412 Set 4

Card Set Information

Author:
BlackWidow
ID:
288779
Filename:
412 Set 4
Updated:
2014-11-10 04:18:53
Tags:
412 Set
Folders:

Description:
412 Set 4
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user BlackWidow on FreezingBlue Flashcards. What would you like to do?


  1. Your network contains an Active Directory domain named contoso.com. The domain contains domain controllers that run either Windows Server 2003, Windows Server 2008 R2, or Windows Server 2012 R2.

    You plan to implement a new Active Directory forest. The new forest will be used for testing and will be isolated from the production network. In the test network, you deploy a server named Server1 that runs Windows Server 2012 R2.

    You need to configure Server1 as a new domain controller in a new forest named contoso.test. The solution must meet the following requirements:

     The functional level of the forest and of the domain must be the same as that of contoso.com.

     Server1 must provide name resolution services for contoso.test.

    What should you do?

  2. You have 30 servers that run Windows Server 2012 R2. All of the servers are backed up daily by using Windows Azure Online Backup.

    You need to perform an immediate backup of all the servers to Windows Azure Online Backup.

    Which Windows PowerShell cmdlets should you run on each server?

    A. Get-OBPolicy | StartOBBackup

    B. Start-OBRegistration | StartOBBackup

    C. Get-WBPolicy | Start-WBBackup

    D. Get-WBBackupTarget | Start-WBBackup
    A. Get-OBPolicy | StartOBBackup
  3. Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 and Server2 have the Hyper-V server role installed.

    Server1 and Server2 have different processor models from the same manufacturer.

    On Server1, you plan to create a virtual machine named VM1. Eventually, VM1 will be exported to Server2.

    You need to ensure that when you import VM1 to Server2, you can start VM1 from saved snapshots.

    What should you configure on VM1?

  4. Your network contains an Active Directory domain named contoso.com. The domain contains a file server named Server1.

    Server1 is a BranchCache hosted cache server that is located in a branch office. The network contains client computers that run either Windows 7 or Windows 8. For the branch office, all of the user accounts and the client computer accounts are located in an organizational unit (OU) named Branch1. A Group Policy object (GPO) named GPO1 is linked to Branch 1. GPO1 contains the BranchCache settings.

    You discover that users in the branch office who have client computers that run Windows 7 do not access cached content from Server1. Users in the branch office who have Windows 8 computers can access cached content from Server1.

    You need to configure the Windows 7 computers to use BranchCache on Server1. Which setting should you configure in GPO1?

  5. Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. The domain contains two domain controllers. The domain controllers are configured as shown in the following table.



    The Branch site contains a member server named Server1 that runs Windows Server 2012 R2.

    You need to identify which domain controller authenticated the computer account of Server1. What should you do?

    A. Verify the value of the %LOGONSERVER% environment variable.

    B. Run nltest /sc_query.

    C. Verify the value of the %SESSIONNAME% environment variable.

    D. Run nltest /dsgetsite.
    A. Verify the value of the %LOGONSERVER% environment variable.
  6. Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 is a file server that has the Hyper-V server role installed. Server1 hosts several virtual machines.

    The virtual machine configuration files are stored on drive D and the VHD files are stored on drive E. You plan to replace drive E with a larger volume.

    You need to ensure that the virtual machines on Server1 remain available while drive E is being replaced. What should you do?

    A. Perform a quick migration.

    B. Add Server1 and Server2 as nodes in a failover cluster.

    C. Perform a live migration.

    D. Perform a storage migration.
    D. Perform a storage migration.
  7. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. Server1 and Server2 have the Failover Clustering feature installed.

    The servers are configured as nodes in a failover cluster named Cluster1. Cluster1 has access to four physical disks. The disks are configured as shown in the following table.



    You need to identify which disk can be added to a Clustered Storage Space in Cluster1. Which disk should you identify?

    A. Disk1

    B. Disk2

    C. Disk3

    D. Disk4
    B. Disk2
  8. Your network contains an Active Directory domain named contoso.com. The domain contains a file server named File1 that runs a Server Core Installation of Windows Server 2012 R2.

    File1 has a volume named D that contains home folders. File1 creates a shadow copy of volume D twice a day. You discover that volume D is almost full. You add a new volume named H to File1.

