70-410 Flashcards

1
Q

Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2012 R2.
The domain contains a user named User1 and a global security group named Group1.

You reconfigure DC2 as a member server in the domain.

You need to add DC2 as the first domain controller in a new domain in the forest.

Which cmdlet should you run?

Available Choices
A. Add-AdPrincipalGroupMembership

B.  Install-AddsDomainController

C.  Install-WindowsFeature

D.  Install-AddsDomain

E.  Rename AdObject

F.  Set AdAccountControl

G. Set-AdGroup

H.  Set-User
A

D. Install-AddsDomain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Your network contains an Active Directory domain named contoso.com.

You log on to a domain controller by using an account named Admin1.Admin1 is a member of the Domain Admins group.

You view the properties of a group named Group1 as shown in the exhibit. (Click the Exhibit button.)

Group1 is located in an organizational unit (OU) named OU1.

You need to ensure that users from Group1 can modify the Security settings of OU1 only.

What should you do from Active Directory Users and Computers?

Available Choices
A. Right-click OU1 and select Delegate Control.

B. Right-click contoso.com and select Delegate Control.

C. Modify the Security settings of Group1.

D. Modify the Managed By settings on OU1.

A

A. Right-click OU1 and select Delegate Control.

Explanation:
Delegating control to only the OU will allow the users of Group1 to modify the security settings.

References:
http://msdn.microsoft.com/en-us/library/windows/desktop/ms676857(v=vs.85).aspx http://technet.microsoft.com/en-us/library/cc732524.aspx

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Your network contains a server named Server1 that runs Windows Server 2012 R2.Server1 has the Hyper-V server role installed. Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.Server1 is configured as shown in the following table.

VM3 is used to test applications.

You need to prevent VM3 from synchronizing its clock to Server1.
What should you configure?

Available Choices
A. NUMA topology

B. Resource control

C. Resource metering

D. Virtual Machine Chimney

E. The VLAN ID

F. Processor Compatibility

G. The startup order

H. Automatic Start Action

I. Integration Services

J. Port mirroring

K. Single-root I/O visualization

A

I. Integration Services

Explanation:
Integration Services settings on virtual machines includes services such as operating system shutdown, time synchronization, data exchange, Heart beat, and Backup (volume snapshot services. Thus you should disable the time synchronization using Integration Services.

References:
http://blogs.technet.com/b/virtualization/archive/2008/08/29/backing-up-hyper-v-virtual- machines.aspx
Exam Ref 70-410, Installing and Configuring Windows Server 2012 R2, Chapter 3: Configure Hyper-V, Objective 3.1: Create and Configure virtual machine settings, p. 144

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

You have a server named Server1 that runs Windows Server 2012 R2.Server1 has the Hyper-V server role installed.

The disks on Server1 are configured as shown in the exhibit.(Click the Exhibit button.)

You create a virtual machine on Server1.

You need to ensure that you can configure a pass-through disk for the virtual machine.

What should you do?

Available Choices
A. Convert Disk 1 to a GPT disk.

B. Delete partition E.

C. Convert Disk 1 to a dynamic disk.

D. Take Disk 1 offline.

A

D. Take Disk 1 offline.

Explanation/References:
Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2: Objective 3.2: Create and Configure virtual machine storage, Chapter 3: p. 159 Exam Ref 70-410: Installing and Configuring Server 2012: Objective 1.3: Installing and Configuring servers, Chapter 1: p. 42-43
http://blogs.technet.com/b/askcore/archive/2008/10/24/configuring-pass-through-disks-in-hyper- v.aspx

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

You have a print server named Server1 that runs Windows Server 2012 R2.

On Server1, you create and share a printer named Printer1.

The Advanced settings of Printer1 are shown in the Advanced exhibit.(Click the Exhibit button.)

The Security settings of Printer1 are shown in the Security exhibit. (Click the Exhibit button.)

The Members settings of a group named Group1 are shown in the Group1 exhibit.(Click the Exhibit button.)

Select Yes if the statement can be shown to be true based on the available information; otherwise select No. Each correct selection is worth one point.

A
  1. NO
  2. NO
  3. YES

(See image)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1.Server1 runs Windows Server 2012 R2.

On Server1, you create a printer named Printed. You share Printed and publish Printed in Active Directory.
You need to provide a group named Group1 with the ability to manage Printer1.

What should you do?

Available Choices
A. From Print Management, configure the Sharing settings of Printer1.

B.  From Active Directory Users and Computers, configure the Security settings of Server1- Printer1.

C.  From Print Management, configure the Security settings of Printer1.

D.  From Print Management, configure the Advanced settings of Printer1.
A

C. From Print Management, configure the Security settings of Printer1.

Explanation:
If you navigate to the Security tab of the Print Server Properties you will find the Permissions that you can set to Allow which will provide Group1 with the ability to manage Printer1.
Set permissions for print servers
1. Open Print Management.
2. In the left pane, clickPrint Servers, right-click the applicable print server and then clickProperties.
3. On theSecuritytab, underGroup or users names, click a user or group for which you want to set permissions.
4. UnderPermissions for , select theAlloworDenycheck boxes for the permissions listed as needeD.
5. To editSpecial permissions, clickAdvanceD.
6. On thePermissionstab, click a user group, and then clickEdit.
7. In thePermissionEntrydialog box, select theAlloworDenycheck boxes for the permissions that you want to edit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. The domain contains a standalone server named Server2 that is located in a perimeter network. Both servers run Windows Server 2012 R2.

You need to manage Server2 remotely from Server1.

What should you do?

Available Choices
A. From Server1, run the Enable-PsRemotingcmdlet.

B.  From Server2, run the winrm command.

C.  From Server2/ run the Enable-PsRemotingcmdlet.

D.  From Server1, run the winrm command.
A

D. From Server1, run the winrm command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You have a server named Server1 that runs Windows Server 2012 R2.Server1 has the Print and Document Services server role installed.

Server1 is connected to two identical print devices.

The solution must ensure that if one print device fails, the print jobs will print automatically on the other print device.

What should you do on Server1?

Available Choices
A. Add two printers and configure the priority of each printer.

B.  Install the Failover Clustering feature, and then add one printer.

C.  Install the Network Load Balancing (NLB) feature, and then add one printer.

D.  Add one printer and configure printer pooling.
A

D. Add one printer and configure printer pooling.

Explanation:
By adding one printer as the default printer you ensure that only that printer is used at a time, and creating a printing pool to automatically distribute print jobs to the next available printer will cover all the requirements stated in the question. A printing pool is one logical printer connected to multiple printers through multiple ports of the print server. The printer that is idle receives the next document sent to the logical printer.

