Midterm

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following is a feature (not a server role) that can be installed in Windows Server 2012/R2? a. Active Directory Domain Services b. Failover clustering c. File and Storage Services d. Hyper-V

Failover clustering

A folder can be shared only with a single name and single set of share permissions. True or False?

False

A user-specific local GPO takes precedence over a site-linked GPO. True or False?

False

Each core in a multicore processor counts toward the maximum number of processors that Windows Server 2012/R2 Foundation Edition supports. True or False?

False

Local storage is rarely direct-attached storage. True or False?

False

Sam*Snead is a valid user account name. True or False?

False

Server Core mode enables you to run certain GUI tools, such as Server Manager and some Control Panel applets, but doesn't include the taskbar or Start screen. True or False?

False

The Users domain local group in the Builtin folder can be a member of the local Administrators group on a Windows client OS computer. True or False?

False

You can convert a Server Core installation to a Minimal Server Interface installation but not vice versa. True or False?

False

You can use a 32-bit processor to install the Hyper-V role as long as it supports virtualization extensions. True or False?

False

When installing an additional DC in an existing domain, which of the following is an option for reducing replication traffic? a. New site b. Child domain c. GC server d. IFM

IFM

Which type of connection security rule should you configure if you want to prevent computers in your domain from connecting to computers outside the domain? a. Isolation b. Authentication exemption c. Server-to-server d. Tunnel

Isolation

Which SMB share option should you enable if you don't want users to see files they don't have at least Read permission to? a. Offline files b. Hidden shares c. BranchCache d. Access-based enumeration

Access-based enumeration

Which of the following is true when purchasing a motherboard with multiple CPU sockets? a. Windows Server 2012/R2 doesn't support multiple CPU sockets. b. You must run a 32-bit version of Windows Server 2012/R2. c. All installed CPUs must be identical. d. Virtualization is not supported on multiple CPUs.

All installed CPUs must be identical

A domain user logging on to the domain becomes a member of which special identity group? a. Creator Owner b. System c. Authenticated Users d. Anonymous Logon

Authenticated Users

Which of the following is true about a page file? a. It should be stored on a separate disk from the Windows folder. b. It's usually stored in fast random access memory. c. Windows stores frequently accessed drivers in it. d. The page file is usually smaller than 50 MB.

It should be stored on a separate disk from the Windows folder.

You're having replication problems with your GPOs and suspect that the version numbers have somehow gotten out of sync between the GPT and the GPC. What can you do to verify the version numbers on a GPO? a. Check the versionNumber attribute of the GPC and open the GPT.INI file. b. Check the versionNumber attribute of the GPT and open the GPC.INI file. c. Right-click the GPO in the Group Policy Management console, click Properties, and view the version in the General tab. d. Right-click the GPO in the Group Policy Management Editor, click Properties, and view the version in the General tab.

Check the versionNumber attribute of the GPC and open the GPT.INI file.

Which container has a default GPO linked to it? a. Users b. Printers c. Computers d. Domain

Domain

Which of the following is the core logical structure container in Active Directory? a. Forest b. OU c. Domain d. Site

Domain

Which is responsible for management of adding, removing, and renaming domains in a forest? a. Schema master b. Infrastructure master c. Domain naming master d. RID master

Domain naming master

You want to have a library of GPOs that specify baseline settings for different policy categories, and you can use this library to create new GPOs with baseline settings already configured. What's the best way to accomplish this? a. Create a number of GPOs in the Group Policy Objects folder and export the settings. b. Create Starter GPOs for each policy category you want to configure. c. Configure the GPOs in the Group Policy Modeling folder. d. Create GPOs in offline mode and save them to the central store.

Create Starter GPOs for each policy category you want to configure.

You want to make changes to policy settings that affect File Explorer. The settings are in the Administrative Templates folder of the User Configuration node. You want the settings to affect all users in the domain. Which of the following is the best way to accomplish this? a. Create a GPO, configure the policy, and link the GPO to the Domain object. b. Create a GPO, configure the policy, and link the GPO to the Users OU. c. Configure the policy in the Default Domain Controllers Policy GPO. d. Configure the policy in the Default Domain Policy GPO and set a security filter for the Domain Users group.

Create a GPO, configure the policy, and link the GPO to the Domain object.

Which of the following is not part of Active Directory's logical structure? a. Tree b. Forest c. DC d. OU

DC

Which feature in Storage Spaces finds data on a volume that exists multiple times and reduces it to a single instance? a. Disk quotas b. Storage tiering c. Fixed provisioning d. Data deduplication

Data deduplication

1. You have recently purchased a new computer that supports four processors and up to 512 GB of RAM. You want to be able to run six to eight virtual instances without incurring additional licensing costs. Which of the following Windows Server 2012/R2 editions should you install on your server? a. Essentials Edition b. Standard Edition c. Foundation Edition d. Datacenter Edition

Datacenter Edition

Which Windows Server 2012/R2 edition allows installing unlimited virtual instances?

Datacenter Edition

Which graphical utility runs in Server Core? a. File Explorer b. Date and Time control panel c. Computer Management d. Server Manager

Date and Time control panel

Which of the following is true of Windows Server 2012/R2 Essentials Edition? a. It can't be installed as a virtual machine. b. It's configured as a root domain controller by default. c. Licensing is limited to 15 users. d. It supports up to four physical processors.

It's configured as a root domain controller by default.