    You need to ensure that the shadow copies of volume D are stored on volume H. Which command should you run?

    A. The Set-Volume cmdlet with the -driveletter parameter.

    B. The vssadmin.exe create shadow command.

    C. The Set-Volume cmdlet with the -path parameter.

    D. The vssadmin.exe add shadowstorage command.
    D. The vssadmin.exe add shadowstorage command.
  9. Your network contains two DHCP servers named Server1 and Server2. Server1 fails. You discover that DHCP clients can no longer receive IP address leases.

    You need to ensure that the DHCP clients receive IP addresses immediately.

    What should you configure from the View/Edit Failover Relationship settings?

  10. Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The forest contains three Active Directory sites named SiteA, SiteB, and SiteC.

    The sites contain four domain controllers. The domain controllers are configured as shown in the following table.



    You discover that the users in SiteC are authenticated by the domain controllers in SiteA and SiteB.

    You need to ensure that the SiteC users are authenticated by the domain controllers in SiteB, unless all of the domain controllers in SiteB are unavailable.

    What should you do?

    A. Create additional connection objects for DC3 and DC4.

    B. Decrease the cost of the site link between SiteB and SiteC.

    C. Create a site link bridge.

    D. Disable site link bridging
    B. Decrease the cost of the site link between SiteB and SiteC.
  11. Your network contains four Active Directory forests. Each forest contains an Active Directory Rights Management Services (AD RMS) root cluster.

    All of the users in all of the forests must be able to access protected content from any of the forests.

    You need to identify the minimum number of AD RMS trusts required.

    How many trusts should you identify?

    A. 3

    B. 6

    C. 12

    D. 16
    C. 12
  12. Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC2 that runs Windows Server 2012 R2.

    DC2 has the DHCP Server server role installed. DHCP is configured as shown in the exhibit.

    You discover that client computers cannot obtain IPv4 addresses from DC2.

    You need to ensure that the client computers can obtain IPv4 addresses from DC2. What should you do?

    A. Disable the Deny filters.

    B. Enable the Allow filters.

    C. Authorize DC2.

    D. Restart the DHCP Server service.
    C. Authorize DC2.
  13. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the DHCP Server server role installed.

    Server1 has a scope named Scope1. A policy named Policy1 is configured for Scope1. Policy1 is configured to provide Hyper-V virtual machines a one-day lease. All other computers receive an eight-day lease.

    You implement an additional DHCP server named Server2 that runs Windows Server 2012 R2. On Server1, you configure Scope1 for DHCP failover. You discover that virtual machines that receive IP addresses from Server2 have a lease duration of eight days.

    You need to ensure that when Server2 assigns IP addresses to the Hyper-V virtual machines, the lease duration is one day. The solution must ensure that other computers that receive IP addresses from Server2 have a lease duration of eight days.

    What should you do?

    A. On Server2, create a new DHCP policy.

    B. On Server1, right-click Scope1, and then click Replicate Scope.

    C. On Server1, delete Policy1, and then recreate the policy.

    D. On Server2, right-click Scope1, and then click Reconcile.
    A. On Server2, create a new DHCP policy.
  14. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2.

    You need to ensure that a WIM file that is located on a network share is used as the installation source when installing server roles and features on Server1.

    Which two actions should you perform? (Each correct answer presentspart of the solution. Choose two.)

    A. Run the dism.exe command and specify the /remove-package parameter.

    B. Run the Remove-WindowsFeature cmdlet.

    C. Enable and configure the Specify settings for optional component installation andcomponent repair policy setting by using a Group Policy object (GPO).

    D. Enable the Enforce upgrade component rules policy setting by using a Group Policy object(GPO).

    E. Run the Remove-WindowsPackage cmdlet.
    A. Run the dism.exe command and specify the /remove-package parameter.

    C. Enable and configure the Specify settings for optional component installation and component repair policy setting by using a Group Policy object (GPO).
  15. Your network contains an Active Directory forest. The forest contains two domains named contoso.com and fabrikam.com. The functional level of the forest is Windows Server 2003.

    You have a domain outside the forest named litwareinc.com.

    You need to configure an access solution to meet the following requirements:

     Users in litwareinc.com must be able to access resources on a server named Server1 in contoso.com.