A printing pool is one logical printer connected to multiple printers through multiple ports of the print server. The printer that is idle receives the next document sent to the logical printer. This is useful in a network with a high volume of printing because it decreases the time users wait for their documents. A printing pool also simplifies administration because multiple printers can be managed from the same logical printer on a server.

References:
Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2: Objective 2.3 Configure print and document services, Chapter 2: Configure Server roles and Features, p. 93, 97 Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 8: File Services and Storage, p. 361
http://technet.microsoft.com/en-us/library/cc757086(v=ws.10).aspx http://technet.microsoft.com/en-us/library/cc784619(v=ws.10).aspx http://technet.microsoft.com/en-us/library/jj556311.aspx

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You have two servers named Server1 and Server2 that run Windows Server 2012 R2.Server1 and Server2 are part of a workgroup.

On Server1, you add Server2 to Server Manager.

When you attempt to connect to Server2 from Server Manager, you receive the following error message: “Credentials not valid.”

You need to ensure that you can manage Server2 from Server1 by using Server Manager on Server1.

What should you do

Available Choices

A.  On Server1, run the Set-Item cmdlet.

B.  On Server 1, run the Set-NetFirewallRulecmdlet.

C.  On Server 2, install the Remote Server Administration Tools (RSAT).

D.  On Server2, run the Configure-SmRemotingcmdlet.
A

D. On Server2, run the Configure-SmRemotingcmdlet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You have virtual machine named VM1.

VM1 uses a fixed size virtual hard disk (VHD) named Disk1.vhD. Disk1.vhd is 200 GB.
You shut down VM1.

You need to reduce the size of Disk1.vhD.

Which action should you select from the Edit Virtual Hard Disk Wizard?

Available Choices

A.  Shrink

B.  compact

C.  Merge

D.  Convert
A

CONVERT

The Edit Virtual Hard Disk Wizard allows you to Compact, Convert, or Expand the VHD. Compacting reduces the size of a dynamically expanding VHD but not a fixed-size VHD. Converting changes the disk format to the newer VHDX. This process recreates the virtual disk, and allows you to specify the size of the VHDX.

Ref: http://blogs.technet.com/b/yungchou/archive/2013/01/23/hyper-v-virtual-hard-disk-vhd-operations-explained.aspx
http://blogs.technet.com/b/aviraj/archive/2012/05/06/windows-server-2012-convert-vhd-to-vhdx-using-hyper-v-manager.aspx

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named Server1 that has the DNS Server server role installed. Server1 hosts a primary zone for contoso.com.

The domain contains a member server named Server2 that is configured to use Server1 as its primary DNS server.

From Server2, you run nslookup.exe as shown in the exhibit.

You need to ensure that when you run Nslookup, the correct name of the default server is displayed.

What should you do?

Available Choices
A. On Server1, create a reverse lookup zone.

B. On Server1, modify the Security settings of the contoso.com zone.

C. From Advanced TCP/IP Settings on Server1, add contoso.com to the DNS suffix list.

D. From Advanced TCP/IP Settings on Server2, add contoso.com to the DNS suffix list.

A

A. On Server1, create a reverse lookup zone.

Explanation:
Make sure that a reverse lookup zone that is authoritative for the PTR resource record exists. PTR records contain the information that is required for the server to perform reverse name lookups.

References:
http://technet.microsoft.com/en-us/library/cc961417.aspx Exam Ref: 70-410: Installing and Configuring Windows Server 2012 R2, Chapter4: Deploying and configuring core network services, Objective 4.1: Configure IPv4 and IPv6 addressing, p.246

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You have a server named Server1 that runs Windows Server 2012 R2.

You connect three new hard disks to Server1.

You need to create a storage space that contains the three disks.

The solution must meet the following requirements:
Provide fault tolerance if a single disk fails.
Maximize the amount of useable storage space.

What should you create?

Available Choices
A. A mirrored space

B.  A spanned volume

C.  A parity space

D.  A simple space
A

A parity space

Explanation:
Fault tolerant and better space ratio. The data on volumes created on this type of virtual disk, together with parity information that can be used to facilitate automatic reconstruction of data in the event of a physical disk failure, is striped across all physical disks in the pool. Parity virtual disks also provide resiliency to help protect you from data loss arising from the failure 368 Chapter 8 File services and storage of a physical disk in the pool, but they perform better with large sequential disk writes than with random I/O.
References:
http://social.technet.microsoft.com/wiki/contents/articles/15198.storage-spaces-overview.aspx http://technet.microsoft.com/en-us/library/cc772180.aspx Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 8: File Services and Storage, p. 367-8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Your network contains a server named Server1 that runs Windows Server 2012 R2.Server1 has the Hyper-V server role installed.

Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.

Server1 is configured as shown in the following table.

You plan to schedule a complete backup of Server1 by using Windows Server Backup.

You need to ensure that the state of VM1 is saved before the backup starts.

What should you configure?

Available Choices
A. NUMA topology

B. Resource control

C. resource metering

D. virtual Machine Chimney

E. The VLAN ID

F. Processor Compatibility

G. The startup order

H. Automatic Start Action

I. Integration Services

J. Port mirroring

K. Single-root I/O virtualization

A

Integration Services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You have a server that runs Windows Server 2012 R2.

The disks on the server are configured as shown in the exhibit.(Click the Exhibit button.)

You need to create a storage pool that contains Disk 1 and Disk 2.

What should you do first?

Available Choices
A. Convert Disk 1 and Disk 2 to GPT disks.

B. Create a volume on Disk 2.

C. Convert Disk 1 and Disk 2 to dynamic disks.

D. Delete volume E.

A

D. Delete volume E.

Explanation:
Storage Pools use unallocated space thus you need to delete Volume E.

References:
http://technet.microsoft.com/en-us/library/ff399688.aspx

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You have a server named Server1 that runs Windows Server 2012 R2.

A network technician installs a new disk on Server1 and creates a new volume. The properties of the new volume are shown in the exhibit. (Click the Exhibit button.)

You need to ensure that you can restore files on volume D by using the Previous Versions tab

What should you do first?

Available Choices
A. Install the File Server Resource Manager role service.

