Microsoft Exam

Ace your homework & exams now with Quizwiz!

You want to prevent users from running any file with a .bat or .vbs extension unless the file is digitally signed byyour organization.How should you configure this rule in AppLocker? a) Create an executable rule with a publisher condition. b) Create an executable rule with a hash condition. c) Create a script rule with a hash condition. d) Create a script rule with a publisher condition.

Create a script rule with a publisher condition.

You are system administrator with hundreds of host workstations to manage and maintain. You need to enablehosts on your network to find the IP addresses of alphanumeric host names such as srv1.myserver.com.Which of the following would you use? a) Dynamic DNS (DDNS) server b) DHCP server c) HOSTS file d) DNS server

DNS server

You have three shared printers that are used by the sales team. To simplify administration, you use a GroupPolicy object (GPO) to deploy these printers to all sales team members.You have received a new printer to replace one of the older printers. You install the printer and deploy it in thesame GPO as the other printers. You check and find that the printer is automatically added to the sales teammembers' computers.You need to remove the printer object for the older printer from all sales team members' computers.What should you do? a) Edit the GPO and remove the specific deployed printer. b) In Print Management on the server, delete the printer object. c) On each client computer, run PushPrinterConnections.exe. d) Have each sales team member manually delete the printer object.

Edit the GPO and remove the specific deployed printer.

You manage a company network with a single Active Directory domain running on two domain controllers. The two domain controllers are also DNS servers and hold an Active Directory-integrated copy of the zone used on the private network.The network has five subnets with DHCP servers delivering IP address and other configuration to host computers. All host computers run Windows 10.You want to ensure that all client computers use the DNS server for DNS host name resolution. Hosts should not be able to automatically discover DNS host names, even for computers on their own subnet. What should you do? a) Edit the default domain Group Policy object (GPO). Enable the Turn off Multicast Name Resolution policy. b) Configure the HOSTS file on each client with the IP address of the DNS server on the local subnet. c) Configure one of your DNS servers as an authoritative DNS server. d) Configure dynamic DNS (DDNS) on your DHCP servers.

Edit the default domain group policy object (GPO). Enable the Turn off Multicast Name Resolution policy.

After configuring a password policy to require users to create strong passwords, you start to notice sticky notes stuck to monitors throughout the organization. The sticky notes often have strings of characters written on them that appear to be passwords.What can you do to prevent the security risk that this practice presents? a) Increase the minimum length for passwords. b) Educate users on how to create and remember strong passwords. c) Require users to change their passwords more often. d) Reduce the limit on the number of failed login attempts.

Educate users on how to create and remember strong passwords.

You are the administrator for the widgets.com domain. Organizational Units (OUs) have been created for eachcompany department. User and computer accounts for each department have been moved into their respectivedepartmental OUs.From your workstation, you create a GPO that configures settings from a custom .admx file. You link the GPOto the Sales OU.You need to make some modifications to the GPO settings from the server console. However, when you open theGPO, the custom administrative template settings are not shown.What should you do? a) Install PowerShell on the server. b) Right-click the Security Settings node and select Import Policy.... c) On the Administrative Template node, right-click the node and choose Add/Remove Templates....Browse and select the .admx file to add. d) Enable the Administrative Templates central store in Active Directory. Copy the .admx file to thecentral store location.

Enable the Administrative Templates central store in Active Directory. Copy the .admx file to the central store location.

You have been asked to troubleshoot a Windows workstation that is a member of your domain.The director who uses the machine said he is able to install anything he wants and change system settings on demand. He has asked you to figure out why User Account Control (UAC) is not being activated when he performs a sensitive operation.You verify that the director's user account is a standard user and not a member of the local Administrators group.You want the UAC prompt to show.What should you do? a)Set up a Group Policy that disables the installation of new hardware. b) Enable the Admin Approval mode for the Built-in Administrator account setting in the Group Policy. c) Enable the Run all administrators in Admin Approval Mode setting in the Group Policy . d) Change the Behavior of the elevation prompt for administrators in Admin Approval Mode setting in theGroup Policy to Prompt for consent. e) Check to see if UAC is configured for this account.

Enable the Run all administrators in Admin Approval Mode setting in the Group Policy .

You are the owner of the D:\Reports folder.Judith needs to be able to see the files and subfolders in the D:\Reports folder. Dalton needs to be able to dothese same things and also delete folders.You need to assign the necessary NTFS permissions to the D:\Reports folder.What should you do? a) Grant read and execute to each. b) Grant read and execute to Judith and modify to Dalton. c) Grant list folder contents to Judith and full control to Dalton. d) Grant modify to each.

Grant Read & Execute to Judith; Modify to Dalton.

You have configured a new GPO. You use a scoping method to prevent it from applying to a specific user usinga specific computer.Which tool can you use to see if your scoping method is successful? a) Group Policy Results b) Group Policy Management c) Group Policy Modeling d) Security Group Filtering

Group Policy Results

You want to prevent users in your domain from running a common game on their machines. This applicationdoes not have a digital signature. You want to prevent the game from running even if the executable file ismoved or renamed.You decide to create an AppLocker rule to protect your computer.Which type of condition should you use in creating this rule? a) Path b) Hash c) Application Identity d) Publisher

Hash

You are a technical consultant for many businesses in your community. One of your clients, a small law firm,has a single Active Directory domain and two Windows servers. Both servers are configured as domaincontrollers while also serving as file and printer servers.This client is calling you on a regular basis because users are deleting or damaging their files. You must visit theclient's site and restore the files from backup. Your client has asked you to create an alternate solution.What should you do? a) Enable incremental backups to a media other than tape. b) Train the users how to use the backup program. c) Implement shadow copies on the relevant data. d) Mirror the system drive

Implement shadow copies on the relevant data.

You manage a network with a single location. You want to use WSUS to make sure that only approved updatesare applied to all client computers. Client computers should download all approved updates from the MicrosoftUpdate website.You install WSUS on one server. You synchronize the list of updates on the server and approve the updates thatyou want applied to client computers.You check the client computers and find that they are downloading updates from the Microsoft Update website,but they are downloading updates that you have not approved.What should you do? a) In a GPO that applies to all client computers, edit the Specify intranet Microsoft Update servicelocation policy and specify your internal WSUS server. b) Configure the WSUS server to store update files locally. c) In a GPO that applies to all client computers, enable the Configure Automatic Updates policy. d) In a GPO that applies to all client computers, edit the Enable client-side targeting policy and specify the Unassigned Computers group

In a a GPO that applies to all client computers, edit the Specify intranet Microsoft Update service location policy and specif your internal WSUS server

You have decided to install third-party anti-malware software on your Windows notebook system.During the installation, the installer warns you that the third-party anti-malware conflicts with WindowsDefender, which is already running on the system.Which tool do you use to disable Windows Defender so you can proceed with the installation? a) Programs and Features b) Windows Defender Tools c) Local Group Policy Editor d) Settings App

Local Group Policy Editor

You have a folder on your Windows server that you would like to share with members of your developmentteam. Users should be able to view and edit any file in the shared folder.You share the folder and give everyone full control permission to the shared folder.Users connect to the shared folder and report that they can open the files, but they cannot modify any of the files.What should you do? a) Create new user accounts for each user and assign the necessary folder permissions. b) Install Samba on your server and then configure permissions using Samba. c) Modify the NTFS permissions on the folder. d) Create a group and make all user accounts members of the group. Grant full control share permissionsto the group.