     Users in the contoso.com forest must be prevented from accessing any resources inlitwareinc.com.

     Users in litwareinc.com must be prevented from accessing any other resources in the contoso.com forest.

    Which three actions should you perform? (Each correct answer presents part of the solution.Choose three.)

    A. Configure SID filtering on the trust.

    B. Configure forest-wide authentication on the trust.

    C. Create a one-way forest trust.

    D. Create a one-way external trust

    E. Modify the permission on the Server1 object.

    F. Configure selective authentication on the trust.
    D. Create a one-way external trust

    E. Modify the permission on the Server1 object.

    F. Configure selective authentication on the trust.
  16. Your network contains a perimeter network and an internal network. The internal network contains an Active Directory Federation Services (AD FS) 2.1 infrastructure. The infrastructure uses Active Directory as the attribute store.

    You plan to deploy a federation server proxy to a server named Server2 in the perimeter network.

    You need to identify which value must be included in the certificate that is deployed to Server2. What should you identify?

    A. The FQDN of the AD FS server.

    B. The name of the Federation Service.

    C. The name of the Active Directory domain.

    D. The public IP address of Server2.
    A. The FQDN of the AD FS server.
  17. You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the File Server Resource Manager role service installed. You are creating a file management task as shown in the exhibit.



    You need to ensure that the Include all folders that store the following kinds of data list displays an entry named Corporate Data.

    What should you do?

    A. Modify the properties of the System Files file group.

    B. Create a new classification property.

    C. Create a new file group.

    D. Modify the Folder Usage classification property.
    B. Create a new classification property.
  18. Your network contains an Active Directory forest named adatum.com. The forest contains an Active Directory Rights Management Services (AD RMS) cluster.

    A partner company has an Active Directory forest named litwareinc.com. The partner company does not have AD RMS deployed.

    You need to ensure that users in litwareinc.com can consume rights-protected content from adatum.com.

    Which type of trust policy should you create?

    A. A federated trust.

    B. A trusted user domain.

    C. A trusted publishing domain.

    D. Windows Live ID.
    A. A federated trust.
  19. Your network contains an Active Directory forest named adatum.com. All servers run WindowsServer 2012 R2. The domain contains four servers. The servers are configured as shown in the following table.



    You need to deploy IP Address Management (IPAM) to manage DNS and DHCP.

    On which server should you install IPAM?

    A. Server1

    B. Server2

    C. Server3

    D. Server4
    D. Server4
  20. You have a file server named Server1 that runs Windows Server 2012 R2. Data Deduplication is enabled on drive D of Server1.

    You need to exclude D:\Folder1 from Data Deduplication.

    What should you configure?

    A. Disk Management in Computer Management

    B. The properties of D:\Folder1

    C. The classification rules in File Server Resource Manager (FSRM)

    D. File and Storage Services in Server Manager
    D. File and Storage Services in Server Manager
  21. Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. The domain contains two domain controllers. The domain controllers are configured as shown in the following table.



    The Branch site contains a perimeter network. For security reasons, client computers in the perimeter network can communicate with client computers in the Branch site only.

    You plan to deploy a new RODC to the perimeter network in the Branch site.

    You need to ensure that the new RODC will be able to replicate from DC10.

    What should you do first on DC10?

    A. Run the Add-ADDSReadOnlyDomainControllerAccount cmdlet.

    B. Create an Active Directory site.

    C. Run the Active Directory Domain Services Configuration Wizard.

    D. Create an Active Directory subnet.
    A. Run the Add-ADDSReadOnlyDomainControllerAccount cmdlet.
  22. Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. The domain contains two domain controllers. The domain controllers are configured as shown in the following table.



    You configure a user named User1 as a delegated administrator of DC10.

    You need to ensure that User1 can log on to DC10 if the network link between the Main site and the Branch site fails.

    What should you do?

    A. Add User1 to the Domain Admins group.

    B. Modify the properties of the DC10 computer account.

    C. Run repadmin and specify /replsingleobject parameter.

    D. On DC10, modify the User Rights Assignment in Local Policies.
    D. On DC10, modify the User Rights Assignment in Local Policies.
  23. Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The domain contains three domain controllers. The domain controllers are configured as shown in the following table.



