Term
You work as an administrator at ABC.com. The network consists of an Active Directory forest that contains a root domain and two child domains (us.ABC.com and uk.ABC.com). All the servers on the network have Server 2012 installed. The root domain hosts a domain local distribution group, named ABCGroup. You are prepping to issue ABCGroup read-only access to a shared folder hosted by the us.ABC.com domain. Which of the following actions should you take? A. configure ABCGroup as a universal Admins group B. configure ABCGroup as a universal security group C. configure ABCGroup as a global administrators group D. configure ABCGroup as a local administrators group |
|
Definition
|
|
Term
ABC.com network consists of a single domain named ABC.com. All servers, including domain controllers, have Windows Server 2012 installed. User accounts are located in an OU named ABCStaff. ABC.com's managers belong to a group called ABCManagers. Create a new GPO that is linked to the ABCStaff OU but not affect Managers. Which of the following actions should you take? A. consider removing the user accounts of the managers from the ABCStaff OU B. consider configuring the new GPO's WMI filter C. consider adding the user accounts of ABC.com's managers to the Admins group D. consider adding the user accounts of ABC.com's managers to the local Administrators group |
|
Definition
|
|
Term
ABC.com network consists of a single domain named ABC.com. All servers, including domain controllers, have Windows Server 2012 installed. The DNS Server Role is installed on ABC-SR13. ABC.com's workstations make use of a web proxy to access the internet and refer to ABC-SR13 as the primary DNS server. Make sure that the internet host names for ABC.com's workstations are not resolved by ABC-SR13. Which of the following actions should you take? A. configure a primary zone on ABC-SR13 B. configure a secondary zone on ABC-SR13 C. configure a reverse lookup zone on ABC-SR13 D. configure a forward lookup zone on ABC-SR13 |
|
Definition
|
|
Term
ABC.com network consists of a single domain named ABC.com. All servers, including domain controllers, have Windows Server 2012 installed. You are running a training exercise for junior administrators and currently discussing the Virtual Fibre Channel SAN feature. Which of the following is TRUE with regards to the Virtual Fibre Channel SAN feature (choose all that apply) A. It prevents virtual machines from connecting directly to the Fibre Channel storage B. It allows for virtual machines to connect to the Fibre Channel storage directly C. it includes support for virtual SANs, live migration, and multipath I/O D. It includes support for virtual SANS, and live migration, but not multipath I/O |
|
Definition
|
|
Term
The ABC.com network consists of a single domain named ABC.com. All servers have Windows Server 2008R2 installed. Some of the workstations have Windows 7 installed, while the rest have Windows 8. After installing a new Server 2012 computer in the domain, you configure it to runthe File and Storage Services server role. Create a shared folder on the new server, and configure the use of Previous Versions for restoring files located in the shared folder. Which of the following actions should you take? A. configure the Shadow Copy settings on the new server B. configure the Snapshot settings on the new server C. configure the Background Copy settings on the new server D. configure the Permission settings on the new server |
|
Definition
|
|
Term
The ABC.com network consists of a single domain named ABC.com. All servers have Windows Server 2008R2 installed. Most of the servers have 64-bit CPU's while the rest of 32-bit CPU's installed. You are informed that ABC.com wants to deploy Windows Server 2012 on all their servers. You need to make recommendations to ensure that this is possible. Which of the following would you recommend? A. The deployment can proceed without any changes B. The servers with 32-bit CPU's must be upgraded to include 64-bit CPU's for the deployment to proceed C. The servers with the 64-bit CPU's must be upgraded to include 32-bit CPU's for the deployment to proceed D. The deployment is not in any way possible |
|
Definition
|
|
Term
ABC.com network consists of a single domain named ABC.com. All servers, including domain controllers, have Windows Server 2012 installed. You are running a training exercise for junior administrators and you are currently discussing Storage Spaces. Which of the following is TRUE with regards to Storage Spaces? A. Mirroring and parity are optional resilient storage modes of Storage Spaces B. Failover clustering is not supported by Storage Spaces C. Storage spaces are virtual disks with associated attributes such as a preferred level of resiliency, and thin or fixed provisioning D. Storage Spaces are a collection of physical disks with associated attributes such as a preferred level of resiliency, and thin or fixed provisioning |
|
Definition
|
|
Term
ABC.com consists of a singe domain called ABC.com. ABC-SR15 has Windows Server 2012 installed and ABC-SR16 has Windows Server 2008R2 SP1 installed. Make sure that ABC-SR16 is able to run Windows PowerShell 3.0. Which of the following 2 actions should you take? A. Make sure that ABC-SR16 has a full installation of Microsoft .NET Framework 4 installed B. Make sure that ABC-SR16 has a full installation of Microsoft .NET Framework 2 installed C. Make sure that ABC-SR16 has WS-Management 3.0 installed D. Make sure that ABC-SR16 is upgraded to Windows Server 2012 |
|
Definition
|
|
Term
Which of the following roles implement what can be classified as infrastructure services? (Choose all that apply.)
a.DNS b.Web Server (IIS) c.DHCP d.Remote Desktop Services |
|
Definition
|
|
Term
Which of the following is a valid upgrade path to Windows Server 2012? a.Windows Server 2003 Standard to Windows Server 2012 Standard b.Windows Server 2008 Standard to Windows Server 2012 Standard c.Windows Server 2008 R2 32-bit to Windows Server 2012 64-bit d.Windows 7 Ultimate to Windows Server 2012 Essentials |
|
Definition
|
|
Term
Which feature must you add to a Windows Server 2012 Server Core installation to convert it to the Minimal Server Interface? a.Graphical Management Tools and Infrastructure Server b.Graphical Shell c.Windows PowerShell d.Microsoft Management Console |
|
Definition
|
|
Term
What is the name of the directory where Windows stores all the operating system modules it might need to install at a later time? a.Windows b.System32 c.Bin d.WinSxS |
|
Definition
|
|
Term
Which of the following are valid reasons why administrators might want to install their Windows Server 2012 servers by using the Server Core option? (Choose all that apply.) a. A Server Core installation can be converted to the full GUI without reinstalling the operating system. b. The Windows PowerShell 3.0 interface in Windows Server 2012 includes more than 10 times as many cmdlets as Windows PowerShell 2.0 c. The new Server Manager in Windows Server 2012 makes it far easier to administer servers remotely d. A Windows Server 2012 Server Core license costs significantly less than a full GUI license |
|
Definition
|
|
Term
Which features must you remove from a full GUI installation of Windows Server 2012 to convert it to a Server Core installation? (Choose all that apply.) a. Windows Management Instrumentation b. Graphical Management Tools and Infrastructure c. Desktop Experience d. Server Graphical Shell |
|
Definition
|
|
Term
Which of the following NIC teaming modes provides fault tolerance and bandwidth aggregation? a. Hyper-V live migration b. Switch Independent Mode c. Switch Dependent Mode d. Link Aggregation Control Protocol |
|
Definition
|
|
Term
Which of the following command-line tools do you use to join a computer to a domain? a. Net.exe b. Netsh.exe c. Netdom.exe d. Ipconfig.exe |
|
Definition
|
|
Term
Which of the following statements about Server Manager is not true? a. Server Manager can deploy roles to multiple servers at the same time. b. Server Manager can deploy roles to VHDs while they are offline. c. Server Manager can install roles and features at the same time. d. Server Manager can install roles and features to any Windows Server 2012 server on the network. |
|
Definition
|
|
Term
Which of the following operations can you not perform on a service by using Server Manager? (Choose all that apply.) a. Stop a running service b. Start a stopped service c. Disable a service d. Configure a service to start when the computer starts |
|
Definition
|
|
Term
Which of the following statements are true of striped volumes? (Choose all that apply.) a. Striped volumes provide enhanced performance over simple volumes. b. Striped volumes provide greater fault tolerance than simple volumes. c. You can extend striped volumes after creation. d. If a single physical disk in the striped volume fails, all the data in the entire volume is lost. |
|
Definition
|
|
Term
Which of the following are requirements for extending a volume on a dynamic disk? (Choose all that apply.) a. If you want to extend a simple volume, you can use only the available space on the same disk if the volume is to remain simple. b. The volume must have a file system (a raw volume) before you can extend a simple or spanned volume. c. You can extend a simple or spanned volume if you formatted it by using the FAT or FAT32 file systems. d. You can extend a simple volume across additional disks if it is not a system volume or a boot volume. |
|
Definition
|
|
Term
Which of the following volume types supported by Windows Server 2012 do not provide fault tolerance? (Choose all that apply.) a. Striped b. Spanned c. Mirrored d. RAID-5 |
|
Definition
|
|
Term
A JBOD drive array is an alternative to which of the following? a. SAN b. SCSI c. RAID d. iSCSI |
|
Definition
|
|
Term
What is the maximum number of shadow copies a Windows Server 2012 system can maintain for each volume? a. 8 b. 16 c. 64 d. 128 |
|
Definition
|
|
Term
Which of the following terms describes the process of granting users access to file server shares by reading their permissions? a. Authentication b. Authorization c. Enumeration d. Assignment |
|
Definition
|
|
Term
Which of the following are tasks you can perform by using the quotas in File Server Resource Manager but can’t perform by using NTFS quotas? (Choose all that apply.) a. Send an email message to an administrator when users exceed their limits. b. Specify different storage limits for each user. c. Prevent users from consuming storage space on a volume beyond their allotted limit. d. Generate warnings to users when they approach their allotted storage limit. |
|
Definition
|
|
Term
In the NTFS permission system, combinations of advanced permissions are also known as __________ permissions. (Choose all that apply.) a. Special b. Basic c. Share d. Standard |
|
Definition
|
|
Term
Which of the following best defines the role of the security principal in file system permission assignments? a. The only person who can access a file that has no permissions assigned to it b. The person responsible for creating permission policies c. The person assigning the permissions d. The person to whom the permissions are assigned |
|
Definition
|
|
Term
Which of the following terms describes the software interface through which a computer communicates with a print device? a. Printer b. Print server c. Printer driver d. Print Management snap-in |
|
Definition
|
|
Term
You are setting up a printer pool on a computer running Windows Server 2012. The printer pool contains three identical print devices. You open the Properties dialog box for the printer and select the Enable Printer Pooling option on the Ports tab. What must you do next? a. Configure the LPT1 port to support three printers. b. Select or create the ports mapped to the three printers. c. On the Device Settings tab, configure the installable options to support two additional print devices. d. On the Advanced tab, configure the priority for each print device so that printing is distributed among the three print devices. |
|
Definition
|
|
Term
One of your print devices is not working properly, and you want to temporarily prevent users from sending jobs to the printer serving that device. What should you do? a. Stop sharing the printer. b. Remove the printer from Active Directory. c. Change the printer port. d. Rename the share. |
|
Definition
|
|
Term
You are administering a computer running Windows Server 2012 configured as a print server. Users in the Marketing group complain that they cannot print documents using a printer on the server. You view the permissions in the printer’s properties. The Marketing group is allowed Manage Documents permission. Why can’t the users print to the printer? a. The Everyone group must be granted the Manage Documents permission. b. The Administrators group must be granted the Manage Printers permission. c. The Marketing group must be granted the Print permission. d. The Marketing group must be granted the Manage Printers permission. |
|
Definition
|
|
Term
You are administering a print server running Windows Server 2012. You want to perform maintenance on a print device physically connected to the print server. There are several documents in the print queue. You want to prevent the documents from being printed to the printer, but you don’t want users to have to resubmit the documents to the printer. What is the best way to do this? a. Open the printer’s Properties dialog box, select the Sharing tab, and then select the Do Not Share This Printer option. b. Open the printer’s Properties dialog box and select a port that is not associated with a print device. c. Open the printer’s queue window, select the first document, and then select Pause from the Document window. d. Open the printer’s queue window and select the Pause Printing option from the Printer menu. |
|
Definition
|
|
Term
Which of the following tasks must you perform before you can manage a remote server running Windows Server 2012 using the Computer Management snap-in? a. Enable WinRM on the remote server. b. Enable the COM + Network Access rule on the remote server. c. Enable the Remote Event Log Management rules on the remote server. d. Install Remote Server Administration Tools on the remote server. |
|
Definition
|
|
Term