Which of the following represents the correct order in which GPOs are applied to an object that falls within the GPO's scope? a. Site, domain, OU, local GPOs b. Local GPOs, domain, site, OU c. Domain, site, OU, local GPOs d. Local GPOs, site, domain, OU

Local GPOs, site, domain, OU

Which type of account is not found in Active Directory? a. Domain user account b. Local user account c. Built-in user account d. Computer account

Local user account

You need to stop a service so that you can do some troubleshooting. Before you stop it, you need to see whether any other services will be affected by this action. What should you do? a. Look at the Dependencies tab. b. View the service startup type. c. Right-click the service and click Show Requirements. d. Set the service recovery options.

Look at the Dependencies tab.

Your manager has asked you to audit 150 Windows 8.1 client computers to make sure they're up to date with patches, antivirus software, and firewall settings. You realize that checking all these computers manually will take an inordinate amount of time. Which server role can you install in Windows Server 2012/R2 to make this job much easier? a. Active Directory Rights Management Services b. Network Policy and Access Services c. Print and Document Services d. AD Federation Services

Network Policy and Access Services

You come across a file with a .vhd extension on your server's hard disk. What should you do to see this file's contents? a. Right-click the file and click Open. b. Open the file in Notepad. c. Burn the file to a DVD. d. Mount the file.

Mount the file.

You want to install a feature to an offline VHD file. What do you do first? a. Commit the changes. b. Install the feature by using dism. c. Mount the image. d. Import the .wim file.

Mount the image.

You're seeing heavy use on one of your shared printers, and users often have to wait in line to get their print jobs. What printing feature can you use to best alleviate the problem? a. Printer prioritization b. Change availability hours c. Change spooling options d. Printer pooling

Printer pooling

Which of the following is not true about disk quotas? a. Users can be prevented from saving files on a volume. b. An event can be generated when a user exceeds the quota limit. c. Quotas can be overridden for groups. d. Quotas can be set without denying disk space to users.

Quotas can be overridden for groups.

You're planning to install a new database application that uses an enormous amount of disk space. You need this application to be highly available, so you need a disk system with the capability to auto-correct from disk errors and data corruption. Which of the following is the best option? a. MBR disk with chkdsk b. NTFS format with EFS c. ReFS format and Storage Spaces d. GPT disk with shadow copies

ReFS format and Storage Spaces

You have four servers that need access to shared storage because you will configure the servers in a cluster. Which storage solution should you consider for this application? a. NAS b. SAN c. SCSI d. DAS

SAN

You're trying to decide which disk technology to use on your new server. The server will be in heavy use around the clock every day, so high performance is a necessity. Which technology is the best choice? a. IDE b. ATA-166 c. SATA d. SAS

SAS

Which disk interface technology transfers data over a parallel bus? a. SATA b. USB c. SAS d. SCSI

SCSI

Which of the following defines the types of information stored in an Active Directory object? a. GPOs b. Attribute values c. Schema attributes d. Schema classes

Schema attributes

Which of the following defines the types of objects in Active Directory? a. GPOs b. Attribute values c. Schema attributes d. Schema classes

Schema classes

Which of the following creates a file named disabled.txt containing a list of disabled Active Directory accounts? a. net accounts /show disabled b. ldifde -accounts -property=enabled -value=false c. Query-Account -Disable=True | disabled.txt d. Search-ADAccount -AccountDisabled > disabled.txt

Search-ADAccount -AccountDisabled > disabled.txt

Which features must be installed to convert a server from Server Core to the full GUI? (Choose all that apply.) a. Server-GUI-Shell b. Server-MMC-Enable c. Server-Full-Interface d. Server-GUI-Mgmt-Infra

Server-GUI-Mgmt-Infra

You have noticed inappropriate use of computers for gaming and Internet downloads by some employees who come in after hours and on weekends. These employees don't have valid work assignments during these times. You have been asked to devise a solution for these employees that doesn't affect other employees or these employees' computers during working hours. What's the best solution? a. Install personal firewall software on their computers in an attempt to block the gaming and Internet traffic. b. Request that the Maintenance Department change the locks on their office doors so that they can enter only during prescribed hours. c. Set the Logon Hours options for their user accounts. d. Before you leave each evening and before the weekend, disable these employees' accounts and reenable them the next working day.

Set the logon hours options for their user accounts

Which of the following best describes a directory service? a. Similar to a list of information in a text file b. Similar to a database program but with the capability to manage objects c. A program for managing the user interface on a server d. A program for managing folders, files, and permissions on a distributed server

Similar to a database program but with the capability to manage objects

Which of the following best describes a Windows client OS? a. Supports up to 64 processors b. Includes fault-tolerance features, such as RAID-5 and clustering c. Supports network connections based on the number of purchased licenses d. Supports a very limited number of logged-on network users

Supports a very limited number of logged-on network users

What's created automatically when you install Windows Server 2012 R2 on a system with a disk drive that has never had an OS installed on it before? a. System volume b. Dynamic disk c. GPT d. Extended partition

System Volume

You have an Active Directory forest of two trees and eight domains. You haven't changed any operations master domain controllers. On which domain controller is the schema master? a. All domain controllers b. The last domain controller installed c. The first domain controller in the forest root domain d. The first domain controller in each tree

The first domain controller in the forest root domain

Objects in an OU with the Block Inheritance option set are affected by a domain-linked GPO with the Enforced option set. True or False?

True

When a policy setting in Computer Configuration and User Configuration in the same GPO conflict, the Computer Configuration policy setting takes precedence. True or False?