B. Convert the disk to a dynamic disk.

C. Run the convert.exe command.

D. Format volume D.

A

D. Format volume D.

Shadow Copies for Shared Folders is activated at the volume level. A Shadow copy is essentially a copy of the disk at a specific moment in time, and this has to be set up do that you can have a Previous Version that can be used to restore files. However, prior to any action taken to set up shadow copies, you need to format the disk first since it is mentioned that it is a NEW volume that was created.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Your network contains an Active Directory domain named contoso.com.

You create a software restriction policy to allow an application named App1 by using a certificate rule.
You need to ensure that when users attempt to execute App1, the certificate for App1 is verified against a certificate revocation list (CRL).

What should you do?

Available Choices
A. Modify the rule for App1.

B.  Modify the Trusted Publishers Properties.

C.  Create a new certificate rule for App1.

D.  Modify the Enforcement Properties.
A

B. Modify the Trusted Publishers Properties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2012 R2.

The domain contains a user named User1 and a global security group named Group1.

You need to ensure that User1 can manage the group membership of Group1. The solution must minimize the number of permissions assigned to User1.

Which cmdlet should you run?

Available Choices
A. Add-AdPrincipalGroupMembership

B.  Install-AddsDomainController

C.  Install-WindowsFeature

D.  Install-AddsDomain

E.  Rename AdOh

F.  Set-AdAccountControl

G. Set-AdGroup

H.  Set-User
A

G. Set-AdGroup

Explanation:
The Set-ADGroup cmdlet modifies the properties of an Active Directory group. You can modify commonly used property values by using the cmdlet parameters. ManagedBy Specifies the user or group that manages the object by providing one of the following property values. Note:
The identifier in parentheses is the LDAP display name for the property.
Distinguished Name
Example: CN=SaraDavis,OU=Europe,CN=Users,DC=corp,DC=contoso,DC=com GUID (objectGUID)
Example: 599c3d2e-f72d-4d20-8a88-030d99495f20
Security Identifier (objectSid)
Example: S-1-5-21-3165297888-301567370-576410423-1103
SAM Account Name (sAMAccountName)
Example: saradavis
The Install-ADDSDomainController cmdlet installs a domain controller in Active Directory. Example: C:\PS>Install-ADDSDomainController -InstallDns -Credential (Get-Credential CORP\Administrator) -DomainName “corp.contoso.com”

References:
http://technet.microsoft.com/en-us/library/hh974723.aspx http://technet.microsoft.com/en-us/library/ee617199.aspx http://technet.microsoft.com/en-us/library/ee617225.aspx

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2.

You create a new inbound rule by using Windows Firewall with Advanced Security.

You need to configure the rule to allow Server1 to accept unsolicited inbound packets that are received through a network address translation (NAT) device on the network.

Which setting in the rule should you configure?

Available Choices
A. Interface types

B.  Authorized computers

C.  Remote IP address

D.  Edge traversal
A

D. Edge traversal

Explanation:
Edge traversal allows the computer to accept unsolicited inbound packets that have passed through an edge device, such as a network address translation (NAT) router or firewall.

References:
http://technet.microsoft.com/en-us/library/cc731927.aspx

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You have a server named Server1 that runs Windows Server 2012 R2.Server1 has the Hyper-V server role installed. An iSCSI SAN is available on the network. Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. You create a LUN on the SAN to host the virtual hard drive files for the virtual machines. You need to create a 3-TB virtual hard disk for VM1 on the LUN. The solution must prevent VM1 from being paused if the LUN runs out of disk space. Which type of virtual hard disk should you create on the LUN?

Choose One:

Dynamically expanding VHDX

Fixed-size VHDX

Fixed-size VHD

Dynamically expanding VHD

A

Fixed-size VHDX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You have a Hyper-V host named Server1 that runs Windows Server 2012 R2.

Server1 hosts a virtual machine named VM1 that runs Windows Server 2012 R2.
VM1 has several snapshots.

You need to modify the snapshot file location of VM1.
What should you do?

Available Choices
A. Right-click VM1, and then click Export…

B.  Shut down VM1, and then modify the settings of VM1.

C.  Delete the existing snapshots, and then modify the settings of VM1.

D.  Pause VM1, and then modify the settings of VM1.
A

C. Delete the existing snapshots, and then modify the settings of VM1.

Explanation: you will need to navigate to the Hyper-V Management snap-in
(C:\ProgramData\Microsoft\Windows\Hyper-V) and from there access the Snapshot file Location tab where you can change the settings for the VM1 snapshot file location. However, since there are already several snapshots in existence, you will need to delete them first because you will not be able to change the location of the snapshot file while there is an existing snapshot and you need to modify the snapshot file location of VM1.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You have a server named Server1 that runs a Server Core Installation of Windows Server 2012 R2 Datacenter.
You have a WIM file that contains the four images of Windows Server 2012 R2 as shown in the Images exhibit.(Click the Exhibit button.)

You review the installed features on Server1 as shown in the Features exhibit.(Click the Exhibit button.)

You need to install the Server Graphical Shell feature on Server1.

Which two possible sources can you use to achieve this goal? (Each correct answer presents a complete solution. Choose two.)

Available Choices
A. Index 1

B. Index 2

C. Index 3

D. Index 4

A

B. Index 2

D. Index 4

Explanation:
When you install Windows Server 2012 R2, you can choose between Server Core Installation and Server with a GUI. The “Server with a GUI” option is the Windows Server 2012 R2 equivalent of the Full installation option available in Windows Server 2008 R2. The “Server Core Installation” option reduces the space required on disk, the potential attack surface, and especially the servicing requirements, so we recommend that you choose the Server Core installation unless you have a particular need for the additional user interface elements and graphical management tools that are included in the “Server with a GUI” option. For this reason, the Server Core installation is now the default. Because you can freely switch between these options at any time later, one approach might be to initially install the Server with a GUI option, use the graphical tools to configure the server, and then later switch to the Server Core Installation option.

Reference: Windows Server Installation Options

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that hosts the primary DNS zone for contoso.com.

All client computers are configured to use DC1 as the primary DNS server.

You need to configure DC1 to resolve any DNS requests that are not for the contoso.com zone by querying the DNS server of your Internet Service Provider (ISP).

What should you configure?

Available Choices
A. Naming Authority Pointer (NAPTR) DNS resource records (RR)

B.  Name server (NS) records

C.  Forwarders

D.  Conditional forwarders
A

C. Forwarders

Explanation:
On a network with several servers and/or client computers a server that is configured as a forwarder will manage the Domain Name System (DNS) traffic between your network and the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the Remote Access server role installed.