Which of the following Windows PowerShell cmdlets can you use to list the existing Windows Firewall rules on a computer running Windows Server 2012? (Choose all that apply.) a. Get-NetFirewallRule b. Set-NetFirewallRule c. Show-NetFirewallRule d. New-NetFirewallRule |
|
Definition
|
|
Term
Which of the following tasks can you NOT perform remotely on a server running Windows Server 2008? a. Install roles by using Server Manager. b. Install roles by using Windows PowerShell. c. Connect to the remote server by using the Computer Management snap-in. d. Monitor event log entries. |
|
Definition
|
|
Term
Which of the following updates must you install on a server running Windows Server 2008 before you can connect to it by using Windows Server 2012 Server Manager? (Choose all that apply.) a. .NET Framework 3.5 b. .NET Framework 4.0 c. Windows Management Framework 3.0 d. Windows Server 2008 R2 |
|
Definition
|
|
Term
When you run Server Manager from a Windows 8 workstation using Remote Server Administration Tools, which of the following elements do NOT appear in the default display? a. The Dashboard b. The Local Server home page c. The All Servers home page d. The Welcome tile |
|
Definition
|
|
Term
Which of the following statements about Type I and Type II virtualization are true? (Choose all that apply.) a. In Type I virtualization, the hypervisor runs on top of a host OS. b. In Type I virtualization, the hypervisor runs directly on the computer hardware. c. In Type II virtualization, the hypervisor runs on top of a host OS. d. In Type II virtualization, the hypervisor runs directly on the computer hardware. |
|
Definition
|
|
Term
Which of the following types of server virtualization provides the best performance for high-traffic servers in production environments? a. Type I virtualization b. Type II virtualization c. Presentation virtualization d. RemoteApp |
|
Definition
|
|
Term
Which of the following Microsoft operating systems includes a license that enables you to create an unlimited number of virtual instances? a. Hyper-V Server b. Windows Server 2012 Datacenter c. Windows Server 2012 Standard d. Windows Server 2012 Foundation |
|
Definition
|
|
Term
Which of the following Hyper-V features make it possible for a VM to function with a minimum RAM value that is lower than the startup RAM value? (Choose all that apply.) a. Smart paging b. Dynamic Memory c. Memory Weight d. Guest Integration Services |
|
Definition
|
|
Term
When you install the Hyper-V role on a server running Windows Server 2012, the instance of the OS on which you installed the role is converted to what system element? a. The hypervisor b. The Virtual Machine Monitor c. The parent partition d. A child partition |
|
Definition
|
|
Term
Which of the following statements about VHDX files is not true? a. VHDX files can be as large as 64 TB. b. VHDX files can only be opened by computers running Windows Server 2012. c. VHDX files support larger block sizes than VHD files. d. VHDX files support 4-KB logical sectors. |
|
Definition
|
|
Term
Which of the following must be true about a pass-through disk? a. A pass-through disk must be offline in the guest OS that will access it. b. A pass-through disk must be offline in the parent partition of the Hyper-V server. c. A pass-through disk can only be connected to a SCSI controller. d. A pass-through disk must be added to a VM with the Disk Management snap-in. |
|
Definition
|
|
Term
The Merge function only appears in the Edit Virtual Hard Disk Wizard under which of the following conditions? a. When you select a VHDX file for editing b. When you select two or more disks for editing c. When you select a disk with free space available in it d. When you select a differencing disk for editing |
|
Definition
|
|
Term
Which of the following are valid reasons not to take snapshots of VMs? (Choose all that apply.) a. Snapshots can consume a large amount of disk space. b. Each snapshot requires a separate copy of the VM’s memory allocation. c. Each snapshot can take several hours to create. d. The existence of snapshots slows down VM performance. |
|
Definition
|
|
Term
Which of the following is not required to add a Fibre Channel adapter to a Hyper-V VM? a. You must create a Fibre Channel virtual SAN. b. You must have a physical Fibre Channel adapter installed in the host computer. c. You must have a Fibre Channel adapter driver that supports virtual networking. d. You must have a SCSI cable connecting the Fibre Channel adapter to the storage devices. |
|
Definition
|
|
Term
Which of the following are valid reasons for using an emulated network adapter rather than a synthetic one? (Choose all that apply.) a. You want to install the guest OS by using a Windows Deployment Services server. b. There is no Guest Integration Services package available for the guest OS you plan to use. c. The manufacturer of your physical network adapter has not yet provided a synthetic network adapter driver. d. The emulated network adapter provides better performance. |
|
Definition
|
|
Term
Which of the following statements is not true about synthetic network adapters? a. Synthetic adapters communicate with the parent partition by using the VMBus. b. Synthetic adapters require the Guest Integration Services package to be installed on the guest OS. c. Synthetic adapters provide faster performance than emulated adapters. d. Synthetic adapters can start the child VM by using a PXE network boot. |
|
Definition
|
|
Term
What is the maximum number of ports supported by a Hyper-V virtual switch? a. 8 b. 256 c. 4,096 d. Unlimited |
|
Definition
|
|
Term
Which of the following virtual switch types does not enable guest OSs to communicate with the parent partition? a. External b. Internal c. Private d. Isolated |
|
Definition
|
|
Term
How many dynamically assigned MAC addresses can a Hyper-V server provide by default? a. 8 b. 256 c. 4,096 d. Unlimited |
|
Definition
|
|
Term
Which of the following is the primary method for transmitting IPv6 traffic over an IPv4 network? a. Subnetting b. Tunneling c. Supernetting d. Contracting |
|
Definition
|
|
Term
Which of the following is the IPv6 equivalent to a private IPv4 address? a. Link-local unicast address b. Global unique unicast address c. Unique local unicast address d. Anycast address |
|
Definition
|
|
Term
Which of the following is an automatic tunneling protocol used by Windows operating systems that are located behind NAT routers? a. Teredo b. 6to4 c. ISATAP d. APIPA |
|
Definition
|
|
Term
What kind of IP address must a system have to be visible from the Internet? a. Registered b. Binary c. Class B d. Subnetted |
|
Definition
|
|
Term
Which of the following subnet mask values would you use when configuring a TCP/ IP client with an IPv4 address on the 172.16.32.0/ 19 network? a. 255.224.0.0 b. 255.240.0.0 c. 255.255.224.0 d. 255.255.240.0 e. 255.255.255.240 |
|
Definition
|
|
Term
Which of the following is the term for the component that enables DHCP clients to communicate with DHCP servers on other subnets? a. Forwarder b. Resolver c. Scope d. Relay agent |
|
Definition
|
|
Term
Which of the following message types is not used during a successful DHCP address assignment? a. DHCPDISCOVER b. DHCPREQUEST c. DHCPACK d. DHCPINFORM |
|
Definition
|
|
Term
Which of the following types of DHCP address allocation is the equivalent of a reservation in Windows Server 2012? a. Dynamic allocation b. Automatic allocation c. Manual allocation d. Hybrid allocation |
|
Definition
|
|
Term
Which of the following network components are typically capable of functioning as DHCP relay agents? a. Windows 8 computers b. Routers c. Switches d. Windows Server 2012 computers |
|
Definition
|
|
Term
Which of the following TCP/ IP parameters is typically deployed as a scope option in DHCP? a. DNS Server b. Subnet Mask c. Lease Duration d. Default Gateway |
|
Definition
|
|
Term
Which of the following resource record types contains the information a DNS server needs to perform reverse name lookups? a. A b. CNAME c. SOA d. PTR |
|
Definition
|
|
Term
Which of the following would be the correct FQDN for a resource record in a reverse lookup zone if the computer’s IP address is 10.75.143.88? a. 88.143.75.10. in-addr.arpa b. 10.75.143.88. in-addr.arpa c. in-addr.arpa. 88.143.75.10 d. arpa.in-addr. 10.75.143.88 |
|
Definition
|
|
Term
Which of the following is not one of the elements of DNS? a. Resolvers b. Relay agents c. Name servers d. Namespace |
|
Definition
|
|
Term
In which of the following DNS transactions does the querying system generate a recursive query? a. A DNS client sends the server name www.adatum.com from a URL to its designated DNS server for resolution. b. A client’s DNS server sends a request to a root domain server to find the authoritative server for the com top-level domain. c. A client’s DNS server sends a request to the com top-level domain server to find the authoritative server for the adatum.com domain. d. A client’s DNS server sends a request to the adatum.com domain server to find the IP address associated with the server name www. |
|
Definition
|
|
Term
Which of the following contains the controls used to modify DNS name caching? a. The Forwarders tab of a server’s Properties sheet b. The Start of Authority (SOA) tab of a zone’s Properties sheet c. The Root Hints tab of a server’s Properties sheet d. The New Zone Wizard |
|
Definition
|
|
Term
The ABC.com network consists of a single domain named ABC.com. All servers, including domain controllers, have Server 2012 installed. You have been instructed to add a new domain controller to ABC.com's existing environment. Which of the following tools should you use? a. Server Manager b. Authorization Manager c. Remote Desktop Gateway Manager d. Network Load Balancing Manager |
|
Definition
|
|
Term
The ABC.com network consists of a single domain named ABC.com. All servers, including domain controllers, have Server 2012 installed. During a training exercise for junior administrators, you discuss the use of Non-Uniform Memory Architecture (NUMA). Which of the following is TRUE with regards to NUMA? (choose two) a. it is a computer architecture used in multiproccesor systems b. it is a computer architecture used in single processor systems c. it allows a processor to access local memory faster than it can access remote memory d. it allows a processor to access remote memory faster than it can access local memory |
|
Definition
|
|
Term
The ABC.com network consists of a single domain named ABC.com. All servers, including domain controllers, have Server 2012 installed. ABC.com has a domain controller (ABC-DC01) which contains the ABC.com's primary DNS zone. ABC.com's workstations refer to ABC-DC01 as their primary DNS server. You have been instructed to make sure that any DNS requests that are not for the ABC.com domain is resolved by querying the DNS server of ABC.com's Internet Service Provider (ISP). Which of the following actions should you take? a. configure a reverse lookup zone b. configure a forward lookup zone c. configure Forwarders d. configure 019 IP Layer Forwarding |
|
Definition
|
|
Term
The ABC.com network consists of a single domain named ABC.com. All servers, including domain controllers, have Server 2012 installed. You are in the process of installing a Server Core installation of Server 2012 on a new server named ABC-SR13. Which of the following is TRUE with regards to installing a Server Core installation? (choose all that apply) a. the Server Graphical Shell is installed but not enabled b. Server roles can be configured locally via the command prompt using Windows PowerShell c. Server roles can be configured locally via Server Manager d. You are able to access the Microsoft Management Console locally e. The Desktop Experience is not available |
|
Definition
|
|
Term
The ABC.com network consists of a single domain named ABC.com. All servers, including domain controllers, have Server 2012 installed. You are discussing printer pooling during a training for junior administrators. Which of the following is TRUE with regards to printer pooling? a. Printers in a pool must be of the same model and use the same printer driver b. each printer in the pool must have a different printer driver c. printer ports used in the pool must be of the same type d. the types of printer ports used in the pool must be mixed e. pooled printers appear to workstations as a single printer f. a minimum of three printers are required to configure a printer pool |
|
Definition
|
|
Term
The ABC.com network consists of a single domain named ABC.com. All servers, including domain controllers, have Server 2012 installed. ABC-SR07 has two physical disks installed. The C: drive hosts the boot partition while the D: drive is not being used. Both disks are online. You have received instructions to create a virtual machine on ABC-SR07. Subsequent to creating the VM you have to connect the D: drive to the virtual machine. Which of the following is TRUE with regards to connecting a physical disk to a virtual machine? a. the physical disk should not be online b. the physical disk should be uninstalled and reinstalled c. the physical disk should be configured as a striped disk d. the physical disk should be configured as a mirrored disk |
|
Definition
|
|
Term
The ABC.com network consists of a single domain named ABC.com. All servers, including domain controllers, have Server 2012 installed. ABC.com has a domain controller named ABC-DC01. You have been instructed to make sure that the Group Policy Administrative Templates are available centrally. Which of the following actions should you take? a. copy the policies folder to the PolicyDefinitions folder in the ABC.com domain's SYSVOL folder b. copy the PolicyDefinitions folder to the policies folder in the ABC.com domain's SYSVOL folder c. copy the policies folder to the PolicyDefinitions folder in the ABC.com domain's systemroot folder d. copy the PolicyDefinitions folder to the policies folder in the ABC.com domain's systemroot folder |
|
Definition
|
|
Term
The ABC.com network consists of a single domain named ABC.com. All servers, including domain controllers, have Server 2012 installed. ABC-SR13 has a Server Core 2012 installation. You are instructed to convert ABC-SR13 to a GUI installation. You want to use a Windows PowerShell cmdlet that uses Windows Update as a source. What action should you take? a. use the "Install-WindowsFeature Server-Gui-Mgmt-Infra,Server-Gui-Shell -Restart" cmdlet b. use the "Install- Install-WindowsFeature Server-Gui-Mgmt-Infra, Server-Gui-Shell -Restart -Source c:\mountdir\windows\winsxs" cmdlet c. use the "Install- Uninstall-WindowsFeature Server-Gui-Shell -Remove" cmdlet d. use the "Set-ExecutionPolicy" cmdlet |