True

Which of the following is true about GPT disks? a. They support a maximum volume size of 2 TB. b. GPT is the default when initializing a disk in Disk Management. c. They use CRC protection for the partition table. d. You can't convert a GPT disk to MBR.

They use CRC protection for the partition table.

Which of the following uses dynamically expanding storage? a. Thin provisioning b. Primordial pools c. Parity volumes d. Resilient File System

Thin provisioning

Why would you use Features on Demand? a. To free up system RAM b. To reduce disk space use c. To use the GUI interface d. To uninstall Server Core

To reduce disk space use

You want to configure an encrypted and authenticated connection between two gateway computers. What rule type should you configure in the New Connection Security Rule Wizard? a. Isolation b. Server-to-server c. Tunnel d. Authentication exemption

Tunnel

If you want to share files with other Windows computers, you should have __________ installed and enabled on your computer. a. Client for Microsoft Networks b. File and Printer Sharing for Microsoft Networks c. Active Directory d. Domain Name System

file and printer sharing for Microsoft Networks

What Group Policy feature should you use if you have a policy linked to an OU that contains computer accounts but want the policy to affect only computers running Windows 7? You don't know exactly which computer accounts represent the computers running Windows 7. a. Disabling inheritance b. Policy enforcement c. WMI filtering d. Security filtering

WMI filtering

Which feature of Windows file sharing should you configure if you want users to be able to access their files securely from mobile devices without having to set up a VPN or configure the firewall? a. Client-side caching b. Offline files c. Access-based enumeration d. Work Folders

Work Folders

A user needs to create files and make changes to file contents. Aside from the Read permission, what other permission should the user be granted without allowing more access than is necessary? a. Write b. Full control c. Modify d. Create

Write

By default, when are policies set in the User Configuration node applied? a. Every 5 minutes b. Immediately c. At user logon d. At computer restart

at user logon

The IT Department sent out a memo stating that it will start delivering desktop computer interfaces through the IT data center via a Web browser interface. What technology is the IT Department using? a. Public cloud computing b. Server clustering c. Directory server d. Virtual desktop infrastructure

virtual desktop infrastructure

Which networking component includes a device driver? a. Network server software b. Network client software c. Network protocol d. Network interface

network interface

A user is having trouble logging on to the domain from a computer that has been out of service for several months, and nobody else can seem to log on from the computer. What should you try first to solve the problem? a. Reinstall Windows on the workstation and create a new computer account in the domain. b. Rename the computer and create a new computer account with the new name. c. Reset the computer account, remove the computer from the domain, and rejoin it to the domain. d. Disable the computer account, remove the computer from the domain, and rejoin it to the domain.

reset the computer account, remove the computer from the domain, and rejoin in to the domain

Which command do you use to restart Server Core? a. shutdown /r /t 0 b. restart /t 0 c. net stop /r /t 0 d. net computer /reset /t 0

shutdown /r /t 0

Which of the following must be installed if you want to remotely manage a Windows Server 2012 server from a Windows Server 2012 R2 server? a. Performance updates b. .NET Framework 4.5 c. Windows Management Framework 4.0 d. A full GUI

.NET Framework 4.5

Which option can you add to the Install-WindowsFeature command that shows you what the results would be but doesn't actually perform the installation task? a. -WhatIf b. -TestOnly c. -ShowResults d. -NoInstall

-WhatIf

Which of the following is true about upgrading to Windows Server 2012/R2? a. A Windows Server 2008 32-bit edition requires a clean install. b. You can upgrade from a Chinese version to an English version. c. A Server Core install always requires a clean installation. d. You can upgrade from Windows Server 2003 R2.

A Windows Server 2008 32-bit edition requires a clean install

You have been asked to advise a business on how best to set up its Windows network. Eight workstations are running Windows 8.1. The business recently acquired a new contract that requires running a network application on a server. A secure and reliable environment is critical to run this application, and security management should be centralized. There are enough funds in the budget for new hardware and software, if necessary. Which Windows networking model should you advise this business to use? a. A Windows domain using Active Directory b. A Windows workgroup using Active Directory c. A peer-to-peer network using File and Printer Sharing d. A peer-to-peer network using Active Directory

A Windows domain using Active Directory

Which of the following best defines a computer used as a server? a. Computer hardware that includes fast disk drives and a lot of memory b. A computer with OS software that has a Web browser and Client for Microsoft Networks c. A computer with OS software that includes directory services and domain name services d. A computer with Linux installed

A computer with OS software that includes directory services and domain name services

Which of the following is not associated with an Active Directory tree? a. A group of domains b. A container object that can be linked to a GPO c. A common naming structure d. Parent and child domains

A container object that can be linked to a GPO

If you want to make a computer a domain controller, which of the following should you install? a. Client for Microsoft Networks b. File and Printer Sharing for Microsoft Networks c. Active Directory d. Domain Name System

Active Directory

If you want to provide users with secure network transactions that verify the identity of sender and receiver with a digital certificate, which role should you consider installing? a. Active Directory Federation Services b. Active Directory Certificate Services c. Active Directory Rights Management Services d. Active Directory Lightweight Directory Services

Active Directory Certificate Services

You have just installed a human resources application that's directory service enabled on a Windows Server 2012/R2 server. You're running primarily Linux in your organization and don't have a Windows domain, but you want to take advantage of the benefits a directory service offers. Which Windows Server 2012/R2 role should you install? a. Active Directory Federation Services b. Active Directory Certificate Services c. Active Directory Rights Management Services d. Active Directory Lightweight Directory Services

Active Directory Lightweight Directory Services

You add a server to Server Manager but see the error message "WinRM Negotiation authentication error." What should you do? a. Add the server with different credentials. b. Add the server to the TrustedHosts list. c. Install .NET Framework 4.5. d. Enter the Configure-SMRemoting command.