Modify the NTFS permissions on the folder.

You are a domain administrator for a large multi-domain network. There are approximately 2,500 computers inyour domain. Organizational Units (OUs) have been created for each department. Group Policy objects (GPOs)are linked to each OU to configure department-wide user and computer settings.While you were on vacation, another 20 computers were added to the network. The computers appear to befunctioning correctly with one exception: the computers do not seem to have the necessary GPO settingsapplied.What should you do? a) Force the user to log out and restart the computer. b) Move the computer accounts from their current location to the correct OUs. c) Verify that the GPOs are linked to the correct OUs. d) Re-apply the GPO to the OUs. e) Remove them from the domain and rejoin them. f) Delete and recreate the computers' accounts.

Move the computer accounts from their current location to the correct OUs.

You configured the IP address and DNS name of a new internal web server named WEB3. Your first test from aweb browser on your workstation was successful. But when you came to work this morning, you were not ableaccess WEB3 from the same workstation using the same browser. You get an error that this site cannot bereached.You have not changed the server's IP configuration since the successful test of the night before. You ping WEB3using its IP address, and you get a response back. Next, you ping WEB3 using its fully qualified domain name(FQDN), and you get a message indicating that the host could not be found.What can you assume from this message? a) Something is wrong with your workstation's IP configuration. b) Name resolution is not working properly. c) Something is wrong with WEB3's IP configuration. d) Something is wrong with connectivity somewhere in the network infrastructure.

Name resolution is not working properly.

You are the administrator for a network with a single Active Directory domain named widgets.local. Thewidgets.local domain has an organizational unit object for each major department in the company, including theinformation systems department. User objects are located in their respective departmental OUs. Users who aremembers of the Domain Admins group belong to the Information Systems department. However, not allemployees in the Information Systems department are members of the Domain Admins group.To simplify employees' computing environment and prevent problems, you link a Group Policy object (GPO) to the widgets.local domain that disables the control panel for users.How can you prevent this Group Policy object from applying to members of the Domain Admins group? a) On the Group Policy object's access control list, deny the read permission for members of the DomainAdmins group. b) Link the Group Policy object to each organizational unit rather than to the domain. c) On the Group Policy object's access control list, deny the apply Group Policy permission for members of the Domain Admins group. d) Configure the Information Systems OU to block policy inheritance. e) Link the Group Policy object to each organizational unit (except the Information Systems OU) ratherthan to the domain.

On the Group Policy object's access control list, deny the Apply Group Policy permission for members of the Domain Admins group.

You have implemented a network where each device provides shared files with all other devices on the network. What type of network do you have?

Peer-to Peer

You have a computer running Windows.Prior to installing some software, you turn off User Account Control (UAC), reboot the computer, and install thesoftware. You turn UAC back on, but it does not prompt you before performing sensitive actions.You want the protection of UAC, but it is not working at all.What should you do? a) Enable UAC. b) Log in as an administrator and turn UAC off and then back on. c) Uninstall the software and re-enable UAC. Reinstall the software. d) Reboot the machine.

Reboot the machine.

To save disk space on your Windows Server 2016 system, you decide to remove unneeded roles and features.Which Windows feature can you use to do this? -Windows Deployment Services -Features on Demand -Remove Roles and Features -Windows Server Update Server

Remove roles and features

You have a Windows server that is maintained by multiple administrators.Sally wants to access a file in the Reports folder. A group named Sales has been granted the full controlpermission to the Reports folder and all subfolders and files.You add Sally as a member of the Sales group, but she still cannot access the file that she needs.You want to let Sally access the Reports folder. What should you do? a)Remove Sally from the Sales group and then add her to the Sales group again. b) Create a new group, give it rights to the Reports folder, and then add Sally to the group. c) Delete and recreate Sally's user account on the local computer. d) Remove Sally from any other groups that have been explicitly denied access to the Reports folder.

Remove sally from any other groups that have been explicitly denied access to the Reports folder.

You have connected a print device to Srv4 and created a printer for it. You have shared the printer as Printer1and published it to Active Directory.You assign the allow print permission for the printer to the Help Desk Technicians domain local group.However, you discover that users who are not members of the Help Desk technicians group can print to theprinter.You want only members of the Help Desk Technicians group to print to Printer1.What should you do? a) Assign the Everyone group the deny print permission to the printer. b) Create a second printer that refers to the same print device. Grant permission to print to the printer tothe Help Desk Technicians domain local group only. c) Remove the Everyone group from the printer's access control list. d) Edit the properties of Printer1 and clear the List in the directory option. e) Remove the printer from the Everyone group and add it to the Help Desk Technicians domain localgroup.

Remove the Everyone group from the printer's access control list.

You have a laptop that you use for remote administration from home and while traveling. The laptop has been joined to the domain using the name of Admin Remote.The processor in your laptop overheats one day, causing extensive damage. Rather than repair the computer, you purchase a new one.The computer arrives, and you edit the system properties and name it Admin Remote. When you try to join the computer to the domain, you receive an error message and are unable to proceed.What should you do? a) Edit the computer account properties in Active Directory. Grant your user account permissions to join the computer to the domain. b) Reset the computer account in Active Directory. c) Rename the computer and then join the domain. Delete the existing computer account in Active Directory. Rename the new computer account object in Active Directory to Admin Remote d) .On the laptop, run the netcom join command.

Reset the computer account in Active Directory.

You have a computer that runs Windows connected to a domain network. One day, you find that the computer isunable to connect to the Internet, although it can communicate with a few other computers on the local subnet.You run the ipconfig command and find that the network connection has been assigned the address of169.254.12.155 with a mask of 255.255.0.0.What can you try as first step to resolve this issue? a) In the Network Connections window, enable the local area connection. b) Run the ipconfig /flushdnscommand. c) Run the ipconfig /release and ipconfig /renew commands. d) Ensure that the network cable is connected to your computer

Run the ipconfig /release and ipconfig /renew commands.

You are installing DHCP in four subnets. Three of the subnets have Windows desktop computers, and the fourthsubnet has only Windows laptop computers.On the subnet with the laptops, you want any computer that has not logged on in two days to release its IPaddress. On the desktop subnets, you want computers that have not logged on in 30 days to release their IPaddresses.How should you configure the DHCP scopes? a) Set up one scope for the three desktop subnets and another scope for the laptop subnet. Set theappropriate lease period for each scope. b) Set up one scope for each subnet and set the lease period as a part of each scope's configuration. c) Set up one scope for the entire network with a 30-day lease and exclude the laptop computers. d) Set up one scope for the entire network and set the lease for each subnet

Set up one scope for each subnet and set the lease period as a part of each scope's configuration.

Your Windows server has a folder named D:\SalesDept. The D: drive is formatted with FAT32.You need to allow network access to the folder as follows:Members of the Sales group should have read-only access to the content in the folder.Members of the SalesAdmin group should be able to open, edit, and add new files to the folder.No other users should have access.Members of the SalesAdmin group are also members of the Sales group.What can you do to configure the needed access while assigning as few permissions as possible? a) Share the SalesDept folder. Grant the read permission to the Sales group and the change permission tothe SalesAdmin group. b) Share the SalesDept folder. Grant the read permission to the Sales group and the change permission tothe SalesAdmin group. Remove Everyone from the access control list. c) Share the SalesDept folder. Grant the read permission to the Sales group and the full control permissionto the SalesAdmin group. Remove Everyone from the access control list. d) Share the SalesDept folder. Grant the read permission to the Sales group and the full control permission to the SalesAdmin group

Share the SalesDept folder. Grant Read permission to the Sales group and Change permission to the SalesAdmin group. Remove Everyone from the access control list.