|
Definition
|
|
Term
The ABC.com network consists of a single domain named ABC.com. All servers, including domain controllers, have Server 2012 installed. During a training exercise for junior admins, you discuss what happens when you run the Remove-NetLbfoTeam PowerShell cmdlet. Which of the following descrives the results of running this cmdlet? a. It removes one or more network adapters from a specified NIC team b. It removes a team interface from a NIC team c. It removes a specified NIC team from the host d. It removes a network adapter member from a switch team |
|
Definition
|
|
Term
The ABC.com network consists of a single domain named ABC.com. All servers, including domain controllers, have Server 2012 installed. ABC-SR07 has the AD DS, DHCP, and DNS server roles installed. ABC-SR08 has the DHCP, and Remote Access server roles installed. ABC-SR09 has been configured to automatically aquire an IP address. You then create a reservation on ABC-SR07 and a filter on ABC-SR08. Which of the following is a reason for this configuration? a. it allows ABC-SR09 to aquire a constant IP address from ABC-SR08 only b. it configures ABC-SR09 with a static IP address c. it allows ABC-SR09 to acquire a constant IP address from ABC-SR07 and ABC-SR08 d. it allows ABC-SR09 to aquire a constant IP address from ABC-SR07 only |
|
Definition
|
|
Term
The ABC.com network consists of a single domain named ABC.com. All servers, including domain controllers, have Server 2012 installed. ABC-SR15 is configured as a file server. You have received instructions to make sure that a user (Mia Hamm) has the ability to generate a complete backup of ABC-SR15 via Windows Server Backup. Which of the following actions should you take? a. use Computer Management to configure the local groups b. use Computer Management to configure the domain local groups c. use Computer Management to configure global groups d. use Computer Management to configure the administrator goups |
|
Definition
|
|
Term
ABC.com has a domain controller (ABC-DC01) with Server 2012 installed. ABC-DC02 has Server 2008 R2 installed. You have deployed a server (ABC-SR15) on ABC.com's perimeter network. ABC-SR15 is running Server Core 2012. You have been instructed to make sure tha ABC-SR15 is part of the ABC.com domain. Which of the following actions should you take? a. use the "Set-Computer" PowerShell cmdlet on ABC-SR15 b. use the "Get-Computer" PowerShell cmdlet on ABC-SR15 c. use the "Test-Computer" PowerShell cmdlet on ABC-SR15 d. use the "Add-Computer" PowerShell cmdlet on ABC-SR15 |
|
Definition
|
|
Term
The ABC.com network consists of a single domain named ABC.com. All servers, including domain controllers, have Server 2012 installed. You are running a training exercise for junior admins and you are currently discussing the new VHD format called VHDX. Which of the following is TRUE with regards to VHDX? (choose all that apply) a. It supports virtual hard disk storage capacity of up to 64GB b. It supports virtual hard disk storage capacity of up to 64TB c. it does not provide protection again data corruption during power failures d. it has the ability to store custom metadata about the file that the user might want to record |
|
Definition
|
|
Term
The ABC.com network consists of a single domain named ABC.com. All servers, including domain controllers, have Server 2012 installed. ABC-SR13 is configured as the primary DNS server in the ABC.com domain. ABC-SR14 makes use of ABC-SR13 for DNS queries. You want to make sure that running nslookup.exe from ABC-SR14 produces a result that shows the proper name of the default server. Which of the following actions should you take? a. create a reverse lookup zone on ABC-SR14 b. create a forward lookup zone on ABC-SR14 c. create a reverse lookup zone on ABC-SR13 d. create a forward lookup zone on ABC-SR13 |
|
Definition
|
|
Term
The ABC.com network consists of a single domain named ABC.com. All servers, including domain controllers, have Server 2012 installed. you have logged into ABC-SR07 and would like to obtain the IP configurations of ABC-SR13. Which of the following actions should you take? a. use the Winrs.exe command b. use the Winsat.exe command c. use the Winpop.exe command d. use the Dsrm.exe command |
|
Definition
|
|
Term
The ABC.com network consists of a single domain named ABC.com. All servers, including domain controllers, have Server 2012 installed. You have been instructed to make sure that ABC-SR07 is configured to be managed from ABC-SR01 using Server Manager. Which of the following is not a valid option to take? (choose all that apply) a. You could access the server manager on ABC-SR01 b. You could access the server manager on ABC-SR13 c. You could run the %windir%/system32/Configure-SMRemoting.exe from an elevated command prompt on ABC-SR13 d. You could run the Configure-SMRemoting.exe -enable cmdlet on ABC-SR01 |
|
Definition
|
|
Term
The ABC.com network consists of a single domain named ABC.com. All servers, including domain controllers, have Server 2012 installed. You are running a training exercise for junior admins, discussing NIC Teaming. Which of the following is TRUE with regards to NIC Teaming? (choose all that apply) a. it allows for traffic failover to prevent connectivity loss if a network component fails b. it prevents bandwidth aggregation c. the Windows Server 2012 implementation of NIC Teaming supports a max of 5 NICs in a team d. the Windows Server 2012 implementation of NIC Teaming supports a max of 32 NICs in a team |
|
Definition
|
|
Term
Which of the following cannot contain multiple Active Directory domains? a. Organizational units b. Sites c. Trees d. Forests |
|
Definition
|
|
Term
What are the two basic classes of Active Directory objects? a. Resource b. Leaf c. Domain d. Container |
|
Definition
|
|
Term
Which of the following is not true about an object’s attributes? a. Administrators must manually supply information for certain attributes. b. Every container object has, as an attribute, a list of all the other objects it contains. c. Leaf objects do not contain attributes. d. Active Directory automatically creates the globally unique identifier (GUID). |
|
Definition
|
|
Term
Which of the following is not a reason you should try to create as few domains as possible when designing an Active Directory infrastructure? a. Creating additional domains increases the administrative burden of the installation. b. Each additional domain you create increases the hardware costs of the Active Directory deployment. c. Some applications might have problems working in a forest with multiple domains. d. You must purchase a license from Microsoft for each domain you create. |
|
Definition
|
|
Term
Which of the following does an Active Directory client use to locate objects in another domain? a. DNS b. Global Catalog c. DHCP d. Site Link |
|
Definition
|
|
Term
What can be used to add, delete, or modify objects in Active Directory, in addition to modifying the schema if necessary? a. DCPROMO b. LDIFDE c. CSVDE d. NSLOOKUP |
|
Definition
|
|
Term
When using CSVDE, what is the first line of the text file that uses proper attribute names? a. Header row b. Header record c. Name row d. Name record |
|
Definition
|
|
Term
Which of the following utilities do you use to perform an offline domain join? a. net join b. join c. djoin d. dconnect |
|
Definition
|
|
Term
Which of the following is not a type of user account that can be configured in Windows Server 2012? a. Local accounts b. Domain accounts c. Network accounts d. Built-in accounts |
|
Definition
|
|
Term
Which of the following are the two built-in user accounts created automatically on a computer running Windows Server 2012? a. Network b. Interactive c. Administrator d. Guest |
|
Definition
|
|
Term
Which of the following groups do you use to consolidate groups and accounts that span either multiple domains or the entire forest? a. Global b. Domain local c. Built-in d. Universal |
|
Definition
|
|
Term
Which of the following is not a correct reason for creating an OU? a. To create a permanent container that cannot be moved or renamed b. To duplicate the divisions in your organization c. To delegate administration tasks d. To assign different Group Policy settings to a specific group of users or computers |
|
Definition
|
|
Term
Which of the following group scope modifications are never permitted? (Choose all that apply.) a. Global to universal b. Global to domain local c. Universal to global d. Domain local to universal |
|
Definition
|
|
Term
In a domain running at the Windows Server 2012 domain functional level, which of the following security principals can be members of a global group? (Choose all that apply.) a. Users b. Computers c. Universal groups d. Global groups |
|
Definition
|
|
Term
You are attempting to delete a global security group in the Active Directory Users and Computers console, and the console will not let you complete the task. Which of the following could possibly be causes for the failure? (Choose all that apply.) a. There are still members in the group. b. One of the group’s members has the group set as its primary group. c. You do not have the proper permissions for the container in which the group is located. d. You cannot delete global groups from the Active Directory Users and Computers Console |
|
Definition
|
|
Term
Which of the following types of files do Group Policy tools access from a Central Store by default? a. ADM files b. ADMX files c. Group Policy objects d. Security templates |
|
Definition
|
|
Term
Which of the following local GPOs takes precedence on a system with multiple local GPOs? a. Local Group Policy b. Administrators Group Policy c. Nonadministrators Group Policy d. User-specific Group Policy |
|
Definition
|
|
Term
Which of the following techniques can you use to apply GPO settings to a specific group of users in an OU? a. GPO linking b. Administrative templates c. Security filtering d. Starter GPOs |
|
Definition
|
|
Term
Which of the following best describes the function of a starter GPO? a. A starter GPO functions as a template for the creation of new GPOs. b. A starter GPO is the first GPO applied by all Active Directory clients. c. A starter GPO uses a simplified interface for elementary users. d. A starter GPO contains all the settings found in the default Domain Policy GPO. |
|
Definition
|
|
Term
When you apply a GPO with a value of Not Configured for a particular setting to a system on which that same setting is disabled, what is the result? a. The setting remains disabled. b. The setting is changed to Not Configured. c. The setting is changed to Enabled. d. The setting generates a conflict error. |
|
Definition
|
|
Term
Which of the following tools would you use to deploy the settings in a security template to all the computers in an AD DS domain? a. Active Directory Users and Computers b. Security Templates snap-in c. Group Policy Object Editor d. Group Policy Management console |
|
Definition
|
|
Term
Which of the following are local groups to which you can add users with the Windows Control Panel? (Choose all that apply.) a. Users b. Power Users c. Administrators d. Nonadministrators |
|
Definition
|
|
Term
Which of the following tools would you use to modify the settings in a security template? a. Active Directory Users and Computers b. Security Templates snap-in c. Group Policy Object Editor d. Group Policy Management console |
|
Definition
|
|
Term
The built-in local groups on a server running Windows Server 2012 receive their special capabilities through which of the following mechanisms? a. Security options b. Windows Firewall rules c. NTFS permissions d. User rights |
|
Definition
|
|
Term
After configuring and deploying the Audit Directory Service Access policy, what must you do before a computer running Windows Server 2012 begins logging Active Directory access attempts? a. You must select the Active Directory objects you want to audit by using the Active Directory Users and Computer console. b. You must wait for the audit policy settings to propagate to all the domain controllers on the network. c. You must open the Audit Directory Service Access Properties sheet and select all the Active Directory objects you want to audit. d. You must add an underscore character to the name of every Active Directory object you want to audit. |
|
Definition
|
|
Term
Which of the following is not one of the software restriction rule types supported by Windows Server 2012? a. Hash rules b. Certificate rules c. Path rules d. Firewall rules |
|
Definition
|
|
Term
Which of the following strategies for enforcing software restrictions will prevent any executable from running except for those that have been specifically allowed by an administrator? a. Basic user b. Disallowed c. Power user d. Unrestricted |
|
Definition
|
|
Term
Under which of the following conditions will a hash rule in a software restriction policy cease to function? (Choose all that apply.) a. If you move the file on which the hash is based to a different folder b. If you update the file on which the hash is based to a new version c. If the file on which the hash is based is modified by a virus d. If you change the permissions for the file on which the hash is based |
|
Definition
|
|
Term
Which of the following rule types applies to files with an .msi extension? a. Executable rules b. Windows Installer rules c. Script rules d. Packaged app rules |
|
Definition
|
|
Term
Which of the following services must you manually start before Windows can apply AppLocker policies? a. Application Identity b. Application Management c. Credential Manager d. Network Connectivity Assistant |
|
Definition
|
|
Term
Which of the following mechanisms is used most often in firewall rules to allow traffic onto the network? a. Hardware addresses b. IP addresses c. Protocol numbers d. Port numbers |
|
Definition
|
|
Term
Connection security rules require that network traffic allowed through the firewall use which of the following security mechanisms? a. EFS b. IPsec c. UAC d. Kerberos |
