TNE255 FINALReview

Ace your homework & exams now with Quizwiz!

The hosts file is contained within what directory in Windows?​

%systemroot%\System32\drivers\etc

How many checkpoints can be created for a single VM?​

50

How many usable host addresses exist within a network with a CIDR prefix of /23?​

510

Select the special character below that can't be used within a username:​

?

NIC teaming

A feature that allows multiple network interfaces to work in tandem to increase available bandwidth and provide load balancing and fault tolerance.

Downlevel Server

A server running an earlier version of the Windows Server OS; usually in the context of managing that server remotely.

Failover

A server's capability o recover from network hardware failure by having redundant hardware that can take over immediately for failed hardware.

Service dependencies

A service that requires another service or Windows component function correctly.

Why might an organization want a single DNS server to make all external queries?​

A single DNS server used for external queries limits exposure and allows for the DNS server to create an extensive cache of DNS entries.

Select below the DHCP option that defines the DNS domain name that will be configured on DHCP clients:​

015

You have DHCP clients on the network that aren't domain members. You want to be sure these computers can register their hostnames with your DNS servers. Which option should you configure?

015 DNS domain name

Select below the predefined option within DHCP that may be necessary for some configurations of Windows Deployment Server?

060 PXEClient

What is the absolute minimum value the DHCP lease duration can be set to?

1 minute

Integrated Scripting Environment (ISE)

A PowerShell development environment that helps in creating PowerShell scripts.

Windows Remote Management (WinRM)

A Windows 2012 feature that provides a command-line interface for performing a variety of remote management tasks.

A folder can be shared only with a single name and single set of share permissions. True or False?

False

Administrator account should not be re-named, but should at least used a secure password

False

Local storage is rarely direct-attached storage. True or False?

False

The use of WINS forward lookup is enabled by default.​ True or False?

False

DNS clients maintain a text file called ____ that can contain static DNS entries

Hosts

DNS clients maintain a text file called ____ that can contain static DNS entries.

Hosts

When installing an additional DC in an existing domain, which of the following is an option for reducing replication traffic?

IFM

In what server configuration window can the Network Access Protection (NAP) feature be enabled or disabled?

IPv4 Properties

Which IPv6 transition technology requires the netsh command to manually create the tunnel to carry IPv6 traffic over the IPv4 Internet?

IPv6-over-IPv4

Which of the following is true when purchasing a motherboard with multiple CPU sockets?

All installed CPUs must be identical.

Load balancing and failing (LBFO)

Another term for NIC teaming.

Which special identity group specifically includes any user account (except the Guest) logged into a computer or domain with a valid username and password?

Authenticated users

The IP address 129.53.82.20 falls under what class of IP addresses?​

B

You're having replication problems with your GPOs and suspect that the version numbers have somehow gotten out of sync between the GPT and the GPC. What can you do to verify the version numbers on a GPO?

Check the versionNumber attribute of the GPC and open the GPT.INI file

A computer adds the ____________________ group to the local Administrators group after being joined to an Active Directory domain.

Domain Admins

An account named SrAdmin created an OU named QandA under the Operations OU. Which of the following is true by default?

Domain Admins is the owner of the QandA OU

Select the true statement regarding the conversion of group scope:​

Domain local groups can be converted to universal, as long as the domain local group does not contain other domain local groups

You have just finished a default installation of Windows Server 2012. You know that TCP/IP is installed. How does the server get assigned an IP address?

DHCP

Which graphical utility runs in Server Core?

Data and Time Control Panel

You're scanning the local cache on a DNS client, and you come across the notation ::1. What does it mean

It's the IPv6 localhost address.

Which type of DNS lookup responds with the best information it has to satisfy the query?

Iterative query

Which of the following represents the correct order in which GPOs are applied to an object that falls within the GPO's scope?

Local GPOs, site, domain, OU

What is a downlevel user logon name used for?​

Logging into older Windows OSs or using older Windows applications

You're managing 75 servers from a single Server Manager console and find you're wasting a lot of time scrolling through the list of servers to find the one you want to manage. You have 5 locations with about 15 servers in each location. What can you do to make managing these servers in Server Manager easier?

Make 5 groups and give them meaningful names

If the Windows Firewall is enabled, how are rules applied when multiple network connections are available?​

Network Location Awareness settings are used to determine whether to apply the Domain, Private, or Public profiles on each individual connection.

You manage the DNS structure on your network. The network security group has decided that only one DNS server should contact the Internet. Under no circumstances should other servers contact the Internet for DNS queries, even if the designated server is down. You have decided that the DNS server named DNS-Int should be the server allowed to contact the Internet. How should you configure your DNS structure to accommodate these requirements?

On each DNS server except DNS-Int, configure a forwarder pointing to DNS-Int. Disable the use of root hints if no forwarders are available. No changes are necessary on DNS-Int.

Which of the following example passwords meets the minimum password requirements for Windows Server 2012?

P@ssw0rd

Select the operations master role that is responsible for providing backward compatibility with Windows NT servers configured as Windows NT backup domain controllers or member servers:

PDC emulator master

​Which of the following choices is one of the two forest-wide FSMO roles?

Schema master

You have noticed inappropriate use of computers for gaming and Internet downloads by some employees who come in after hours and on weekends. These employees don't have valid work assignments during these times. You have been asked to devise a solution for these employees that doesn't affect other employees or these employees' computers during working hours. What's the best solution?

Set the Logon Hours options for their user accounts.

Which of the following best describes a directory service?

Similar to a database program but with the capability to manage objects

Over the past several months, Tom, who has access to sensitive company information, has logged on to computers in other departments and left them without logging off. You have discussed the matter with him, but the problem continues to occur. You're concerned that someone could access these sensitive resources easily. What's the best way to solve this problem?

Specify which computers Tom can log on to in the domain by using the Log On To option in his account's properties.

Which of the following is not a standard component of Teredo tunneling?​

Teredo proxy

Which of the following scenarios is not ideal for the deployment of a single domain structure?​

The domain structure must be able to utilize different name identities

The responsible person section of an SOA record contains what information?

The e-mail address of the responsible person

You have an Active Directory forest of two trees and eight domains. You haven't changed any operations master domain controllers. On which domain controller is the schema master?

The first domain controller in the forest root domain

What happens if a security group that's an ACE in a shared folder is converted to a distribution group?

The group remains in the DACL, but the ACE has no effect on members' access to the resource.

​Although the hosts file is no longer used for localhost name resolution, what else can the hosts file be used for?

The hosts file can be used to store permanent IP address to host mappings outside of the DNS database, and can be used to create a rudimentary web filter.

How are Active Directory objects added to special identity groups?

The membership details of special identity groups is handled dynamically by Windows, and can't be changed manually by an administrator.

A user-specific local GPO takes precedence over a site-linked GPO. True or False?

True

A zone that is not integrated into Active Directory is referred to as a standard zone, and the zone data is stored in a text file.​

True

Configuration policies are uploaded to a computer when the OS starts and are updated every 90 minutes thereafter. True or False?

