412 Prep Set 2

Card Set Information

Author:
BlackWidow
ID:
288758
Filename:
412 Prep Set 2
Updated:
2014-11-10 00:38:32
Tags:
412 Prep Set
Folders:

Description:
412 Prep Set 2
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user BlackWidow on FreezingBlue Flashcards. What would you like to do?


  1. Your network contains servers that run Windows Server 2012 R2. The network contains a large number of iSCSI storage locations and iSCSI clients. You need to deploy a central repository that can discover and list iSCSI resources on the network automatically. Which feature should you deploy?

    A. the Windows Standards-Based Storage Management feature
    B. the iSCSI Target Storage Provider feature
    C. the iSNS Server service feature
    D. the iSCSI Target Server role service
    C. the iSNS Server service feature
    (this multiple choice question has been scrambled)
  2. You have a file server named FS1 that runs Windows Server 8. Data Deduplication is enabled on FS1. You need to configure Data Deduplication to run at a normal priority from 20:00 to 06:00 daily. What should you configure?

    A. File and Storage Services in Server Manager.
    B. The Data Deduplication process in Task Manager.
    C. Disk Management in Computer Management.
    D. The properties of drive C.
    A. File and Storage Services in Server Manager.
    (this multiple choice question has been scrambled)
  3. Your network contains an Active Directory domain named contoso.com. The domain contains a file server named Server1. All servers run Windows Server 2012 R2. All domain user accounts have the Division attribute automatically populated as part of the user provisioning process. The Support for Dynamic Access Control and Kerberos armoring policy is enabled for the domain. You need to control access to the file shares on Server1 based on the values in the Division attribute and the Division resource property. Which three actions should you perform in sequence?

    • From AD AC create a claim type
    • From AD AC create a reference resource property.
    • On the shared folders, set the classification value.
  4. Your network contains an Active Directory domain named contoso.com. All client computers run Windows 8 Enterprise. You have a remote site that only contains client computers. All of the client computer accounts are located in an organizational unit (CU) named Remote1. A Group Policy object (GPO) named GPO1 is linked to the Remote1 OU. You need to configure BranchCache for the remote site. Which two settings should you configure in GPO1?

    • Turn on BranchCache
    • Set Branch Cache Distributed Cache mode.
  5. Your company has a main office and a branch office. An Active Directory site exists for each office.The network contains an Active Directory forest named contoso.com. The contoso.com domain contains three member servers named Server1, Server2, and Server3. All servers run WindowsServer 2012 R2.

    In the main office, you configure Server1 as a file server that uses BranchCache.In the branch office, you configure Server2 and Server3 as BranchCache hosted cache servers.

    You are creating a Group Policy for the branch office site.

    In the branch office, you need to configure the client computers that run Windows 8 to use Server2 and Server3 as BranchCache.



    • Turn on Branch Cache
    • Configure Hosted Cache Servers
  6. Your network contains two Active Directory forests named contoso.com and fabrikam.com. A two-way forest trust exists between the forests. The contoso.com forest contains an enterprise certification authority (CA) named CA1.

    You implement cross-forest certificate enrollment between the contoso.com forest and the fabrikam.com forest.
    On CA1, you create a new certificate template named Template1.

    You need to ensure that users in the fabrikam.com forest can request certificates that are based on Template1.
    Which tool should you use?

    A. Certutil
    B. CertificateServices.ps1
    C. Sync-ADObject
    D. PKISync.ps1
    E. Pkiview.msc
    D. PKISync.ps1
    (this multiple choice question has been scrambled)
  7. Your network contains an Active Directory domain named contoso.com. The domain contains an enterprise certification authority (CA). The domain contains a server named Server1 that runs Windows Server 2012 R2.

    You install the Active Directory Federation Services server role on Server1. You plan to configure Server1 as an Active Directory Federation Services (AD FS) server.

    The Federation Service name will be set to adfs1.contoso.com.

    You need to identify which type of certificate template you must use to request a certificate for AD FS.



    Web Server
  8. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Active Directory Certificate Services server role installed and is configured as an enterprise certification authority(CA).