You have a single router with three subnets as follows:SubnetA = 50 hostsSubnetB = 15 hostsSubnetC = 65 hostsYou need to select a subnet mask for each subnet that provides sufficient host addresses without wastingaddresses.Which mask values should you use? -SubnetA = 255.255.255.192 SubnetB = 255.255.255.224 SubnetC = 255.255.255.128 -SubnetA = 255.255.255.128 SubnetB = 255.255.255.240 SubnetC = 255.255.255.192 -SubnetA = 255.255.255.224 SubnetB = 255.255.255.240 SubnetC = 255.255.255.192 -SubnetA = 255.255.255.64 SubnetB = 255.255.255.32 SubnetC = 255.255.255.64

SubnetA = 255.255.255.192 SubnetB = 255.255.255.224 SubnetC = 255.255.255.128

You are the network administrator for westsim.com, and you manage a server named App1 that is running an application that uses a service named Custom App Service.This service is required to contact an internal database running on a server named SQL1. After installing the application, you determine that Custom App Service is not able to contact SQL1. You need to enable the CustomApp Service to contact SQL1.What should you do? -You should create a custom rule using Windows Firewall with Advanced Security. -You should add the App1 computer account to the local Administrators group on SQL1. -You should configure a managed service account in Active Directory and then specify the managedservice account user name and password in the properties of Custom App Service. -You should add the App1 computer account to the Windows Authorization Access Group builtin localgroup.

You should create a custom rule using Windows Firewall with Advanced Security.

39After you install Windows Server 2016, you must activate the server if you want to receive updates fromMicrosoft to keep your server secure and running smoothly. You have a 30-day grace period in which to activatethe server. The vendor who sold the Windows Server license should provide a piece of information that you needto activate your installation.Which of the following do you need to activate your Windows server? -The product key -The access code -The product license -The activation code -The update key

a product key

You manage a network with a single domain named eastsim.com. The network currently has three domaincontrollers.During installation, you did not designate one of the domain controllers as a global catalog server. Now youneed to make the domain controller a global catalog server.Which tool should you use to accomplish this task? a) Active Directory Users and Computers or Active Directory Sites and Services b) Active Directory Sites and Services c) Active Directory Domains and Trusts d) Active Directory Domains and Trusts or Active Directory Sites and Services e) Active Directory Users and Computers

a) Active Directory Users and Computers or Active Directory Sites and Services

You currently manage a virtual machine named VM12 that has been installed on the Srv5 physical server. Thevirtual machine uses a single fixed disk of 100 GB saved in the vdisk1.vhd file.Physical disk space on the server is getting low. When you run Disk Management within the virtual machine,you notice that only 30 GB of space is being used, but the vdisk1.vhd file occupies 100 GB.You want to reduce the physical size of the virtual hard disk.What should you do? a) Convert the disk to a dynamically expanding disk named vdisk2.vhd. Delete vdisk1.vhd, and changevdisk2.vhd's name to vdisk1.vhd. b) Convert the disk to a dynamically expanding disk named vdisk2.vhd. Compact the disk. c) Convert thedisk to a fixed disk named vdisk3.vhd. Delete vdisk1.vhd and change vdisk3.vhd's name to vdisk1.vhd. d) Compact the disk. e) Create a differencing disk named vdisk2.vhd using vdisk1.vhd as the parent disk. Reconfigure thevirtual server to use vdisk2.vhd instead of vdisk1.vhd.

a) Convert the disk to a dynamically expanding disk named vdisk2.vhd. Delete vdisk1.vhd, and changevdisk2.vhd's name to vdisk1.vhd.

You are planning a server virtualization implementation using Hyper-V. Your virtualization solution must meetthe following requirements: -Both 32-bit and 64-bit operating systems will be installed as virtual machines. -You need to install two virtual machines. -Virtual machines must be able to communicate with each other. -Virtual machines must be able to communicate with the host operating system. -Virtual machines must not be able to communicate with other network devices. What should you do? a) Create a private network b) Create a host network c) Create an external network d) Create an internal network

a) Create a private network

You are configuring a NIC team that is being used for failover only and not bandwidth aggregation.Which NIC teaming configuration must you use? a) Switch-independent teaming b) Link aggregation control protocol teaming c) Static teaming d) Switch-dependent teaming

a) Switch-independent teaming

You need to create a storage space on a Windows server that will store files used by the research and development employees in your organization.Because the data stored in the storage space is vital to the success of your organization, you decide to use three-way mirroring to provide redundancy for the storage space. To enhance redundancy, you decide to use the enclosure awareness feature of Windows Server to mirror data between multiple storage enclosures. Because of the critical nature of the data, you need the storage space to be able to tolerate up to two failed enclosures.How many compatible storage enclosures will be required to meet these design requirements? a) 2 b) 5 c) 3 d) 4

b) 5

You manage a group of 10 Windows workstations that are currently configured as a workgroup. Which are advantages you could gain by installing Active Directory and adding the computers to a domain?(Select two.) a) Decreased implementation cost b) Centralized authentication c) Reduced need for specialized hardware d) Centralized configuration control e) Increased local control of workstation settings

b) Centralized authentication d) Centralized configuration control

You are the network administrator for your company. Your network consists of two Active Directory domains,research.westsim.local and sales.westsim.local.Your company has two sites, Dallas and Houston. Each site has two domain controllers, one domain controllerfor each domain.Users in Houston who are members of the sales.westsim.local domain report slow performance when logging inand accessing files in Dallas. Users in Dallas do not report any problems logging in and accessing localresources. You want all users in Houston to experience adequate login and resource access response time.What should you do? a) Decrease the site link cost between the two sites. b) Configure one of the domain controllers in Houston to be a global catalog server. c) Increase the replication frequency between the two sites. d) Enable universal group membership caching in Houston.

b) Configure one of the domain controllers in Houston to be a global catalog server.

You are the administrator of the eastsim.com domain, which has two domain controllers. Your Active Directory structure has organizational units (OUs) for each company department.You have assistant administrators who help manage Active Directory objects. For each OU, you grant one of your assistants Full Control over the OU. You come to work one morning to find that while managing some user accounts, the administrator in charge of the Sales OU has deleted the entire OU. You restore the OU and all of its objects from a recent backup.You want to configure the OU to prevent accidental deletion. You edit the OU properties, but can't find the Protect object from accidental deletion setting.What should you do so you can configure this setting? a)Use the Delegation of Control wizard to delegate control of the Sales OU to your user object. b) In Active Directory Users and Computers, select View > Advanced Features. c) Log on as a member of the Domain Admins group. d) Raise the domain functional level to Windows Server 2016.

b) In Active Directory Users and Computers, select View > Advanced Features.

The Srv1 server runs Hyper-V and has several virtual servers installed. Currently, most virtual servers are usedfor testing purposes.The physical system is running out of memory because of all of the virtual machines that are currently active.You want to stop three virtual machines to free up system resources.You want to stop the virtual machines so that all open applications are still open and running when they startagain.What should you do? a) Shut down the virtual machine. b) Save the virtual machine. c) Turn off the virtual machine. d) Take a snapshot.

b) Save the virtual machine.

