object (GPO)? A. DirectAccess Client Experience Settings B. DNS Client C. Name Resolution Policy D. Network Connections

C

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2. You mount an Active Directory snapshot on DC1. You need to expose the snapshot as an LDAP server. Which tool should you use? A. Ldp B. ADSI Edit C. Dsamain D. Ntdsutil

C

Your network contains an Active Directory domain named contoso.com. The domain contains a file server named Server1 that runs Windows Server 2012 R2. Server1 has a share named Share1. When users without permission to Share1 attempt to access the share, they receive the Access Denied message as shown in the exhibit. (Click the Exhibit button.) You deploy a new file server named Server2 that runs Windows Server 2012 R2. You need to configure Server2 to display the same custom Access Denied message as Server1. What should you install on Server2? A. The Remote Assistance feature B. The Storage Services server role C. The File Server Resource Manager role service D. The Enhanced Storage feature

C

Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed. Server1 hosts 10 virtual machines. A virtual machine named VM1 runs Windows Server 2012 R2 and hosts a processor-intensive application named App1. Users report that App1 responds more slowly than expected. You need to monitor the processor usage on VM1 to identify whether changes must be made to the hardware settings of VM1. Which performance object should you monitor on Server1? A. Processor B. Hyper-V Hypervisor Virtual Processor C. Hyper-V Hypervisor Logical Processor D. Hyper-V Hypervisor Root Virtual Processor E. Process

C

Your network contains an Active Directory domain named contoso.com. The domain contains a read-only domain controller (RODC) named RODC1. You create a global group named RODC_Admins. You need to provide the members of RODC_Admins with the ability to manage the hardware and the software on R0DC1. The solution must not provide RODC_Admins with the ability to manage Active Directory objects. What should you do? A. From Active Directory Site and Services, configure the Security settings of the RODC1 server object. B. From Windows PowerShell, run the Set-ADAccountControlcmdlet. C. From a command prompt, run the dsmgmt local roles command. D. From Active Directory Users and Computers, configure the Member Of settings of the RODC1 account.

C

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 P.2. Server1 has the Network Policy and Access Services server role installed. You plan to deploy 802. lx authentication to secure the wireless network. You need to identify which Network Policy Server (NPS) authentication method supports certificate-based mutual authentication for the 802.1x deployment. Which authentication method should you identify? A. MS-CHAP B. PEAP-MS-CHAPv2 C. EAP-TLS D. MS-CHAP v2

C

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. A local account named Admin1 is a member of the Administrators group on Server1. You need to generate an audit event whenever Admin1 is denied access to a file or folder. What should you run? A. auditpol.exe /set /userradmin1 /failure: enable B. auditpol.exe /set /user: admin1 /category: "detailed tracking" /failure: enable C. auditpol.exe /resourcesacl /set /type: file /user: admin1 /failure D. auditpol.exe /resourcesacl /set /type: key /user: admin1 /failure /access: ga

C

Your network contains an Active Directory domain named contoso.com. The domain contains more than 100 Group Policy objects (GPOs). Currently, there are no enforced GPOs. The domain is renamed to adatum.com. Group Policies no longer function correctly. You need to ensure that the existing GPOs are applied to users and computers. You want to achieve this goal by using the minimum amount of administrative effort. What should you use? A. Dcgpofix B. Get-GPOReport C. Gpfixup D. Gpresult E. Gpedit. msc F. Import-GPO G. Restore-GPO H. Set-GPInheritance I. Set-GPLink J. Set-GPPermission K. Gpupdate L. Add-ADGroupMember