    You need to ensure that all of the users in the domain are issued a certificate that can be used for the following purposes:

     Email security

     Client authentication

     Encrypting File System (EFS)

    Which two actions should you perform? (Each correct answer presents part of the solution.Choose two.)

    A. From a Group Policy, configure the Certificate Services Client - Auto-Enrollment settings.

    B. From a Group Policy, configure the Certificate Services Client - Certificate Enrollment Policysettings.

    C. Modify the properties of the User certificate template, and then publish the template.

    D. Duplicate the User certificate template, and then publish the template.

    E. From a Group Policy, configure the Automatic Certificate Request Settings settings.
    A. From a Group Policy, configure the Certificate Services Client - Auto-Enrollment settings.

    D. Duplicate the User certificate template, and then publish the template.
  9. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. The system properties of Server1 are shown in the exhibit.



    You need to configure Server1 as an enterprise subordinate certification authority (CA).

    What should you do first?

    A. Add RAM to the server.

    B. Set the Startup Type of the Certificate Propagation service to Automatic.

    C. Install the Certification Authority Web Enrollment role service.

    D. Join Server1 to the contoso.com domain.
    B. Set the Startup Type of the Certificate Propagation service to Automatic.
  10. Your network contains an Active Directory domain named contoso.com. The domain contains two Active Directory sites named Site1 and Site2.

    You need to configure the replication between the sites to occur by using change notification.

    Which attribute should you modify?

    • Options, you must modify the options attribute
  11. Your network contains an Active Directory domain named contoso.com. The domain contains amain office and a branch office. An Active Directory site exists for each office. All domain controllers run Windows Server 2012 R2. The domain contains two domain controllers. The domain controllers are configured as shown in the following table.



    DC1 hosts an Active Directory-integrated zone for contoso.com. You add the DNS Server server role to DC2. You discover that the contoso.com DNS zone fails to replicate to DC2. You verify that the domain, schema, and configuration naming contexts replicate from DC1 to DC2.

    You need to ensure that DC2 replicates the contoso.com zone by using Active Directory replication.
    Whichtool should you use?

    A. Dnslint

    B. A DNS Manager

    C. Active Directory Users and Computers

    D. Dnscmd
    A. Dnslint
  12. Your network contains an Active Directory forest named adatum.com. The forest contains a single domain. The domain contains four servers. The servers are configured as shown in the following table.



    You need to update the schema to support a domain controller that will run Windows Server 2012 R2. On which server should you run adprep.exe?

    A. Server1

    B. DC3

    C. DC2

    D. DC1
    DC3 - It is Win Server 2008 R2.
  13. Your network contains an Active Directory domain named contoso.com. The domain contains domain controllers that run either Windows Server 2003, Windows Server 2008 R2, or Windows Server 2012 R2.

    You plan to implement a new Active Directory forest. The new forest will be used for testing and will be isolated from the production network.

    In the test network, you deploy a server named Server1 that runs Windows Server 2012 R2. You need to configure Server1 as a new domain controller in a new forest named contoso.test.

    The solution must meet the following.

    The functional level of the forest and of the domain must be the same as that of contoso.com.

    Server1 must provide name resolution services for contoso.test. 

    What should you do?





    A. There is no need to set the Forest Functional Level.

    B. Set Forest Functional Level to Windows 2003.

    C. Set Forest Functional Level to Windows 2008

    D. Set Forest Functional Level to Windows 2008 R2.

    E. Set Forest Functional Level to Windows 2012.

    F. There is no need to set the Domain Functional Level.

    G. Set Domain Functional Level to Windows 2003.

    H. Set Domain Functional Level to Windows 2008

    I. Set Domain Functional Level to Windows 2008 R2.

    J. Set Domain Functional Level to Windows 2012.
    B. Set Forest Functional Level to Windows 2003.

    F. There is no need to set the Domain Functional Level.

    H. Set Domain Functional Level to Windows 2008
  14. Your network contains two Active Directory forests named contoso.com and fabrikam.com. The contoso.com forest contains two domains named corp.contoso.com and contoso.com.