True

DNS recursion is enabled on Windows DNS servers by default.​ True or False?

True

Every GPO has a GPT associated with it. True or False?

True

Every IP address configuration requires the use of a subnet mask, and all hosts on the same network must share the same network ID in their IP addresses.​

True

GPOs linked to a site object can facilitate IP address based policy settings.​

True

IP addresses can be leased for an unlimited period. True or False?

True

Information within an OU can be hidden using permissions, and administration of an OU can be delegated to a non-administrative account.​

True

Permission inheritance can be configured such that permissions are only inherited by specific types of child object types.​

True

The DHCP server service can be configured to automatically discard A and PTR records when a lease is deleted.​

True

The MX record type is used to designate mail exchangers, or mail servers for e-mail. True or False?

True

The Windows Server DHCP relay agent function is configured as part of the Routing role service of the Remote Access server role. True or False?

True

The best method for configuring updates to servers and domain member computers is via group policy.​

True

The most likely problem with GPO replication is a delay in clients receiving changes in policy settings. True or False?

True

When selecting disk subsystems for enterprise or servers accessed 24/7, SAS is a preferred technology.

True

You can convert a Server Core installation to a Minimal Server Interface installation but not vice versa. True or False?

True

What can a DHCP server do to enable active conflict detection?​

The server can attempt to ping an IP address to ensure that an address isn't already in use before it is assigned.

​Disabling a binding has what affect on a DHCP server?

The server no longer listens to UDP port 67 on the disabled binding

What Group Policy feature should you use if you have a policy linked to an OU that contains computer accounts but want the policy to affect only computers running Windows 7? You don't know exactly which computer accounts represent the computers running Windows 7.

WMI filtering

Which of the following must be installed if you want to remotely manage a Windows Server 2012 server from a Windows Server 2012 R2 server? a. Performance updates b. .Net Framework 4.5 c. Windows Management Framework 4.0 d. A full GUI

b. .Net Framework 4.5

Which of the following is NOT associated with an Active Directory tree? a. A group of domains b. A container object that can be linked to a GPO c. A common naming structure d. Parent and Child domains

b. A container object that can be linked to a GPO

Which command shows a list of installed roles and features? a. Installed-WindowsFeature -Show b. Get-WindowsFeature | where Installed c. List-InstalledFeature d. Show-Features .if. Installed

b. Get-WindowsFeature | where Installed

Which of the following is true about an SSD? a. Uses magnetic platters b. Has no moving parts c. Uses a proprietary interface d. Uses EPROM

b. Has no moving parts

Which of the following is NOT part of Active Directory's logical structure? a. Tree b. Forest c. DC d. OU

c. DC

Which of the following is the core logical structure container in Active Directory? a. Forest b. OU c. Domain d. Site

c. Domain

Which is responsible for management of adding, removing, and renaming domains in a forest? a. Schema master b. Infrastructure master c. Domain naming master d. RID master

c. Domain naming master

You want to install a feature to an offline VHD file. What do you do first? a. Commit the changes b. Install the feature by using dism c. Mount the image d. Import the .wim file

c. Mount the image

Which of the following is true about GPT disks? a. They support a maximum volume size of 2 TB b. GPT is the default when initializing a disk in Disk Management c. They use CRC protection for the partition table d. You can't convert a GPT disk to MBR

c. They use CRC protection for the partition table

You add a server to Server Manager but see the error message "WinRM Negotiation authentication error." What should you do? a. Add the server with different credentials b. Add the server to the TrustedHosts list c. Install .NET Framework 4.5 d. Enter the Configure-SMRemoting command

d. Enter the Configure-SMRemoting command

Which of the following is considered a leaf object? (Choose all that apply.) a. Computer account b. Organizational unit c. Domain controller d. Shared folder

d. Shared folder

Legacy network adapters and synthetic network adapters provide equivalent performance. True or False?

false

Routing tables are static items, in that entries within the table never change, and no new entries are ever added.​

false

Server options take precedence over scope options. True or False?

false

Settings in local GPOs that are inherited from domain GPOs can be changed on the local computer. True or False?

false

The IP address 10.240.0.0/8 cannot be assigned to a host. True or False?

false

The Microsoft best practice recommendation is to modify the two default GPOs in a domain for making password policy changes.

false

Virtual machines are more economical because they do not require individual licenses. True or False?

false

Virtual machines must use the same OS as the host. True or False?

false

Security

fine-grained access controls enable administrators to control access to each directory object and its properties. Active Directory also supports secure authentication protocols to maximize compatibility with Internet applications and other systems.

​If a virtual machine will be running disk intensive applications, what type of virtual disks should be used?

fixed size

You're installing a new VM in Hyper-V that requires excellent disk performance for the installed applications to perform well. The applications require a virtual disk of about 200 GB. The host has two drives: one used as the Windows system drive and the other as a data drive of 500 GB. It's currently running a VM that uses a virtual disk stored on the host's data drive. This VM requires little disk access, uses only 20 GB of the host's data drive, and will max out at 40 GB. What type of disk should you use for the new VM you're installing?

fixed-sized disk

Which of the following is not a directory partition?

group policy partition

​The _____________ determines the reach of a group's application in a domain or forest: which security principals in a forest can be group members and to which forest resources a group can be assigned rights or permissions.

group scope

You have three VMs that must communicate with one another and with the host computer but not be able to access the physical network directly. What type of virtual network should you create?

internal

Which term identifies an operation that copies all or part of a zone from one DNS server to another and occurs because of a secondary server requesting the transfer from another server.

Zone transfer

member service

a Windows server that's in the management scope of a Windows domain but doesn't have Active Directory installed

Directory Services Restore Mode (DSRM)

a boot mode used to perform restore operations on Active Directory if it becomes corrupted or parts of it are deleted accidentally

private cloud

a cloud computing service provided by a company's internal IT department (see also cloud computing)

public cloud

a cloud computing service provided by a third party

network connection

a collection of components consisting of a network interface, network protocols, and network client and server software that work together to connect a Windows computer to a network

forest

a collection of one or more Active Directory trees. A forest can consist of a single tree with a single domain, or it can contain several trees, each with a hierarchy of parent and child domains

cloud computing

a collection of technologies for abstracting the details of how applications, storage, network, and other computing resources are delivered to users.