C

Your network contains an Active Directory domain named contoso.com. The domain contains six domain controllers. The domain controllers are configured as shown in the following table. Domain Controller name.....Operating system.....FMSO role DC1.....Windows Server 2008 R2.....PDC emulator DC2.....Windows Server 2012 R2.....Schema master DC3.....Windows Server 2008 R2.....Infrastructure master DC4.....Windows Server 2008 R2.....Domain naming master DC5.....Windows Server 2008 R2.....RID master DC6.....Windows Server 2012 R2.....None The network contains a server named Server1 that has the Hyper-v server role installed. DC6 is a virtual machine that is hosted on Server1. You need to ensure that you can clone DC6. Which FSMO role should you transfer to DC2? A. Rid master B. Domain naming master C. PDC emulator D. Infrastructure master

C

Your network contains an Active Directory forest. The forest contains two domains named contoso.com and fabrikam.com. All of the DNS servers in both of the domains run Windows Server 2012 R2. The network contains two servers named Server1 and Server2. Server1 hosts an Active Directory-integrated zone for contoso.com. Server2 hosts an Active Directory-integrated zone for fabrikam.com. Server1 and Server2 connect to each other by using a WAN link. Client computers that connect to Server1 for name resolution cannot resolve names in fabnkam.com. You need to configure Server1 to support the resolution of names in fabnkam.com. The solution must ensure that users in contoso.com can resolve names in fabrikam.com if the WAN link fails. What should you do on Server1? A. Create a stub zone. B. Add a forwarder. C. Create a secondary zone. D. Create a conditional forwarder.

C

Your network has a router named Router1 that provides access to the Internet. You have a server named Server1 that runs Windows Server 2012 R2. Server1 to use Router1 as the default gateway. A new router named Router2 is added to the network. Router2 provides access to the Internet. The IP address of the internal interface on Router2 is 10.1.14.2S4. You need to configure Server1 to use Router2 to connect to the Internet if Router1 fails. What should you do on Server1? A. Add a route for 10.1.14.0/24 that uses 10.1.14.254 as the gateway and set the metric to 1. B. Add 10.1.14.254 as a gateway and set the metric to 1. C. Add a route for 10.1.14.0/24 that uses 10.1.14.254 as the gateway and set the metric to 500. D. Add 10.1.14.254 as a gateway and set the metric to 500.

C

You manage a server that runs Windows Server 2012 R2. The server has the Windows Deployment Services server role installed. You have a desktop computer that has the following configuration: ✑ Computer name: Computer1 ✑ Operating system: Windows 8 ✑ MAC address: 20-CF-30-65-D0-87 ✑ GUID: 979708BF-C04B-4525-9FE0-C4150BB6C618 You need to configure a pre-staged device for Computer1 in the Windows Deployment Services console. Which two values should you assign to the device ID? (Each correct answer presents a complete solution. Choose two.) A. 20CF3065D08700000000000000000000 B. 979708BFC04B45259FE0C4150BB6C618 C. 979708BF-C04B-452S-9FE0-C4150BB6C618 D. 0000000000000000000020CF306SD087 E. 00000000-0000-0000-0000-C41S0BB6C618

C, D

Your company has a main office and two branch offices. The main office is located in Seattle. The two branch offices are located in Montreal and Miami. Each office is configured as an Active Directory site. The network contains an Active Directory domain named contoso.com. Network traffic is not routed between the Montreal office and the Miami office. You implement a Distributed File System (DFS) namespace named \\contoso.com\public. The namespace contains a folder named Folder1. Folder1 has a folder target in each office. You need to configure DFS to ensure that users in the branch offices only receive referrals to the target in their respective office or to the target in the main office. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) A. Set the Ordering method of \\contoso.com\public to Random order. B. Set the Advanced properties of the folder target in the Seattle office to Last among all targets. C. Set the Advanced properties of the folder target in the Seattle office to First among targets of equal cost. D. Set the Ordering method of \\contoso.com\public to Exclude targets outside of the client's site. E. Set the Advanced properties of the folder target in the Seattle office to Last among targets of equal cost. F. Set the Ordering method of \\contoso.com\public to Lowest cost.