Add the server to the TrustedHosts list.

You want to configure an inbound firewall rule that allows a connection only if the computer trying to make the connection is authenticated. What option should you select? a. Allow the connection if it is secure b. Block unauthenticated connections c. Isolation mode d. Allow Domain connections

Allow the connection if it is secure.

Which of the following is not a valid Windows Server 2012/R2 installation option? a. A clean installation of Windows Server 2012/R2 (Server with a GUI) b. An upgrade from Windows Server 2008 Server Core to Server with a GUI c. An upgrade from Windows Server 2008 Enterprise to Windows Server 2012/R2 Datacenter d. A clean installation of Windows Server 2012/R2 (Server Core)

An upgrade from Windows Server 2008 Server Core to Server with a GUI

You're the administrator of a file server. Tom, who is on vacation, had created a file that Mary needs access to, but neither her account nor the Administrator account has permission to access the file. What is the best way to allow Mary to access the file?

As Administrator, take ownership of the file, grant Mary the permission she needs, and then give ownership back to Tom.

Which of the following is not a standard NTFS permission? a. Read & execute b. Change c. Write d. List folder contents

Change

Which of the following is a task you must do during Windows Server 2012/R2 installation? a. Name the server. b. Choose the disk where it will be installed. c. Set the Administrator password. d. Set the workgroup or domain.

Choose the disk where it will be installed

You right-click a Server Core server in Server Manager and click Computer Management. You see an error indicating that the server can't be managed. What should you do to solve the problem? a. Run configure-SMRemoting.exe -Enable on the local computer. b. Configure Windows Firewall on the remote computer. c. Install the Minimal Server Interface on the remote computer. d. Disable WinRM on the local computer.

Configure Windows Firewall on the remote computer.

You installed Windows Server 2012/R2 recently, and it has been running well for the past several days. You read about a critical security patch that has been available for about a week. You view the currently installed updates in the Programs and Features control panel and don't see any installed updates. You need to install this update immediately and make sure the server is kept up to date without your intervention in the future. What should you do?

Configure Windows Update

You want to create policies in a new GPO that affects only computers with Windows 7 installed. You don't want to reorganize your computer accounts to do this, and you want computers that are upgraded to Windows 8.1 to fall out of the GPO's scope automatically. What can you do? a. For each policy, use selective application to specify Windows 7 as the OS. b. Create a new OU, place all computer accounts representing computers with Windows 7 installed in this OU, and link the GPO to this OU. c. Create a group called W7Computers. Place all computer accounts representing computers with Windows 7 installed in this group, and use this group in a security filter on the GPO. Link the GPO to the domain. d. Configure a WMI filter on the GPO that specifies Windows 7 as the OS. Link the GPO to the domain.

Configure a WMI filter on the GPO that specifies Windows 7 as the OS. Link the GPO to the domain.

You're a consultant for a small company that uses eight Windows 8.1 computers in a workgroup configuration. The owner asked you to set restrictive policies on users to prevent them from making Control Panel, desktop, and other changes. The owner wants to be exempt from these policies but shouldn't be a member of the local Administrators group. What should you do? a. Configure the Local Computer Policy object, and then configure a user-specific GPO for the owner. b. Configure the Local Computer Policy object, and use GPO filtering to exempt the owner from this policy. c. Install Windows Server 2012 R2 and configure Active Directory. Add the Windows 8.1 computers to the domain, configure a GPO for the domain, and use filtering to exempt the owner. d. Configure the Local Computer Policy object, and then configure a logon script for the owner that changes the restrictive settings.

Configure the Local Computer Policy object, and then configure a user-specific GPO for the owner.

You have a server with Windows Server 2012 R2 installed on Disk 0, a basic disk. You're using the server to store users' documents. You have two more disks that you can install in the server. What should you do if you want to provide fault tolerance for users' documents? a. Convert Disk 0 to dynamic. Create a striped volume using Disk 0, Disk 1, and Disk 2. b. Create a RAID 1 volume from Disk 1 and Disk 2. c. Convert the new disks to GPT. Create a spanned volume using Disk 1 and Disk 2. d. Create a RAID 5 volume from Disk 0, Disk 1, and Disk 2.

Create a RAID 1 volume from Disk 1 and Disk 2.

You have created a GPO named RestrictU and linked it to the Operations OU (containing 30 users) with link order 3. RestrictU sets several policies in the User Configuration node. After a few days, you realize the Operations OU has three users who should be exempt from the restrictions in this GPO. You need to make sure these three users are exempt from RestrictU's settings, but all other policy settings are still in effect for them. What's the best way to proceed? a. Move the three users to a new OU. Create a GPO with settings appropriate for the three users, and link it to the new OU. b. Create an OU under Operations, and move the three users to this new OU. Create a GPO, and link it to this new OU. Configure the new OU to block inheritance of the RestrictU GPO. c. Create a global group and add the three users as members. Configure GPO security filtering so that the global group is denied access to the GPO. d. Set the Enforced option on RestrictU with an Enforce filter that excludes the three user accounts.

Create a global group and add the three users as members. Configure GPO security filtering so that the global group is denied access to the GPO.