A user named User1 must connect to the network remotely. The client computer of User1 requires Challenge Handshake Authentication Protocol (CHAP) for remote connections. CHAP is enabled on Server1.

You need to ensure that User1 can connect to Server1 and authenticate to the domain.

What should you do from Active Directory Users and Computers?

Available Choices
A. From the properties of User1, select Store password using reversible encryption.

B.  From the properties of Server1, assign the Allowed to Authenticate permission to User1.

C.  From the properties of User1, select Use Kerberos DES encryption types for this account.

D.  From the properties of Server1, select Trust this computer for delegation to any service (Kerberos only).
A

A. From the properties of User1, select Store password using reversible encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Your network contains an Active Directory domain named contoso.com. The domain contains hundreds of groups, many of which are nested in other groups.

The domain contains a user account named user1.User1 is a direct member of 15 groups.

You need to identify of which Active Directory groups User1 is a member, including the nested groups. The solution must minimize administrative effort.

Which tool should you use?

Available Choices
A. Active Directory Users and Computers

B.  ADSI Edit

C.  Get-ADUser

D.  Dsget
A

D. Dsget

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Your network contains a server named Server1 that runs Windows Server 2012 R2.Server1 has the Hyper-V server role installed.

Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.

Server1 is configured as shown in the following table.

You need to ensure that VM1 can use more CPU time than the other virtual machines when the CPUs on Server1 are under a heavy load.

What should you configure?

Available Choices
A. NUMA topology

B. Resource control

C. resource metering

D. virtual Machine Chimney

E. The VLAN ID

F. Processor Compatibility

G. The startup order

H. Automatic Start Action

I. Integration Services

J. Port mirroring

K. Single-root I/O virtualization

A

Resource control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Your network contains an Active Directory domain named contoso.com. The DNS zone for contoso.com is Active-Directory integrated.

The domain contains 500 client computers. There are an additional 20 computers in a workgroup.

You discover that every client computer on the network can add its record to the contoso.com zone.

You need to ensure that only the client computers in the Active Directory domain can register records in the contoso.com zone.

What should you do?

Available Choices
A. Sign the contoso.com zone by using DNSSEC.

B.  Configure the Dynamic updates settings of the contoso.com zone.

C.  Configure the Security settings of the contoso.com zone.

D.  Move the contoso.com zone to a domain controller that is configured as a DNS server.
A

B. Configure the Dynamic updates settings of the contoso.com zone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Your network contains an Active Directory forest named contoso.com. The forest contains five domains. All domain controllers run Windows Server 2012 R2.

The contoso.com domain contains two user accounts named Admin1 and Admin2.

You need to ensure that Admin1 and Admin2 can configure hardware and services on all of the member servers in the forest. The solution must minimize the number of privileges granted to Admin1 and Admin2.

Which built-in groups should you use?

Available Choices
A. Administrators local groups

B.  Administrators domain local groups

C.  Domain Admins global groups

D.  Server Operators global groups
A

A. Administrators local groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2012 R2.Server1 has the Group Policy Management feature installed. Server2 has the Print and Document Services server role installed.

On Server2, you open Print Management and you deploy a printer named Printer1 by using a Group Policy object (GPO) named GPO1.When you open GPO1 on Server1, you discover that the Deployed Printers node does not appear.

You need to view the Deployed Printers node in GPO1.

What should you do?

Available Choices
A. On Server1, modify the Group Policy filtering options of GPO1.

B.  On a domain controller, create a Group Policy central store.

C.  On Server2, install the Group Policy Management feature.

D.  On Server1, configure the security filtering of GPO1.
A

C. On Server2, install the Group Policy Management feature.

Explanation:
To use Group Policy for printer deployment you will need to have a Windows Active Directory domain, and this article assumes that your Domain Controller is a Windows 2008 R2 Server. You will also need the Print Services role installed on a server (can be on your DC), and you will be using the Print Management and Group Policy Management consoles to configure the various settings. It is assumed that you have already followed Part One and have one or more printers shared on your server with the necessary drivers, ready to deploy to your client computers. The question does not mention if GPMC is installed on server 2, so I assume that it does not deploy the GPO because it had no GPMC on server 2.
GPMC is not installed by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

You have a server named Server1 that runs Windows Server 2012 R2.Server1 has the Hyper-V server role installed. Server1 is connected to two Fibre Channel SANs and is configured as shown in the following table.

You have a virtual machine named VM1.

You need to configure VM1 to connect to SAN1.

What should you do first?

Available Choices
A. Create a Virtual Fibre Channel SAN.

B. Create a Hyper-V virtual switch.

C. Add one HBA.

D. Configure network adapter teaming.

A

Create a Virtual Fibre Channel SAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Your network contains a server named Server1 that runs Windows Server 2012 R2.Server1 has the Hyper-V server role installed.

Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.

Server1 is configured as shown in the following table.

VM2 sends and receives large amounts of data over the network.

You need to ensure that the network traffic of VM2 bypasses the virtual switches of the parent partition.

What should you configure?

Available Choices
A. NUMA topology

B.  Resource control

C.  resource metering

D.  virtual Machine Chimney

E.  The VLAN ID

F.  Processor Compatibility

G. The startup order

H.  Automatic Start Action

I.    Integration Services

J.    Port mirroring

K.  Single-root I/O virtualization
A

Single-root I/O virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

You have a server named Server1 that runs a Server Core installation of Windows Server 2012 R2.

Server1 is configured to obtain an IPv4 address by using DHCP.

You need to configure the IPv4 settings of the network connection on Server1 as follows:
IP address: 10.1.1.1
Subnet mask: 255.255.240.0
Default gateway: 10.1.1.254

What should you run?

Available Choices
A. netsh.exe

B.  netcfg.exe

C.  msconfig.exe

D.  ipconfig.exe
A

A. netsh.exe

Explanation:
In order to configure TCP/IP settings such as the IP address, Subnet Mask, Default Gateway, DNS and WINS addresses and many other options you can use Netsh.exE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

You have a shared folder named Share1. The folder permissions of Share1 are configured as shown in the Folder Permissions exhibit.(Click the Exhibit button.)

The Share permissions of Share1 are configured as shown in the Share Permissions exhibit.
(Click the Exhibit button.)

You have a group named Group1. The members of Group1 are shown in the Group1 exhibit.
(Click the Exhibit button.)