C, D

Your network contains an Active Directory domain named contoso.com. The domain contains a server named NPS1 that has the Network Policy Server server role installed. All servers run Windows Server 2012 R2. You install the Remote Access server role on 10 servers. You need to ensure that all of the Remote Access servers use the same network policies. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) A. Configure each Remote Access server to use the Routing and Remote Access service (RRAS) to authenticate connection requests. B. On NPS1, create a remote RADIUS server group. Add all of the Remote Access servers to the remote RADIUS server group. C. On NPS1, create a new connection request policy and add a Tunnel-Type and a Service-Type condition. D. Configure each Remote Access server to use a RADIUS server named NPS1. E. On NPS1, create a RADIUS client template and use the template to create RADIUS clients.

C, D

You have a WIM file that contains an image of Windows Server 2012 R2. applied a Microsoft Standalone Update Package (MSU) to the image. You need to remove the MSU package from the image. Which three actions should you perform in sequence? To answer, move the appropriate three actions from the list of actions to the answer area and arrange them in the correct order. A. Run dism.exe and specify the /Capture-Image parameter B. Run dism.exe and specify the /Appy-Image parameter C. Run wusa.exe and specify the /uninstall parameter D. Run dism.exe and specify the /RemovePackage parameter E. Run dism.exe and specify the /Cleanup-Image parameter

C, D, E

You have a server named WSUS1 that runs Windows Server 2012 R2. WSUS1 has the Windows Server Update Services server role installed and has one volume. You add a new hard disk to WSUS1 and then create a volume on the hard disk. You need to ensure that the Windows Server Update Services (WSUS) update files are stored on the new volume. What should you do? A. From the Update Services console, configure the Update Files and Languages option. B. From the Update Services console, run the Windows Server Update Services Configuration Wizard. C. From a command prompt, run wsusutil.exe and specify the export parameter. D. From a command prompt, run wsusutil.exe and specify the movecontent parameter.

D

Your company has a main office and two branch offices. The main office is located in New York. The branch offices are located in Seattle and Chicago. The network contains an Active Directory domain named contoso.com. An Active Directory site exists for each office. Active Directory site links exist between the main office and the branch offices. All servers run Windows Server 2012 R2. The domain contains three file servers. The file servers are configured as shown in the following table. Server name.....Server location NYC-SVR1.....New York Office SEA-SVR1.....Seattle Office CHI-SVR1.....Chicago Office You implement a Distributed File System (DFS) replication group named ReplGroup. ReplGroup is used to replicate a folder on each file server. ReplGroup uses a hub and spoke topology. NYC-SVR1 is configured as the hub server. You need to ensure that replication can occur if NYC-SVR1 fails. What should you do? A. Create an Active Directory site link bridge. B. Create an Active Directory site link. C. Modify the properties of Rep1Group. D. Create a connection in Rep1Group.

D

Your network contains a DNS server named Server1. Server1 hosts a DNS zone for contoso.com. You need to ensure that DNS clients cache records from contoso.com for a maximum of one hour. Which value should you modify in the Start of Authority (SOA) record? To answer, select the appropriate setting in the answer area. A. Refresh Interval B. Retry Interval C. Expires after D. Minimum (default) TTL

D

Your network contains an Active Directory domain named contoso.com. All user accounts for the marketing department reside in an organizational unit (OU) named OU1. All user accounts for the finance department reside in an organizational unit (OU) named OU2. You create a Group Policy object (GPO) named GPO1. You link GPO1 to OU2. You configure the Group Policy preference of GPO1 to add a shortcut named Link1 to the desktop. You discover that when a user signs in, the Link1 is not added to the desktop. You need to ensure that when a user signs in, Link1 is added to the desktop. What should you do? A. Enforce GPO1. B. Enable loopback processing in GPO1. C. Modify the Link1 shortcut preference of GPO1. D. Modify the Security Filtering settings of GPO1.