    You establish a two-way forest trust between contoso.com and fabrikam.com. Users from the corp.contoso.com domain report that they cannot log on to client computers in the fabrikam.com domain by using their corp.contoso.com user account. When they try to log on, they receive following error message:

    “The computer you are signing into is protected by an authentication firewall. The specified account is not allowed to authenticate to the computer.”

    Corp.contoso.com users can log on successfully to client computers in the contoso.com domain by using their corp.contoso.com user account credentials.

    You need to allow users from the corp.contoso.com domain to log on to the client computers in the fabrikam.com forest. What should you do?

    A. Configure Windows Firewall with Advanced Security.

    B. Enable SID history.

    C. Configure forest-wide authentication.

    D. Instruct the users to log on by using a user principal name (UPN).
    C. Configure forest-wide authentication.
  15. Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Both servers have the Hyper-V server role installed. The servers have the hardware configurations shown in the following table.



    Server1 hosts five virtual machines that run Windows Server 2012 R2. You need to move the virtual machines from Server1 to Server2.

    The solution must minimize downtime. What should you do for each virtual machine?

    A. Export the virtual machines from Server1 and import the virtual machines to Server2.

    B. Perform a live migration.

    C. Perform a quick migration.

    D. Perform a storage migration.
    A. Export the virtual machines from Server1 and import the virtual machines to Server2.
  16. Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2. Both servers have the Hyper-V server role installed.

    You plan to replicate virtual machines between Server1 and Server2. The replication will be encrypted by using Secure Sockets Layer (SSL).

    You need to request a certificate on Server1 to ensure that the virtual machine replication is encrypted. Which two intended purposes should the certificate for Server1 contain?

    (Each correct answer presents part of the solution. Choose two.)

    A. Client Authentication

    B. Kernel Mode Code Signing

    C. Server Authentication

    D. IP Security end system

    E. KDC Authentication
    • A. Client Authentication
    • E. KDC Authentication
  17. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2 that run Windows Server 2012 R2. Both servers have the Hyper-V server role installed.

    The network contains an enterprise certification authority(CA). All servers are enrolled automatically for a certificate-based on the Computer certificate template.

    On Server1, you have a virtual machine named VM1. VM1 is replicated to Server2. You need to encrypt the replication of VM1.

    Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

    A. On Server1, modify the settings of VM1.

    B. On Server2, modify the settings of VM1.

    C. On Server2, modify the Hyper-V Settings.

    D. On Server1, modify the Hyper-V Settings.

    E. On Server1, modify the settings of the virtual switch to which VM1 is connected.

    F. On Server2, modify the settings of the virtual switch to which VM1 is connected.
    • A. On Server1, modify the settings of VM1.
    • F. On Server2, modify the settings of the virtual switch to which VM1 is connected.
  18. Your network contains an Active Directory domain named contoso.com. The domain contains a file server named Server1 that runs Windows Server 2012 R2.

    You create a user account named User1 in the domain. You need to ensure that User1 can use Windows Server Backup to back up Server1. The solution must minimize the number of administrative rights assigned to User1.

    What should you do?

    A. Add User1 to the Backup Operators group.

    B. Add User1 to the Power Users group.

    C. Assign User1 the Backup files and directories user right and the Restore files and directories user right.

    D. Assign User1 the Backup files and directories user right.
    D. Assign User1 the Backup files and directories user right.
  19. You have a server named Server1 that runs Windows Server 2012 R2 and is used for testing.

    A developer at your company creates and installs an unsigned kernel-mode driver on Server1. The developer reports that Server1 will no longer start. You need to ensure that the developer can test the new driver. The solution must minimize the amount of data loss.

    Which Advanced Boot Option should you select?

    A. Disable Driver Signature Enforcement

    B. Disable automatic restart on system failure

    C. Last Know Good Configuration (advanced)

    D. Repair Your Computer
    A. Disable Driver Signature Enforcement
  20. You have a fail over cluster named Cluster1 that contains four nodes. All of the nodes run Windows Server 2012 R2.