Select Yes if the statement can be shown to be true based on the available information; otherwise select No. Each correct selection is worth one point.

A

SEE IMaGE

Explanation:
NTFS permissions control access to the files and folders stored on disk volumes formatted with the NTFS file system. Share permissions control access to folders over a network.
To access a file over a network, a user must have appropriate share permissions (and appropriate NTFS permissions if the shared folder is on an NTFS volume).Granting a user Full
Control NTFS permission on a folder enables that user to take ownership of the folder unless the user is restricted in some other way.User1 was not granted Full Control permission.
The Administrators have Full Control permission. I assume that User2 is an administrator since the Group1 exhibit shows only User1 as a member.

References:
http://technet.microsoft.com/en-us/library/cc754178.aspx Exam Ref 70-410: Installing and configuring Windows Server 2012 R2, Chapter 2: Configure server roles and features,
Objective 2.1: Configure file and share access, p.75-80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Your network contains two Active Directory forests named contoso.com and adatum.com. Each forest contains one domain. A two-way forest trust exists between the forests.

The forests use the address spaces shown in the following table.

From a computer in the contoso.com domain, you can perform reverse lookups for the servers in the contoso.com domain, but you cannot perform reverse lookups for the servers in the adatum.com domain.

From a computer in the adatum.com domain, you can perform reverse lookups for the servers in both domains.

You need to ensure that you can perform reverse lookups for the servers in the adatum.com domain from the computers in the contoso.com domain.

What should you create?

Available Choices
A. A trust point

B.  A GlobalNames zone

C.  A delegation

D.  A conditional forwarder
A

D. A conditional forwarder

Explanation:
Conditional forwarders are DNS servers that only forward queries for specific domain names. Instead of forwarding all queries it cannot resolve locally to a forwarder, a conditional forwarder is configured to forward a query to specific forwarders based on the domain name contained in the query. Forwarding in terms of domain names improves conventional forwarding by adding a name-based condition to the forwarding process.

References:
http://technet.microsoft.com/en-us/library/cc757172(v=ws.10).aspx

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Your company has a main office and four branch offices. The main office contains a server named Server1 that runs Windows Server 2012 R2.

The IP configuration of each office is configured as shown in the following tablE.

You need to add a single static route on Server1 to ensure that Server1 can communicate with the hosts on all of the subnets.

Which command should you run?

Available Choices
A. route.exe add -p 10.10.0.0 mask 255.255.252.0 10.10.0.1

B. route.exe add -p 172.16.16.0 mask 255.255.252.0 10.10.0.1

C. route.exe add -p 10.10.0.0 mask 255.255.252.0 172.16.0.0

D. route.exe add -p 172.16.18.0 mask 255.255.252.0 10.10.0.1

A

B. route.exe add -p 172.16.16.0 mask 255.255.252.0 10.10.0.1

Explanation:
These parameters will allow communication with all the hosts.

References:
Exam Ref: 70-410: Installing and Configuring Windows Server 2012 R2, Chapter4: Deploying and configuring core network services, Objective 4.1: Configure IPv4 and IPv6 addressing, p.192, 196

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. The domain contains a server named Server1.

You open Review Options in the Active Directory Domain Services Configuration Wizard, and then you click View script.

You need to ensure that you can use the script to promote Server1 to a domain controller.

Which file extension should you use to save the script?

A.  .bat

B.  .cmd

C.  .psl

D.  .xml
A

C. .psl

From http://technet.microsoft.com/en-us/library/jj574105.aspx
The Review Options page in Server Manager also offers an optional View Script button to create a Unicode text file that contains the current ADDSDeployment configuration as a single Windows PowerShell script. This enables you to use the Server Manager graphical interface as a Windows PowerShell deployment studio. Use the Active Directory Domain Services Configuration Wizard to configure options, export the configuration, and then cancel the wizard. This process creates a valid and syntactically correct sample for further modification or direct use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Your network contains an Active Directory domain named contoso.com. The domain contains 100 user accounts that reside in an organizational unit (OU) named OU1.

You need to ensure that a user named User1 can link and unlink Group Policy objects (GPOs) to OU1. The solution must minimize the number of permissions assigned to User1.

What should you do?

Available Choices
A. Run the Delegation of Control Wizard on OU1.

B.  Add User1 to the Group Policy Creator Owners group.

C.  Modify the permission on the \\Contoso.com\SYSVOL\Contoso.com\Policies folder.

D.  Modify the permissions on the User1 account.
A

A. Run the Delegation of Control Wizard on OU1.

The Delegation of Control Wizard allows you to delegate tasks, active Directory Object types and to set permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2.A server named Server1 is configured to encrypt all traffic by using IPSec.

You need to ensure that Server1 can respond to ping requests from computers that do not support IPSec.

What should you do?

Available Choices
A. From a command prompt, run netsh set global autotuninglevel = highlyrestrictedcongestionprovider=none.

B.  From a command prompt, run netsh set global autotuninglevel-restricted congestionprovider=ctcp.

C.  From Windows Firewall with Advanced Security, allow unicast responses for the Domain Profile.

D.  From Windows Firewall with Advanced Security, exempt ICMP from IPSec.
A

D. From Windows Firewall with Advanced Security, exempt ICMP from IPSec.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

You have a print server named Server1 that runs Windows Server 2012 R2.

You discover that when there are many pending print jobs, the system drive occasionally runs out of free space.

You add a new hard disk to Server1.You create a new NTFS volume.

You need to prevent the print jobs from consuming disk space on the system volume.

What should you modify?

Available Choices
A. The properties on the new volume

B.  The properties of the Print Spooler service

C.  The Print Server Properties

D.  The properties of each shared printer
A

The Print Server Properties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Your network contains a server named Server1 that runs Windows Server 2012 R2.Server1 has the Hyper-V server role installed.

Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.

Server1 is configured as shown in the following table.

You install Windows Server 2012 R2 on VM2 by using Windows Deployment Services (WDS).

You need to ensure that the next time VM2 restarts, you can connect to the WDS server by using PXE.

Which virtual machine setting should you configure for VM2?

Available Choices (select all choices that are correct)
 A. NUMA topology

B. Resource control

C. resource metering

D. virtual Machine Chimney

E. The VLAN ID

F. Processor Compatibility

G. The startup order

H. Automatic Start Action

I. Integration Services

J. Port mirroring

K. Single-root I/O virtualization

A

The startup order

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2.

You create and enforce the default AppLocker executable rules.