D

Your network contains an Active Directory domain named contoso.com. You have several Windows PowerShell scripts that execute when users log on to their client computer. You need to ensure that all of the scripts execute completely before the users can access their desktop. Which setting should you configure? To answer, select the appropriate setting in the answer area. A. Allow Logon scripts when NetBIOS or WINS is disabled B. Specify maximum wait time for Group Policy scripts C. Run Windows PowerShell scripts first at computer startup D. Run logon scripts synchronously E. Display instructions in shutdown scripts as they run F. Run startup scripts synchronously G. Display instructions in startup scripts as they run H. Run Windows PowerShell scripts first at user logon

D

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. The domain contains 200 Group Policy objects (GPOs). An administrator named Admin1 must be able to add new WMI filters from the Group Policy Management Console (GPMC). You need to delegate the required permissions to Admin1. The solution must minimize the number of permissions assigned to Admin1. What should you do? A. From Active Directory Users and Computers, add Admin1 to the WinRMRemoteWMIUsers__group. B. From Group Policy Management, assign Creator Owner to Admin1 for the WMI Filters container. C. From Active Directory Users and Computers, add Admin1 to the Domain Admins group. D. From Group Policy Management, assign Full control to Admin1 for the WMI Filters container.

D

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. The domain contains 500 client computers that run Windows 8 Enterprise. You implement a Group Policy central store. You have an application named App1. App1 requires that a custom registry setting be deployed to all of the computers. You need to deploy the custom registry setting. The solution must minimize administrator effort. What should you configure in a Group Policy object (GPO)? A. The Software Installation settings B. The Administrative Templates C. An application control policy D. The Group Policy preferences

D

Your network contains an Active Directory domain named contoso.com. All domain controllers run either Windows Server 2008 or Windows Server 2008 R2. You deploy a new domain controller named DC1 that runs Windows Server 2012 R2. You log on to DC1 by using an account that is a member of the Domain Admins group. You discover that you cannot create Password Settings objects (PSOs) by using Active Directory Administrative Center. You need to ensure that you can create PSOs from Active Directory Administrative Center. What should you do? A. Modify the membership of the Group Policy Creator Owners group. B. Transfer the PDC emulator operations master role to DC1. C. Upgrade all of the domain controllers that run Window Server 2008. D. Raise the functional level of the domain.

D

Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. The functional level of both the domain and the forest is Windows Server 2008 R2. The domain contains a domain-based Distributed File System (DFS) namespace that is configured as shown in the exhibit. (Click the Exhibit button.) You need to enable access-based enumeration on the DFS namespace. What should you do first? A. Raise the domain functional level. B. Raise the forest functional level. C. Install the File Server Resource Manager role service on Server3 and Server5. D. Delete and recreate the namespace.

D

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2. All client computers run Windows 8 Enterprise. DC1 contains a Group Policy object (GPO) named GPO1. You need to deploy a VPN connection to all users. What should you configure from User Configuration in GPO1? A. Policies/Administrative Templates/Network/Windows Connect Now B. Policies/Administrative Templates/Network/Network Connections C. Policies/Administrative Templates/Windows Components/Windows Mobility Center D. Preferences/Control Panel Settings/Network Options

D

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1. You run ntdsutil as shown in the exhibit. (Click the Exhibit button.) C:\>ntdsutil ntdsutil: snapshot snapshot: list all 1. 2012/04/13:10:56 {79f94f82-5926-4f44-8af0-2f56d827a57d} 2. c: {7385b8ee-cdac-445c-aa93-e322c16b8d9f} c:\$SNAP_201204121056_VOLUMEC$\ You need to ensure that you can access the contents of the mounted snapshot. What should you do? A. From the snapshot context of ntdsutil, run activate instance "NTDS". B. From a command prompt, run dsamain.exe -dbpath c:\$snap_201204131056_volumec$\windows\ntds\ntds. dit -Idapport 389. C. From the snapshot context of ntdsutil, run mount {79f94f82-5926-4f44-8af0- 2f56d827a57d}. D. From a command prompt, run dsamain.exe -dbpath c:\$snap_201204131056_volumec$\windows\ntds\ntds. dit -Idapport 33389.