    You need to schedule the installation of Windows updates on the cluster nodes.

    Which tool should you use?

    A. The Wusa command

    B. The Invoke-CauScan cmdlet

    C. The Add-CauClusterRole cmdlet

    D. The Wuauclt command
    C. The Add-CauClusterRole cmdlet
  21. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1.

    You add two additional nodes in Cluster1. You have a folder named Folder1 on Server1 that hosts App1ication data. Folder1 is a folder target in a Distributed File System (DFS) namespace.

    You need to provide highly available access to Folder1. The solution must support DFS Replication to Folder1. What should you configure?

    A. Affinity-None

    B. Affinity-Single

    C. The cluster quorum settings

    D. The failover settings

    E. A file server for general use

    F. The Handling priority

    G. The host priority

    H. Live migration

    I. The possible owner

    J. The preferred owner

    K. Quick migration

    L. The Scale-Out File Server
    E. A file server for general use
  22. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2.

    Server1 and Server2 have the Network Load Balancing (NLB) feature installed. The servers are configured as nodes in an NLB cluster named Cluster1. Port rules are configured for all clustered App1ications.

    You need to ensure that Server2 handles all client requests to the cluster that are NOT covered by a port rule.

    What should you configure?

    A. Affinity-None

    B. Affinity-Single

    C. The cluster quorum settings

    D. The failover settings

    E. A file server for general use

    F. The Handling priority

    G. The host priority

    H. Live migration

    I. The possible owner

    J. The preferred owner

    K. Quick migration

    L. The Scale-Out File Server
    G. The host priority
  23. Your network contains an Active Directory domain named contoso.com.

    A previous administrator implemented a Proof of Concept installation of Active Directory Rights Management Services (AD RMS). After the proof of concept was complete, the Active Directory Rights Management Services server role was removed.

    You attempt to deploy AD RMS. During the configuration of AD RMS,you receive an error message indicating that an existing AD RMS Service Connection Point (SCP) was found.

    You need to remove the existing AD RMS SCP. Which tool should you use?

    A. ADSI Edit

    B. Active Directory Users and Computers

    C. Active Directory Domains and Trusts

    D. Active Directory Sites and Services

    E. Services

    F. Authorization Manager

    G. TPM Management

    H. Certification Authority
    • A. ADSI Edit
    • D. Active Directory Sites and Services
  24. Your network contains an Active Directory forest. The forest contains two domains named contoso.com and fabrikam.com. The functional level of the forest is Windows Server 2003.

    You have a domain outside the forest named adatum.com. You need to configure an access solution to meet the following requirements:

     Users in adatum.com must be able to access resources in contoso.com.

     Users in adatum.com must be prevented from accessing resources in fabrikam.com.

     Users in both contoso.com and fabrikam.com must be prevented from accessing resources in adatum.com.What should you create?

    A. a one-way realm trust from contoso.com to adatum.com

    B. a one-way realm trust from adatum.com to contoso.com

    C. a one-way external trust from contoso.com to adatum.com

    D. a one-way external trust from adatum.com to contoso.com
    D. a one-way external trust from adatum.com to contoso.com
  25. Your network contains an Active Directory domain named contoso.com. The domain contains amain office and a branch office. An Active Directory site exists for each office. All domain controllers run Windows Server 2012 R2.

    The domain contains two domain controllers. DC1 hosts an Active Directory-integrated zone for contoso.com. You add the DNS Server server role to DC2.

    You discover that the contoso.com DNS zone fails to replicate to DC2. You verify that the domain,schema, and configuration naming contexts replicate from DC1 to DC2.

    You need to ensure that DC2 replicates the contoso.com zone by using Active Directory replication. Which tool should youuse?

    A. Dnscmd

    B. Dnslint

    C. Repadmin

    D. Ntdsutil

    E. DNS Manager

    F. Active Directory Sites and Services

    G. Active Directory Domains and Trusts

    H. Active Directory Users and Computers
    F. Active Directory Sites and Services
  26. You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the File Server Resource Manager role service installed.