PowerShell

a command-line interactive scripting environment that provides the commands needed for most management tasks in a Windows Server 2012/R2 environment

Directory Service

a database that stores information about a computers network and offers features for retrieving and managing that information

fully qualified domain name (FQDN)

a domain name that includes all parts of the name, including the top-level domain

New Technology File Systems (NTFS)

a file system used on Windows OSs that supports compression, encryption, and fine-tuned permissions

Windows domain

a group of Windows computers that share common management and are subject to rules and policies that an administrator defines

tree

a grouping of domains that share a common naming structure

client access licenses (CALS)

a license required by law for each user who logs on to a Windows Server 2012/R2 Standard or Datacenter Edition server.

server role

a major function or service that a sever performs

site

a physical location in which domain controllers communicate and replicate information regurarly

Lightweight Directory Access Protocol (LDAP)

a protocol that runs over TCP/IP and is designed to facilitate access to directory services and directory objects. It's based on a suite of protocols called X.500, developed by the International Telecommunication Union

virtual desktop infrastructure (VDI)

a rapidly growing sector of private cloud computing whereby users access their desktops through a private cloud; the OS and applications run on servers in a corporate data center rather than on the local computer

SYSVOL folder

a shared folder containing file-based information that's replicated to other domain controllers

virtualization

a technology that uses software to emulate multiple hardware environments, allowing multiple operating systems to run on the same physical server simultaneously

Which option can you add to the Install-WindowsFeature command that shows you what the results would be but doesn't actually perform the installation task? a. -What If b. -TestOnly c. -ShowResults d. -NoInstall

a. -What If

Which MMC is added after Active Directory installation? (Choose all that apply.) a. Active Directory Domains and Trusts b. Active Directory Groups and Sites c. ADSI Edit d. Active Directory Restoration Utility

a. Active Directory Domains and Trusts c. ADSI Edit

Which of the following can be used to create shares? (Choose all that apply.) a. Advanced sharing b. Disk management c. Simple file sharing d. File and Storage Services

a. Advanced sharing c. Simple file sharing d. File and Storage Services

Which of the following is a feature of Active Directory? (Choose all that apply.) a. Fine-grained access controls b. Can be distributed among many servers c. Can be installed on only one server per domain d. Has a fixed schema

a. Fine-grained access controls b. Can be distributed among many servers

You have installed a new disk and created a volume on it. What should you do before you can store files on it? a. Format it b. Partition it c. Initialize it d. Erase it

a. Format it

What type of IPv6 address should you use when you have multiple routers on a subnet and want hosts to use the nearest router for packets that should be delivered to remote networks?

anycast

How can an administrator remove all audit policy subcategories so that auditing is controlled only by Group Policy?

auditpol/clear

Scalability

advanced indexing technology provides high-performance data access, whether Active Directory consists of a few dozen or a few million objects

Centralized but distributed database

all network data is centrally located, but it can be distributed among many servers for fast, easy access to information from any location. Automatic replication of information also provides load balancing and fault tolerance.

Windows workgroup

also called a peer-to-peer network, it's a small collection of Windows computers whose users typically have something in common, such as the need to share files or printers with each other. No computer has authority or control over another. Logons, security, and resource sharing are decentralized

organizational unit (OU)

an Active Directory container used to organize a network's users and resources into logical administrative units

After you install the DHCP Server role on a member server, what must you do before the server can begin providing DHCP services?

authorize the server

Checkpoint files utilize what file name extension?

avhd

When creating a new user, the "User cannot change password" option can't be used in conjunction with what other option?​

user must change password at next logon

A user can use their ___________, which follows the format username@domain, to log into a computer on a domain.

user principal name UPN

How can an administrator ​create subnets, or boradcast domains, on a single external or internal virtual switch?

virtual LANS

What value can be used to determine what percentage of assigned processing power can be used by a VM?​

virtual machine limit

The "hypervisor" is also known as:

virtual machine monitor

What Active Directory replication method makes use of remote differential compression (RDC)?

​Distributed File System Replication (DFSR)

Select below the built-in group that facilitates anonymous access to web resources by Internet Information Services

​IIS_IUSRS

What type of DNS query causes a DNS server to respond with the best information it currently has in its local database?​

​Iterative query

​Which PowerShell cmdlet can be used to create a resource pool for measuring memory usage?

​New-VMResourcePool

​An administrator working on a Windows Server 2012 R2 Server Core installation needs to disable DHCP all interfaces on the server. What PowerShell command should be used?

​Set-NetIPInterface

In a ping response packet, what does the TTL field indicate?​

​Time to live, which indicates how many hops the packet can go through before the packet is expired and discarded.

How should an administrator test the functionality of DNS operation on a domain controller, as well as troubleshoot issues with DNS forwarders, delegation, dynamic updates, and record registration?​

​Using dcdiag /test:dns

The default location for computer accounts that are created automatically after joining the domain can be changed using which command?​

redircmp

The ______________ policy allows an administrator to control the membership of both domain groups and local groups on member computers.

restricted groups

Which of the following specifies what types of actions a user can perform on a computer or network?

rights

Which of the following is a component of Active Directory's physical structure?

sites

A _______________ file can be used on a host computer from temporary memory storage when memory requirements suddenly increase beyond the physical amount of memory available

smart paging

network protocol

software that specifies the rules and format of communication between devices on a network

guest OS

the operation system running in a virtual machine installed on a host computer (see also virtual machine VM)

network server software

the part of the OS that receives requests for shared network resources and makes these resources available to a network client

network client

the part of the OS that sends request to a server to access network resources

host computer

the physical computer on which virtualization software is installed and virtual machines run

virtualization software

the software for creating and managing virtual machines and creating the virtual environment in which a guest OS is installed

Active Directory replication

the transfer of information between all domain controllers to make sure they have consistent and up-to-date information

virtual machine (VM)

the virtual environment that emulates a physical computer's hardware and BIOS

hypervisor

the virtualization software component that creates and monitors the virtual hardware environment, which allows multiple virtual machines to share physical hardware resources

Hierarchical organization

this structure makes management of network resources and administration of security policies easier

Why might you need to create predefined options with code 060?

to support WDS clients

.com, .net, and .edu​ are all examples of what level of the DNS naming hierarchy?

top-level domains

The ____________ command is known as the trace route command, because it displays the route packets take between two computers.​

tracert

Active Directory's use of multimaster replication ensures that changes to AD objects are automatically replicated to all domain controllers.​

true

After a checkpoint has been created for a virtual machine, the checkpoint location for the VM can't be changed.

true

All hosts on the same network must share the same network ID. True or False?

true

Physical machines can be converted to virtual machines. True or False?

true

Resource metering in Hyper-V can be used to measure use of VM resources for customer billing. True or False?

true

The Active Directory Recycle Bin is disabled by default, and can be enabled in the Active Directory Administrative Center (ADAC)​

true

The Logon Hours window selections will not affect a user who is already logged into their system, unless an additional GPO settings are used. True or False?

true

The recommended minimum number of Active Directory domain controllers in a domain environment is two

true

A DHCPINFORM request sent by a client will receive what message number from a DHCP server?

5

What command option for the dnscmd command lists all zones on the server?

/enumzones

What ipconfig command line option can be used to delete cached DNS information from memory?​

/flushdns

By default, how many previous logons are cached locally to a computer?​

10

Which IP address expressed in CIDR notation has the subnet mask 255.255.255.0?

10.100.44.123/24

​Each Group Policy Object is assigned a globally unique identifier (GUID) of what length

128 bits

How long does it take for a change to trigger intrasite replication?

15 seconds, with a 3 second delay between each replication partner

​The binary number 11000000 represents what number below in decimal

192

in CIDR notation, the subnet mask 255.255.255.0 is represented by what prefix?

24

The Windows default password complexity settings require at least how many different character types, out of the total four character types possible?​

3

What CPU extensions are a prerequisite for installing the Hyper-V role?