Srv7 has a single 500 GB hard disk installed. A single volume named System uses all 100 GB on the disk andholds the operating system and system files.You need to configure disk storage as follows:You want to create a second volume named Data that is 1 TB in size.You want to add fault tolerance to both the System and the Data volumes.If possible, you want both volumes to provide increased performance.You will add additional 1 TB hard disks to the system as necessary to meet these goals. You want to add theminimum number of hard disks.How many disks should you add? a) 2 b) 3 c) 4 d) 5

c) 4

You currently manage a virtual machine named VM18 that has been installed on the Srv5 physical server. Thevirtual machine uses a single dynamic disk of 100 GB.You notice that the physical size of the virtual hard disk is 40 GB, but that the virtual machine reports only atotal of 20 GB of files.You want to reduce the physical space used by the virtual hard disk.What should you do? a) Create a differencing disk using the virtual machine's disk as the parent disk. b) In the virtual machine, defragment the hard disk. c) Compact the disk. d) Convert the disk to a fixed disk with a smaller size.

c) Compact the disk.

You currently use a Windows 7 desktop system. You have been asked to evaluate Windows 10 as a possibleupgrade for the Windows 7 systems you manage.You decide to install Windows 10 in a VHD file on your Windows 7 system. To ensure that the evaluation isrealistic, you need to ensure the best possible performance.Which type of VHD file should you use? a) Thin provisioned b) Dynamically expanding c) Fixed size d) VHDX

c) Fixed size

You need to enable data deduplication on your server's data volume. You add the Data Deduplication role service and then use the DDPEval.exe utility to analyze server volumes for data deduplication. Now you need to use Server Manager to configure data deduplication on the data volume.Which of the following steps are part of the configuration process? (Select three.) a) Specify the amount of built-in redundancy to be used for critical metadata. b) Enable the garbage collection schedule. c) Specify the extensions of any file types that should not be deduplicated. d) Specify the degree of optimization that should be enforced. e) Enable data deduplication. f) Enable the scrubbing schedule. g) Specify the number of days that should elapse from the date of file creation until files are deduplicated.

c) Specify the extensions of any file types that should not be deduplicated. e) Enable data deduplication. g) Specify the number of days that should elapse from the date of file creation until files are deduplicated.

You are installing Windows Server 2016 on a system with a clean hard drive. The hard drive contains no datafiles or operating system files. Which installation type should you choose? -Upgrade -New server -Custom -Standard

custom

Srv7 currently has a single hard disk. The System volume takes up the entire hard disk.You need to create a new volume named Data for storing files used by applications running on the server. You want the new volume to optimize performance. Fault tolerance is not necessary for this volume.What should you do? a) Add two hard disks. Convert both disks to dynamic. Create a new spanned volume using both disks. b) Add three hard disks. Convert all disks to dynamic. Create a new RAID 5 volume using all disks. c) Add two hard disks. Convert both disks to dynamic. Create a new mirrored volume using both disks. d) Add two hard disks. Convert both disks to dynamic. Create a new striped volume using both disks.

d) Add two hard disks. Convert both disks to dynamic. Create a new striped volume using both disks.

You want to configure a Windows computer to boot to a Windows 10 installation on a VHD file. You will use the image on the Windows installation disk.You have downloaded the Windows AIK tools. You create a virtual disk file using Disk Management.What should you do next? a) Run ImageX to apply the boot.wim image to the VHD. b) Run ImageX to apply the install.wim image to the VHD. c) Run BCDBoot to copy boot files to the VHD file. d) Attach the VHD. e) Run DiskPart and configure the partition in the VHD as active.

d) Attach the VHD.

You are the administrator of the eastsim.com domain. Your Active Directory structure has organizational units(OUs) for each company department. You have assistants who help with resetting passwords and managinggroup membership.You also want your assistants to help create and delete user accounts.Which of the following tools can you use to allow your assistants to perform these additional tasks? a) Active Directory Users and Computers b)Active Directory Account Manager c) Active Directory Administrative Center d) Delegation of Control Wizard

d) Delegation of Control Wizard

You are working in Hyper-V Manager on a system that hosts several Windows Server 2008 R2 virtual machines.You create snapshots of these virtual machines nightly as part of your disaster recovery plan.Users are complaining that they can no longer access the virtual servers. In Hyper-V Manager, they are identified as being in a Paused-Critical state.What should you do? (Select two. Each answer is a part of the overall solution.) a) Reconfigure the virtual machines to use the new drive as a pass-through disk. b) Revert the virtual machines to the most recent snapshot. c) Reboot the hypervisor system. d) Install a new physical hard disk in the hypervisor host. e) Move the snapshot files to the new hard disk. f) Upgrade the virtual machines to Windows Server 2012 R2.

d) Install a new physical hard disk in the hypervisor host. e) Move the snapshot files to the new hard disk.

You are the administrator for a small network. You have approximately 50 users who are served by a single Windows server. You are providing Active Directory, DNS, and DHCP with this server. Your clients all use Windows workstations.Last week, an employee quit. A replacement has been hired and will be starting next Monday. The new user will need to have access to everything the previous user had, including document files held in the Home folder. You need to set up an account for the new user that all the access required.What should you do? a) Create an account for the new user and transfer ownership of the files to the new account. b) Create an account for the new user and copy the files to their new home folder. c) Delete the existing account. Create a new account and take ownership of the old user's files. d) Rename the existing account, changing the name fields to match the new employee. e) Copy the existing account and then change the appropriate fields.

d) Rename the existing account, changing the name fields to match the new employee.

You are the network administrator for Corpnet.com. You have several virtual machines hosted on a VMware platform. You have installed a new Windows server that has the Hyper-V role installed. You need to migrate theVMware virtual machines to Hyper-V.What should you do? a) Use the Disk2VHD tool. b) Use the Microsoft Assessment and Planning (MAP) toolkit. c) Use the Application Compatibility toolkit (ACT). d) Use the Microsoft Virtual Machine Converter (MVMC) tool.

d) Use the Microsoft Virtual Machine Converter (MVMC) tool.

You are in the process of configuring an iSCSI storage area network (SAN) for your network.You want to configure a Windows server to connect to an iSCSI target defined on a different server system. You also need to define iSCSI security settings, including CHAP and IPsec. Which tool should you use? a) Multipath I/O b) iSCSI Initiator c) Internet Storage Name Service (iSNS) d) iSCSI under File and Storage Services in Server Manager

d) iSCSI under File and Storage Services in Server Manager

When Active Directory is installed, several containers are created by default.Which default container would you be able to apply a Group Policy to? a) Computers container b) Domain Controllers OU c) Users container d) Builtin container

domain controllers ou

You are the network administrator of a network that spans three locations, Atlanta, Chicago, and Denver. Your organization started in Atlanta, and that's where you installed your first Active Directory domain controller. The Chicago and Denver locations were later added to the domain with their own domain controllers. These three locations each have their own subnet and are connected using dedicated WAN links.You have used Active Directory Sites and Services to change to the name of the Default-First-Site-Name to Atlanta, but that's all you've done so far. The IT manager wants you to continue configuring Active Directory Sites and Services to direct clients to local network resources for authentication. He does not want you to manage replication traffic at this time.Which of the following steps must you perform to complete this configuration? (Select three.) a) Create server objects for Chicago and Denver. b)Create site objects for Chicago and Denver. c) Configure inter-site transport links between Atlanta, Chicago, and Denver site objects. d) Create subnet objects for Chicago, Denver, and Atlanta, and then link them to their respective server objects. e) Create subnet objects for Chicago, Denver, and Atlanta, and then link them to their respective sites. f) Move the Chicago and Denver server objects into their respective site objects. g) Move the Chicago and Denver server objects to their respective subnet objects.

e) Create subnet objects for Chicago, Denver, and Atlanta, and then link them to their respective sites. b)Create site objects for Chicago and Denver. f) Move the Chicago and Denver server objects into their respective site objects.