|
Definition
|
|
Term
Which of the following actions can you not perform from the Windows Firewall control panel? a. Allow an application through the firewall in all three profiles b. Block all incoming connections for any of the three profiles c. Create firewall exceptions based on port numbers for all three profiles d. Turn Windows Firewall off for all three profiles |
|
Definition
|
|
Term
Which of the following tools cannot enable and disable the Network Discovery firewall rules? a. File Explorer b. Network and Sharing Center c. Action Center d. Allowed Apps dialog box |
|
Definition
|
|
Term
Which of the following statements about Windows Firewall are true? (Choose all that apply.) a. Applying firewall rules by using Group Policy overwrites all the firewall rules on the target computer. b. Applying firewall rules by using Group Policy combines the newly deployed rules with the ones already there. c. Importing firewall rules saved from another computer overwrites all the rules on the target system. d. Importing firewall rules saved from another computer combines both sets of settings. |
|
Definition
|
|
Term
What is the only difference between Server 2012 Standard and Server 2012 Datacenter editions? |
|
Definition
The number of VM instances permitted by the license. Standard only allows 2 VM instances and 1 physical instance while Datacenter allows unlimited VM instances and 1 physical instance. |
|
|
Term
What are the three Server 2012 installation options? |
|
Definition
Server Core, Full GUI, and Minimal Server Interface |
|
|
Term
What are the advantages to using Server Core? |
|
Definition
1. Hardware resource conservation 2. Reduced disk space 3. Reduced patch frequency 4. Recduced attack surface |
|
|
Term
The Minimal Server Interface is a compromise between Full GUI and Core that removes some of the most hardware-intensive elements of the GUI. What tools are available in the Minimal Server Interface? |
|
Definition
Server manager MMC applications Device manager PowerShell |
|
|
Term
What upgrade paths are NOT supported by Server 2012? |
|
Definition
Upgrades from any version prior to Server 2008 Upgrades from pre-RTM editions of Server 2012 Upgrades from workstation operating systems Cross-platform upgrades (32-bit to 64-bit) Upgrades from any Itanium edition Cross-language upgrades |
|
|
Term
What is the command-line command to rename a computer? |
|
Definition
netdom renamecomputer %ComputerName% /NewName |
|
|
Term
What is the command-line command to join a domain? |
|
Definition
netdom join %computerName% /domain: /userd: /passwordd:*
Using the * will prompt for a password |
|
|
Term
What is the PowerShell cmdlet to enable remote desktop? |
|
Definition
Set-NetFirewallRule -DisplayGroup "Remote Desktop" -Enabled True |
|
|
Term
What is the PowerShell cmdlet used to convert from GUI to Core? |
|
Definition
Uninstall-WindowsFeature Server-Gui-Mgmt-Infra,Server-Gui-Shell -Restart |
|
|
Term
What is the PowerShell cmdlet used to convert from Core to Gui? |
|
Definition
Install-WindowsFeature Server-Gui-Mgmt-Infra,Server-Gui-Shell -Restart |
|
|
Term
What are the two modes for NIC Teaming? |
|
Definition
Switch Independent Mode Switch Dependent Mode |
|
|
Term
Which mode of NIC teaming allows for alternate routes through the network? |
|
Definition
|
|
Term
Which mode of NIC Teaming allows all adapters to be combined into a single interface with combined bandwidth? |
|
Definition
|
|
Term
What are the two available configurations of Switch Independent Mode NIC Teaming and what is the difference between the two? |
|
Definition
Active/Active configuration - all the adapters are active providing an increased throughput. If one adapter fails, performance is degraded
Active/Standby configuration - one adapter is left offline to function as a failover in the event the active adapter fails. Performance remains the same in the event of a failure |
|
|
Term
What are the two configurations available in Switch Dependent Mode NIC Teaming? What is achieved with this mode? What is the difference between the two configurations? |
|
Definition
Static Teaming - requires configuration on the switch and the computer to identify which links form the team
Link aggregation control protocol - dynamically identifies links between the comptuer and a specific switch to automatically create a team, expand a team, or reduce a team
Both modes result in aggregated bandwidth because the pool of links in the team functions as a single pipeline |
|
|
Term
What is the major limitation to NIC Teaming? |
|
Definition
Systems will avoid using multiple adapters for large TCP segments to minimize lost and out-of-order TCP segments |
|
|
Term
What are the two partitioning styles available in Server 2012? |
|
Definition
MBR (Master Boot Record) GPT (GUID Partition Table) |
|
|
Term
What are the two disk types? |
|
Definition
|
|
Term
Partitions or Volumes: Which is used to describe divides in basic disks and which is used to describe divides in dynamic disks? |
|
Definition
Basic = Partitions Dynamic = Volumes |
|
|
Term
Name the five types of volumes. |
|
Definition
Simple Spanned Striped Mirrored RAID-5 |
|
|
Term
Of the 5 types of volumes, which two provide fault tolerance? |
|
Definition
|
|
Term
Name the volume type: Combines the space from multiple dynamic disks into a single large volume Fills all the space on the first disk, then fills each disk in turn Does not increase read/write performance |
|
Definition
|
|
Term
Name the volume type: System writes data one stripe at a time to each successive disk in the volume Provides improved performance as each disk in the array has time to seek the location of its next stripe while the other drives are writing Cannot be extended after creation |
|
Definition
|
|
Term
Name the volume type: Requires an identical amount of space on two physical dynamic disks All read/write operations are performed on both disks simultaneously so they contain duplicate copies of all data If one fails, the other continues to provide access to the volume until the failed drive is repaired or replaced |
|
Definition
|
|
Term
Name the volume type: Requires 3 or more dynamic physical disks System stripes data and parity information across all disks so that if one physical disk fails, the missing data can be recreated by using the parity information on the other disks Improved read performance due to striping Write performance suffers due to the need for parity calculations |
|
Definition
|
|
Term
Name the file system: Preferred file system Improved support for larger hard drives than FAT Better security in the form of encryption and permissions that restrict access by unauthorized users |
|
Definition
|
|
Term
Name the file system: Lacks the security that NTFS provides Any user that gains access to the computer can read any file without restriction Only viable reason for use is the need to dual boot the computer with a non-windows OS or a previous version of windows that does not support NTFS |
|
Definition
|
|
Term
Name the file system: Offers practically unlimited file and directory sizes Increased resiliency that eliminates the need for error-checking Does not include support for NTFS features such as file compression, Encrypted File System and disk quotas Cannot be read by any OS older than Server 2012 and Windows 8 |
|
Definition
|
|
Term
What is the PowerShell cmdlets to obtain the correct designations for the storage subsystem and the physical disks? What is the PowerShell cmdlet to create a storage pool? |
|
Definition
Get-StorageSubsystem
Get-PhysicalDisk
New-StoragePool -FriendlyName -StorageSubSystemFriendlyName -PhysicalDisks |
|
|
Term
Describe the three tasks in the Tasks menu on the Physical Disks tile on the Storage Pools home page. |
|
Definition
Add - add a physical disk to the pool; must be initialized and cannot contain any volumes
Evict - prepares a disk for removal from the pool by moving all the data to other physical disks in the pool
Remove - removes the space provided by a physical disk from the pool; option only appears if all data has been evicted |
|
|
Term
What information is included in a sharing strategy? |
|
Definition
What folders to share names to assign to the shares permissions granted to users offline file settings to use for the shares |
|
|
Term
What are the two sets of permissions used to grant/deny access to a shared file/folder? |
|
Definition
Share permissions NTFS permissions |
|
|
Term
Describe the two types of folder shares. |
|
Definition
SMB - Server Message Block - standard file sharing protocol used by all versions of Windows
NFS - Network File System - standard file sharing protocol used by UNIX and Linux distros |
|
|
Term
What happens when access-based enumeration is enabled on a folder share? |
|
Definition
Users are prevented from seeing the files/folders they do not have permission to access. Filters are applied to shared folders based on a user's permissions to the files and subfolders in the share. If a user cannot access a shared resource, the user doesn't see the resource. |
|
|
Term
What option must be selected for client systems to use Offline Files? |
|
Definition
|
|
Term
What are the two basic types of Access Control Entries (ACEs)? |
|
Definition
|
|
Term
Describe the two approaches to permission management. |
|
Definition
Additive - start with no permissions and then grant Allow permissions to give the necessary access - most popular approach
Subtractive - start by granting all possible Allow permissions and then granting Deny permissions for the access not needed |
|
|
Term
What is effective access? |
|
Definition
The combination of Allow and Deny permissions |
|
|
Term
What are the three basic rules that define how permissions are combined to form the effective access? |
|
Definition
Allow permissions are cumulative Deny permissions override Allow permissions Explicit permissions take precedence over inherited permissions |
|
|
Term
How can admins bypass the share permission system and rely solely on NTFS permissions for granular file system protection? |
|
Definition
Leave the Allow Full Control share permission to the Everyone special identity - this is granted by default to every new share |
|
|
Term
What feature allows admins to maintain previuos versions of files on a server, allowing quicker recovery of accidentally deleted or overwritten files? |
|
Definition
|
|
Term
What are the two ways to configure storage quotas? |
|
Definition
File Server Resource Manager - more flexible option NTFS Quotas - simpler option |
|
|
Term
Define the four components of the Windows print architecture. |
|
Definition
Print Device - the actual hardware that produces hard-copy documents
Printer - the software interface through which a computer communicates with a print device
Print Server - a comptuer or standalone device that receives print jobs and sends them to print devices
Printer Driver - a device driver that converts print jobs into appropriate the string of commands for a specific print device |
|
|
Term
What are the four fundamental configurations for Windows printer deployments? |
|
Definition
Direct printing Locally attached printer sharing Network-attached printing Network-attached printer sharing |
|
|
Term
When right-clicking on a printer, the shortcut menu displays a Printer Properties and a Properties shortcut. What is the difference between the two? |
|
Definition
Printer Properties opens the Properties sheet for the printer
Properties opens the Properties sheet for the print device - where a user can configure options for printing |
|
|
Term
What is Remote Access Easy Print? |
|
Definition
A component that enables Remote Desktop clients to print to their local print devices |
|
|
Term
Clients need proper permissions to access a shared printer. What do these permissions dictate? |
|
Definition
if a user can use the printer
if the user can manage all documents submitted to a printer (users can manage their own documents)
if the user can manage the properties of the printer itself |
|
|
Term
Describe three advanced printing configurations. |
|
Definition
Connect a single printer to multiple print devices, creating a printer pool
Connect multiple print devices that support different forms and paper sizes to a single printer
Connect multiple printers with different priorities, security settings, auditing, and monitoring parameters to a single print device |
|
|
Term
What four services can you choose to install when installing the Print and Document Services role? |
|
Definition
Print Server Distributed Scan Server Internet Printing LPD Service |
|
|
Term
What admin tasks can be performed through the print management snap-in for MMC? |
|
Definition
Adding print servers Viewing printers Managing printers and print servers Deploying printers with Group Policy |
|
|
Term
What is the PowerShell cmdlet to configure WinRM and what are the available parameters? |
|
Definition
Configure-SMRemoting.exe -Get: displays current status -Enable: enables WinRM -Disable: disables WinRM |
|
|
Term
What inbound Windows Firewall Rules must be enabled for remote access to the server? |
|
Definition
COM+ Network Access (DCOM-in) Remote Event Log Management (NP-in) Remote Event Log Management (RPC) Remote Event Log Management (RPC-EPMAP) |
|
|
Term
What are the different ways to configure Windows Firewall on servers? |
|
Definition
PowerShell Windows Firewall with Advanced Security MMC snap-in NetSh AdvFirewall command from elevated command prompt Create a GPO and apply it to remote servers |
|
|
Term
name the Virtualization Architecture: Hypervisor runs on top of the host OS Host OS shares access to the computer's processor with the hypervisor, passing control of the processor back and forth Does not provide performance equivalent to separate physical computers |
|
Definition
|
|
Term
Name the Virtualization Architecture: Hypervisor is an abstraction layer that interacts directly with the computer's physical hardware without an intervening Host OS Hypervisor creates individual environments (partitions) wach with its own OS installed and access to the computer's hardware via the hypervisor No host OS shares processor time with the hypervisor |
|
Definition
Hyper-V/Type I virtualization |
|
|
Term
What are the Hyper-V hardware limitations? |
|
Definition