32 bit or 64-bit

How many bits are in the interface ID of an IPv6 address?

64

A DHCP server that sends information back to a client on what UDP port?

68

Which of the following tunneling protocols requires that the IPv4 address embedded in the tunneling address must be a public address?

6to4

What's the default lease duration on a Windows DHCP server?

8 days

Hyper-V considers one read I/O operation to be how much data​?

8 kb

Relay agent information is configured as DHCP option __________.

82

​If a DHCP server does not respond to a client's first renewal request, how long will the client keep its current address until initiating the next lease renewal request?

87.5%

You have a DHCP server set up on your network and no DHCP relay agents. You're capturing DHCP packets with a protocol analyzer and see a broadcast packet with UDP source port 68 and UDP destination port 67. Which of the following DHCP message types can the packet be?

A DHCPOFFER to offer an IP address lease

Which of the following is true about upgrading to Windows Server 2012/R2?

A Windows Server 2008 32-bit edition requires a clean install.

Minimal Server Interface

A new feature in Windows Server 2012 that takes up less disk space than the Server with a GUI option but more than the Server Core option. Includes Server Manager, MMCs, and some Control Panel applets.

Your company just opened a small branch office where 10 computer users will work. You have installed a single Windows Server 2012 R2 computer configured as a member server for basic file and print server needs. Users require DNS for Internet access and to resolve names of company resources. You decide to install DNS on the existing server. Which of the following types of installations makes the most sense?

A primary server hosting a standard zone

How can an administrator make a user template account easily recognizable?​

A special character, such as an underscore, can be added to the beginning of a template account's name.

Service

A task or process that runs in the background.

What DNS record type is used for an IPv6 host record?​

AAAA

Your DNS server is on the same network as the computer where you enter the following commands: arp -d ipconfig /flushdns nslookup server1 Which of the following protocols is used first as a result of these commands?

ARP

Flexibilty

Active Directory is installed with some predefined objects, such as user accounts and groups, but their properties can be modified, and new objects can be added for a customized solution

domain

Active Directory's core structural unit. It contains OUs and represents administrative, security, and policy boudaries

What cmdlet can be used to add a computer to a Windows domain network?

Add-Computer

Which of the following is a built-in user account? (Choose all that apply.)

Administrator Guest

When installing Active Directory, what must be done to ensure minimal fault tolerance capabilities?

At least two domain controllers and two DNS servers should be used.

​What Active Directory directory partition holds the DNS database?

Global catalog partition

What folder is selected by default for scanning when using the Automatically Generate Rules option ​in creating AppLocker policies?

C:\Program Files

How can an administrator attempt to automatically fix inconsistencies between DHCP summary lease information kept in the Registry and detailed lease information stored in the DHCP database?

By using the Reconcile All Scopes option​

Where is the smart paging file located on a Windows Server by default?​

C:\ProgramData\Microsoft\Windows\Hyper-V

What type of record does DNS create automatically to resolve the FQDN of an NS record?

Glue A records

You have set up an e-mail server that needs to respond to e-mail requests, using mail.coolgadgets.com and mail.niftytools.com in the request URL. How can you do this?

Configure two IP addresses on one NIC. Configure DNS to map one IP address to mail.coolgadgets.com and the other IP address to mail.niftytools.com.

You have several hundred client computers using WINS to resolve names of some enterprise servers. Many of the client computers are laptops used to connect to the network remotely. You're trying to eliminate WINS from your network to reduce the number of protocols and services you must support. What can you do, with the least administrative effort, that allows you to stop using WINS yet still allows clients computers to use a single-label name for accessing enterprise servers?

Create a GlobalNames zone and add CNAME records for enterprise servers.

You have created a GPO named RestrictU and linked it to the Operations OU (containing 30 users) with link order 3. RestrictU sets several policies in the User Configuration node. After a few days, you realize the Operations OU has three users who should be exempt from the restrictions in this GPO. You need to make sure these three users are exempt from RestrictU's settings, but all other policy settings are still in effect for them. What's the best way to proceed?

Create a global group and add the three users as members. Configure GPO security filtering so that the global group is denied access to the GPO

What server role is installed along with Active Directory Domain Services if no other servers with this role are available?

DNS

You have just typed the commands ipconfig /flushdns and ping server1. Which of the following protocols is used first as a result of these commands?

DNS

What is the name of the mode that allows for repairs to Active Directory in the event of a corruption or accidental deletion?

DRSM

​An administrator has discovered that several critical parts of Active Directory have been deleted. What boot mode can be used to perform restoration?

DRSM

Load balancing

Distributing traffic between two or more interfaces, thus increasing the overall network throughput a server is capable of maintaining.

What is the most typically used group type conversion?

Distribution group -> security group

Which of the following options can an administrator enable to improve DNS security?

Do not allow dynamic updates

You're using a VM with a Windows 8.1 Pro guest OS to run applications that you want isolated from the host computer and the LAN. However, you want to be able to print from the VM to the printer connected to your host and copy files between the host and guest OS. The VM is connected to a private virtual switch. What can you do?

Enable Enhanced Session mode in Hyper-V, and verify that Remote Desktop Services is running on the guest.

What should you define in a scope to prevent the DHCP server from leasing addresses that are already assigned to devices statically?

Exclusion range

If a domain consists of DCs that are running versions of Windows Server earlier than Windows Server 2008, what replication method is used?

File Replication Service (FRS)

A ____________ is a formatted unit of data that's ready to be transferred to the network medium. It contains a destination and source MAC address and an error-checking code called the frame check sequence (FCS)

Frame

The ____________ file contains version information that is used to determine when a GPO has been modified, and is used during replication to determine if a local copy of a GPO is up to date.​

GPT.INI

What cmdlet can be used to get a list of available Windows features via PowerShell?

Get-WindowsFeature

What Active Directory directory partition holds the DNS database?

Global catalog partition

Settings in the Administrative Templates section of the User Configuration node affect what area of the registry?

HKEY_CURRENT_USER

What utility should always be used in order to delete checkpoints?

Hyper-V manager

Where is a GPT stored?

In a folder named the same as the GUID of the GPO in the SYSVOL share

The protocol for accessing Active Directory objects and services is based on which of the following standards?

LDAP

You have created a GPO that defines settings only in the Local Policies node. You want the settings to apply to all computers in the domain and take precedence over any other GPOs. Which of the following is the best approach?

Link the new GPO to the domain, and then right-click the new GPO and click Enforced.

The _________ file system is the default file system used during a Windows Server 2012 installation.

NTFS

server operating systems

OSs designed to emphasize network access performance and run background processes rather than desktop applications

Which of the following is true about organizational units? (Choose all that apply.)

OUs can be nested A group policy can be linked to an OU

The Vendor Class uses what option field within a DHCPDISCOVER packet?

Option 60

Four organizing components of Active Directory

Organizational units Domains Trees Forests

Two aspects of Active Directory structure

Physical Structure Logical Structure

The _____________ cmdlet within PowerShell can be used to rename an object in Active Directory.​

Rename-ADObject

When a DNS server responds to a query with a list of name servers, what is the response called?