Which of the following PowerShell cmdlets is used to retrieve information about an existing object? -info -get -set -help

get

Mary is in charge of DNS administration for her network. The private network consists of a single Active Directory domain called private.westsim.com. DNS data is stored in an Active Directory-integrated zone.The sales department has just installed a web server called Sales Web. This server will host an intranet site for use by the sales team. They want this server to be accessible using the URL sales.westsim.com.What should Mary do? a) In the westsim.com domain, create a CNAME record called sales. IdentifySalesWeb.private.westsim.com as the target. b) In the private.westsim.com domain, create a PTR record that identifies sales.westsim.com as thealternate URL for the SalesWeb server. c) Place HOSTS files on each workstation in the sales department. Create an entry with the IP address forSalesWeb that references the sales.westsim.com name. d) Create a second A record in the private.westsim.com domain. Use Sales as the name. Identify the IPaddress of SalesWeb in the resource record.

in the westsim.com domain, create a CNAME record called sales. Identify SalesWeb.private.westsim.com as the target.

After reconfiguring the static address of an internal web server named WEB3, your computer can no longerconnect to WEB3. However, other users are still able to connect to the same web server.You suspect that your computer still has the old IP address for WEB3 in its DNS cache.Which command can you use to verify that this is the case before clearing the DNS cache on your computer? a) ipconfig /release b) ipconfig /displaydns c) ipconfig /renew d) ipconfig /flushdns

ipconfig /displaydns

You are managing rights on a standalone server. You want to make changes to the settings of the Restore Filesand Directories policy.Which of the following is the tool you must use to make changes to this policy? a) User Rights Policy Editor b) Local Group Policy Editor c) Local Security Policy Editor d) Group Policy Management Editor

local group policy editor

You've been assigned to manage a Windows Server system named AccServer. This server was deployed using aServer Core installation.You need to make several configuration changes to the system.Which utility could you use to do this? -PowerShell -Hyper-V Manager -Server Manager -Computer Management

power shell

You are visiting one of your company's branch offices to set up a new server and complete some general servermanagement tasks. Employees in the branch office tell you they have been experiencing intermittent issuesaccessing a server in the home office.You send ICMP requests to the server at the home office from a workstation at the branch office using ping withthe -t option. As it continues to send ping requests and receive replies, you find that the ping request times outevery few minutes. You suspect that one of the routers between the branch office and the home office may beexperiencing issues.Which troubleshooting tool can you use from a Windows workstation to see a map of the routers between thebranch office and the home office? a) nslookup b) ping -route c) ipconfig d) tracert

tracert

You are the administrator of a network with a single Active Directory domain.You need to create 75 user accounts in the domain Users container. You have a list of new user accounts thatinclude an IP telephone number. The user accounts are available via an export from your company's HRapplication in the form of a comma-delimited file.You want to create the new accounts as quickly and easily as possible.What should you do? a) Create the new user accounts with Dsadd contact by parsing the .csv file. b) Create the new user accounts with Dsadd user by parsing the .csv file. c) Use Csvde to import user accounts using the .csv file. d) Create the new user accounts using Active Directory Users and Computers.

use Csvde to import user accounts using the .csv file.

Which of the following are features or benefits specific to a Windows Server 2016 Server Core deployment?(Select two.) -Reduced system requirements -Graphical user interface -Stable environment -PowerShell -Remote desktop management

-reduce system requirements -Stable environment

39You are in charge of managing several servers. Your company requires many custom firewall rules in WindowsFirewall with Advanced Security.What should you do? -Configure firewall settings in Group Policy. Apply the GPO so that it applies to all applicable servers. -Use Secedit.exe to import a custom security policy. -Configure each computer individually. -Create a PowerShell script that applies the firewall setting each time a server boots. Apply this script toall applicable servers.

Configure firewall settings in Group Policy. Apply the GPO so that it applies to all applicable servers.

You are an administrator for a company that uses Windows servers. In addition to Active Directory, you also provide file and print services, DHCP, DNS, and email services. There is a single domain and a single site. There are two member servers, one that handles file and print services only, and one database server. You are considering adding additional servers as business increases.Your company produces mass mailings for its customers. The mailing list and contact information provided to your company by its clients is strictly confidential. Because of the private information sometimes contained in the data (one of your clients is a hospital), and because of the importance of the data to your operation, the data can also be considered a trade secret. You want to ensure the data stored on your member servers is only accessed by authorized personnel for business purposes. You've set file permissions to restrict access, but you want to track the authorized users.How should you configure your security policy to track access to the data files? a) Configure system events auditing on the domain controllers. b) Configure object access auditing in a GPO and link it to the domain. c) Configure object access on the database server. d) Configure object access auditing in a GPO and link it to the Domain Controllers OU. e) Configure logon access auditing in a GPO and link it to the Domain Controllers OU.

Configure object access auditing in a GPO and link it to the domain.

Which NIC Teaming configuration option uses the IEEE 802.1ax Link Aggregation Control Protocol (LACP) toidentify the links that form the team? -Static teaming -Switch-independent mode -Generic teaming -Dynamic teaming -Address hashing

Dynamic Teaming

You are the manager for Windows servers at your company. You have configured Windows Server Backup totake regular backups once per day and save those backups to an external disk.You find that users working on a new project are constantly overwriting files and asking you to restore olderversions of files that exist on backups from as far back as a week ago. You would like to implement a solutionthat allows users to restore files without an administrator's help.What should you do? a) Configure a scheduled task to save backups to rewriteable DVDs in an automatic disc changer. b) Teach users how to recover files from the daily backups. c) Add the Indexing Service role service to the server. d) Enable VSS on the volume that holds user data.

Enable VSS on the volume that holds user data.

Your network has a single domain named southsim.com. DNS data for the domain is stored on the following servers:DNS1 holds the primary zone for southsim.com.DNS2 and DNS3 hold secondary zones for southsim.com. All three DNS servers are located on domain controllers. The DNS zone for the domain is configured to allow dynamic updates.You want to allow client computers to send DNS updates to any of the three servers and allow any of the three servers to update DNS records in the zone. What should you do? a) On all three servers, change the zone type of the DNS zone to Active Directory-integrated. b) On the primary zone, change the Dynamic Update option to allow only secure updates. c) On the primary zone, change the settings to allow zone transfer to only the two secondary servers. d) On the primary zone, change the settings so that the two secondary servers are notified when the zone isupdated.

On all three servers, change the zone type of the DNS zone to Active Directory-integrated.

You are the network administrator for Corpnet.com. A small group of software developers in your organizationhave to use Linux workstations. You are creating a share for these Linux users on your file server, which isnamed File1.Which feature must be installed on the Windows server to accomplish this? a) BranchCache b) Server for NFS c) Client for NFS d) Active Directory Certificate Services

Server for NFS

Which is an advantage of a client/server network?