D

Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server1. Server1 runs Windows Server 2012 R2. You enable the EventLog-Application event trace session. You need to set the maximum size of the log file used by the trace session to 10 MB. From which tab should you perform the configuration? To answer, select the appropriate tab in the answer area. A. Trace Buffers B. File C. Directory D. Stop Condition E. Trace Providers F. Trace Session G. Security

D

Your network contains an Active Directory domain named contoso.com. The domain contains a read-only domain controller (RODC) named R0DC1. You create a global group named RODC_Admins. You need to provide the members of RODC_Admins with the ability to manage the hardware and the software on R0DC1. The solution must not provide RODC_Admins with the ability to manage Active Directory objects. What should you do? A. From Active Directory Sites and Services, run the Delegation of Control Wizard. B. From a command prompt, run the dsadd computer command. C. From Active Directory Site and Services, configure the Security settings of the R0DC1 server object. D. From a command prompt, run the dsmgmt local roles command.

D

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the Network Policy Server role service installed. An administrator creates a RADIUS client template named Template1. You create a RADIUS client named Client1 by using Template 1. You need to modify the shared secret for Client1. What should you do first? A. Configure the Advanced settings of Template1. B. Set the Shared secret setting of Template1 to Manual. C. Clear Enable this RADIUS client for Client1. D. Clear Select an existing template for Client1.

D

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 is configured as a VPN server. You need to configure Server1 to perform network address translation (NAT). What should you do? A. From Network Connections, modify the Internet Protocol Version 4 (TCP/IPv4) setting of each network adapter. B. From Network Connections, modify the Internet Protocol Version 6 (TCP/IPv6) setting of each network adapter. C. From Routing and Remote Access, add an IPv6 routing protocol. D. From Routing and Remote Access, add an IPv4 routing protocol.

D

Your network contains an Active Directory domain named contoso.com. The domain contains six domain controllers named DC1, DC2, DC3, DC4, DC5, and DC6. Each domain controller has the DNS Server server role installed and hosts an Active Directory-integrated zone for contoso.com. You plan to create a new Active Directory-integrated zone named litwareinc.com that will be used for testing. You need to ensure that the new zone will be available only on DC5 and DCG. What should you do first? A. Change the zone replication scope. B. Create an Active Directory connection object. C. Create an Active Directory site link. D. Create an application directory partition.

D

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2. Both servers run Windows Server 2012 R2. Both servers have the File and Storage Services server role, the DFS Namespaces role service, and the DFS Replication role service installed. Server1 and Server2 are part of a Distributed File System (DFS) Replication group named Group1. Server1 and Server2 are separated by a low-speed WAN connection. You need to limit the amount of bandwidth that DFS can use to replicate between Server1 and Server2. What should you modify? A. The referral ordering of the namespace B. The staging quota of the replicated folder C. The cache duration of the namespace D. The schedule of the replication group

D

Your network contains four Network Policy Server (NPS) servers named Server1, Server2, Servers, and Server4. Server1 is configured as a RADIUS proxy that forwards connection requests to a remote RADIUS server group named Group1. You need to ensure that Server2 and Server3 receive connection requests. Server4 must only receive connection requests if both Server2 and Server3 are unavailable. How should you configure Group1? A. Change the Weight of Server4 to 10. B. Change the Weight of Server2 and Server3 to 10. C. Change the Priority of Server2 and Server3 to 10. D. Change the Priority of Server4 to 10.