Referral

A ____________ contains PTR records that map IP addresses to names and is named after the IP network address of the computers whose records it contains.

Reverse lookup zone

The __________ folder is a shared folder containing file-based information that's replicated to other domain controllers

SYSVOL

Your Hyper-V server has a single disk of 300 GB being used as the system disk and to host a dynamically expanding disk for a Windows Server 2012 R2 VM. The VM's virtual disk has a maximum size of 200 GB and is currently 80 GB and growing. You have only about 30 GB free space on the host disk. You have noticed disk contention with the host OS, and the constant need for the virtual disk to expand is causing performance problems. You also have plans to install at least one more VM. You have installed a new 500 GB hard disk on the host and want to make sure the VM doesn't contend for the host's system disk, and the expansion process doesn't hamper disk performance. What should you do?

Shut down the VM. Convert the dynamically expanding disk to a fixed-size disk, being sure to place the fixed-size disk on the new host drive. Connect the VM to the fixed-size disk in place of the dynamically expanding disk. Delete the old virtual disk.

Checkpoints for your test VMs are taking up too much space on the host's system disk. You have two test VMs running, each with one checkpoint to represent the baseline testing environment. You're finished with your current testing and are ready for another round of testing, but you want to make sure your checkpoints are stored on another volume. What should you do?

Shut down the VMs. Apply the checkpoint to each VM, and delete all checkpoints in Hyper-V Manager. Change the path of the checkpoint files to the other volume, and create a new checkpoint for each VM.

What protocol in the TCP/IP suite provides reliable data transfer between applications at the transport-layer?

TCP

What network protocol is the most widely used, and installed by default on Windows Server 2012 R2?

TCP/IPv4

How do routers recognize 6to4 IPv6 packets?

The 2002::/16 prefix is used to identify 6to4 addresses. The first 16 bits are always 2002, and the next 32 bits represent an IPv4 address.

Which of the following statements is not true regarding the built-in Administrator account?​

The Administrator account can't be renamed, but it can be deleted

A valid comma separated value file that can be imported using csvde must have what option below on the first line?

The FQDN of the target domain

If a GPO's link status is "disabled", what affect does this have on the GPO?

The GPO is listed under the container object and the link is disabled, however, the GPO itself may still be enabled on a different container object.

What is an Organizationally Unique Identifier (OUI)?​

The OUI is the first 24 bits of a MAC address, and is used to identify the manufacturer of the NIC.

​In a zone's Properties dialog box, what option is unavailable under Dynamic updates for only standard zones?

The Secure option only

You're the administrator of a file server. Tom, who is on vacation, had created a file that Mary needs access to, but neither her account nor the Administrator account has permissions to access the file. What is the best way to allow Mary to access the file?

The administrator account can take ownership of the file, grant Mary the permissions she needs in order to access the file and then give ownership back to Tom.

Under what circumstances would a multi-domain structure not be an ideal choice?

The structure should facilitate easier access to resources

Some of your non-Windows clients aren't registering their hostnames with the DNS server. You don't require secure updates on the DNS server. What option should you configure on the DHCP server so that non-Windows clients names are registered?

Update DNS records dynamically for DHCP clients that don't request updates.

Which container has a default GPO linked to it? a. Users b. Printers c. Computers d. Domains

d. Domains

All your domain controllers are running Windows Server 2012 R2. You're noticing problems with GPT replication. What should you check?

Verify that DFSR is operating correctly.

domain controller

a Windows server that has Active Directory installed and is responsible for allowing client computers access to domain resources

At what point does a client send a unicast packet to the DHCP server to request a lease renewal for its current IP address?​

When the lease is 50% expired

stand-alone server

a Windows server that isn't a domain controller or a member of a domain

In the DHCP server's statistics, you notice that a lot of DHCPNAK packets have been transmitted. What's the most likely reason?

You changed the range of addresses in a scope recently.

Standard Edition

a Windows Server 2012/R2 edition suitable for most businesses that need a full-featured server and might need to use virtualization on a moderate scale

Essentials Edition

a Windows Server 2012/R2 edition suitable for small businesses with 25 or fewer users. This edition doesn't support Hyper-C, and some services, such as Active Directory and DNS, are installed automatically during OS installation

Datacenter Edition

a Windows Server 2012/R2 edition, intended primarily for organizations using virtualization on a large scale.

Server Core

a Windows Server 2012/R2 installation option that doesn't have a traditional GUI

Foundation Edition

a Windows Server 2012/R2 edition intended as an entry-level server edition. Its an OEM-only version that supports only 15 users and can only be purchased already installed on a server

Which of the following is associated with an Active Directory forest? (Choose all that apply.) a. Can contact trees with different naming structures b. Allows independent domain administration c. Contains domains with different schemas d. Represents the broadest element is Active Directory

a. Can contact trees with different naming structures b. Allows independent domain administration d. Represents the broadest element is Active Directory

Which of the following is a default folder object? a. Computers b. Domain Controllers c. Groups d. Sites

a. Computers

You see something named "primordial" in the File and Storage Services. What can you do with it? a. Create a storage pool b. Create a virtual disk c. Format it d. Create a new volume

a. Create a storage pool

An expensive color laserjet printer is shared by a group of managers and some other employees. The managers complain that they often have to wait for their print jobs until other employees' large jobs have finished. Usually, the managers' print jobs are small and needed immediately, but other employees rarely need their print jobs in a hurry. What can you do to help solve this problem without buying additional equipment? a. Create two printers and assign them different priorities and permissions b. Create another printer and configure a printer tool c. Buy another printer and configure permissions so that only managers can access it d. Make the printer available only during the hours managers are working

a. Create two printers and assign them different priorities and permissions

Which of the following is not one of the five folder objects that are created when Active Directory is installed?

adminstrators

You need to prevent members of a group from accessing a subfolder of a folder the group does have access to. What's the best way to do this? (Choose two answers. Each correct answer represents part of the solution.) a. Disable permission inheritance on the subfolder, and convert existing permissions b. Add each member of the group to the subfolder's DACL, and assign a Deny permission to each member c. Create a new group, and add members of the existing group to this new group. Add the new group to the subfolder's DACL with a Deny permission d. Remove the group from the subfolder's DACL

a. Disable permission inheritance on the subfolder, and convert existing permissions d. Remove the group from the subfolder's DACL

You have installed a shared printer with the default permissions and want users to be able to manage their own documents in the printer queue. What do you need to do? a. Do nothing b. Assign the Everyone special identity the Manage documents permission c. Assign the Everyone special identity the Manage printers permission d. Add Domain Users to the Printer Operators group

a. Do nothing

Which of the following is a directory partition? (Choose all that apply.) a. Domain directory partition b. Group policy partition c. Schema directory partition d. Configuration partition

a. Domain directory partition c. Schema directory partition d. Configuration partition