You're concerned that some domain controllers and workstations don't meet security requirements. What should you do to verify security settings on a computer against a list of known settings? a. Create a security template and run Group Policy Modeling. b. Create a security database from a template and run secedit.exe. c. Load the Security Templates snap-in and use the Group Policy Results feature. d. Export the Security Settings node on the computer and run Security Configuration and Analysis.

Create a security database from a template and run secedit.exe.

You see something named "primordial" in File and Storage Services. What can you do with it? a. Create a storage pool. b. Create a virtual disk. c. Format it. d. Create a new volume.

Create a storage pool

You have been working with ADMX files to modify existing Administrative Templates and create new templates. You work on different domain controllers, depending on your location. Despite a concerted effort, your ADMX files are getting out of sync. How can you solve this problem? a. Remove group policy management tools from all but one domain controller so that policies can be managed from only one computer. b. Create an ADMX store in the SYSVOL share, and copy the ADMX files to the ADMX store. c. Create an ADMX store in Active Directory, and move all your ADMX files to Active Directory. d. Share the %systemroot%\PolicyDefinitions folder on all your domain controllers, and set up Task Scheduler to copy ADMX files automatically from one system to all other systems.

Create an ADMX store in the SYSVOL share, and copy the ADMX files to the ADMX store.

Your network consists of three sites and two domains, with some computers from both domains at each site. Each site has certain security settings that should apply to all computers from both domains when they're located at the site. What's the best way to ensure that the correct security settings are applied to the computers at each site? a. Create three OUs in each domain, one for each site. In both domains, place the computer accounts in the OU corresponding to the site where the computer is located. Apply a GPO with the appropriate security settings to each OU in both domains. b. Create three GPOs, one for each site, with the appropriate security settings. Apply the GPOs to the corresponding site, and enforce the GPO. c. Create three GPOs, one for each site. Apply the GPOs to the domain object in both domains. Create three groups, one for each site, and place the computer accounts in the appropriate groups. Use GPO filtering to make sure the policy configured for each site affects only the corresponding group of computers. d. On each computer in each site, configure the local GPO in GPOE with the appropriate security settings. In the Group Policy Object Editor, right-click the Computer Configuration node and click Block Inheritance.

Create three GPOs, one for each site, with the appropriate security settings. Apply the GPOs to the corresponding site, and enforce the GPO.

An expensive color laserjet printer is shared by a group of managers and some other employees. The managers complain that they often have to wait for their print jobs until other employees' large jobs have finished. Usually, the managers' print jobs are small and needed immediately, but other employees rarely need their print jobs in a hurry. What can you do to help solve this problem without buying additional equipment? a. Create two printers and assign them different priorities and permissions. b. Create another printer and configure a printer pool. c. Buy another printer and configure permissions so that only managers can access it. d. Make the printer available only during the hours managers are working.

Create two printers and assign them different priorities and permissions.

Which of the following server roles resolves names of Internet computers? a. Active Directory Domain Services b. DNS Server c. DHCP Server d. Remote Access e. Hyper-V

DNS Server

Your boss has told you that he wants several employees to have a way to access the company network securely through an Internet connection. Further, the computers they use to access the network from should be manageable by the IT Department. What should you configure on your Windows Server 2012/R2 server? a. DirectAccess b. Windows Deployment Services c. Dynamic Access Control d. Storage Spaces

DirectAccess

Which of the following is defined as a physical component with a disk interface connector? a. Format b. Partition c. Volume d. Disk drive

Disk drive

Which of the following is the correct sequence of steps for creating a volume with Storage Spaces? a. Disk pool, volume, virtual disk b. Primordial pool, virtual disk, volume c. Virtual disk, disk pool, volume d. Disk pool, virtual disk, volume

Disk pool, virtual disk, volume

You have installed a shared printer with the default permissions and want users to be able to manage their own documents in the print queue. What do you need to do? a. Do nothing. b. Assign the Everyone special identity the Manage documents permission. c. Assign the Everyone special identity the Manage printers permission. d. Add Domain Users to the Printer Operators group.

Do nothing

Which load-balancing mode should you choose if you need to balance heavy traffic flow over multiple NICs? a. Address Hash b. Dynamic c. LACP d. Hyper-V Port

Dynamic

You need to protect sensitive files from unauthorized users even if the disk is stolen. What feature should you use and on what file system? a. EFS, NTFS b. Disk compression, ReFS c. Quotas, NTFS d. Shadow copies, ReFS

EFS, NTFS

You have been getting quite a few calls with requests to restore files from a backup because the file was accidentally deleted from a share or because the user needed a previous version of a file that was overwritten. Restoring the files has become a burden, and sometimes you need to repeat the process several times until you find the version the user needs. What can you do to give users a way to access the files they need and reduce your administrative burden? a. Adjust permissions on the shares so that users can't delete files except their own. Tell users to back up their own files to local backup media. b. Enable shadow copies for each share. c. Enable shadow copies on the volumes where the shares are hosted. d. Give each user a backup program and an external hard drive.

Enable shadow copies on the volumes where the shares are hosted.

You have installed a new disk and created a volume on it. What should you do before you can store files on it? a. Format it. b. Partition it. c. Initialize it. d. Erase it.

Format it.