    You plan to test an App1ication on a server named Server1. Server1 is currently located in Site1. After the test, Server1 will be moved to Site2.

    You need to ensure that Server1 attempts to authenticate to DC3 first, while you test the App1ication. What should you do?

    A. Create a new site and associate the site to an existing site link object.

    B. Modify the priority of site-specific service location (SRV) DNS records for Site2.

    C. Create a new subnet object and associate the subnet object to an existing site.

    D. Modify the weight of site-specific service location (SRV) DNS records Site1.
    B. Modify the priority of site-specific service location (SRV) DNS records for Site2.
  24. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Active Directory Certificate Services server role installed and configured.

    For all users, you are deploying smart cards for logon. You are using an enrollment agent to enroll the smart card certificates for the users.

    You need to configure the Contoso Smartcard Logon certificate template to support the use of the enrollment agent.

    Which setting should you modify?

  25. Your network contains an Active Directory domain named contoso.com. The domain contains the two servers. The servers are configured as shown in the following table.



    You investigate a report about the potential compromise of a private key for a certificate issued to Server2.

    You need to revoke the certificate issued to Server2. The solution must ensure that the revocation can be reverted.

    Which reason code should you select?

  26. Your network contains two Active Directory forests named contoso.com and adatum.com. All domain controllers run Windows Server 2012 R2. A federated trust exists between adatum.com and contoso.com. The trust provides adatum.com users with access to contoso.com resources.

    You need to configure Active Directory Federation Services (AD FS) claim rules for the federated trust. The solution must meet the following requirements:

     In contoso.com, replace an incoming claim type named Group with an outgoing claim type named Role.

     In adatum.com, allow users to receive their tokens for the relying party by using their Active Directory group membership as the claim type.

    The AD FS claim rules must use predefined templates.

    Which rule types should you configure on each side of the federated trust?

  27. Your network contains an Active Directory domain named contoso.com. All servers run WindowsServer 2012 R2. The domain contains a domain controller named DC1 that is configured as an enterprise root certification authority (CA).

    All users in the domain are issued a smart card and are required to log on to their domain-joined client computer by using their smart card. A user named User1 resigned and started to work for a competing company.

    You need to prevent User1 immediately from logging on to any computer in the domain. The solution must not prevent other users from logging on to the domain.

    Which tool should you use?

    A. Active Directory Users and Computers.

    B. Server Manager.

    C. The Certificates snap-in.

    D. The Certification Authority console.
    A. Active Directory Users and Computers.
  28. Your network contains an Active Directory forest named contoso.com. The forest contains asingle domain. The forest functional level is Windows Server 2012 R2. You have a domain controller named DC1. On DC1, you create a new Group Policy object (GPO) named GPO1.

    You need to verify that GPO1 was replicated to all of the domain controllers. Which tool should you use?

    A. Group Policy Management

    B. Active Directory Sites and Services

    C. DFS Management

    D. Active Directory Administrative Center
    A. Group Policy Management
  29. Your network contains two DNS servers named DN51 and DNS2 that run Windows Server 2012R2. DNS1 has a primary zone named contoso.com. DNS2 has a secondary copy of thecontoso.com zone.

    You need to log the zone transfer packets sent between DNS1 and DNS2.What should you configure?

    A. Monitoring from DNS Manager.

    B. Logging from Windows Firewall with Advanced Security.

    C. A Data Collector Set (DCS) from Performance Monitor.

    D. Debug logging from DNS Manager.
    D. Debug logging from DNS Manager.
  30. Your network contains an Active Directory forest. The forest contains one domain namedcontoso.com. The domain contains three domain controllers. The domain controllers are configured as shown in the following table.



    DC1 has all of the operations master roles installed. You transfer all of the operations master roles to DC2, and then you uninstall Active Directory from DC1.

    You need to ensure that you can use Password Settings objects (PSOs) in the domain. What should you do?

    A. Change the domain functional level.

    B. Upgrade DC2.

    C. Run the dcgpofix.exe command.

    D. Transfer the schema master role.
    A. Change the domain functional level.
  31. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server3 that runs Windows Server 2012 R2 and has the DHCP Server server role installed. DHCP is configured as shown in the exhibit.