D

Your network contains one Active Directory domain named contoso.com. The forest functional level is Windows Server 2012. All servers run Windows Server 2012 R2. All client computers run Windows 8.1. The domain contains 10 domain controllers and a read-only domain controller (RODC) named RODC01. All domain controllers and RODCs are hosted on a Hyper-V host that runs Windows Server 2012 R2. You need to identify whether the members of the Protected Users group will be prevented from authenticating by using NTLM. Which cmdlet should you use? A. Get-ADGroupMember B. Get-ADDomainControllerPasswordReplicationPolicy C. Get-ADDomainControllerPasswordReplicationPolicyUsage D. Get-ADDomain E. Get-ADOptionalFeature F. Get-ADAccountAuthorizationGroup G. Get-ADAuthenticationPolicySilo H. Get-ADAuthenticatonPolicy

D

Your network contains two DNS servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 hosts a primary zone for contoso.com. Server2 hosts a secondary zone for contoso.com. You need to ensure that Server2 replicates changes to the contoso.com zone every five minutes. Which setting should you modify in the start of authority (SOA) record? A. Retry interval B. Expires after C. Minimum (default) TTL D. Refresh interval

D

Your network contains an Active Directory forest named contoso.com. All domain controllers run Windows Server 2008 R2. The schema is upgraded to Windows Server 2012 R2. Contoso.com contains two servers. Server1 and Server2 run Windows Server 2012 R2. They are configured with the Web Server (IIS) server role and the Network Load Balancing (NLB) feature Server1 and Server2 host a load-balanced application pool named AppPool1. You need to ensure that AppPool1 uses a group Managed Service Account as its identity. Which three actions should you perform? To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order. A. Run the Install-ADServiceAccount cmdlet B. Modify the settings of AppPool1 C. Run the New-ADServiceAccount cmdlet D. Install a domain controller that runs Windows Server 2012 R2 E. Run the Set-ADServiceAccount cmdlet

D, C, B

Your network contains an Active Directory domain named contoso.com. All client computers run Windows 8.1. The network contains a shared folder named FinancialData that contains five files. You need to ensure that the FinancialData folder and its contents are copied to all of the client computers. Which two Group Policy preferences should you configure? (Each correct answer presents part of the solution. Choose two.) A. Shortcuts B. Network Shares C. Environment D. Folders E. Files

D, E

Your network contains an Active Directory domain named adatum.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 is configured as a Network Policy Server (NPS) server and as a DHCP server. You need to log all DHCP clients that have windows Firewall disabled. Which three actions should you perform in sequence? To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order. A. Create a connection request policy B. Create a network policy C. Create a remediation server group D. Create a Windows Security Health Validator (WSHV) E. Create a health policy

D, E, B

Your network contains 25 Web servers that run Windows Server 2012 R2. You need to configure auditing policies that meet the following requirements: ✑ Generate an event each time a new process is created. ✑ Generate an event each time a user attempts to access a file share. Which two auditing policies should you configure? To answer, select the appropriate two auditing policies in the answer area. A. Audit access management (Not Defined) B. Audit directory service access (Not Defined) C. Audit logon events (Not Defined) D. Audit Object (Not Defined) E. Audit policy change(Not Defined) F. Audit privilege use (Not Defined) G. Audit process tracking (Not Defined) H. Audit system events(Not Defined)

D, G

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has two network adapters and is located in a perimeter network. You need to install the RIP version 2 routing protocol on Server1. Which node should you use to add the RIP version 2 routing protocol? To answer, select the appropriate node in the answer area. A. Network Interfaces B. Ports C. Remote Access Clients D. Remote Access Logging & Policies E. IPv4 General F. IPv4 Static Routes G. IPv4 IGMP H. IPv4 DHCP Relay Agent I. IPv4 NAT