    You attempt to delete a classification property and you receive the error message as shown in the exhibit.



    You need to delete the isConfidential classification property. What should you do?

    A. Delete the classification rule that is assigned the isConfidential classification property.

    B. Disable the classification rule that is assigned the isConfidential classification property.

    C. Set files that have an isConfidential classification property value of Yes to No.

    D. Clear the isConfidential classification property value of all files.
    A. Delete the classification rule that is assigned the isConfidential classification property.
  27. You have a server named Server 1 that runs Windows Server 2012 R2.

    Server1 has five network adapters.
    Three of the network adapters are connected to a network named LAN1.
    The two other network adapters are connected to a network named LAN2.

    You create a network adapter team named Team1 from two of the adapters connected to LAN1.
    You create a network adapter team named Team2 from the two adapters connected to LAN2.

    A company policy states that all server IP addresses must be assigned by using a reserved address in DHCP.

    You need to identify how many DHCP reservations you must create for Server1. How many reservations should you identify?

    A. 2

    B. 3

    C. 5

    D. 7
    B. 3
  28. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2.

    Server1 has the IP Address Management (IPAM) Server feature installed. IPAM is configured currently for Group Policy-based provisioning.

    You need to change the IPAM provisioning method on Server1. What should youdo?

    A. Run the ipamgc.exe command.

    B. Run the Set-IPAMConfiguration cmdlet.

    C. Reinstall the IP Address Management (IPAM) Server feature.

    D. Delete IPAM Group Policy objects (GPOs) from the domain.
    C. Reinstall the IP Address Management (IPAM) Server feature.
  29. Your network contains an Active Directory domain named contoso.com. Domain controllers run either Windows Server 2008, Windows Server 2008 R2, or Windows Server 2012 R2.

    You have a Password Settings object (PSOs) named PSO1. You need to view the settings of PSO1. Which tool should you use?

    A. Get-ADDomainControllerPasswordReplicationPolicy

    B. Get-ADDefaultDomainPasswordPolicy

    C. Server Manager

    D. Get-ADFineGrainedPasswordPolicy
    D. Get-ADFineGrainedPasswordPolicy
  30. Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2. Both servers have the IP Address Management (IPAM) Server feature installed.

    You have a support technician named Tech1. Tech1 is a member of the IPAM Administrators group on Server1 and Server2.

    You need to ensure that Tech1 can use ServerManager on Server1 to manage IPAM on Server2.

    To which group on Server2 should you add Tech1?

    A. IPAM MSM Administrators

    B. IPAM Administrators

    C. winRMRemoteWMIUsers_

    D. Remote Management Users
    C. winRMRemoteWMIUsers_
  31. You have a server named Server2 that runs Windows Server 2012 R2. You have storage provisioned on Server2 as shown in the exhibit.



    You need to configure the storage so that it appears in Windows Explorer as a drive letter on Server1.

    Which three actions should you perform in sequence?

    To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.

    Select and Place:

    • On Server 2 - Add an iSCSI initiator ID to target1,
    • On Server 1, configure the iSCSI initiator to connect to target 1
    • On Server 1, create a new volume from Server Manager
  32. Your network contains two Active Directory forests named contoso.com and adatum.com. Both forests contain multiple domains. All domain controllers run Windows Server 2012 R2.

    Contoso.com has a one-way forest trust to adatum.com. A domain named paris.eu.contoso.com hosts several legacy App1ications that use NTLM authentication.
    Users in a domain named london.europe.adatum.com report that it takes a long time to be authenticated when they attempt to access the legacy App1ications hosted in paris.eu.contoso.com.
    You need to reducehow long it takes for the london.europe.adatum.com users to be authenticated in paris.eu.contoso.com.

    What should you do?

    A. Create a shortcut trust.

    B. Create an external trust between the forest root domains.

    C. Disable SID filtering on the existing trust.

    D. Create an external trust.
    A. Create a shortcut trust.
  33. Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2.
    You are creating a central access rule named Test Finance that will be used to audit members of the Authenticated Users group for access failure to shared folders in the finance department.