Host system can have up to 320 logical processors support up to 2048 virtual CPUs support up to 4TB RAM One server can have up to 1024 active VMs Each VM can have up to 64 virtual CPUs and 1TB of memory can support clusters with up to 64 nodes and 8000 VMs |
|
|
Term
What are the hardware requirements for the Hyper-V role? |
|
Definition
64-bit processor with hardware assisted virtualization
System BIOS that supports the virtualization hardware on which the virtualization feature has been enabled
Hardware-enforced Data Execution Prevention must be enabled |
|
|
Term
AMD and Intel used different terms to describe hardware-enforced Data Execution Prevention (DEP). What are those terms? |
|
Definition
AMD: No eXecute (NX) Intel: eXecuted Disable (XD) |
|
|
Term
What files are created for each VM? |
|
Definition
.XML file that contains the VM configuration information
.VHD or .VHDX that contains the guest OS, applications, and data
.VSV if the machine has been placed into a saved state |
|
|
Term
What is the PowerShell cmdlet to create a new VM? |
|
Definition
New-VM -memoryStartupBytes -newVHDSizeBytes |
|
|
Term
What settings can be configured using Dynamic Memory? |
|
Definition
Startup RAM Minimum RAM Maximum RAM Memory Buffer Memory Weight |
|
|
Term
Name the dynamic memory setting: Amount of memory to allocate when the VM starts |
|
Definition
|
|
Term
Name the dynamic memory setting: The smallest amount of memory the VM can use at any time |
|
Definition
|
|
Term
Name the dynamic memory setting: the largest amount of memory that the VM can use at any time |
|
Definition
|
|
Term
Name the dynamic memory setting: A percentage that Hyper-V uses to calculate how much memory to allocate to the VM compared to its actual utilization, as measured by performance counters |
|
Definition
|
|
Term
Name the dynamic memory setting: relative value that specifies the priority of the VM compared to other VMs on the same computer |
|
Definition
|
|
Term
When the minimum RAM is lower than the startup RAM, it is possible that the physical RAM supply will be depleted and a VM may not be able to start. How is this problem resolved? |
|
Definition
|
|
Term
Why would a system use Smart Paging? |
|
Definition
If a VM has to restart and there is not enough memory to allocate for startup RAM, the system uses hard disk space to make up the difference and begins paging memory contents to disk for as long as it takes to restart the VM and return it to its minimum RAM allocation |
|
|
Term
What are the three different types of VHD files? |
|
Definition
Fixed hard disk image Dynamic hard disk image Differencing hard disk image |
|
|
Term
Describe a differencing hard disk image. |
|
Definition
A child image file is created from a parent image file. The system writes all data to the child image, which can later be merged with the parent image file. This facilitates a rollback if necessary. This may be used for updates - the updates are installed on the child image for testing, and if all is well they are merged on to the parent image. |
|
|
Term
What is the PowerShell cmdlet to create a new virtual hard disk? |
|
Definition
New-VHD -Path -Fixed|-Dynamic|-Differencing -SizeBytes [-BlockSizeBytes [-logicalSectorSizeBytes 512|4096] [-ParentPath |
|
|
Term
How many hard disk controllers does each VM have? |
|
Definition
|
|
Term
How many devices can each IDE controller support and what is the default IDE configuration? |
|
Definition
2 One channel on IDE 0 is for the system hard disk and one channel on IDE 1 is for the system DVD drive |
|
|
Term
What is a pass-through disk and how do you add one to a VM? |
|
Definition
A type of disk that points to a physical drive installed on the host computer
To add one to the VM, it must first be taken offline in the parent OS. Once it is offline, it will be available for selection in the physical disk drop-down list |
|
|
Term
What is a snapshot and why would one be used? |
|
Definition
Captured image of the state, data, and hardware configuration of a VM at a particular moment in time.
A convenient way for admins to quickly revert a VM to a previous state at will. |
|
|
Term
|
Definition
Storage Area Network: a dedicated network that provides access to consolidated, block level data storage |
|
|
Term
What are the benefits to using a SAN? |
|
Definition
Avoid limitations imposed by the maximum number of devices that can be connected directly to a computer
Added flexibility in communication capabilities |
|
|
Term
What communication technology is used by servers to communicate with the SAN? |
|
Definition
|
|
Term
Name the virtual switch type: Virtual switch is bound to the networking protocol stack in the host OS and connected to a physical network interface adapter in the Hyper-V server. VMs running on the server's parent and child partitions can access the physical network that the physical adapter is connected to. |
|
Definition
|
|
Term
Name the virtual switch type: Virtual switch is bound to a separate instance of the networking protocol stack in the host OS and connected to a physical network interface adapter in the Hyper-V server. VMs running on the server's parent and child partitions can all access the network implemented by the virtual switch, but the VMs on the child partitions cannot access the physical network through the physical network interface adapter. |
|
Definition
|
|
Term
Name the virtual switch type: Virtual switch exists only in the Hyper-V server and is accessible only to the VMs running on the child partitions. The host OS can access the physical network through the physical network interface adapter, but not the virtual network created by the virtual switch |
|
Definition
|
|
Term
How is a virtual switch associated with a particular VLAN on the physical network? |
|
Definition
Selecting "Enable Virtual LAN Identification for Management OS" and entering a VLAN identifer |
|
|
Term
What are the three basic methods for assigning IPv4 addresses? |
|
Definition
Manual IPv4 Configuration DHCP Automatic Private IP Addressing (APIPA) |
|
|
Term
When can you contract and IPv6 address and how is it done? |
|
Definition
When two or more consecutive 8-bit blocks of zeros are in the address, they can be contracted with a double colon. The leading zeros can also be removed. EX: 21cd:0053:0000:0000:e8bb:04f2:003c:c394 becomes 21cd:53::e8bb:4f2:3c:c394 |
|
|
Term
How is the network address expressed in IPv6? |
|
Definition
The slash notation introduced in CIDR
EX: 21cd:53::/64 |
|
|
Term
Name the IPv6 address type: The IPv6 equivalent of a registered IPv4 address, routable worldwide and unique on the internet |
|
Definition
|
|
Term
Name the IPv6 address type: The equivalent to APIPA address in IPv4 Not routable because all addresses are on the same network Always starts with the same network identifier: a 10-bit prefix of 1111110 010 followed by 54 zeros (fe80::/64) Systems possessing this type of address can only communicate with systems on the same link |
|
Definition
Link-Local Unicast Address |
|
|
Term
Name the IPv6 address type: The equivalent of 10.0.0.0/8, 172.16.0.0/12 and 192.168.0.0/26 private network addresses Routable within an organization Can be subnetted as needed to support any size organization |
|
Definition
Unique Local Unicast Addresses |
|
|
Term
Name the IPv6 address type: Always begin with a falue of 11111111 in binary, ff in hex |
|
Definition
|
|
Term
Name the IPv6 address type: Function is to identify routers within a given address scope and send traffic to the nearest router as determined by the local routing protocols Can be used to identify a particular set of routers in the enterprise |
|
Definition
|
|
Term
What are the three technologies supported by Windows that are used to automatically configure tunnels that express an IPv4 address in the IPv6 format. |
|
Definition
6to4 Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) Teredo |
|
|
Term
What are the three components of DHCP? |
|
Definition
A DHCP Server A DHCP Client A DHCP communications protocol |
|
|
Term
What are the 3 different IP address allocation methods defined by the DHCP standards? |
|
Definition
Dynamic allocation Automatic allocation Manual allocation |
|
|
Term
What are the 8 different message types used by DHCP? |
|
Definition
DHCPDISCOVER DHCPOFFER DHCPREQUEST DHCPDECLINE DHCPACK DHCPNAK DHSPRELEASE DHCPINFORM |
|
|
Term
What are DHCP Extensions? |
|
Definition
Parameters that govern the DHCP lease negotiation and renewal processes |
|
|
Term
Name the DHCP Extensions. |
|
Definition
Requested IP Address IP Address Lease Time Server Identifier Parameter Request List Message Renewal (T1) time value Rebinding (T2) time value |
|
|
Term
What are the two types of DHCP options? |
|
Definition
Scope options Server options |
|
|
Term
When do you need a DHCP relay agent? |
|
Definition
When you have a subnet that does not have a DHCP server on it. |
|
|
Term
What are the 3 elements of the DNS architecture? |
|
Definition
The DNS namespace Name servers Resolvers |
|
|
Term
What are the two types of name resolution requests recognized by DNS servers? |
|
Definition
Recursive query Iterative query |
|
|
Term
What is the in-addr.arpa domain used for? |
|
Definition
Reverse name resolution - resolving an IP address to a DNS name. |
|
|
Term
The ABC.com network consists of a single domain named ABC.com. All servers, including domain controllers, have Server 2012 installed. You have created and linked a new GPO to an OU named ABCServ, which host the computer accounts for servers in the ABC.com domain. You have been tasked with adding a group to a local group on all servers in the ABC.com domain. This group should not, however, be removed from the local group. Which of the following actions should you take? a. consider adding a restricted group b. consider adding a global group c. consider adding a user group d. consider adding a server group |
|
Definition
|
|
Term
The ABC.com network consists of a single domain named ABC.com. All servers have Server 2012 installed, while domain controllers have Windows Server 2008 R2 installed. You are tasked with deploying a new Windows Server 2012 domain controller. You are preparing to install the DNS Server role and enable the global catalog server option. Which of the following actions should you take? a. Consider making use of Server Manager b. Consider making use of the Active Directory Installation Wizard c. Consider making use of the DHCP Installation Wizard d. Consider making use of the TS Manager |
|
Definition
|
|
Term
ABC.com has a Windows Server 2012 domain controller (ABC-DC01) which has the Domain Naming master and Schema master roles installed. ABC.com also has a Windows Server 2008 R2 domain controller, named ABC-DC02, which has the PDC Emulator, RID master, and Infrastructure master roles installed. You have deployed a new Windows Server 2012 server, which belongs to a workgroup, in ABC.com's perimeter network. you then executed the djoin.exe command. Which of the following is the purpose of the djoin.exe command? a. It sets up a computer account in a domain and requests an offline domain join when a computer restarts b. It sets up a user account in a domain and requests an online domain join when a computer restarts c. It sets up a computer account in a domain and requests an offline domain join immediately d. It sets up a computer account in a domain join and requests an online domain join immediately |
|
Definition
|
|
Term
The ABC.com network consists of a single domain named ABC.com. All servers, including domain controllers, have Server 2012 installed. ABC.com has its headquarters in London, and several widespread satellite offices. When ABC.com releases a new written policy stating that the GUI should not be installed on any servers deployed to ABC.com's satellite offices. It is reported that a server in one of the satellite offices are not compliant with the new written policy. You are required to remedy the situation, while using the least amount of user interaction. Which of the following actions should you take? a. uninstall the User Interfaces and Infrastructure feature using a PowerShell cmdlet b. uninstall the User Interfaces and Infrastructure feature via TS Manager c. uninstall the User Interfaces and Infrastructure feature via Server Manager d. uninstall the User Interfaces and Infrastructure feature using the Dsrm.exe command from the command prompt |
|
Definition
|
|
Term
The ABC.com network consists of a single domain named ABC.com. All servers, including domain controllers, have Server 2012 installed. ABC.com has a server (ABC-SR07) which has the AD DS, DHCP, and DNS server roles installed. ABC.com has another server (ABC-SR08) which has the DHCP, and Remote Access server roles installed. You have configured a server (ABC-SR09), which has the File and Storage server role installed, to automatically acquire an IP address. You then create a filter on ABC-SR07. What is the reason for this configuration? a. to make sure that ABC-SR07 issues ABC-SR09 an IP address b. to make sure that ABC-SR07 does not issue ABC-SR09 an IP address c. to make sure that ABC-SR09 acquires a constant IP address from ABC-SR08 only d. to make sure that ABC-SR09 is configured with a static IP address |
|
Definition
|
|
Term
The ABC.com network consists of a single domain named ABC.com. All servers, including domain controllers, have Server 2012 installed. You have been instructed to modify an Active Directory computer object. Which of the following actions should you take? a. make use of the Get-ADComputer Windows PowerShell cmdlet b. make use of the Set-ADComputer Windows PowerShell cmdlet c. make use of the New-ADComputer Windows PowerShell cmdlet d. make use of the Get-ADComputerServiceAccount Windows PowerShell cmdlet |
|
Definition
|
|
Term
The ABC.com network consists of a single domain named ABC.com. All servers, including domain controllers, have Server 2012 installed. You are running a training exercise for junior administrators. You are currently discussing connection security rules. Which of the following is TRUE with regards to connection security rules? a. Connection security rules allows for traffic to be secured via IPsec b. Connection security rules do not allow the traffic through the firewall c. Connection security rules are applied to programs or services d. Connection security rules are applied between two computers |
|
Definition