Users report that they can no longer execute a legacy application installed in the root of drive C.

You need to ensure that the users can execute the legacy application.

What should you do?

Available Choices
A. Create a new rule.

B.  Delete an existing rule.

C.  Modify the action of the existing rules.

D.  Add an exception to the existing rules.
A

A. Create a new rule.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

You have a server named Corel that has a Server Core Installation of Windows Server 2012 R2.

Corel has the Hyper-V server role installed. Corel has two network adapters from different third- party hardware vendors.

You need to configure network traffic failover to prevent connectivity loss if a network adapter fails.

What should you use?

Available Choices
A. New-NetSwitchTeam

B.  Install-Feature

C.  Add-NetSwitchTeamMember

D.  Netsh.exe
A

A. New-NetSwitchTeam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Your network contains an Active Directory domain named contoso.com.

An organizational unit (OU) named OU1 contains user accounts and computer accounts.

A Group Policy object (GPO) named GP1 is linked to the domain.GP1 contains Computer Configuration settings and User Configuration settings.

You need to prevent the User Configuration settings in GP1 from being applied to users. The solution must ensure that the Computer Configuration settings in GP1 are applied to all client computers.

What should you configure?

Available Choices
A.  The GPO Status

B.  The Block Inheritance feature

C.  The Group Policy loopback processing mode

D.  The Enforced setting
A

C. The Group Policy loopback processing mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Your network contains an Active Directory domain named contoso.com. The domain contains an application server named Server1.Server1 runs Windows Server 2012 R2.

Server1 is configured as an FTP server.

Client computers use an FTP application named App1.exE. App1.exe uses TCP port 21 as the control port and dynamically requests a data port.

On Server1, you create a firewall rule to allow connections on TCP port 21.

You need to configure Server1 to support the client connections from App1.exE.

What should you do?

A.  Run netshadvfirewall set global statefulftp enable.

B.  Run netsh firewall addportopening TCP 21 dynamicftp.

C.  Create an inbound firewall rule to allow App1.exE.

D.  Create an isolation connection security rule.
A

A. Run netshadvfirewall set global statefulftp enable.

The Netshadvfirewall set global statefulftp command will configure how Windows Firewall with Advanced Security handles FTP traffic that uses an initial connection on one port to request a data connection on a different port.
When statefulftp is enabled (Disabled being the default setting) the firewall tracks the port numbers specified in PORT command requests and in the responses to PASV requests, and then allows the incoming FTP data traffic entering on the requested port number.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Your network contains a server named Server1 that runs Windows Server 2012 R2.Server1 has the Print and Document Services server role installed.

You connect a new print device to the network. The marketing department and the sales department will use the print device.

You need to provide users from both departments with the ability to print to the network print device. The solution must ensure that if there are multiple documents queued to print, the documents from the sales users print before the documents from the marketing users.

What should you do on Server1?

Available Choices
A.  Add two printers and configure printer pooling.

B.  Add one printer. Modify the printer priority and the security settings.

C.  Add two printers. Modify the priorities of each printer and the security settings of each printer.

D.  Add one printer and configure printer pooling.
A

Add two printers. Modify the priorities of each printer and the security settings of each printer.

Explanation:
To set different print priority to different groups you need to navigate to the Advanced tab of the Printers and Faxes properties to set priorities to ensure that the Sales department print jobs take priority.

References:
Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2: Objective 2.3 Configure print and document services, Chapter 2: Configure Server roles and Features, p. 93, 97, 104
Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 9: Print and Document Services, p. 444
http://technet.microsoft.com/en-us/library/cc738090(v=ws.10).aspx

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Your network contains an Active Directory domain named adatum.com. The domain contains a member server named L0N-DC1.L0N-DC1 runs Windows Server 2012 R2 and has the DHCP Server server role installed.

The network contains 100 client computers and 50 IP phones. The computers and the phones are from the same vendor.

You create an IPv4 scope that contains addresses from 172.16.0.1 to 172.16.1.254.

You need to ensure that the IP phones receive IP addresses in the range of 172.16.1.100 to 172.16.1.200. The solution must minimize administrative effort.

What should you create?

Available Choices
A. Server level policies

B.  Reservations

C.  Filters

D.  Scope level policies
A

Scope level policies

Explanation:
The scope is already in place.
Scope level policies are typically settings that only apply to that scope. They can also overwrite a setting that was set at the server level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Your network contains several servers that run Windows Server 2012 R2 and client computers that run Windows 8.1.

You download several signed Windows PowerShell scripts from the Internet.

You need to run the PowerShell scripts on all of the servers and all of the client computers.

What should you modify first?

Available Choices
A. The environment variables on all of the servers

B.  The execution policy on all of the servers

C.  The execution policy on all of the client computers

D.  The environment variables on all client computers
A

C. The execution policy on all of the client computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2.

A user named User1 attempts to log on to DC1, but receives the error message shown in the exhibit.(Click the Exhibit button.)

You need to ensure that User1 can log on to DC1.

What should you do?

Available Choices
A. Add User1 to the Remote Management Users group.

B. Grant User1 the Allow log on locally user right.

C. Modify the Logon Workstations setting of the User1 account.

D. Modify the Account is sensitive and cannot be delegated setting of the User1 account.

A

Grant User1 the Allow log on locally user right.

Explanation:
Domain controllers, by default, restrict the types of user accounts that have the ability to log on locally.

References:
Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2, Chapter 6: Create and Manage Group Policy, Objective 6.2: Configure Security Policies, p. 321
Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2, Chapter 2: Configure server roles and features, Objective 2.3: Configure servers for remote
management, p. 114 http://technet.microsoft.com/en-us/library/ee957044(v=ws.10).aspx

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Your network contains a server named Server1 that runs Windows Server 2012 R2.Server1 has the Hyper-V server role installed.

Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.

Server1 is configured as shown in the following table.

You install a network monitoring application on VM2.

You need to ensure that all of the traffic sent to VM3 can be captured on VM2.

What should you configure?

Available Choices
A. NUMA topology

B. Resource control

C. Resource metering

D. Virtual Machine Chimney

E. The VLAN ID

F. Processor Compatibility

G. The startup order

H. Automatic Start Action

I. Integration Services

J. Port mirroring

K. Single-root I/O virtualization

A

J. Port mirroring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

You have a server named Server1 that runs Windows Server 2012 R2.

Server1 has three physical network adapters named NIC1, NIC2, and NIC3.