The network is inexpensive to implement

Which Hyper-V feature found in Windows Server provides temporary memory that allows a virtual machine torestart even when there is not enough physical memory available? a) Resource Metering b) Resource Control c) Smart Paging d) Dynamic Memory

c) Smart Paging

You have completed the installation of Windows Server 2016.Which of the following tasks is best to perform before joining the server to an Active Directory domain? -Configure Windows Firewall. -Install updates. -Change the workgroup name. -Change the computer name.

change the computers name

Which of the following are used in PowerShell to specify an option in the command? -Providers -Nouns -Flags -Keywords -Cmdlets

flags

Which is the typical syntax of a PowerShell command? -noun-verb -noun - adverb -noun-verb -adverb -verb-adverb -noun -verb-noun -adverb

verb-noun-adverb

The Large Block Corporation has a network with three subnets. The network has a DNS server that provides name resolution.Stacy has been asked to implement a DHCP solution for her network. Currently, all hosts use manually-configured static IP addresses. She installs a DHCP server and configures it to deliver IP address, defaultgateway, and DNS server configuration information.What must Stacy do at each client to complete the configuration? (Select two.) -Enable DHCP proxy services on each client. -Configure each host to obtain DNS server address automatically. -Configure each host to append parent suffixes of the primary DNS suffix -.Configure each host to obtain an IP address automatically.

-.Configure each host to obtain an IP address automatically. -Configure each host to obtain DNS server address automatically.

You are the administrator for a network with two domains, westsim.com and sales.westsim.com. You have a shared folder called Reports on the Sales1 server in the sales.westsim.com domain. The following two users need access to this shared folder:Mark in the westsim.com domain Mary in the sales.westsim.com domain You create a global group called Sales in westsim.com. You grant this group the necessary permissions to the Reports shared folder. You add Mark as a member of the group; however you are unable to add Mary as a groupmember. What should you do? (Select two. Each choice is a possible answer.) a) Delete the existing group. Create a global group in sales.westsim.com. Add Mark and Mary as members andassign permissions to the share. b) Delete the existing group. Create a domain local group in sales.westsim.com. Add Mark and Mary asmembers and assign permissions to the share. c) Delete the existing group. Create a domain local group in westsim.com. Add Mark and Mary as members and assign permissions to the share. d) Convert the group to a universal group. e) Convert the group to a domain local group.

-Convert the group to a universal group. -Delete the existing group. Create a domain local group in sales.westsim.com. Add Mark and Mary as members and assign permissions to the share.

You get a call from a user one day telling you that his password no longer works. As you inquire about the reasons why the password doesn't work, he tells you that yesterday he got a call from an administrator asking forhis user account password, which he promptly supplied.You know that a legitimate administrator would have never made this request. You are concerned that the impersonator might have contacted other users with the same request. To protect your network, you would like to reset all user account passwords and force users to change their passwords at next login.You want to accomplish this as quickly as possible. What should you do? (Select two. Each choice is a possible solution.) a) Create a script that runs Dsmod. Specify the new password and account properties in the script. Run the script. b) Run Csvde to export user account information. Edit the .csv file to modify the user account properties and passwords. Run Csvde to modify the existing user accounts. c) In Active Directory Users and Computers, select all affected user accounts. Right-click the user accounts toreset the passwords and force the password change at next logon. d) Run Ldifde to export user account information. Edit the .ldif file to modify the user account properties and passwords. Run Ldifde to modify the existing user accounts.

-Create a script that runs Dsmod. Specify the new password and account properties in the script. Run the script.ANDD.) -Run Ldifde to export user account information. Edit the .ldif to modify the user account properties and passwords. Run Ldifde to modify the existing user accounts.

You are the manager of the eastsim.com domain. Your Active Directory structure has organizational units (OUs)for each company department. Assistant administrators help you manage Active Directory objects. For each OU,you grant one of your assistants full control over the OU. You come to work one morning to find that while managing some user accounts the administrator in charge of the Sales OU has deleted the entire OU. You restore the OU and all of its objects from a recent backup.You want to make sure that your assistants can't delete the OUs they are in charge of.What should you do? (Select two. Each choice is a possible solution.) a) Edit the properties for each OU to prevent accidental deletion. b) Edit the properties for each OU. For the OU administrators, allow all permissions, but deny full control permissions. c) Edit the properties for each OU. For the OU administrators, deny the delete all child objects permission. d) Edit the properties for each OU. For the OU administrators, grant full control permissions but apply the permissions to this object only. e) Remove full control permissions from each OU. Run the Delegation of Control wizard for each OU, granting permissions to perform the necessary management tasks.

-Edit the properties for each OU to prevent accidental deletion. -Remove full control permissions from each OU. Run the Delegation of Control wizard for each OU, granting permissions to perform the necessary management tasks.

You are the network administrator of a small network consisting of three Windows servers and 150 Windowsworkstations. Your network has a password policy in place with the following settings: -Enforce password history: 10 passwords remembered -Maximum password age: 30 days -Minimum password age: 0 days -Minimum password length: 8 characters -Password must meet complexity requirements: Disabled -Store password using reversible encryption: Disabled One day, while sitting in the cafeteria, you overhear a group of co-workers talk about how restrictive the password policy is and how they have found ways to beat it. When required to change the password, they simply change the password 10 times at the same sitting. Then they go back to the previous password.Your company has started a new security crackdown, and passwords are at the top of the list. You thought youhad the network locked down, but now you see that you need to put an end to this practice. Users need to havepasswords that are a combination of letters and numbers and do not contain a complete dictionary word. Usersshould not be able to reuse a password immediately.What should you do? (Choose two. Each answer is part of the solution.) a) Enable the Minimum password age setting. b) Schedule a meeting with each co-worker's supervisor to explain that the co-worker is violating the corporate security policies. c) Enable the Store password using reversible encryption setting. d) Schedule a meeting with the co-worker to explain the password policy in more detail and explain why it is in place. e) Enable the Password must meet complexity requirements setting.

-Enable the password must meet complexity requirements setting -Enable the minimum password age setting

You are the security administrator for your organization. Your multiple domain Active Directory forest usesWindows Server domain controllers and member servers. The computer accounts for your member servers arelocated in the Member Servers OU. Computer accounts for domain controllers are in the Domain ControllersOU.You are creating a security template that you plan to import into a GPO. You want to log all domain useraccounts that connect to the member servers.What should you do to be able to check each server's log for the events? (Choose two. Each choice is a required part of the solution.) a) Enable the logging of object access events. b) Enable the logging of logon events. c) Enable the logging of account logon events. d) Link the GPO to the Domain Controllers OU. e) Link the GPO to the Member Servers OU. f) Enable the logging of system events.

-Link the GPO to the Member Servers OU -Enable the logging of Logon events

You are consulting with the owner of a small network that has a Windows server functioning as a workgroupserver. There are six Windows desktop computers. There is no Internet connectivity.The server contains possibly sensitive information, so the owner wants to make sure that no unauthorized accessoccurs. You suggest that auditing be configured so that access to sensitive files can be tracked.What can you do to make sure that the files generate audit results? (Choose three. Each correct answer is part ofthe required solution.) a) Make sure the properties on the Security log allow writes by all users. b) Make sure the files to be audited are on NTFS partitions. c) Make sure the Object Access auditing policy is configured for success and failure. d) Make sure the correct users and groups are listed in the auditing properties of the files. d) Make sure the account you logged into has permission to read the security log.