You need to protect sensitive files from unauthorized users even if the disk is stolen. What feature should you use and on what file system? a. EFS, NTFS b. Disk compression, ReFS c. Quotas, NTFS d. Shadow copies, ReFS

a. EFS, NTFS

Which of the following is TRUE about a page file? a. It should be stored on a separate disk from the Windows folder b. It's usually stored in fast random access memory c. Windows stores frequently accessed drivers in it d. The page file is usually smaller than 50 MB

a. It should be stored on a separate disk from the Windows folder

You need to stop a service so that you can do some troubleshooting. Before you stop it, you need to see whether any other services will be affected by this action. What should you do? a. Look at the Dependencies tab b. View the service startup type c. Right-click the service and click Show Requirements d. Set the service recovery options

a. Look at the Dependencies tab

Which of the following is an example of long-term storage? (Choose all that apply) a. Magnetic tape b. CPU cache c. SSD d. RAM

a. Magnetic tape c. SSD

Which of the following is an example of what a server uses storage for? (Choose all that apply.) a. Page file b. Virtual machines c. Working memory d. Documents

a. Page file b. Virtual machines d. Documents

What folder under Policies within the Computer Configuration Node of a GPO contains the Control Panel, Network, Printers, System, and Windows Component folders?

adminstrative templates

You right-click a Server-Core server in Server Manager and click Computer Management. You see an error indicating that the server can't be managed. What should you do to solve the problem? a. Run configure-SMRemoting.exe -Enable on the local computer b. Configure Windows Firewall on the remote computer c. Install the Minimal Server Interface on the remote computer d. Disable WinRM on the local computer

a. Run configure-SMRemoting.exe -Enable on the local computer

Which of the following is a file-sharing protocol supported by Windows Server 2012/R2 File and Storage Services role? (Choose all the apply.) a. SMB b. FTP c. TFTP d. NFS

a. SMB b. FTP d. NFS

Which features must be installed to convert a server from Server Core to the full GUI? (Choose all the apply.) a. Server-GUI-Shell b. Server-MMC-Enable c. Server-Full-Interface d. Server-GUI-Mgmt-Infra

a. Server-GUI-Shell

which of the following is a task you should preform before installing roles and features? (choose all that apply.) a. Set a strong Administration password b. read the Windows Server 2012 user manual c. configure static IP address d. Make sure security updates are current

a. Set a strong Administration password c. configure static IP address d. Make sure security updates are current

What type of storage layout does Storage Spaces support? (Choose all that apply.) a. Simple space b. Mirror space c. Parity space d. Striped space

a. Simple space b. Mirror space c. Parity space

What type of volumes or partitions can be created on a basic disk? (Choose all the apply.) a. Spanned volume b. Striped partition c. Extended partition d. Simple volume

a. Spanned volume d. Simple volume

Which of the following is the responsibility of a domain controller? (Choose all the apply.) a. Storing a copy of the domain data b. Providing data search and retrieval functions c. Servicing multiple domains d. Providing authentication services

a. Storing a copy of the domain data b. Providing data search and retrieval functions d. Providing authentication services

What's created automatically when you install Windows Server 2012 R2 on a system with a disk drive that has never had an OS installed on it before? a. System volume b. Dynamic Disk c. GPT d. Extended partition

a. System volume

Which of the following ways can a user become a files owner? (Choose all that apply.) a. Take ownership of the file b. Create the file c. Belong to the File Owner special identity d. Be assigned as the owner by an administrator

a. Take ownership of the file b. Create the file d. Be assigned as the owner by an administrator

Policy-based administration

administrators can define policies to ensure a secure and consistent environment for users yet maintain the flexibility to apply different rules for departments, locations, or user classes as needed.

Which of the following uses dynamically expanding storage? a. Thin provisioning b. Primordial pools c. Parity volumes d. Resilient File System

a. Thin provisioning

A user needs to create files and make changes to file contents. Aside from the Read permissions, what other permissions should the user be granted without allowing more access than is necessary? a. Write b. Full control c. Modify d. Create

a. Write

What feature, once activated, can't be disabled without reinstalling all domain controllers within a forest?

active directory recycle bin

Which of the following is not true about disk quotas? a. Users can be prevented from saving files on a volume b. An event can be generated when a user exceeds the quota limit c. Quotas can be overridden for groups d. Quotas can be set without denying disk space to users

b. An event can be generated when a user exceeds the quota limit

The Tsmith user account has been granted the Read share permissions. Tsmith is a member of the Sales group, which has been granted the Change share permission. In the shared folder's Security tab, Sales has been granted full control, and the Users group has been granted Read permission. Which of the following can Tsmith do in the share when accessing it from the network? (Choose all that apply.) a. Change permission on all files b. Delete all files c. Take ownership of all files d. Create files

b. Delete all files d. Create Files

To which of the following can a GPO be linked? (Choose all that apply.) a. Trees b. Domains c. Folders d. Sites

b. Domains d. Sites

Which load-balancing mode should you choose if you need to balance heavy traffic flow over multiple NICs? a. Address Hash b. Dynamic c. LACP d. Hyper-V Port

b. Dynamic

The protocol for access Active Directory objects and services is based on which of the following standards? a. DNS b. LDAP c. DHCP d. ICMP

b. LDAP

Which type of account is NOT found in Active Directory? a. Domain user account b. Local user account c. Built-in user account d. Computer account

b. Local user account

Which of the following is the correct sequence of steps for creating a volume with Storage Spaces? a. Disk pool, volume, virtual disk b. Primordial pool, virtual disk, volume c. Virtual disk, disk pool, volume d. Disk pool, virtual disk, volume

b. Primordial pool, virtual disk, volume

Which of the following specifies what types of actions a user can perform on a computer or network? a. Attributes b. Rights c. Permissions d. Classes

b. Rights

You have four servers that need access to shared storage because you're configuring them in a cluster. Which storage solution should you consider for this application? a. NAS b. SAN c. SCSI d. DAS

b. SAN

Which administrative share does Active Directory use for replications? a. NETLOGON b. SYSVOL c. Admin$ d. IPC$

b. SYSVOL

All domains in the same forest have which of the following common? (Choose all that apply.) a. Domain name b. Schema c. Domain administrator d. Global catalog

b. Schema d. Global catalog

Which of the following is a method for adding a server to Server Manager? (Choose all that apply.) a. Query NetBIOS b. Search Active Directory c. Import a file d. Search DNS

b. Search Active Directory c. Import a file d. Search DNS

Select below the prefix used by all Teredo related addresses:​

​2001::/32

Which of the following is true about share and NTFS permissions? a. NTFS permissions are applied only to local file access b. Share permissions take precedence over NTFS permissions c. Share permissions are applied to network and local file access d. NTFS permissions are applied to network access

b. Share permissions take precedence over NTFS permissions

Which of the following best describes a directory service? a. Similar to a list of information in a text file b. Similar to a database program but with the capability to manage objects c. A program for managing the user interface on a server d. A program for managing folders, files, and permissions on a distributed server

b. Similar to a database program but with the capability to manage objects

What command can you put in a batch file to allow users to access the Public share on the ServPub1 server, using the drive letter P? a. net share P: \\ServPub1\Public b. net use P: \\ServPub1\Public c. share \\ServPub1\Public P: d. share P: \\ServPub1\Public