You're starting a new business with five employees who need access to an application that runs on Windows Server 2012. You need to keep costs down, and you don't have a lot of computer expertise, so you want to keep things as simple as possible. Ideally, you'll buy a server with an OS already installed. Which edition of Windows Server 2012/R2 should you consider? a. Essentials b. Standard c. Foundation d. Datacenter

Foundation

Which cmdlet shows a list of services related to Hyper-V? a. List-Services Hyper-V -all b. Show-Service -ServiceType Hyper* c. Get-Help Service Hyper-V d. Get-Service -DisplayName Hy*

Get-Service -DisplayName Hy*

If you want to see a list of available rolls and features, which command should you use? a. sconfig b. Show-WindowsRoles c. dism.exe d. Get-WindowsFeature

Get-WindowsFeature

Which command shows a list of installed roles and features? a. Installed-WindowsFeature -Show b. Get-WindowsFeature | where Installed c. List-InstalledFeature d. Show-Features .if. Installed

Get-WindowsFeature | where Installed

Which of the following is associated with installing the first domain controller in a forest? a. RODC b. Child domain c. Global catalog d. DHCP

Global catalog

Which of the following is true about an SSD? a. Uses magnetic platters b. Has no moving parts c. Uses a proprietary interface d. Uses EPROM

Has no moving parts

Which of the following roles should you install if you want to create and manage virtual machines? a. Network Policy and Access Services b. Server Manager c. Hyper-V d. DHCP Server

Hyper-V

You want to see the permissions set on an OU, so you open Active Directory Users and Computers, right-click the OU, and click Properties. After clicking all the available tabs, you can't seem to find where permissions are set in the Properties dialog box. What should you do? a. Log on as a member of Enterprise Admins and try again. b. In the Properties dialog box, click the Advanced button. c. Right-click the OU and click Security. d. In Active Directory Users and Computers, click View, Advanced Features.

In Active Directory Users and Computers, click View, Advanced Features

Another administrator has been changing permissions on the Operations OU by adding some groups and users to the DACL. You're concerned that the JrAdmin account has been given more access to the OU than it should have. You need to see all permissions the JrAdmin account has to the Operations OU. What should you do? a. In Active Directory Users and Computers, right-click the JrAdmin account, click Properties, and view her group memberships. b. In Active Directory Administrative Center, run the Permissions Wizard and select JrAdmin as the target. c. In Active Directory Users and Computers, enable Advanced Features, open the Operations OU's Properties dialog box, and navigate to the Effective Access tab. d. In Active Directory Administrative Center, openJrAdmin's account properties and click the Manager Of tab.

In Active Directory Users and Computers, enable Advanced Features, open the Operations OU's Properties dialog box, and navigate to the Effective Access tab.

You have hired a new junior administrator and created an account for her with the logon name JrAdmin. You want her to be able to reset user accounts and modify group memberships for users in the Operations department whose accounts are in the Operations OU. You want to do this with the least effort and without giving JrAdmin broader capabilities. What should you do? a. In Active Directory Administrative Center, right-click the Operations OU, click Properties, and click Managed By. b. In Active Directory Users and Computers, right-click the Operations OU and click Delegate Control. c. Open the Operations Security tab and add JrAdmin to the DACL. d. Add JrAdmin to the Password Managers domain local group.

In Active Directory Users and Computers, right-click the Operations U and click Delegate Control

Where is a GPT stored? a. In a folder named the same as the GPO in the SYSVOL share b. In a folder named the same as the GUID of the GPO in Active Directory c. In a folder named the same as the GUID of the GPO in the SYSVOL share d. In a folder named the same as the GPO in Active Directory

In a folder named the same as the GUID of the GPO in the SYSVOL share

Which of the following is not a typical Windows Server 2012/R2 postinstallation task? a. Installing the Server Core role b. Setting the correct time zone c. Setting IP configuration parameters d. Changing the server name

Installing the Server Core role

You want the switch to automatically identify the links between NICs on a NIC team and the switch so that teams can be created dynamically. What option should you set on the NIC team, and what feature should you look for on the switch? a. LACP, 802.3ad b. Static Teaming, LACP c. Switch Independent, Address Hashing d. LACP, 802.1ax

LACP, 802.1ax

The protocol for accessing Active Directory objects and services is based on which of the following standards? a. DNS b. LDAP c. DHCP d. ICMP

LDAP

You have created a GPO that defines settings only in the Local Policies node. You want the settings to apply to all computers in the domain and take precedence over any other GPOs. Which of the following is the best approach? a. Link the new GPO to the domain, and unlink the Default Domain Policy. Right-click the domain object and click Enforced. b. Link the new GPO to each OU containing computer accounts, and make sure it has link order 1. c. Link the new GPO to the domain, and then right-click the new GPO and click Enforced. d. Link the new GPO to the domain, make sure it has the highest link order, and then right-click the domain object and click Block Inheritance.

Link the new GPO to the domain, and then right-click the new GPO and click Enforced.

Which of the following is the common framework in which most Windows Server 2012/R2 administrative tools run? a. Windows Management Center b. Microsoft Management Console c. Server Configuration Manager d. Windows Configuration Manager

Microsoft Management Console

Which of the following is true about the three server modes? a. Server Core uses the most resources. b. Server with a GUI doesn't have PowerShell. c. Minimal Server Interface can't run MMCs. d. Minimal Server Interface doesn't have File Explorer.

Minimal Server Interface doesn't have File Explorer.