E

Your network contains an Active Directory domain named contoso.com. The domain contains five servers. The servers are configured as shown in the following table. Server name.....Configuration Server1.....Domain Controller Server2.....DHCP server Server3.....DNS server Server4.....Network Policy Server (NPS) Server5.....Windows Deployment Services (WDS) All desktop computers in contoso.com run Windows 8 and are configured to use BitLocker Drive Encryption (BitLocker) on all local disk drives. You need to deploy the Network Unlock feature. The solution must minimize the number of features and server roles installed on the network. To which server should you deploy the feature? A. Server1 B. Server2 C. Server3 D. Server4 E. Server5

E

Your network contains an Active Directory domain named contoso.com. You have several Windows PowerShell scripts that execute when client computers start. When a client computer starts, you discover that it takes a long time before users are prompted to log on. You need to reduce the amount of time it takes for the client computers to start. The solution must not prevent scripts from completing successfully. Which setting should you configure? To answer, select the appropriate setting in the answer area. A. Allow logon scripts when NetBIOS or WINS is disabled B. Specify maximum wait time for Group Policy scripts C. Run Windows PowerShell scripts first at computer startup D. Run logon scripts synchronously E. Display instructions in shutdown scripts as they run F. Run startup scripts synchronously G. Display instructions in startup scripts as they run H. Run Windows PowerShell scripts first at user logon, logoff

F

Your network contains an Active Directory domain named contoso.com. You create an organizational unit (OU) named OU1 and a Group Policy object (GPO) named GPO1. You link GPO1 to OU1. You move several file servers that store sensitive company documents to OU1. Each file server contains more than 40 shared folders. You need to audit all of the failed attempts to access the files on the file servers in OU1. The solution must minimize administrative effort. Which two audit policies should you configure in GPO1? To answer, select the appropriate two objects in the answer area. A. Account Logon B. Account Management C. Detailed Tracking D. DS Access E. Logon/Logoff F. Object Access G. Policy Change H. Privilege Use I. System J. Global Object Access Auditing

F, J

Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. You need to audit successful and failed attempts to read data from USB drives on the servers. Which two objects should you configure? To answer, select the appropriate two objects in the answer area. A. Audit Application Generated B. Audit Certification Services C. Audit Detailed File Share D. Audit File Share E. Audit File System F. Audit Filtering Platform Connection G. Audit Filtering Platform Packet Drop H. Audit Handle Manipulation I. Audit Kernel Object J. Audit Other Object Access Events K. Audit Registry L. Audit Removable Storage M. Audit SAM N. Audit Central Access Policy Staging

H, L

Your network contains an Active Directory domain named contoso.com. The domain contains more than 100 Group Policy objects (GPOs). Currently, there are no enforced GPOs. You have two GPOs linked to an organizational unit (OU) named OU1. You need to change the precedence order of the GPOs. What should you use? A. Dcgpofix B. Get-GPOReport C. Gpfixup D. Gpresult E. Gpedit. msc F. Import-GPO G. Restore-GPO H. Set-GPInheritance I. Set-GPLink J. Set-GPPermission K. Gpupdate L. Add-ADGroupMember

I

Your network contains an Active Directory domain named contoso.com. The domain contains more than 100 Group Policy objects (GPOs). Currently, there are no enforced GPOs. The domain contains a top-level organizational unit (OU) for each department. A group named Group1 contains members from each department. You have a GPO named GPO1 that is linked to the domain. You need to configure GPO1 to apply settings to Group1 only. What should you use? A. Dcgpofix B. Get-GPOReport C. Gpfixup D. Gpresult E. Gpedit. msc F. Import-GPO G. Restore-GPO H. Set-GPInheritance I. Set-GPLink J. Set-GPPermission K. Gpupdate L. Add-ADGroupMember

J


Set pelajaran terkait

Gardner's multiple intelligences

View Set

ECON 182 Microeconomics - Chapter 10 & 11 -Chapter Readings

View Set

IU D271 Doing Business in China -- Q&A'S To Assignment Questions for Exam 1

View Set

Social Studies: Chapter 8, 8.3 (Pharaoh Khufu: The pyramid Builder)

View Set