b. net use P: \\ServPub1\Public

By default, when are policies set in the User Configuration node applied? a. Every 5 minutes b. Immediately c. At user logon d. At computer restart

c. At user logon

You have been getting quite a few calls with requests to restore files from a backup because the file was accidentally deleted from a share or because the user needed a previous version of a file that was overwritten. Restoring the files has become a burden, and sometimes you need to repeat the process several times until you find the version the user needs. What can you do the users a way to access the files they need and reduce your administrative burden? a. Adjust permissions on the shares so that the users can't delete files except their own. Tell users to backup their own files to local backup media b. Enable shadow copies for each share c. Enable shadow copies on the volumes where the shares are hosted d. Give each user a backdrop program and an external hard drive

c. Enable shadow copies on the volumes where the shares are hosted

Which of the following is associated with installing the first domain controller in a forest? a. RODC b. Child domain c. Global catalog d. DHCP

c. Global catalog

You want shared network storage that's easy to set up and geared toward file sharing with several file-sharing protocols, but you don't want the device to be dedicated to file sharing, What should you consider buying? a. SAN b. DAS c. NAS d. LAS

c. NAS

You want to be able to manage a Server Core computer's firewall by using the Windows Firewall with Advanced Security snap-in. What should you do? a. On the local computer, disable the Windows Firewall Remote Management rule group. b. On the remote computer, enter the command Configure-SMRemoting -ConfigureFirewallRules c. On the remote computer, use the PowerShell command Set-NetFirewallRule -DisplayGroup "Windows Firewall Remote Management" -enabled True d.On the local computer, enable the COM+ Network Access firewall rule

c. On the remote computer, use the PowerShell command Set-NetFirewallRule -DisplayGroup "Windows Firewall Remote Management" -enabled True

You need to create a share containing confidential information that only a select group of people should know about. You don't want this share to appear in users' network browse lists. What can you do that involves the least administrative effort and disruption? a. Disable network discovery on all computers b. Disable network discovery on the computers of users who you don't want to see the share c. Put a $ character at the end of the share name d. Put a @ character a the beginning of the share name

c. Put a $ character at the end of the share name

You need a disk system that provides the best performance for a new application that frequently reads and writes data to the disk. You aren't concerned about disk fault tolerance because the data will be backed up each day; performance is the main concern. What type of volume arrangement should you use? a. Spanned volume b. RAID 1 volume c. RAID 0 volume d. RAID 5 volume

c. RAID 0 volume

You're planning to install a new database application that uses an enormous amount of disk space. You need this application to be highly available, so you need a disk system with the capability to auto-correct from disk errors and data corruption. Which of the following is the best option? a. MBR disk with chkdsk b. NTFS format with EFS c. ReFS format and Storage Spaces d. GPT disk with shadow copies

c. ReFS format and Storage Spaces

Which of the following defines the types of information in an Active Directory object? a. GPOs b. Attribute values c. Schema attributes d. Schema classes

c. Schema attributes

Which of the following is a component of Active Directory's physical structure? a. Organizational units b. Domains c. Sites d. Folders

c. Sites

Which of the following is true about NIC teaming? a. You need a minimum of two NICs to create a NIC team b. In failover mode, one NIC is always in standby mode c. Static teaming is used mainly for load balancing d. LACP is the default teaming mode

c. Static teaming is used mainly for load balancing

Which of the following is a new feature in Windows Server 2012 R2 that combines the speed of SSDs with the low cost and capacity of HDDs? a. JBOD b. Thin provisioning c. Storage tiering d. Resilient spaces

c. Storage tiering

Which of the following is defined as a physical component with a disk interface connector? a. Format b. Partition c. Volume d. Disk Drive

d. Disk Drive

You have an Active Directory forest of two trees and eight domains. You haven't changed any operations master domain controllers. On which domain controller is the schema master? a. All domain controllers b. The last domain controller installed c. The first domain controller in the forest root domain d. The first domain controller in each tree

c. The first domain controller in the forest root domain

Which of the following is not one of the four different ways an application can be designated as an exception to a ​Software Restriction Policy?

developer

Which of the following is NOT a standard NTFS permission? a. Read & execute b. Change c. Write d. List folder contents

c. Write

Which of the following is true about installing roles and features in windows server 2012/R2? a. you can't install a server role by using the command line b. All server role installations require a server restart c. You can install more than one role at a time d. server roles can be installed only on online drives

c. You can install more than one role a

A ____________ is a partial copy of a VM made at a particular moment.​

checkpoint

server features

components you can install that provide functions to enhance or support an installed role or add a stand-alone feature

You're reviewing DHCP server statistics and notice that the server has received many DHCPDECLINE messages. What should you configure on the server to reduce the number of DHCPDECLINE messages?

conflict detection

You have a network of 150 computers and notice that a computer you don't recognize has been leasing an IP address. You want to make sure this computer can't lease an address from your server. What's the best solution that takes the least administrative effort?

create a deny filter

Which of the following is a valid IPv6 address?​

​2001::1

Which SMB share option should you enable if you don't want user's to see files they don't have at least Read permission to? a. Offline files b. Hidden shares c. Branch cache d. Access-based enumeration

d. Access-based enumeration

You have a server with Windows Server 2012 R2 installed on Disk 0, a basic disk. You're using the server to store user's documents. You have two more disks that you can install in the server. What should you do if you want to provide fault tolerance for user's documents? a. Convert Disk 0 to dynamic. Create a striped volume using Disk 0, Disk 1 and Disk 2 b. Create a RAID 1 volume from Disk 1 and Disk 2 c. Convert the new disks to GPT. Created a spanned volume using Disk 1 and Disk 2 d. Create a RAID 5 volume from Disk 0, Disk 1 and Disk 2

d. Create a RAID 5 volume from Disk 0, Disk 1 and Disk 2

Which feature in Storage Spaces finds the data on a volume that exists multiple times and reduces it to a single space? a. Disk quotas b. Storage tiering c. Fixed provisioning d. Data deduplication

d. Data deduplication

Which cmdlet shows a list of services related to Hyper-V? a. List-Services Hyper-V -all b. Show-Service -ServiceType Hyper* c. Get-Help Service Hyper-V d. Get-Service -DisplayName Hy*

d. Get-Service -DisplayName Hy*

When installing an additional DC in an existing domain, which of the following is an option for reducing replication traffic? a. New site b. Child domain c. GC server d. IFM

d. IFM

You want to switch automatically identify the links between NICs on a NIC team and the switch so that teams can be created dynamically. What option should you set on the NIC team, and what feature should you look for on the switch? a. LACP, 802.3ad b. Static Teaming, LACP c. Switch Independent, Address Hashing d. LACP, 802.1ax

d. LACP, 802.1ax

Which of the following is true about the three server modes? a. Server Core uses the most resources b. Server with a GUI doesn't have PowerShell c. Minimal Server Interface can't run MMCs d. Minimal Server Interface doesn't have File Explorer