In Active Directory, all your computer accounts are in the Computers folder, and all your user accounts are in the Users folder. You need to configure an AppController policy that affects users who log on to computers in the Engineering Department. Which of the following is the best way to accomplish this? a. Place the Engineering Department user accounts in a group. Create a new GPO, configure the AppController policy, and link the GPO to the group you created. b. Place the Engineering Department computer accounts in a group named Eng. Create a new GPO, configure the AppController policy, and link it to the domain object. Set a security filter for the Eng group. c. Move the Engineering Department user accounts to a new OU named Eng. Configure the AppController policy on the Default Domain Policy GPO. Set Block Inheritance on the Users folder. d. Move the Engineering Department computer accounts to a new OU named Eng. Create a new GPO, configure the AppController policy, and link the GPO to the Eng OU.

Move the Engineering Department computer accounts to a new OU named Eng. Create a new GPO, configure the AppController policy, and link the GPO to the Eng OU.

You want shared network storage that's easy to set up and geared toward file sharing with several file-sharing protocols, but you don't want the device to be dedicated to file sharing. What should you consider buying? a. SAN b. DAS c. NAS d. LAS

NAS

Which of the following disk formats supports Encrypting File System (EFS)? a. exFAT b. FAT32 c. NTFS d. ReFS

NTFS

You need to support a large disk volume of 1 TB or more and use quotas to limit the amount of space users' files can occupy on the volume. Which file format should you use? a. exFAT b. FAT32 c. NTFS d. ReFS

NTFS

Which of the following is true about share and NTFS permissions? a. NTFS permissions are applied only to local file access. b. Share permissions take precedence over NTFS permissions. c. Share permissions are applied to network and local file access. d. NTFS permissions are applied to network access.

NTFS permissions are applied to network access.

You want to be able to manage a Server Core computer's firewall by using the Windows Firewall with Advanced Security snap-in. What should you do? a. On the local computer, disable the Windows Firewall Remote Management rule group. b. On the remote computer, enter the command Configure-SMRemoting -ConfigureFirewallRules. c. On the remote computer, use the PowerShell command Set-NetFirewallRule -DisplayGroup "Windows Firewall Remote Management" -enabled True. d. On the local computer, enable the COM+ Network Access firewall rule.

On the remote computer, use the PowerShell command Set-NetFirewallRule -DisplayGroup "Windows Firewall Remote Management" -enabled True.

You approach one of your servers running Server Core and see a completely blank desktop except for the mouse pointer. You need to do some management tasks on the server. What should you do? a. Right-click the mouse and click Open a command prompt. b. Press Start+X and click Run. c. Press Ctrl+Alt+Delete and click Start Task Manager. d. Right-click the desktop, point to New, and click Task.

Press Ctrl+Alt+Delete and click Start Task Manager

You need to create a share containing confidential information that only a select group of people should know about. You don't want this share to appear in users' network browse lists. What can you do that involves the least administrative effort and disruption? a. Disable network discovery on all computers. b. Disable network discovery on the computers of users who you don't want to see the share. c. Put a $ character at the end of the share name. d. Put a @ character at the beginning of the share name.

Put a $ character at the end of the share name.

You need a disk system that provides the best performance for a new application that frequently reads and writes data to the disk. You aren't concerned about disk fault tolerance because the data will be backed up each day; performance is the main concern. What type of volume arrangement should you use? a. Spanned volume b. RAID 1 volume c. RAID 0 volume d. RAID 5 volume

RAID 0 volume

Which of the following specifies what types of actions a user can perform on a computer or network? a. Attributes b. Rights c. Permissions d. Classes

Rights

What feature of the Windows Server 2012/R2 file system should you enable if you want users to be able to restore deleted or previous versions of a file in a shared folder? a. Distributed File System b. Disk quotas c. Shadow copies d. Bitlocker

Shadow copies

Which administrative share does Active Directory use for replication? a. NETLOGON b. SYSVOL c. Admin$ d. IPC$

SYSVOL

Which of the following is a component of Active Directory's physical structure? a. Organizational units b. Domains c. Sites d. Folders

Sites

Which of the following is true about NIC teaming? a. You need a minimum of two NICs to create a NIC team. b. In failover mode, one NIC is always in standby mode. c. Static teaming is used mainly for load balancing. d. LACP is the default teaming mode.

Static teaming is used mainly for load balancing.

Which of the following is a new feature in Windows Server 2012 R2 that combines the speed of SSDs with the low cost and capacity of HDDs? a. JBOD b. Thin provisioning c. Storage tiering d. Resilient spaces

Storage tiering

Which of the following sets the profile for each network connection on your computer? a. The Network Connection policy under the Software Settings node b. The Windows Firewall with Advanced Security policy c. The Properties dialog box of each network interface d. The Network Location Awareness feature

The Network Location Awareness feature

All your domain controllers are running Windows Server 2012 R2. You're noticing problems with GPT replication. What should you check? a. Verify that Active Directory replication is working correctly. b. Verify that FRS is operating correctly. c. Verify that DFSR is operating correctly. d. Check the GPOReplication flag for the GPT in the Attribute Editor.

Verify that DFSR is operating correctly.

What must be running to allow you to manage a server remotely with PowerShell? a. Windows Firewall b. LBFO c. Telnet d. WinRM

WinRM

You have just finished installing Windows Server 2012/R2. You have assigned the server a name and finished configuring IP addresses. You have tested your configuration by using ping to verify network connectivity with your default gateway and another server on the network, and everything worked fine. However, the next day, a colleague tells you that when he tried to ping the server, his request timed out. You try to ping your colleague's computer and receive a reply just fine. Why can't your colleague ping your server successfully? a. Your server's default gateway is incorrect. b. Windows Firewall is blocking the packets. c. Your colleague's IP address configuration is incorrect. d. You don't have DNS installed.