    You need to ensure that only Scope1, Scope3, and Scope5 assign the same DNS servers to DHCP clients.

    The solution must minimize administrative effort. What should you do?

    A. Create a superscope and scope-level policies.

    B. Configure the Scope Options.

    C. Create a superscope and a filter.

    D. Configure the Server Options.
    B. Configure the Scope Options.
  32. You have a server named Server1 that runs Windows Server 2012 R2. When you install a custom App1ication on Server1 and restart the server, you receive the following error message:

    "The Boot Configuration Data file is missing some required information.File: \Boot\BCDError code: 0x0000034."

    You start Server1 by using Windows PE.

    You need to ensure that you can start Windows Server2012 R2 on Server1.

    Which tool should you use?

    A. Bootsect

    B. Bootim

    C. Bootrec

    D. Bootcfg
    C. Bootrec
  33. You have a server named Server1 that runs Windows Server 2012 R2. Server1 fails.

    You identify that the master boot record (MBR) is corrupt.

    You need to repair the MBR. Which tool should you use?

    A. Bcdedit

    B. Bcdboot

    C. Bootrec

    D. Fixmbr
    C. Bootrec
  34. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Active Directory Rights Management Services server role installed.

    Your company works with a partner organization that does not have its own Active Directory Rights Management Services (AD RMS) implementation.

    You need to create a trust policy for the partner organization.The solution must meet the following requirements:

     Grant users in the partner organization access to protected content.

     Provide users in the partner organization with the ability to create protected content.

    Which type of trust policy should you create?

    A. A federated trust.

    B. Windows Live ID.

    C. A trusted publishing domain.

    D. A trusted user domain.
    A. A federated trust.
  35. Your network contains an Active Directory domain named contoso.com. All servers run WindowsServer 2012 R2. The domain contains two domain controllers. The domain controllers are configured as shown in the following table.



    On DC1, you create an Active Directory-integrated zone named Zone1. You verify that Zone1 replicates to DC2. You use DNSSEC to sign Zone1. You discover that the updates to Zone1 fail to replicate to DC2. You need to ensure that Zone1 replicates to DC2. What should you configure on DC1?

  36. Your network contains four servers that run Windows Server 2012 R2. Each server has the Failover Clustering feature installed. Each server has three network adapters installed. An iSCSISAN is available on the network. You create a failover cluster named Cluster1. You add the servers to the cluster. You plan to configure the network settings of each server node as shown in the following table.



    You need to configure the network settings for Cluster1. What should you do?

    • Allow allow and dont allow
  37. A new corporate policy states that backups must use Windows Azure Online Backup whenever possible. You need to identify which backup methods you must use to back up Server1. The solution must use Windows Azure Online Backup whenever possible. Which backup type should you identify for each volume?

  38. You perform a full installation of Windows Server 2012 R2 on a virtual machine named Server1.You plan to use Server1 as a reference image.

    You need to minimize the amount of storage space used by the Windows Server 2012 R2 installation. Which cmdlet should you use?

    A. Remove-Module

    B. Optimize-VHD

    C. Optimize-Volume

    D. Uninstall-WindowsFeature
    B. Optimize-VHD
  39. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the DHCP Server server role installed. 

    Server1 has a scope named Scope1. A policy named Policy1 is configured for Scope1. Policy1 is configured to provide Hyper-V virtual machines a one-day lease. All other computers receive an eight-day lease. You implement an additional DHCP server named Server2 that runs Windows Server 2012 R2. 

    On Server1, you configure Scope1 for DHCP failover. 

    You discover that virtual machines that receive IP addresses from Server2 have a lease duration of eight days. 

    You need to ensure that when Server2 assigns IP addresses to the Hyper-V virtual machines, the lease duration is one day. The solution must ensure that other computers that receive IP addresses from Server2 have a lease duration of eight days. What should you do?

    A.    On Server2, right-click Scope1, and then click Reconcile. 

    B.    On Server1, right-click Scope1, and then click Replicate Scope. 

    C.    On Server2, create a new DHCP policy. 

    D.    On Server1, delete Policy1, and then recreate the policy.
    B.    On Server1, right-click Scope1, and then click Replicate Scope.