d. Minimal Server Interface doesn't have File Explorer

You come across a file with a .vhd extension on your server's hard disk. What should you do to see the file's contents? a. Right-click the file and click Open b. Open the file in Notepad c. Burn the file to a DVD d. Mount the file

d. Mount the file

You're seeing heavy use on one of your shared printers, and users often have to wait in line to get their print jobs. What printing feature can you use to best alleviate the problem? a. Printer prioritization b. Change availability hours c. Change spooling options d. Printer pooling

d. Printer pooling

Which disk interface technology transfers data over a parallel bus? a. SATA b. USB c. SAS d. SCSI

d. SCSI

Which of the following defines the types of objects in Active Directory? a. GPOs b. Attribute values c. Schema attributes d. Schema classes

d. Schema classes

What must be running to allow you to manage a server remotely with PowerShell? a. Windows Firewall b. LBFO c. Telnet d. WinRm

d. WinRm

Which feature of Windows file sharing should you configure if you want users to be able to access their files securely from mobile devices without having to set up a VPN or configure the firewall? a. Client-side caching b. Offline files c. Access-based enumeration d. Work Folders

d. Work Folders

What type of interface are you likely to find on a DAS device for connecting the device to the server that uses it? a. SATA b. IDE c. PATA d. eSATA

d. eSATA

If an administrator wants to extend an existing volume, what command should be used?

diskpart

What command can be used to change the server edition from Standard to Datacenter after an installation?

dism

Which Windows command line utility below can be used to check for resource records on a server, verify delegations, verify resource records needed for AD replication, and perform e-mail connectivity tests?​

dnslint

Which of the following is the core logical structure container in Active Directory?

domain

You have Windows Server 2012 R2 DNS servers, Windows Server 2008 DNS servers, and two old Windows 2000 DNS servers in a Windows domain. You just created a new zone, newzone.com, that you want replicated by Active Directory to all DNS servers. Where should you store the zone?

domain partition

child domain

domains that share at least the top-level and second-level domain name structure as an existing domain in the forest; also called "subdomains"

The __________ command finds and displays objects in Active Directory that meet specified criteria.

dsquery

Which commands can you use together to change attributes of several users at once?

dsquery and dsmod

Administrators can use ________________, which are virtual hard disks files that grow as data is written to the file.​

dynamically expanding disks

A superscope is a special type of scope that allows a DHCP server to service multiple IPv4 subnets on multiple physical networks, using IPv4 or IPv6.

false

Generation 2 virtual machines support legacy adapters

false

Which of the following accurately represents an FQDN?

host.subdomain.domain.top-level-domain

Where is a local user account stored in a domain environment?

in the SAM database

​Select the operations master role responsible for ensuring that changes made to object names in one domain are updated in references to the object in other domains:

infrastructure master

In what order are group policy settings applied?

local, site, domain, OU

You have just changed the IP address on a computer named computer5 in your domain from 172.31.1.10/24 to 172.31.1.110/24. You were communicating with this computer from your workstation fine right before you changed the address. Now when you try the command ping computer5 from your workstation, you don't get a successful reply. Other computers on the network aren't having a problem communicating with the computer. Which command might help solve the problem?

ipconfig /flushdns

In the New Connection Security Rule Wizard, which connection security rule restricts connections based on authentication criteria, such as domain membership or health status?

isolation

Which type of connection security rule should you configure if you want to prevent computers in your domain from connecting to computers outside the domain?

isolation

Which of the following is a user account category? (Choose all that apply.)

local domain

A server that is connected to different IP networks using two or more NICs is considered to be a _________ server​.

multihomed

What command allows Echo Request packets through the firewall?

netsh firewall set icmpsetting 8

What command can be used to send test queries to a target DNS server?​

nslookup

You want to verify whether a PTR record exists for the server1.csmtech.local host, but you don't know the server's IP address. Which of the following commands should you use to see whether a PTR record exists for server1.csmtech.local?

nslookup server1.csmtech.local, and then nslookup IPAddress returned from the first nslookup

Microsoft site

one or more IP subnets connected by high-speed LAN technology

The ____________________ is a container used to organize users and resources into logical administrative units, and often mimics an organization's administrative structure.

organizational unit

Which of the following account options can't be set together? (Choose all that apply.)

password never expires user must change password at next logon

You have just finished setting up your DNS infrastructure, and the DNS process seems to be working well. You want to be able to create a baseline of performance data so that if slowdowns occur later, you have information for comparison purposes. Which tool should you use?

performance monitor

Which of the following choices is not a valid resource pool type?

power

What Active Directory partition contains the information needed to define objects and object attributes for all domains in the forest?

schema directory

When data within a zone changes, what information in the SOA record changes to reflect that the zone information should be replicated?​

serial number

In the New Connection Security Rule Wizard, what option can be used to set up a rule that requires authentication between two computers, between IP subnets, or between a specific computer and a group of computers in a subnet?​

server-to-server

What is the term used by Microsoft to describe a collection of bug fixes and security updates made since an OS release?

service pack

Which of the following choices is not one of the three user account types defined in Windows Server 2012?

service user account

role services

services that can be installed in Server Manager to add functions to the main role

Which one of the following is not the responsibility of a domain controller?

servicing multiple domains

You want high availability for DHCP services, a primary server to handle most DHCP requests, and a secondary server to respond to client requests only if the primary server fails to in about a second. The primary server has about 85% of the IP addresses to lease, leaving the secondary server with about 15%. You don't want the servers to replicate with each other. What should you configure?

split scope

Which Windows Server 2012/R2 edition includes the license for one virtual instance of Windows Server 2012/R2?

standard edition

Which of the following is not a valid option when configuring automatic start?

start saved virtual machine state

Which PowerShell cmdlet can be used to ​start a virtual machine?

start-VM

Active Directory

the Windows directory service that enables administrators to create and manage users and groups, set network-wide user and computer policies, manage security, and organize network resources

After a template account has been created, what can be done to ensure that the template account does not pose a security risk?

the account should be disabled

root domain controller

the first domain controller installed in an Active Directory forest

​A Group Policy Container (GPC) stores GPO properties and status information, but no actual policy settings.

true

​Storage Quality of Service allows administrators to specify minimum and maximum performance values for virtual hard disks.

true

A _________ hypervisor implements OS virtualization by running on the host computer's hardware, and it controls and monitors guest OSs. It controls access to the host's hardware and provides device drivers for guest OSs.​

type 1

What type of IPv6 address specifies a single interface on a device?​

unicast

What are the four different character types that can make up a Windows password?

uppercase letters, lowercase letters, numerals, and special symbols

Where are DHCP database backups stored by default?

​%systemroot%\System32\dhcp\backup\DhcpCfg


Related study sets

Exam 1 Health Psychology Chapters 1 - 5

View Set

ATI NurseLogic 2.0 Testing and Remediation

View Set

APUSH Short Answer Questions- Chapters 1 and 2

View Set

Perry/Hockenberry chapter 12. High Risk Perinatal Care: Gestational Conditions

View Set