On Server1, you create a NIC team named Team1 by using NIC1 and NIC2.You configure Team1 to accept network traffic on VLAN 10.

You need to ensure that Server1 can accept network traffic on VLAN 10 and VLAN 11. The solution must ensure that the network traffic can be received on both VLANs if a network adapter fails.

What should you do?

Available Choices
A. From Server Manager, change the load balancing mode of Team1.

B.  Run the New-NetLbfoTeamcmdlet.
C.  From Server Manager, add an interface to Team1.

D.  Run the Add-NetLbfoTeamMembercmdlet.
A

C. From Server Manager, add an interface to Team1.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Your network contains an Active Directory forest. The forest contains a single domain named contoso.com. The domain contains four domain controllers. The domain controllers are configured as shown in the following table.

All domain controllers are DNS servers.

You plan to deploy a new domain controller named DC5 in the contoso.com domain.

You need to identify which domain controller must be online to ensure that DC5 can be promoted successfully to a domain controller.

Which domain controller should you identify?

A

DC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

You have a server named Server1 that runs Windows Server 2012 R2.

On Server1, you open Computer Management as shown in the exhibit.(Click the Exhibit button.)

You need to ensure that you can create a 3-TB volume on Disk 1.

What should you do first?

Available Choices
A. Create a storage pool.

B. Convert the disk to a GPT disk.

C. Convert the disk to a dynamic disk.

D. Create a VHD, and then attach the VHD.

A

B. Convert the disk to a GPT disk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Your network contains an Active Directory domain named contoso.com.

An administrator provides you with a file that contains the information to create user accounts for 200 temporary employees. The file is shown in the exhibit.(Click the Exhibit button.)

You need to automate the creation of the user accounts. You must achieve this goal by using the minimum amount of administrative effort.
Which tool should you use?

Available Choices
A. Ldifde

B. csvde

C. Dsadd

D. Net user

A

B. csvde

Explanation:
The CSVDE is a command-line utility that can create new AD DS objects by importing information from a comma-separated value (.csv) file. This would be the least amount of administrative effort in this case.

References:
Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2: Chapter 5: Install and administer Active Directory, Objective 5.2: Create and Manage Active Directory Users and Computers, p. 269

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Your network contains an Active Directory domain named contoso.com.

Computer accounts for the marketing department are in an organizational unit (OU) named Departments\Marketing\Computers. User accounts for the marketing department are in an OU named Departments\Marketing\Users.

Marketing users can only log on to the client computers in the Departments\Marketing\Computers OU.

You need to apply an application control policy to all of the marketing users.

Which Group Policy Object (GPO) should you configure?

To answer, select the appropriate GPO in the answer area.

A

GPO3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Your network contains an Active Directory forest named contoso.com. The forest contains two domains named contoso.com and child.contoso.com. The forest contains two domain controllers. The domain controllers are configured as shown in the following table.

You need to ensure that DC2 can provide authoritative responses for queries to the contoso.com namespace.

What should you do?

Available Choices
A.  On DC2, create a forwarder.

B.  On DC1, create a delegation.

C.  On DC1, change the replication scope of the contoso.com zone.

D.  On DC2, modify the Zone Transfers settings.
A

B. On DC1, create a delegation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Your network contains an Active Directory domain named contoso.com. The domain contains 100 servers. The servers are contained in an organizational unit (OU) named ServersOU.

You need to create a group named Group1 on all of the servers in the domain.You must ensure that Group1 is added only to the servers.

What should you configure?

Available Choices
A. A Restricted Groups setting in a Group Policy linked to ServersOU

B.  A Local Users and Groups preferences setting in a Group Policy linked to the Domain Controllers OU

C.  A Local Users and Groups preferences setting in a Group Policy linked to ServersOU

D.  A Restricted Groups setting in a Group Policy linked to the domain
A

C. A Local Users and Groups preferences setting in a Group Policy linked to ServersOU

C. allows you to centrally manage local users and groups on domain member computers and is this is the correct OU for the GPO change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Your network contains multiple subnets.

On one of the subnets, you deploy a server named Server1 that runs Windows Server 2012 R2. You install the DNS Server server role on Server1, and then you create a standard primary zone named contoso.com.

You need to ensure that client computers can resolve single-label names to IP addresses.

What should you do first?

Available Choices
A. Create a reverse lookup zone.

B.  Convert the contoso.com zone to an Active Directory-integrated zone.

C.  Create a GlobalNames zone.

D.  Configure dynamic updates for contoso.com.
A

C. Create a GlobalNames zone.

Explanation:
You should use GlobalNames zone to take advantage of single-label names. This will also ensure that the zone remains valid.

References:
Exam Ref: 70-410: Installing and Configuring Windows Server 2012 R2, Chapter4: Deploying and configuring core network services, Objective 4.3: Deploy and Configure the DNS service, p.233
http://technet.microsoft.com/en-us/library/cc731744.aspx

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

You have a server named Server1 that runs Windows Server 2012 R2.Server1 has the Hyper-V server role installed. On Server1, you create a virtual machine named VM1.VM1 has a legacy network adapter.

You need to assign a specific amount of available network bandwidth to VM1.
What should you do first?

Available Choices
A. Add a second legacy network adapter, and then run the Set-VMNetworkAdaptercmdlet.

B.  Add a second legacy network adapter, and then configure network adapter teaming.

C.  Remove the legacy network adapter, and then run the Set-VMNetworkAdaptercmdlet.

D.  Remove the legacy network adapter, and then add a network adapter.
A

D. Remove the legacy network adapter, and then add a network adapter.

Add a New network adapter because the legacy network adapter doesn’t support bandwidth management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

You perform a Server Core Installation of Windows Server 2012 R2 on a server named Server1.

You need to add a graphical user interface (GUI) to Server1.

Which tool should you use?

Available Choices
A. The Install-WindowsFeaturecmdlet

B.  The Install-Module cmdlet

C.  The Install-RoleServicecmdlet

D.  The setup.exe command
A

A. The Install-WindowsFeaturecmdlet

The DISM command is called by the Add-WindowsFeature commanD. Here is the syntax for DISM:
Dism /online /enable-feature /featurename:ServerCore-FullServer /featurename:Server-Gui-Shell /featurename:Server-Gui-Mgmt

49
Q

You have a server named Server1 that runs Windows Server 2012 R2.

You plan to use Windows PowerShell Desired State Configuration (DSC) to confirm that the Application Identity service is running on all file servers.