    Explanation: Scope 1 has been set up for DHCP failover. Now we need to replicate it from Server1 to Server2.
  40. You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the DNS Serverserver role installed.

    You need to store the contents of all the DNS queries received by Server1.What should you configure?

    A. Logging from Windows Firewall with Advanced Security.

    B. Debug logging from DNS Manager.

    C. A Data Collector Set (DCS) from Performance Monitor.

    D. Monitoring from DNS Manager.
    D. Monitoring from DNS Manager.

    Explanation: (D) Standard queries Specifies that packets containing standard queries (per RFC 1034) are logged in the DNS server log file. Updates Specifies that packets containing dynamic updates (per RFC 2136) are logged in the DNS server log file. Notifies Specifies that packets containing notifications (per RFC 1996) are logged in the DNS server log file.
  41. You deploy an Active Directory Federation Services (AD FS) 2.1 infrastructure. The infrastructure uses Active Directory as the attribute store. Some users report that they fail to authenticate to the AD FS infrastructure. You discover that only users who run third-party web browsers experience issues.

    You need to ensure that all of the users can authenticate to the AD FSinfrastructure successfully.

    Which Windows PowerShell command should you run?

    A. Set-ADFSProperties -ProxyTrustTokenLifetime 1:00:00

    B. Set-ADFSProperties -AddProxyAuthenticationRules None

    C. Set-ADFSProperties -SSOLifetime 1:00:00

    D. Set-ADFSProperties -ExtendedProtectionTokenCheck None
    A. Set-ADFSProperties -ProxyTrustTokenLifetime 1:00:00
  42. Your network contains an Active Directory domain named contoso.com. All servers run WindowsServer 2012 R2. The domain contains a file server named Server1. The domain contains a domain controller named DC1. Server1 contains three shared folders. The folders are configured asshown in the following table.



    Folder2 has a conditional expression of User.Department= = MMarketing".You discover that a user named User1 cannot access \\Server1\folder2. User1 can access\\Server1\folderl and \\Server1\folder3.You verify the group membership of User1 as shown in the Member of exhibit.

    You need to ensure that User1 can access the contents of \\Server1\folder2.

    What should you do?

    A. From a Group Policy object (GPO), set the Support for Dynamic Access Control and Kerberos armoring setting to Always provide claims.

    B. Change the department attribute of User1.

    C. Grant the Full Control NTFS permissions on Folder2 to User1.

    D. Remove User1 from the Accounting global group.
    B. Change the department attribute of User1.
  43. You have a server named Server1 that runs Windows Server 2012 R2. You install the File and Storage Services server role on Server1. From Windows Explorer, you view the properties of a folder named Folder1 and you discover that the Classification tab is missing.

    You need to ensure that you can assign classifications to Folder1 from Windows Explorer manually.

    What should you do?

    A. From Folder Options, clear Hide protected operating system files (Recommended).

    B. Install the File Server Resource Manager role service.

    C. From Folder Options, select the Always show menus.

    D. Install the Share and Storage Management Tools.
    B. Install the File Server Resource Manager role service.
  44. Your network contains an Active Directory domain named contoso.com. All domain controllersrun Windows Server 2012 R2. The domain contains two domain controllers. The domain controllers are configured as shown in the following table.

    The Branch site contains a perimeter network.

    For security reasons, client computers in the perimeter network can communicate with client computers in the Branch site only.

    You plan to deploy a new RODC to the perimeter network in the Branch site. You need to ensure that thenew RODC will be able to replicate from DC10.

    What should you do first on DC10?

    A. Enable the Bridge all site links setting.

    B. Run the Active Directory Domain Services Configuration Wizard.

    C. Create an Active Directory site link bridge.

    D. Create an Active Directory site.
    C. Create an Active Directory site link bridge.
  45. Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The domain contains three domain controllers. The domain controllers are configured as shown in the following table.   


    You plan to test an application on a server named Server1.

    Server1 is currently located in Site1. After the test, Server1 will be moved to Site2.

    You need to ensure that Server1 attempts to authenticate to DC3 first, while you test the application.

    What should you do?