|
|
Term
The ABC.com network consists of a single domain named ABC.com. All servers, including domain controllers, have Server 2012 installed. When you recently added new workstations to the ABC.com manually, you found that the computer accounts were created in the default container. You want to make sure that the default container for newly created computers is redirected to a specified, target OU. Which of the following actions should you take? a. make use of the replace.exe command-line tool b. make use of the redircmp.exe command-line tool c. make use of the redirusr.exe command-line tool d. make use of the rexec.exe command-line tool |
|
Definition
|
|
Term
The ABC.com network consists of a single domain named ABC.com. All servers, including domain controllers, have Server 2012 installed. You have been instructed to modify the name of the local Administrator account on all ABC.com workstations. You want to achieve this using as little administrative effort as possible. Which of the following actions should you take? a. consider configuring the Security Options settings via the Group Policy Management Console (GPMC) b. consider configuring the Security Options settings via Server Manager c. consider configuring the replication settings d. consider navigating to Local Users and Groups via Computer Management on each workstation |
|
Definition
|
|
Term
The ABC.com network consists of a single domain named ABC.com. All servers, including domain controllers, have Server 2012 installed. You have just executed the Uninstall-WindowsFeature Server-Gui-Shell -Remove cmdlet on ABC.com server, named ABC-SR13. Which of the following is the reason for doing this? a. to only remove Windows Explorer from ABC-SR13 b. to only remove the Windows Internet Explorer from ABC-SR13 c. to only remove the components and files related to Windows Explorer from ABC-SR13 d. to remove Windows Explorer, Windows Internet Explorer, and all associated components and files from ABC-SR13 |
|
Definition
|
|
Term
The ABC.com network consists of a single domain named ABC.com. All servers, including domain controllers, have Server 2012 installed and the workstations have Win8 installed. You are running a training exercise for junior administrators. You are currently discussing a Windows PowerShell cmdlet that activates previously de-activated firewall rules. Which of the following is the cmdlet being discussed? a. Set-NetFirewallRule b. Enabled-NetFirewallRule c. Set-netIPsecRule d. Enable-NetIPsecRule |
|
Definition
|
|
Term
The ABC.com network consists of a single domain named ABC.com. All servers, including domain controllers, have Server 2012 installed. ABC.com has a server (ABC-SR07) with four network adapters. ABC.com has two LANs. Two of ABC-SR07's network adapters are connected to one LAN while the other two are connected to the other LAN. You are required to configure one of the network adapter pairs into a network adapter team. Which of the following actions should you take? a. consider accessing the Group Policy Management Console (GPMC) on ABC-SR07 b. consider accessing the TS Manager console on ABC-SR07 c. consider accessing the Server Manager console on ABC-SR07 d. consider accessing the Remote Desktop Gateway Manager console on ABC-SR07 |
|
Definition
|
|
Term
The ABC.com network consists of a single domain named ABC.com. All servers, including domain controllers, have Server 2012 installed. You have been instructed to make sure that ABC.com users are not able to install a Windows Store application. You then create a rule for packaged apps. Which of the following is the rule based on? (Choose all that apply) a. The publisher of the package b. The publisher of the application c. The name of the package d. The name of the application e. The package version f. The application version |
|
Definition
|
|
Term
The ABC.com network consists of a single domain named ABC.com. All servers, including domain controllers, have Server 2012 installed. You received instructions to install the Remote Desktop Services server role on a server, named ABC-SR07. You want to achieve this remotely from ABC-SR06. Which of the following actions should you take? a. consider accessing the Server Manager console on ABC-SR07 b. consider accessing the Server Manager console on ABC-SR06 c. consider accessing the TS Manager console on ABC-SR07 d. consider accessing the TS Manager console on ABC-SR06 |
|
Definition
|
|
Term
The ABC.com network consists of a single domain named ABC.com. All servers, including domain controllers, have Server 2012 installed. You are running a training exercise for junior administrators. You are discussing spanned volumes. Which of the following is TRUE with regards to spanned volumes? (Choose all that apply) a. Spanned volumes do not provide fault tolerance b. Spanned volumes are a fault tolerant solution c. You can extend a spanned volume onto a maximum of 16 dynamic disks d. You cannot create a spanned volume using a system volume or boot volume |
|
Definition
|
|
Term
The ABC.com network consists of a single domain named ABC.com. All servers, including domain controllers, have Server 2012 installed. ABC.com has a Hyper-V server, named ABC-SR13, which hosts multiple virtual machines. You have enabled the use of Single-Root I/O Virtualization? (Choose all that apply) a. It maximizes network throughput, while minimizing network latency b. It maximizes network throughput, as well as network latency c. It avoids the virtual switch stack and allows the virtual machine direct access to the actual network switch d. It prevents the virtual machine from accessing the network switch directly |
|
Definition
|
|
Term
The ABC.com network consists of a single domain named ABC.com. All servers, including domain controllers, have Server 2012 installed. You are running a training exercise for junior administrators. You are currently discussing storage pools. Which of the following are TRUE with regards to storage pools? a. It allows you to group physical disks into one or more containers b. It prevents you from grouping physical disks into one or more containers c. It allows you to easily add storage with minor impact on users d. It allows you to easily add storage without impacting users |
|
Definition
|
|
Term
The ABC.com network consists of a single domain named ABC.com. All servers, including domain controllers, have Server 2012 installed. A backup of a GPO from the test.com domain is stored on a domain controller in the ABC.com domain. You are informed that a GPO must be created in the ABC.com domain, and must be based on the settings of the GPO in the test.com domain. You start by creating the new GPO using the New-GPO Windows PowerShell cmdlet. You want to complete the task via a Windows PowerShell cmdlet. Which of the following actions should you take? a. use the Invoke-GPUpdate Windows PowerShell cmdlet b. use the Copy-GPO Windows PowerShell cmdlet c. use the New-GPLink Windows PowerShell cmdlet d. use the Import-GPO Windows PowerShell cmdlet |
|
Definition
|
|
Term
The ABC.com network consists of a single domain named ABC.com. All servers, including domain controllers, have Server 2012 installed and all workstations have Win8 installed. You are running a training exercise for junior administrators. You are currently discussing the Always Offline Mode. Which of the following is TRUE with regards to the Always Offline Mode? (Choose all that apply) a. It allows for swifter access to cached files and redirected folders b. To enable Always Offline Mode, you have to satisfy the forest and domain functional-level requirements, as well as schema requirements c. It allows for lower bandwidth usage due to users are always working offline d. To enable Always Offline Mode, you must have workstations running Windows 7 or Windows Server 2008 R2 |
|
Definition
|
|
Term
The ABC.com network consists of a single domain named ABC.com. All servers, including domain controllers, have Server 2012 installed. You are running a training exercise for junior administrators and are currently discussing the Windows Firewall with Advanced Security feature. Which of the following is TRUE with regards to Windows Firewall with Advanced Security? (choose all that apply) a. It provides host-based, two-way network traffic filtering for a computer b. It provides host-based, one-way network traffic filtering for a computer c. It blocks unauthorized network traffic flowing into or out of the local computer d. It only blocks unauthorized network traffic flowing into the local computer e. It only blocks unauthorized network traffic flowing out of the local computer |
|
Definition
|
|
Term
The ABC.com network consists of a single domain named ABC.com. All servers, including domain controllers, have Server 2012 installed. You have received instructions to convert a basic disk to a GPT disk. Which of the following is TRUE with regards to GPT disks? (Choose all that apply) a. to convert a basic disk to a GPT disk, the disk must not contain any partitions or volumes b. You can convert a basic disk to a GPT disk, regardless of partitions or volumes c. GPT is required for disks larger than 2TB d. GPT is required for disks smaller than 2TB e. The GPT partition style can be used on removable media f. GPT disks make use of the standard BIOS partition table |
|
Definition
|
|
Term
The ABC.com network consists of a single domain named ABC.com. All servers, including domain controllers, have Server 2012 installed. You have configured a server (ABC-SR07) as a VPN server. You are required to configure new firewall rules for workstation connections. You want to achieve this using the least amount of administrative effort. Which of the following actions should you take? a. Use the Enable-NetFirewallrule cmdlet b. Use the New-NetFirewallRule cmdlet c. Use the dism.exe command from the command prompt d. Use the dsadd.exe command from the command prompt |
|
Definition
|
|
Term
The ABC.com network consists of a single domain named ABC.com. All servers, including domain controllers, have Server 2012 installed. You are running a training exercise for junior administrators and are currently discussing Group Policy preference. Which of the following is TRUE with regards to Group Policy preference? a. It supports applications and operating system features that are not compatible with Group Policy b. It does not support item-level targeting c. It is the same as Group Policy filtering d. It does not cause the application or operating system feature to disable the user interface for the settings they configure |
|
Definition
|
|
Term
The ABC.com network consists of a single domain named ABC.com. All servers, including domain controllers, have Server 2012 installed. ABC.com has a server (ABC-SR13) that hosts a shared folder named ABCShare that has been shared as ABCShare$. Which of the following is TRUE with regards to sharing the folder in this manner? a. It allows all users to view ABCShare when browsing the network b. It prevents users from viewing ABCShare when browsing the network c. It only allows ABC-SR13's users to view ABCShare d. It removes the permissions configured for ABCShare |
|
Definition
|
|
Term
The ABC.com network consists of a single domain named ABC.com. Subsequent to deploying a Server Core Installation of Windows Server 2012 on a new ABC.com server, you are instructed to add a GUI to the server. You want to achieve this goal from the command prompt. Which of the following commands should you use? a. dism.exe command b. dsquery.exe command c. dsadd.exe command d. dsrm.exe command |
|
Definition
|
|
Term
Name the DNS Zone: Contains the master copy of the zone database where admins make all changes to the zone's resource records |
|
Definition
|
|
Term
Name the DNS Zone: Creates a duplicate of the primary zone on another server Contains a backup copy of the primary master zone database file stored as an identical text file on the server's local drive Can only update the resource records by replicating the primary master zone database file using a process called a zone transfer |
|
Definition
|
|
Term
Name the DNS Zone: Creates a copy of a primary zone that contains the key resource records that identify the authoritative servers for the zone Forwards or refers requests |
|
Definition
|
|
Term
Name the resource record: Indicates the server is the best authoritative source for data concerning the zone |
|
Definition
|
|
Term
Name the resource record: Identifies a DNS server functioning as an authority for the zone Each DNS server in the zone must be represented by this type of resource record |
|
Definition
|
|
Term
Name the resource record: Provides a name-to-address mapping that supplies an IPv4 address for a spcific DNS name. Performs the primary function of the DNS - converting names to addresses |
|
Definition
|
|
Term
Name the resource record: Provides a name-to-address mapping that supplies an IPv6 address for a specific DNS name |
|
Definition
|
|
Term
Name the resource record: Provides an address-to-name mapping that supplies a DNS name for a specific address in teh in-addr.arpa domain. Used for reverse lookups only |
|
Definition
|
|
Term
Name the resource record: Creates an alias that points to the real name of a host identified by an A record Used to provide alternative names by which systems can be identified |
|
Definition
|
|
Term
Name the resource record: Identifies a system that will direct email traffic sent to an address in the domain to the individual recipient, a mail gateway, or another mail server |
|
Definition
|
|
Term
What are the two types of user accounts? |
|
Definition
|
|
Term
What are the two built-in user accounts created during installation of a Windows operating system? |
|
Definition
|
|
Term
What tools can be used to create user accounts? |
|
Definition
Active Directory Administration Center Active Directory Users and Computers Dsadd.exe Windows PowerShell CSVDE.exe LDIFDE.exe |
|
|
Term
What is the PowerShell cmdlet used to import a CSV file to create multiple user objects? |
|
Definition
Import-CSV users filename.csv | foreach {new-ADuser -SamAccountName $_.SamAccountName -Name $_.Name -SurName $_.Surname -GivenName $_.GivenName -Path "OU=Research,DC=adatum,DC=com" -AccountPassword Pa$$w0rd -Enabled $true |
|
|
Term
What are the different ways to create computer objects before computers are joined to the domain? |