    You need to ensure that access requests are unaffected when the rule is published. What should you do?

    A. Add a User condition to the current permissions entry for the Authenticated Users principal.

    B. Set the Permissions to Use the following permissions as proposed permissions.

    C. Add a Resource condition to the current permissions entry for the Authenticated Users principal.

    D. Set the Permissions to Use following permissions as current permissions.
    B. Set the Permissions to Use the following permissions as proposed permissions.
  34. You have a server named Server1 that runs Windows Server 2012 R2. Windows Server 2012 R2 is installed on volume C.

    You need to ensure that Safe Mode with Command Prompt loads the next time Server1 restarts. Which tool should you use?

    A. The Restart-Server cmdlet

    B. The Bootcfg command

    C. The Restart-Computer cmdlet

    D. The Bcdedit command
    D. The Bcdedit command
  35. You have a server named Server1 that runs a Server Core Installation of Windows Server 2012 R2. Shadows copies are enabled on all volumes.

    You need to delete a specific shadow copy. The solution must minimize server downtime. Which tool should you use?

    A. Vssadmin

    B. Diskpart

    C. Wbadmin

    D. Shadow
    A. Vssadmin
  36. Your network contains two Active Directory forests named contoso.com and litwareinc.com.

    A two-way forest trusts exists between the forest. Selective authentication is enabled on the trust. The contoso.com forest contains a server named Server1. 

    you need to ensure that users inlitwareinc.com can access resources on Server1.

    What should you do?

    A. Install Active Directory Rights Management Services on a domain controller in contoso.com.

    B. Modify the permission on the Server1 computer account.

    C. Install Active Directory Rights Management Services on a domain controller inlitwareinc.com.

    D. Configure SID filtering on the trust.
    B. Modify the permission on the Server1 computer account.
  37. Your network contains two Web servers named Server1 and Server2. Server1 and Server2 are nodes in a Network Load Balancing (NLB) cluster. You configure the nodes to use the port rule shown in the exhibit.



    You need to configure the NLB cluster to meet the following requirements:

     HTTPS connections must be directed to Server1 if Server1 is available.

     HTTP connections must be load balanced between the two nodes.

    Which three actions should you perform? (Each correct answer presents part of the solution.Choose three.)

    A. From the host properties of Server1, set the Handling priority of the existing port rule to 2.

    B. From the host properties of Server1, set the Handling priority of the existing port rule to 1.

    C. From the host properties of Server2, set the Priority (Unique host ID) value to 1.

    D. Create a port rule for TCP port 80. Set the Filtering mode to Multiple host and set the Affinity to None.

    E. From the host properties of Server2, set the Handling priority of the existing port rule to 2.

    F. Create an additional port rule for TCP port 443. Set the Filtering mode to Multiple host and set the Affinity to Single.
    B. From the host properties of Server1, set the Handling priority of the existing port rule to 1.

    D. Create a port rule for TCP port 80. Set the Filtering mode to Multiple host and set the Affinity to None.

    E. From the host properties of Server2, set the Handling priority of the existing port rule to 2.
  38. Your network contains an Active Directory domain named contoso.com.

    The domain contains a domain controller named DC1 that runs Windows Server 2012 R2. DC1 has the DHCP Server server role installed. DHCP is configured as shown in the exhibit.



    You discover that client computers cannot obtain IPv4 addresses from DC1. You need to ensure that the client computers can obtain IPv4 addresses from DC1.

    What should you do?

    A. Activate the scope.

    B. Authorize DC1.

    C. Disable the Allow filters.

    D. Disable the Deny filters.
    C. Disable the Allow filters.
  39. Your network contains an Active Directory domain named contoso.com. The domain contains a file server named Server1 and a domain controller named DC1. All servers run Windows Server2012 R2.

    A Group Policy object (GPO) named GPO1 is linked to the domain. Server1 contains a folder named Folder1. Folder1 is shared as Share1.

    You need to ensure that authenticated users can request assistance when they are denied access to the resources on Server1.

    Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

    A. Assign the Read Attributes NTFS permission on Folder1 to the Authenticated Users group.

    B. Install the File Server Resource Manager role service on Server1.

    C. Configure the Customize message for Access Denied errors policy setting of GPO1.

    D. Enable the Enable access-denied assistance on client for all file types policy setting for GPO1.

    E. Install the File Server Resource Manager role service on DC1.
    B. Install the File Server Resource Manager role service on Server1.

    D. Enable the Enable access-denied assistance on client for all file types policy setting for GPO1.
  40. Your network contains an Active Directory domain named adatum.com. All domain controllers run Windows Server 2008 R2.

    The domain contains a file server named Server6 that runs Windows Server 2012 R2. Server6 contains a folder named Folder1. Folder1 is shared as Share1. The NTFS permissions on Folder1 are shown in the exhibit.



    The domain contains two global groups named Group1 and Group2.

    You need to ensure that only users who are members of both Group1 and Group2 are denied access to Folder1.

    Which two actions should you perform? (Each correct answer presents part ofthe solution. Choose two.)

    A. Remove the Deny permission for Group1 from Folder1.

    B. Deny Group2 permission to Folder1.

    C. Install a domain controller that runs Windows Server 2012 R2.

    D. Create a conditional expression.

    E. Deny Group2 permission to Share1.

    F. Deny Group1 permission to Share1.
    C. Install a domain controller that runs Windows Server 2012 R2.

    D. Create a conditional expression.
  41. Your network contains an Active Directory forest. The forest contains a single domain named contoso.com.

    The forest contains two Active Directory sites named Main and Branch1. The sites connect to each other by using a site link named Main-Branch1. There are no other site links. Each site contains several domain controllers. All domain controllers run Windows Server 2012 R2.

    Your company plans to open a new branch site named Branch2. The new site will have a WAN link that connects to the Main site only. The site will contain two domain controllers that run Windows Server 2012 R2.

    You need to create a new site and a new site link for Branch2. The solution must ensure that the domain controllers in Branch2 only replicate to the domain controllers in Branch1 if all of the domain controllers in Main are unavailable.

    Which three actions should you perform? To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.

    • Disable site link bridging
    • Add Branch2 to the Main-Branch1 site link

    Create a new site link object named Main-Branch 2
  42. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2 that run Windows Server 2012 R2.

    You configure a new failover cluster named Cluster1. Server1 and Server2 are nodes in Cluster1.

    You need to configure the disk that will be used as a witness disk for Cluster1. How should you configure the witness disk?

    To answer, drag the appropriate configurations to the correct location or locations. Each configuration may be used once, more than once, or not at all. 

  43. Your network contains an Active Directory forest named contoso.com that contains a single domain.

    The forest contains three sites named Site1, Site2, and Site3. Domain controllers run either Windows Server 2008 R2 or Windows Server 2012 R2. Each site contains two domain controllers. Site1 and Site2 contain a global catalog server.

    You need to create a new site link between Site1 and Site2. The solution must ensure that the site link supports the replication of all the naming contexts.

    From which node should you create the site link?

    To answer, select the appropriate node in the answer area.

  44. Your network contains an Active Directory domain named adatum.com. All servers run WindowsServer 2012 R2. All domain controllers have the DNS Server server role installed.

    You have a domain controller named DC1. On DC1, you create an Active Directory-integrated zone named adatum.com and you sign the zone by using DNSSEC. You deploy a new read-only domain controller (RODC) named RODC1.

    You need to ensure that the contoso.com zone replicates to RODC1. What should you configure on DC1?

    To answer, select the appropriate tab in the answer area.

  45. You have a server named Server1 that runs Windows Server 2012 R2. Server1 has a single volume that is encrypted by using

    BitLocker Drive Encryption (BitLocker). BitLocker is configured to save encryption keys to a Trusted Platform Module (TPM). Server1 is configured to perform a daily system image backup.

    The motherboard on Server1 is upgraded. After the upgrade, Windows Server 2012 R2 on Server1 fails to start.