    A.    Create a new site and associate the site to an existing site link object. 

    B.    Modify the priority of site-specific service location (SRV) DNS records for Site2. 

    C.    Create a new subnet object and associate the subnet object to an existing site. 

    D.    Modify the weight of site-specific service location (SRV) DNS records Site1.
    B.    Modify the priority of site-specific service location (SRV) DNS records for Site2. 

    Explanation: Service Location (SRV) Resource Record Priority A number between 0 and 65535 that indicates the priority or level of preference given for this record to the host that is specified in Host offering this service. Priority indicates this host’s priority with respect to the other hosts in this domain that offer the same service and are specified by different service location (SRV) resource records.
  46. Your network contains an Active Directory domain named contoso.com. The domain contains twomember servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 hasMicrosoft SQL Server 2012 installed. You install the Active Directory Federation Services serverrole on Server2.

    You need to configure Server2 as the first Active Directory Federation Services(AD FS) server in the domain.

    The solution must ensure that the AD FS database is stored in a SQLServer database on Server1.

    What should you do on Server2?

    A. From a command prompt, run fsutil.exe.

    B. From Windows PowerShell, run Install-ADFSFarm.

    C. From Server Manager, install the Federation Service Proxy.

    D. From Server Manager, install the AD FS Web Agents.
    B. From Windows PowerShell, run Install-ADFSFarm.
  47. Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2.Server1 and Server2 have the Hyper-V server role installed. Server1 and Server2 are configured as Hyper-V replicas of each other. Server2 hosts a virtual machine named VM5. VM5 is replicated to Server1.

    You need to verify whether the replica of VM5 on Server1 is functional. The solution must ensure that VM5 remains accessible to clients. What should you do from Hyper-V Manager?

    A. On a server in Cluster2, click Migrate Roles.

    B. On a server in Cluster2, configure Cluster-Aware Updating.

    C. On a server in Cluster1, click Move Core Cluster Resources, and then click Select Node.

    D. On a server in Cluster1, configure Cluster-Aware Updating.
    B. On a server in Cluster2, configure Cluster-Aware Updating.
  48. Your network contains an Active Directory domain named contoso.com. The domain contains twomember servers named Server1 and Server2. All servers run Windows Server 2012 R2. Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1. Cluster1 has access to four physical disks. The disks are configured as shown in the following table.



    You need to ensure that all of the disks can be added to a Cluster Shared Volume (CSV). Which two actions should you perform? (Each correct answer presents part of the solution. Choosetwo.)

    A. Enable BitLocker on Disk4.

    B. Format Disk3 to use NTFS.

    C. Format Disk2 to use NTFS.

    D. Disable BitLocker on Disk1.
    B. Format Disk3 to use NTFS.

    C. Format Disk2 to use NTFS.
  49. The contoso.com domain only contains domain controllers that run Windows Server 2012 R2. The forest contains a child domain named child.contoso.com. The child.contoso.com domain only contains domain controllers that run Windows Server 2008 R2. The child.contoso.com domain contains a memberserver named Server1 that runs Windows Server 2012 R2. You have access to four administrative user accounts in the forest. The administrative user accounts are configured as shown in the following table.



    You need to ensure that you can add a domain controller that runs Windows Server 2012 R2 to the child.contoso.com domain.

    Which account should you use to run adprep.exe?

    A. Admin1

    B. Admin2

    C. Admin3

    D. Admin4
    C. Admin3 Domain Admin
  50. Your network contains two servers named Server1 and Server 2. Both servers run WindowsServer 2012 R2 and have the Hyper-V server role installed. Server1 hosts a virtual machinevnamed VM1. The virtual machine configuration files and the virtual hard disks for VM1 are storedvin D: \VM1. You shut down VM1 on Server1. You copy D:\VM1 to D:\VM1 on Server2.

    You need to start VM1 on Server2. You want to achieve this goal by using the minimum amount of administrative effort. What should you do?

    A. Run the Import-VMIntialReplication cmdlet.

    B. Create a new virtual machine on Server2 and attach the VHD from VM1 to the new virtualmachine.

    C. From Hyper-V Manager, run the Import Virtual Machine wizard.

    D. Run the Import-IscsiVirtualDisk cmdlet.
    C. From Hyper-V Manager, run the Import Virtual Machine wizard.

What would you like to do?

Home > Flashcards > Print Preview