-Make sure the Audit File System policy is configured for success and failure -Make sure the files to be audited are on NTFS partitions -Make sure the correct users and groups are listed in the File System policy.

You are the administrator of a large network. You have one location serving several thousand users. You have100 Windows servers. Your users are using Windows desktops.You are installing another server into the network. The server's role is as a web server that will be hosting thecompany intranet site.The server will require an IP address on the 10.1.1.0 /24 subnet. At present, this subnet contains only servers,and one of the servers is providing addresses through DHCP. You need to assign this server an IP address.How should you assign the IP address to the web server? (Choose two. Each answer is a complete solution.) a) Manually configure the IP address on the web server. Create a reservation on the DHCP server. b) Configure the web server to use DHCP. Create an exclusion on the DHCP server. c) Configure the web server to use DHCP. Create a reservation on the DHCP server. d) Manually configure the IP address on the web server. Create an exclusion on the DHCP server. e) Configure the web server to use DHCP.

-Manually configure the IP address on the Web server. Create an exclusion on the DHCP server. -Configure the Web server to use DHCP. Create a reservation on the DHCP server.

You are the administrator of a network with a single subnet. A single Windows server (Srv1) on Subnet1 is thedomain controller, DNS server, and DHCP server.Due to recent expansion, you are adding a second subnet. The second subnet is connected to the first using adedicated router. On Subnet2, you add a second Windows server (Srv2) that provides file and print services forhosts on that subnet.You want hosts on Subnet2 to receive IP addressing information from the server on Subnet1.What should you do? (Select two. Each choice is a complete solution.) a) On Srv2, add the Remote Access role with routing. In Routing and Remote Access, configure the RelayAgent protocol. b) Enable BootP forwarding on the router connecting Subnet1 to Subnet2. c) On Srv2, add the Network Policy and Access Services Role with routing. In Routing and Remote Access,configure the IGMP Router and Proxy protocol. d) On Srv2, add the DHCP server role. Configure a scope for Subnet2. e) On Srv2, add the DHCP server role. Configure a superscope for Subnet2.

-On Srv2, add the Network Policy and Access Services Role with routing. In Routing and Remote Access, configure the Relay Agent protocol. -Enable BootP forwarding on the router connecting Subnet1 to Subnet2.

Windows printing uses the concept of a logical printer.Which of the following are the components of a logical printer? (Select three.) a) Print device b) Printer driver c) Printed document d) Print server e) Printer port f) Printer role service g) Print spooler

-Print spooler -Printer driver -Print device

You manage several servers that are all in the same domain. Two of the servers, DC10 and DC13, are in differentbuildings that are on opposite sides of the company campus. Your desk is in the same building as DC10, and youwant to complete management tasks, such as managing storage settings, on DC13 from the DC10 desktop.You decide to implement Remote MMC snap-ins on DC13 so you can manage it remotely. You know thatWindows Remote Management is already enabled on DC13 by virtue of being joined to a domain.Which of the following exceptions need to enabled in the firewall on DC13? (Select two.) -Remote Registry -Remote Administration -Plug and Play -Windows Remote Management -Routing and Remote Access

-Remote Registry -Plug and Play

You are the administrator for a large single-domain network. You have several Windows Server domain controllers and member servers. Your 3,500 client computers are Windows workstations.Today, one of your users has called for help. It seems that his computer is reporting that a trust cannot be established between his Windows computer and the domain controller. He is unable to log on to the domain. You examine the computer's account using Active Directory Users and Computers, and there is nothing obviously wrong. You need to allow this user to log on to the domain.What should you do? a) Rejoin the domain b) Re-enable the computer account and rejoin the domain. c) Reset the computer account. d) Re-enable the computer account. e) Reset the computer account and rejoin the domain.

-Reset the computer account and rejoin the domain.

You are the network administrator for your network. Your network consists of a single Active Directory domain.Your company recently mandated the following user account criteria:User accounts must be deactivated after three unsuccessful logon attempts.User account passwords must be at least 12 characters long.User accounts must be manually reset by an administrator once they are locked out.You must make the changes to affect everyone in the domain. You are editing the Default Domain Group Policyobject.What should you do? (Choose three. Each correct choice represents part of the solution.) a) Set Account lockout threshold to 0. b) Set Reset account lockout counter after to 0. c) Set Account lockout threshold to 3. d) Set Account lockout duration to 999. e) Set Account lockout duration to 0. f) Enable Password must meet complexity requirements. g) Set Minimum password length to 12. h) Set Maximum password age to 3.

-Set Account lockout duration to 0 -Set minimum password length to 12 -Set Account lockout threshold to 3

You manage a network with a single Active Directory domain called westsim.com.Organizational units have been created for the accounting, sales, and shipping departments. User and computeraccounts for each department are in their respective OUs.Maria Hurd is going on a seven-week sabbatical and will not be in to work during that time.Which of the following can you perform to secure her user account to prevent it from being used to accessnetwork resources while she is away? (Select two.) a)Remove the user account from any groups. Remove any permissions assigned to the user account b).Change the password for the user account. Set the User cannot change password option. c) Disable the user account. d) Rename the user account. e) Set an account expiration time for the last day Maria will be in the office.

-Set an account expiration time for the last day Maria will be in the office. -disable the account

Sally, a member of the sales department, is borrowing a laptop computer from her supervisor to do some workfrom home in the evenings. Sally contacts you and indicates that she cannot access the C:\Reports folder on thelaptop. This folder contains documents that she needs to edit.You log on to the laptop as a domain administrator to check the folder's access control list. You are denied accessto view the permissions. You contact Sally's supervisor to verify that Sally should receive access to the folder.Sally's supervisor indicates that Sally should be able to read, change, and delete documents in the folder, but thatonly the supervisor should be able to configure permissions.You need to grant Sally appropriate permissions to the C:\Reports folder. What should you do? (Choose two.Each correct choice is part of the solution.) a) Grant Sally the allow modify permission to the C:\Reports folder. b) Grant your user account allow full control permission to the C:\Reports folder. c) Take ownership of the C:\Reports folder. d) Grant Sally the allow full control permission to the C:\Reports folder. e) Give Sally ownership to the C:\Reports folder. f) Instruct Sally to take ownership of the C:\Reports folder.

-Take ownership of the C:\Reports folder. -Grant Sally the Allow Modify permission to the C:\Reports folder

You are the administrator of a network with a single Active Directory domain. Your domain contains three domain controllers and five member servers.Your security policy states that all accounts should be locked out after three unsuccessful logon attempts and that accounts must be reset only by an administrator. A GPO enforces these settings.You receive a call Monday morning from the help desk. There are seven users who are unable to log in to the domain. Upon further investigation, you notice all seven accounts have been locked out.You need to unlock the user accounts with the least amount of administrative effort while complying with your security policy.What should you do next? a) Change the Account lockout threshold value to 0. b) Using Active Directory Users and Computers, select Unlock Account for each account. c) Change the Reset account lockout counter after value to 0. d) Change the Account lockout duration value to 0. e) Using Active Directory Users and Computers, highlight all seven accounts and select Unlock Account.

-Using Active Directory Users and Computers, select Unlock Account for each for each account.