    You need to start the operating system on Server1 as soon as possible.

    What should you do?

    A. Start Server1 from the installation media. Run startrec.exe.

    B. Move the disk to a server that has a model of the old motherboard. Start the server from theinstallation media. Run bcdboot.exe.

    C. Move the disk to a server that has a model of the old motherboard. Start the server. Runtpm.msc.

    D. Start Server1 from the installation media. Perform a system image recovery.
    D. Start Server1 from the installation media. Perform a system image recovery.
  46. You have a test server named Server1 that is configured to dual-boot between Windows Server2008 R2 and Windows Server 2012 R2.

    You start Server1 and you discover that the boot entry for Windows Server 2008 R2 no longer appears on the boot menu. You start Windows Server 2012R2 on Server1 and you discover the disk configurations shown in the following table.



    You need to restore the Windows Server 2008 R2 boot entry on Server1.

    What should you do?

    A. Run bootrec.exe and specify the /scanos parameter.

    B. Run bcdedit.exe and specify the /create store parameter.

    C. Run bootcfg.exe and specify the /copy parameter.

    D. Run bootrec.exe and specify the /rebuildbcd parameter.
    D. Run bootrec.exe and specify the /rebuildbcd parameter.
  47. You have 3 server named LON-DC1 that runs Windows Server 2012 R2. An iSCSI virtual disk named VirtualiSCSIl.vhd exists on LON-DC1 as shown in the exhibit.

    You create a new iSCSI virtual disk named VirtualiSCSI2.vhd by using the existing itgt iSCSI target.VirtualiSCSIl.vhd is removed from LON-DC1.

    You need to assign VirtualiSCSI2.vhd a logical unit value of 0.

    What should you do?

    A. Modify the properties of the VirtualiSCSI2.vhd iSCSI virtual disk.

    B. Run the Add-IscsiVirtualDiskTargetMapping cmdlet and specify the -Lun parameter.

    C. Run the iscsicli command and specify the reportluns parameter.

    D. Run the iscsicpl command and specify the virtualdisklun parameter.
    B. Run the Add-IscsiVirtualDiskTargetMapping cmdlet and specify the -Lun parameter.
  48. Your network contains an Active Directory forest named contoso.com. The forest contains a single domain.

    The forest contains three Active Directory sites named SiteA, SiteB, and SiteC. The sites contain four domain controllers. The domain controllers are configured as shown in the following table.



    An IP site link exits between each site. You discover that the users in SiteC are authenticated by the domain controllers in SiteA and SiteB.

    You need to ensure that the SiteC users are authenticated by the domain controllers in SiteB, unless all of the domain controllers in SiteB are unavailable.

    What should you do?

    A. Create a site link bridge.

    B. Create additional connection objects for DC3 and DC4.

    C. Create additional connection objects for DC1 and DC2.

    D. Increase the cost of the site link between SiteA and SiteC.
    D. Increase the cost of the site link between SiteA and SiteC.
  49. You have a file server named Server1 that runs Windows Server 2012 R2. The folders on Server1 are configured as shown in the following table.



    A new corporate policy states that backups must use Windows Azure Online Backup whenever possible.

    You need to identify which technology you must use to back up Server1. The solution must use Windows Azure Online Backup whenever possible.

    What should you identify?

  50. You have a server named File1 that runs Windows Server 2012 R2. File1 has the File Server role service installed.

    You plan to back up all shared folders by using Windows Azure Online Backup. You download and install the Windows Azure Online Backup Service Agent on File1.

    You need to ensure that you use Windows Server Backup to back up data to Windows Azure Online Backup.

    What should you do?

    A. From Computer Management, add the File1 computer account to the Backup Operators group.

    B. From the Services console, modify the Log On settings of the Windows Azure Online Backup Service Agent.

    C. From Windows Server Backup, run the Register Server Wizard.

    D. From a command prompt, run wbadmin.exe enable backup.
    C. From Windows Server Backup, run the Register Server Wizard.

What would you like to do?

Home > Flashcards > Print Preview