|
Definition
ADUC Active Directory Administrative Center DSADD.exe Windows PowerShell |
|
|
Term
What are the two basic strategies for creating AD Computer Objects? |
|
Definition
Create the computer objects by using an AD tool so that computers can locate the existing objects when they join the domain
Begin the joining process first and let the computer create its own computer object |
|
|
Term
What are the two different group types? |
|
Definition
Distribution groups Security groups |
|
|
Term
What are the three group scopes available in AD? |
|
Definition
Domain Local Groups Global Groups Universal Groups |
|
|
Term
What are the administrative benefits of using group policies? |
|
Definition
Control over centralized configuration of user settings, application installation, and desktop configuration
Centralized administration of user files eliminates the need for and cost of trying to recover files from a damaged drive
The need to manually make security changes on each computer is reduced by the rapid deployment of new settings through Group Policy |
|
|
Term
What are the three types of GPOs? |
|
Definition
Local GPOs Nonlocal GPOs Starter GPOs |
|
|
Term
By default, tools such as the Group Policy Management console save the ADMX files to the %systemroot%\PolicyDefinitions folder. Where must they be copied to for a Central Store? |
|
Definition
%systemroot%\SYSVOL\sysvol\\Policies |
|
|
Term
What are the three subnodes under Computer Configuration and User Configuration that further organize the available Group Policy settings |
|
Definition
Software Settings Windows Settings Administrative Templates |
|
|
Term
What are the three different states of each Administrative Template setting? |
|
Definition
Not Configured Enabled Disabled |
|
|
Term
What are the three layers of Group Policy support? |
|
Definition
Local Group Policy Administrators and Nonadministrators Group Policy User-specific Group Policy |
|
|
Term
What are the guidelines to plan an audit policy? |
|
Definition
Audit only pertinent items Archive security logs to provide a documented history Configure the size of the security logs carefully |
|
|
Term
What are the four settings for UAC? |
|
Definition
Always notify me Notify me when programs try to make changes to my computer Notify me when programs try to make changes to my computer(do not dim my desktop) Never notify me |
|
|
Term
What are the four types of software rules that can specify which programs can or cannot run on the network? |
|
Definition
Hash rules Certificate rules Path rules Network zone rules |
|
|
Term
What are the three specific properties used to provide additional settings that apply to all policies within the Software Restriction Policies folder? |
|
Definition
Enforcement Designated File Types Trusted Publishers |
|
|
Term
You have a server named Server1 that runs Windows Server 2012. Server1 has the Hyper-V server role installed. On Server1, you create a virtual machine named VM1. VM1 has a legacy network adapter. You need to assign a specific amount of available network bandwidth to VM1. What should you do first? A. Remove the legacy network adapter, and then run the Set-VMNetworkAdapter cmdlet B. Add a second legacy network adapter, then run the Set-VMNetworkAdapter cmdlet C. Add a second legacy network adapter, and then configure network adapter teaming D. remove the legacy network adapter, and then add a network adapter |
|
Definition
|
|
Term
You have a server named Server1 that runs Windows Server 2012. Server1 has the Hyper-V server role installed. You have fixed-size VHD named Files.vhd. You need to make the contents in Files.vhd available to several virtual machines. The solution must meet the following requirements: · Ensure that if the contents are changed on any virtual machine, the changes are not reflected on the other virtual machines. · Minimize the amount of disk space used. What should you do? A. Create a dynamically expanding VHDX. Transfer the information from Files.vhd to the new VHDX file B. Create a fixed-size VHDX. Transfer the information from Files.vhd to the new VHDX file. C. Convert Files.vhd to a dynamically expanding VHD. D. Create differencing VHD5 that use Files.vhd as the parent disk |
|
Definition
|
|
Term
Your network contains an Active Directory domain named adatum.com. The domain contains a server named Server1 that runs Windows Server 2012. On a server named Core1, you perform a Server Core Installation of Windows Server 2012. You join Core1 to the adatum.com domain. You need to ensure that you can use Event Viewer on Server1 to view the event logs on Core1. What should you do on Core1? A. Run the Enable-NetFirewallRule cmdlet B. Run sconfig.exeand configure remote management C. Run the Disable-NetFirewallRule cmdlet. D. Run sconfiq.exeand configure the network settings. |
|
Definition
|
|
Term
Your network contains a file server named Server1 that runs Windows Server 2012. All client computers run Windows 8. You need to ensure that when users are connected to the network, they always use local offline files that are cached from Server1. Which Group Policy setting should you configure? A. Configure slow-link mode B. Configure slow link speed C. Enable file synchronization on costed networks D. Turn on economical application of Administratively assigned Offline Files |
|
Definition
|
|
Term
Your network contains an Active Directory domain named contoso.com. All servers run either Windows Server 2008 R2 or Windows Serve 2012. All client computers run either Windows 7 or Windows 8. The domain contains a member server named Server1 that runs Windows Server 2012. Server1 has the File and Storage Services server role installed. On Server1, you create a share named Share1. You need to ensure that users can use Previous Versions to restore the files in Share1. What should you configure on Server1? A. The Shadow Copies settings B. A Windows Server Backup schedule C. A data recovery agent D. The Recycle Bin properties |
|
Definition
|
|
Term
You have a server named Server1 that runs Windows Server 2012. Server1 has the Print and Document Services server role installed. Server1 is connected to two identical print devices. You need to ensure that users can submit print jobs to the print devices. The solution must ensure that if one print device fails, the print jobs will print automatically on the other print device. What should you do on Server1? A. Add two printers and configure the priority of each printer B. Add one printer and configure printer pooling C. Install the Network Load Balancing (NLB) feature, and then add one printer D. Install the Failover Clustering feature, and then add one printer |
|
Definition
|
|
Term
Your network contains a server named Server1 that runs Windows Server 2012. Server1 has the Print and Document Services server role installed. You connect a new print device to the network. The marketing department and the sales department will use the print device. You need to provide users from both departments with the ability to print to the network print device. The solution must ensure that if there are multiple documents queued to print, the documents from the sales users print before the documents from the marketing users. What should you do on Server1? A. Add two printers. Modify the priorities of each printer and the security settings of each printer B. Add two printers and configure printer pooling C. Add one printer and configure printer pooling D. Add one printer. Modify the printer priority and the security settings |
|
Definition
|
|
Term
You have a server named Server2 that runs Windows Server 2012. You open Server Manager on Server2 as shown in the exhibit. (Click the Exhibit button.) The Everyone group has read share permission and read NTFS permission to Sources. You need to ensure that when users browse the network, the Sources share is not visible. What should you do? A. From the properties of the Sources folder, remove the Sources share, and then share the Sources folder as Sources$ B. From the properties of the Sources folder, deny the List Folder Contents permission for the Everyone group C. From the properties of the Sources share, configure access-based enumeration D. From the properties of the Sources folder, configure the hidden attribute |
|
Definition
|
|
Term
Your network contains an Active Directory domain named contoso.com. The network contains a member server named Server1 that runs Windows Server 2012. Server1 has the DNS Server server role installed and has a primary zone for contoso.com. The Active Directory domain contains 500 client computers. There are an additional 20 computers in a workgroup. You discover that every client computer on the network can add its record to the contoso.com zone. You need to ensure that only the client computers in the Active Directory domain can register records in the contoso.com zone. What should you do first? A. Move the contoso.com zone to a domain controller that is configured as a DNS server B. Configure the Dynamic updates settings of the contoso.com zone C. Sign the contoso.com zone by using DNSSEC D. Configure the Security settings of the contoso.com zone. |
|
Definition
|
|
Term
Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that hosts the primary DNS zone for contoso.com. All client computers are configured to use DC1 as the primary DNS server. You need to configure DC1 to resolve any DNS requests that are not for the contoso.com zone by querying the DNS server of your Internet Service Provider (ISP). What should you configure? A. Name server (NS) records B. Condition and forwarders C. Forwarders D. Naming Authority Pointer (NAPTR) DNS resource records (RR) |
|
Definition
|
|
Term
Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012. The domain contains a server named Server1 that runs Windows Server 2012. You need to ensure that when users log on to Server1, their user account is added automatically to a local group named Group1 during the log on process. Which Group Policy settings should you modify? A. Restricted Groups B. Security Options C. User Rights Assignment D. Preferences |
|
Definition
|
|
Term
Your network contains an Active Directory domain named contoso.com. You need to prevent users from installing a Windows Store app named App1. What should you create? A. An application control policy executable rule B. An application control policy packaged app rule C. A software restriction policy certificate rule D. An application control policy Windows Installer rule |
|
Definition
|
|
Term
Your network contains an Active Directory domain named contoso.com. The domain contains 500 servers that run Windows Server 2012. You have a written security policy that states the following: · Only required ports must be open on the servers. · All of the servers must have Windows Firewall enabled. · Client computers used by Administrators must be allowed to access all of the ports on all of the servers. · Client computers used by the Administrators must be authenticated before the client computers can access the servers. You have a client computer named Computer1 that runs Windows 8. You need to ensure that you can use Computer1 to access all of the ports on all of the servers successfully. The solution must adhere to the security policy. Which three actions should you perform A. On Computer1, create a connection security rule B. On all of the servers, create an outbound rule and select the Allow the connection if it is secure option C. On all of the servers, create an inbound rule and select the Allow the connection if it is secure option D. On Computer1, create an inbound rule and and select the Allow the connection if it is secure option E. On Computer1, create an outbound rule and select the Allow the connection if it is secure option F. On all of the servers, create a connection security rule |
|
Definition
|
|
Term
Your network contains an Active Directory domain named contoso.com. All user accounts are in an organizational unit (OU) named Employees. You create a Group Policy object (GPO) named GP1. You link GP1 to the Employees OU. You need to ensure that GP1 does not apply to the members of a group named Managers. What should you configure? A. The Security settings of Employees B. The WMI filter for GP1 C. The Block Inheritance option for Employees D. The Security settings of GP1 |
|
Definition
|
|
Term
Your network contains a server named Server1 that runs Windows Server 2012. Server1 is located on the same subnet as all of the client computers. A network technician reports that he receives a "Request timed out" error message when he attempts to use the ping utility to connect to Server1 from his client computer. The network technician confirms that he can access resources on Server1 from his client computer. You need to configure Windows Firewall with Advanced Security on Server1 to allow the ping utility to connect. Which rule should you enable? A. File and Printer Sharing (Echo Request - ICMPv4-In) B. Network Discovery (WSD-In) C. File and Printer Sharing (NB-Session-In) D. Network Discovery (SSDP-In) |
|
Definition
|
|
Term
Your network contains a production Active Directory forest named contoso.com and a test Active Directory forest named contoso.test. A trust relationship does not exist between the forests. In the contoso.test domain, you create a backup of a Group Policy object (GPO) named GPO1. You transfer the backup of GPO1 to a domain controller in the contoso.com domain. You need to create a GPO in contoso.com based on the settings of GPO1. You must achieve this goal by using the minimum amount of Administrative effort. What should you do? A. From Windows PowerShell, run the Get- GPO cmdlet and the Copy- GPO cmdlet. B. From Windows PowerShell, run the New- GPO cmdlet and the Import- GPO cmdlet. C. From Group Policy Management, create a new starter GPO. Right-click the new starter GPO, and then click Restore from Backup. D. From Group Policy Management, right-click the Group Policy Objects container, and then click Manage Backups. |
|
Definition
|
|
Term
Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2008 R2. One of the domain controllers is named DCI. The network contains a member server named Server1 that runs Windows Server 2012. You need to promote Server1 to a domain controller by using install from media (IFM). What should you do first?