SRV02 holds a shared folder named Forecast for the Managers group.Maria is a member of the Managers group. You would like to grant the Managers group full control to the foldernamed Forecast, but limit Maria's access to read only.You have added the Managers group to the access list for the Forecast folder and granted Full Control access.You now need to limit Maria's access to the folder.What should you do? (Choose two. Each choice is a complete solution.) a) Add Maria's account to the Forecast share. Grant change access and deny full control. b) Remove Maria's account from the Managers group and grant read access. c) Add Maria's account to the Forecast share. Grant read access and deny full control. d) Remove Maria's account from the Managers group and grant change access. e) Add Maria to the NTFS permissions for the folder. Grant read access.

-remove marias account from the managers group and grant read access. -add maria to the ntfs permissions for the folder. grant read access.

You have captured an image of a newly installed Windows computer. Your manager wants you to apply this image to several new computers that are going to be distributed to employees whose computers have gotten too old and need to be replaced. Your manager tells you to make sure you don't get computer name conflicts on the network when this image gets deployed.Which of the following tools must you use to prevent causing computer name conflicts by deploying this image? -sysprep -bcdedit -DISM -ImageX -Windows System Image Manager

-sysprep

You need to configure Windows Firewall with Advanced Security to allow traffic for an application that dynamically opens up multiple ports on an as-needed basis.What should you do? -Add a port exception for the range of possible ports used by the application. -Configure ICMP exceptions. -Disable Windows Firewall only on the interface that the application uses. -Add a program rule. -Add a port rule for each port necessary.

Add a program rule.

You manage a network with Windows clients, multiple subnets, and Windows DNS servers.You want to be able to resolve a host name for a server on your network to its IPv4 address.What should you do? a) Add an A record on the DNS server. b) Add an NS record on the DNS server. c) Edit the Lmhosts file on the computer. d) Add a PTR record on the DNS server.

Add an A record on the DNS server.

You are the administrator of a network with two Active Directory domains. Each domain currently includes 35 global groups and 75 domain local groups.You have been reading the Windows Server help files and have come to the conclusion that universal groups may be the answer to ease administrative management of these groups. You decide to incorporate universal groups.How can you make sure to not include changes to any group that will affect group member's assigned permissions? a) Add global groups to universal groups and then add those to domain local groups. b) Add global groups to domain local groups and then add those to universal groups. c) Add all global groups to a universal group named All Users d) Remove all members from the global groups and add them to universal groups.

Add global groups to universal groups and then add those to domain local groups.

After completing a server core deployment on a new server, you prepare the server to be joined to an ActiveDirectory domain by completing the following tasks:Change the name of the computer to something that fits your server naming rules.Set the time and time zone to match your local time zone.Which of the following tasks should you still perform before joining the server to the domain? -Configure the server to get an IP address dynamically. -Assign a static IP address to the server. -Add the DNS role to the server. -Nothing. The server is ready to join the domain.

Assign a static IP address to the server.

You manage the intranet servers for EastSim Corporation. The company network has three domains:eastsim.com, asiapac.eastsim.com, and emea.eastsim.com. The main company website runs on the web1.eastsim.com server with a public IP address of 101.12.155.99. A host record for the server already exists in the eastsim.com zone.You want Internet users to be able to use the URL http://www.eastsim.com to reach the website.What type of DNS record should you create? a) SOA b) NS c) SRV d) A e) CNAME f) PTR

CNAME

You manage several Windows workstations in your domain. You want to configure a GPO that will make themprompt for additional credentials whenever a sensitive action is taken.What should you do? a) Configure User Rights Assignment settings. b) Configure User Account Control (UAC) settings. c) Configure Windows Firewall with Advanced Security settings. d) Configure Restricted Groups settings.

Configure User Account Control (UAC) settings.

You are the network administrator for eastsim.com. The network consists of one Active Directory domain.You have been instructed to map a drive to a department share for all users. The company no longer uses loginscripts, so you must ensure that the department share is mapped using Group Policy.What should you do? a) Configure a Folder Options policy in a GPO lined to each OU that contains users. b) Configure a Shortcuts policy in a GPO linked to the Computers container. c) Configure a Drive Maps policy in a GPO linked to the domain. d) Configure an Environment policy in a GPO linked to the Domain Controllers OU.

Configure a Drive Maps policy in a GPO linked to the domain.

You are the administrator of what will become a large Windows Server network using the TCP/IP protocol.Currently, the network consists of three Windows servers and 50 Windows workstations all on the same subnet.During the last meeting you had with the CIO, it was determined that company growth would mean addingworkstations and printers to the existing network for a total of 235 devices. No one segment is to have more than85 hosts. The existing hardware will be used on the network as the new devices are added.How should you assign IP addresses to the workstations on the network to minimize administration? a) Manually configure the IP address on each workstation. b) Configure each workstation to use DHCP. Install a DHCP server and configure a single scope. c) Configure each workstation to use DHCP. Install a DHCP server and configure a single scope. d) Configure reservations for each client. e) Configure each workstation to use DHCP. Do not install a DHCP server to force the workstations to useautomatic private addressing

Configure each workstation to use DHCP. Install a DHCP server and configure a single scope.

You manage a network with a single Active Directory domain called westsim.com.Organizational units have been created for the accounting, sales, and shipping departments. User and computeraccounts for each department are in their respective OUs.Mary Hurd is a manager in the sales department. Mary is a member of the Managers global group. This groupalso has members from other organizational units. The Managers group has been given the read share permissionto the Reports shared folder. Mary's user account (mhurd) has also been given the change share permission to theReports shared folder.You need to create several new user accounts that have the same group membership and permission settings asthe mhurd user account.How can you complete this configuration with the least amount of effort? a) Copy the mhurd user account. Assign the Managers group the read and change share permissions to theReports shared folder. b) Copy the mhurd user account. Assign the new account the read and change share permissions to theReports shared folder c). Copy the mhurd user account. Make the new user account a member of the Managers group. Assign thenew account the change share permission to the Reports shared folder. d) Copy the mhurd user account. Make the new user account a member of the Managers group. Assign thegroup the read and change share permissions to the Reports shared folder. e) Copy the mhurd user account. Assign the new account the change share permission to the Reportsshared folder.

Copy the mhurd user account. Assign the new account the Change share permission to the Reports shared folder.

You are the domain administrator for a single domain forest. You have 10 file servers that are member servers running Windows Server. Your company has designed its top-level OU structure based on the 15 divisions for your company. Each division has a global security group containing the user accounts for division managers.You have folders on your file servers that all division managers should have permission to access. For some resources, all division managers will need full control. For others, they will only need read or change permissions. You need a group strategy that will facilitate the assignment of permissions but minimize administrative effort.What should you do? a) Create a global group called AllMgrs; make each of the existing division managers groups a member. b) Create a universal group called AllMgrs; make each of the existing division managers groups a member. c) Create a domain local group called AllMgrs; add each of the division managers user accounts to thegroup. d) Create a global group called AllMgrs; add each of the division managers user accounts to the group.

Create a global group called AllMgrs; make each of the existing division managers groups a member.


Related study sets

Medical Administrative Assistant: Module 6: Patient Accounts and Payment Processing

View Set

Lifespan and Development (Ch.1-4) (Test 1)

View Set

Graphing Two-Variable Linear Inequalities: Quiz

View Set

AP PSYCH CHAPTER 8- Motivation & Emotion

View Set

Art History Survey II Quiz Stuff

View Set

"First Aid- Chapter 23: Disaster, Remote, and Wilderness Emergencies"

View Set