Windows Firewall is blocking the packets

Which of the following is true about installing roles and features in Windows Server 2012/R2? a. You can't install a server role by using the command line. b. All server role installations require a server restart. c. You can install more than one role at a time. d. Server roles can be installed only on online drives.

You can install more than one role at a time.

Which of the following is a default folder object? a. Computers b. Domain Controllers c. Groups d. Sites

computers

You're managing 75 servers from a single Server Manager console and find you're wasting a lot of time scrolling through the list of servers to find the one you want to manage. You have 5 locations with about 15 servers in each location. What can you do to make managing these servers in Server Manager easier?

create server groups

Jane has left the company. Her user account is a member of several groups and has permissions and rights to a number of forest-wide resources. Jane's replacement will arrive in a couple of weeks and needs access to the same resources. What's the best course of action? a. Find all groups Jane is a member of and make a note of them. Delete Jane's user account and create a new account for the new employee. Add the new account to all the groups Jane was a member of. b. Copy Jane's user account and give the copy another name. c. Disable Jane's account. When the new employee arrives, rename Jane's account, assign it a new password, and enable it again. d. Export Jane's account and then import it when the new employee arrives. Rename the account and assign it a new password.

disable Jane's account. When the new employee arrives, rename Jane's account, assign it a new password, and enable it again

An account named SrAdmin created an OU named QandA under the Operations OU. Which of the following is true by default? a. Domain Admins is the owner of the QandA OU. b. SrAdmin is the owner of the QandA OU and all objects created inside it. c. SrAdmin has all standard permissions except Full control for the QandA OU. d. The Everyone group has Read permission to the QandA OU.

domain admins is the owner of the Q and A OU.

Which direct group scope conversion is allowed? a. Domain local to universal, provided no domain local group is already a member b. Global to domain local, without restriction c. Domain local to global, provided no domain local group is already a member d. Universal to global, without restriction

domain local to universal, provided no domain local group is already a member

Which of the following is true about the Users domain local group? a. It's in the Users folder. b. It can be converted to a global group. c. Domain Users is a member. d. Its members can log on locally to a domain controller.

domain users is a member

Which of the following is the default setting for Windows Update after you first turn on automatic updates? a. Download and install updates automatically. b. Download but do not install updates. c. Inform when updates are available but do not download updates. d. Download updates but let me choose whether to install them.

download and install updates automatically

Which commands can you use together to change attributes of several users at once? a. dsget and dsadd b. dsget and dsmod c. dsquery and dsmod d. dsquery and dsget

dsquery and dsmod

What type of interface are you likely to find on a DAS device for connecting the device to the server that uses it? a. SATA b. IDE c. PATA d. eSATA

eSATA

Global groups can have domain local groups as members. True or False?

false

What command can you put in a batch file to allow users to access the Public share on the ServPub1 server, using the drive letter P? a. net share P: \\ServPub1\Public b. net use P: \\ServPub1\Public c. share \\ServPub1\Public P: d. share P: \\ServPub1\Public

net use P: \\ServPub1\Public

What command allows Echo Request packets through the firewall? a. icmp set icmp-echo enabled b. Set-NetFirewallRule "Echo Request" -Enabled True c. netsh firewall set icmpsetting 8 d. ipconfig -allow "ping requests"

netsh firewall set icmpsetting 8

Which command should you use in Windows Server 2012 Server Core to perform menu-based configuration tasks? a. netsh.exe b. smigdeploy.exe c. sconfig d. command.com

sconfig

Over the past several months, Tom, who has access to sensitive company information, has logged on to computers in other departments and left them without logging off. You have discussed the matter with him, but the problem continues to occur. You're concerned that someone could access these sensitive resources easily. What's the best way to solve this problem? a. Ensure that all computers Tom is logging on to have screen savers set to lock the computer after 15 minutes of inactivity. b. Specify which computers Tom can log on to in the domain by using the Log On To option in his account's properties. c. Move Tom's account and computer to another domain, thereby making it impossible for him to log on to computers that are members of different domains. d. Disable local logon for Tom's account on all computers except Tom's.

specify which computers Tom can log on to in the domain by using the Log On To option in his account's properties

What happens if a security group that's an ACE in a shared folder is converted to a distribution group? a. A security group can't be converted to a distribution group if it has already been assigned permissions. b. The group is removed from the DACL automatically. c. The group remains in the DACL, but the ACE has no effect on members' access to the resource. d. The group remains in the DACL, and permissions assigned to the group affect access to the resource as though it were still a security group.

the group remains in the DACL, but the ACE has no effect on members' access to the resource

You're a consultant for a small business with four computer users. The company's main reason for networking is to share the Internet connection, two printers, and several documents. Keeping costs down is a major consideration, and users should be able to manage their own shared resources. Which networking model best meets the needs of this business?

workgroup model


Set pelajaran terkait

Accounting Chapter 9 - Long-Term Liabilities

View Set

Macroeconomic study plan questions

View Set

Lecture 3: ASIA Sensory and Motor Examination for Patients with SCI (Cranial Nerves Added in)

View Set

ATI Health Asses 2.0: Respiratory

View Set

Research Methods: Exam 1 Topics 14-24 Dr. Hancock

View Set

CHAPTER 13 NUTRITION FOR CHILDREN AND ADOLESCENTS.

View Set