A. Create a system state backup of DC1 B. Create IFM media on DC1 C. Upgrade DC1 to Windows Server 2012 D. Run the Active Directory Domain Services Configuration Wizard on Server1 E. Run the Active Directory Domain Services Installation Wizard on DC1 |
|
Definition
|
|
Term
Your network contains an Active Directory domain named contoso.com. The domain contains 100 servers. The servers are contained in a organizational unit (OU) named ServersOU. You need to create a group named Group1 on all of the servers in the domain. You must ensure that Group1 is added only to the servers. What should you configure?
A. a Local Users and Groups preferences setting in a Group Policy linked to the Domain Controllers OU B. a Restricted Groups setting in a Group Policy linked to the domain C. a Local Users and Groups preferences setting in a Group Policy linked to Servers OU D. a Restricted Groups setting in a Group Policy linked to ServersOU |
|
Definition
|
|
Term
Your network contains an Active Directory domain named adatum.com. The domain contains several thousand member servers that run Windows Server 2012. All of the computer accounts for the member servers are in an organizational unit (OU) named ServersAccounts. Servers are restarted only occasionally. You need to identify which servers were restarted during the last two days. What should you do?
A. Run dsquery computer and specify the -staiepwd parameter B. Run Get-ADComputer and specify the SearchScope parameter C. Run Get-ADComputer and specify the lastLogon property D. Run dsquery server and specify the -o parameter |
|
Definition
|
|
Term
Your network contains an Active Directory domain named contoso.com. The domain contains two domain controllers named DC1 and DC2. You install Windows Server 2012 on a new computer named DC3. You need to manually configure DC3 as a domain controller. Which tool should you use?
A. Server Manager B. winrm.exe C. Active Directory Domains and Trusts D. dcpromo.exe |
|
Definition
|
|
Term
You have a server named Core1 that has a Server Core Installation of Windows Server 2012. Core1 has the Hyper-V server role installed Core1 has two network adapters from different third-party hardware vendors. You need to configure network traffic failover to prevent connectivity loss if a network adapter fails. What should you use?
A. New-NetSwitchTeam B. Add-NetSwitchTeamMember C. Install-Feature D. netsh.exe |
|
Definition
|
|
Term
You have a server named Server1 that runs Windows Server 2012. You connect three new hard disks to Server1. You need to create a storage space that contains the three disks. The solution must meet the following requirements: · Provide fault tolerance if a single disk fails. · Maximize the amount of files that can be stored in the storage space. What should you create?
A. A simple space B. A spanned volume C. A mirrored space D. A parity space |
|
Definition
|
|
Term
You have a server named Server1 that runs Windows Server 2012. Server1 has five network adapters. Three of the network adapters an connected to a network named LAN1. The two other network adapters are connected to a network named LAN2. You need to create a network adapter team from the three network adapters connected to LAN 1. Which tool should you use?
A. Routing and Remote Access B. Network and Sharing Center C. Server Manager D. Network Load Balancing Manager |
|
Definition
|
|
Term
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 and a server named Server2 that runs Windows Server 2008 R2 Service Pack 1 (SP1). Both servers are member servers. On Server2, you install all of the software required to ensure that Server2 can be managed remotely from Server Manager. You need to ensure that you can manage Server2 from Server1 by using Server Manager. Which two tasks should you perform on Server2?
A. Run the systempropertiesremote.exe command B. Run the Enable-PSRemoting cmdlet C. Run the Enable-PSSessionConfiguration cmdlet D. Run the Configure-SMRemoting.ps1 script E. Run the Set-ExecutionPolicy cmdlet |
|
Definition
|
|
Term
Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2 that run Windows Server 2012. You log on to Server1. You need to retrieve the IP configurations of Server2. Which command should you run from Server1?
A. winrs -r:server2 ipconfig B. winrm get server2 C. dsquery *-scope base-attr ip, server2 D. ipconfig > server2.ip |
|
Definition
|
|
Term
You install Windows Server 2012 on a standalone server named Server1. You configure Server1 as a VPN server. You need to ensure that client computers can establish PPTP connections to Server1. Which two firewall rules should you create?
A. An inbound rule for protocol 47 B. An outbound rule for protocol 47 C. An inbound rule for TCP port 1723 D. An inbound rule for TCP port 1701 E. An outbound rule for TCP port 1723 F. An outbound rule for TCP port 1701 |
|
Definition
A and C
To allow PPTP tunnel maintenance traffic, open TCP 1723. To allow PPTP tunneled data to pass through router, open Protocol ID 47 |
|
|
Term
You have a server named Server1 that runs Windows Server 2012. You promote Server1 to domain controller. You need to view the service location (SVR) records that Server1 registers on DNS. What should you do on Server1?
A. Open the Srv.sys file B. Open the Netlogon.dns file C. Run ipconfig /displaydns D. Run Get-DnsServerDiagnostics |
|
Definition
|
|
Term
Your network contains an active directory domain named contoso.com. The domain contains a domain controller named DCS. DCS has a Server 2012 Core installation. You need to uninstall Active Directory from DCS manually. Which tool should you use?
A. The Remove-WindowsFeature cmdlet B. the dsamain.exe command C. the ntdsutil.exe command D. The Remove-ADComputer cmdlet |
|
Definition
|
|
Term
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server 2012. You create a group Managed Service Account named gservice1. You need to configure a service named Service1 to run as the gservice1 account. How should you configure Service1?
A. From a command prompt, run sc.exe and specify the config parameter. B. From Windows PowerShell,run Set-Service and specify the -PassThrough parameter C. From Windows PowerShell,run Set-Service and specify the -StartupType parameter D. From Services Console configure the General settings |
|
Definition
|
|
Term
Your company has a main office and two branch offices. The offices connect to each other by using a WAN link. In the main office, you have a server named Server1 that runs Windows Server 2012. Server1 is configured to use an IPv4 address only. You need to assign an IPv6 address to Server1. The IP address must be private and routable. Which IPv6 address should you assign to Server1?
A. fe80:ab32:145c::32cc:401b B. ff00:3fff:65df:145c:dca8::82a4 C. 2001:ab32:145c::32cc:401b D. fd00:ab32:14:ad88:ac:58:abc2:4 |
|
Definition
|
|
Term
Your network contains two Active Directory forests named adatum.com and contoso.com. Both forests contain multiple domains. A two-way trust exists between the forests. The contoso.com domain contains a domain local security group named Group1. Group1 contains contoso\user1 and adatum\user1. You need to ensure that Group1 can only contain users from the contoso.com domain. Which three actions should you perform, in order?
Remove adatum\user1 from Group1 Convert Group1 to a distribution group Convert Group1 to a global group Remove contoso\user1 from Group1 Convert Group1 to a universal group |
|
Definition
Remove adatum\user1 from Group1 Convert Group1 to a universal group Convert Group1 to a global group |
|
|
Term
Your network contains two Hyper-V hosts named Host1 and Host2. Host1 contains a virtual machine named VM1. Host2 contains a virtual machine named VM2. VM1 and VM2 run Windows Server 2012. You install the Network Load Balancing feature on VM1 and VM2. You need to ensure that the virtual machines are configured to support Network Load Balancing (NLB). Which virtual machine settings should you configure on VM1 and VM2?
A. Router guard B. DHCP guard C. Port mirroring D. MAC address |
|
Definition
|
|
Term
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 and has the Hyper-V server role installed. On Server1, you create a virtual machine named VM1. When you try to add a RemoteFX 3D Video Adapter to VM1, you discover that the option is unavailable as shown in the following exhibit. You need to add the RemoteFX 3D Video Adapter to VM1. What should you do first?
A. On Server1, run the Enable-VMRemoteFxPhysicalVideoAdapter cmdlet. B. On Server1, install the Media Foundation feature. C. On Server1, run the Add-VMRemoteFx3dVideoAdapter cmdlet. D. On Server1, install the Remote Desktop Virtualization Host (RD Virtualization Host) role service. |
|
Definition
|
|
Term
Your network contains an Active Directory domain named adatum.com. The domain contains a member server named Server1 and a domain controller named DC2. All servers run Windows Server 2012. On DC2, you open Server Manager and you add Server1 as another server to manage. From Server Manager on DC2, you right-click Server1 as shown in the exhibit. You need to ensure that when you right-click Server1, you see the option to run the DHCP console. What should you do?
A. On Server1, install the Feature Administration Tools B. In the domain, add DC1 to the DHCP Administrators group. C. On DC2 and Server1, run winrm quickconfig. D. On DC2, install the Role Administration Tools. |
|
Definition
|
|
Term
Your network contains an Active Directory domain named adatum.com. The computer accounts for all member servers are located in an organizational unit (OU) named Servers. You link a Group Policy object (GPO) to the Servers OU. You need to ensure that the domain's Backup Operators group is a member of the local Backup Operators group on each member server. The solution must not remove any groups from the local Backup Operators groups. What should you do?
A. Add a restricted group named adatum\Backup Operators. Add Backup Operators to the This group is a member of list. B. Add a restricted group named adatum\Backup Operators. Add Backup Operators to the Members of this group list. C. Add a restricted group named Backup Operators. Add adatum\Backup Operators to the This group is a member of list. D. Add a restricted group named Backup Operators. Add adatum\Backup Operators to the Members of this group list. |
|
Definition
|
|
Term
Your network contains an Active Directory domain named contoso.com. An organizational unit (OU) named OU1 contains user accounts and computer accounts. A Group Policy object (GPO) named GP1 is linked to the domain. GP1 contains Computer Configuration settings and User Configuration settings. You need to prevent the User Configuration settings in GP1 from being applied to users. The solution must ensure that the Computer Configuration settings in GP1 are applied to all client computers. What should you configure?
A. the Group Policy loopback processing mode B. the Block Inheritance feature C. the Enforced setting D. the GPO Status |
|
Definition
|
|
Term
Your network contains an active directory domain named Contoso.com. The domain contains 100 user accounts that reside in an organizational unit (OU) named OU1. You need to ensure that user named user1 can link and unlink Group Policy Objects(GPOs) to OU1. The solution must minimize the number of permissions assigned to user1. What should you do?
A. Run the Delegation of Control Wizard on the Policies containers B. Run the Set-GPPermission cmdlet C. Run the Delegation of Control Wizard on OU1 D. Modify the permission on the user1 account |
|
Definition
|
|
Term
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012. An application named Appl.exe is installed on all client computers. Multiple versions of Appl.exe are installed on different client computers. Appl.exe is digitally signed. You need to ensure that only the latest version of Appl.exe can run on the client computers. What should you create?
A. An application control policy packaged app rule B. A software restriction policy certificate rule C. An application control policy Windows Installer rule D. An application control policy executable rule |
|
Definition
|
|
Term
Your infrastructure divided in 2 sites. You have a forest root domain and child domain. There is only one DC on site 2 with no FSMO roles. The link goes down to site 2 and no users can log on. What FSMO roles you need on to restore the access?
A. Infrastructure master B. RID master C. Domain Naming master D. PCD emulator |
|
Definition
|
|
Term
Your network contains an Active Directory forest named contoso.com. All domain controllers currently run Windows Server 2008 R2. You plan to install a new domain controller named DC4 that runs Windows Server 2012. The new domain controller will have the following configurations: · Schema master · Global catalog server · DNS Server server role · Active Directory Certificate Services server role You need to identify which configurations Administrators by using the Active Directory Installation Wizard. Which two configurations should you identify?
A. Transfer the schema master B. Enable the global catalog server C. Install the DNS Server role D. Install the Active Directory Certificate Services role |
|
Definition
|
|
Term
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012. The domain contains a server named Server1. You install the Windows PowerShell Web Access gateway on Server1. You need to provide administrators with the ability to manage the servers in the domain by using the Windows PowerShell Web Access gateway. Which two cmdlets should you run on Server1?
A. Set-WSManQuickConfig B. Set-WSManInstance C. Add-PswaAuthorizationRule D. Set-BCAuthentication E. Install-PswaWebApplication |
|
Definition
|
|
Term
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012. The domain contains a server named Server1. You open Review Options in the Active Directory Domain Services Configuration Wizard and then you click on View Script. You need to ensure that you can use the script to promote Server1 to a domain controller. Which file extension should you use to save the script?
A. .pal B. .bat C. .xml D. .cmd |
|
Definition
|
|