You define the following configuration in the Windows PowerShell Integrated Scripting Environment (ISE):

You need to use DSC to configure Server1 as defined in the configuration.

What should you run first?

Available Choices (select all choices that are correct)
 A. Service1

B. Configuration1

C. Start DscConfiguration

D. Test-DscConfiguration

A

B. Configuration1

51
Q

Your network contains an Active Directory domain named contoso.com. All of the AppLocker policy settings for the member servers are configured in a Group Policy object (GPO) named GPO1.

A member server named Server1 runs Windows Server 2012 R2.

On Server1, you test a new set of AppLocker policy settings by using a local computer policy. You need to merge the local AppLocker policy settings from Server1 into the AppLocker policy settings of GPO1.

What should you do?

Available Choices
A. From Local Group Policy Editor on Server1, export an .inf file. Import the .inf file
by using Group Policy Management Editor.
B. From Server1, run the Set-ApplockerPolicycmdlet.

C.  From Local Group Policy Editor on Server1, export an .xml file. Import the .xml
file by using Group Policy Management Editor.
D.  From Server1, run the New-ApplockerPolicycmdlet.
A

B. From Server1, run the Set-ApplockerPolicycmdlet.

Explanation:
The Set-AppLockerPolicy cmdlet sets the specified Group Policy Object (GPO) to contain the specified AppLocker policy. If no Lightweight Directory Access Protocol (LDAP) is specified, the local GPO is the default.
When the Merge parameter is used, rules in the specified AppLocker policy will be merged with the AppLocker rules in the target GPO specified in the LDAP path. The merging of policies will remove rules with duplicate rule IDs, and the enforcement setting specified by the AppLocker policy in the target GPO will be preserved. If the Merge parameter is not specified, then the new policy will overwrite the existing policy.

References:
http://technet.microsoft.com/en-us/library/ee791816(v=ws.10).aspx Exam Ref 70-410: Installing and configuring Windows Server 2012 R2, Chapter 10:
Implementing Group Policy, Lesson1: Planning, Implementing and managing Group Policy, p.

52
Q

You have a Hyper-V host named Host1 that connects to a SAN by using a hardware Fibre Channel adapter.

Host1 contains two virtual machines named VM1 and VM2.

You need to provide VM1 with direct access to the SAN. VM2 must not require access to the SAN.

Which two configurations should you perform? (Each correct answer presents part of the solution. Choose two.)

 Available Choices (select all choices that are correct)
    A.  On VM1, configure a Fibre Channel adapter.
B.  On Host1, configure a new virtual switch.

C.  On VM1, add a network adapter.

D.  On Host1, configure a new Virtual Fibre Channel SAN.

E.  On Host1, modify the Hyper-V settings.
A

A. On VM1, configure a Fibre Channel adapter.

D. On Host1, configure a new Virtual Fibre Channel SAN.

Explanation:
The process of setting up virtual Fibre Channel starts with building a virtual SAN. DOthis by opening the Hyper-V Manager, right click on the listing for your Hyper-V server in the console tree, and then choose the Virtual SAN Manager command from the shortcut menu. Then (A) Once you have created a virtual SAN, the next step in the process is to link a virtual machine to the virtual SAN.To do so, right click on the virtual machine for which you want to provide Fibre Channel connectivity and select the Settings command from the resulting shortcut menu. Next, select the Add Hardware container, as shown in the figure above, and then select the Fibre Channel Adapter option from the list of available hardware. Etc.
* Virtual Fibre Channel for Hyper-V (also referred to as Synthetic Fibre Channel) provides VM guest operating systemswith direct access to a Fibre Channel SAN by using a standard World Wide Name (WWN) associated with a virtual machine

53
Q

You have a server named Server1 that runs Windows Server 2012 R2.

Server1 has following storage spaces:
Data
Users
Backups
Primordial

You add an additional hard disk to Server1.

You need to identify which storage space contains the new hard disk.

Which storage space contains the new disk?

Available Choices
A. Primordial

B.  Data

C.  Users

D.  Backups
A

Primordial

54
Q

Your network contains an Active Directory domain named contoso.com.

The password policy for the domain is set to require a minimum password length of 10 characters.

A user named User1 and a user named User2 work for the sales department.

User1 is forced to create a domain password that has a minimum of 12 characters.User2 is forced to create a domain password that has a minimum of eight characters.

You need to identify what forces the two users to have different password lengths.

Which tool should you use?

Available Choices
A. Group Policy Management

B.  Credential Manager

C.  Active Directory Administrative Center

D.  Security Configuration Wizard (SCW)
A

C. Active Directory Administrative Center

Explanation:
In Windows Server 2008, you can use fine-grained password policies to specify multiple password policies and apply different password restrictions and account lockout policies to different sets of users within a single domain. For example, to increase the security of privileged accounts, you can apply stricter settings to the privileged accounts and then apply less strict settings to the accounts of other users. Or in some cases, you may want to apply a special password policy for accounts whose passwords are synchronized with other data sources. This is found in the Active Directory Administrative Center. You can use Active Directory Administrative Center to perform the following Active Directory administrative tasks:
Create new user accounts or manage existing user accounts Create new groups or manage existing groups
Create new computer accounts or manage existing computer accounts Create new organizational units (OUs) and containers or manage existing OUs Connect to one or several domains or domain controllers in the same instance of Active Directory Administrative Center, and view or manage the directory information for those domains or domain controllers
Filter Active Directory data by using query-building search

References:
http://technet.microsoft.com/en-us/library/cc770842(v=ws.10).aspx

55
Q

Your network contains an Active Directory domain named contoso.com.

All client computers run Windows 8.

You deploy a server named Server1 that runs Windows Server 2012 R2.

You install a new client-server application named App1 on Server1 and on the client computers. The client computers must use TCP port 6444 to connect to App1 on Server1.Server1 publishes the information of App1 to an intranet server named Server2 by using TCP port 3080.

You need to ensure that all of the client computers can connect to App1. The solution must ensure that the application can connect to Server2.

Which Windows Firewall rule should you create on Server2?

A.  An outbound rule to allow a connection to TCP port 3080

B.  An inbound rule to allow a connection to TCP port 3080

C.  An outbound rule to allow a connection to TCP port 6444

D.  An inbound rule to allow a connection to TCP port 6444
A

B. Server2 needs inbound on 3080

References:
http://social.technet.microsoft.com/wiki/contents/articles/13894.troubleshooting-windows- firewall-withadvanced-security-in-windows-server-2012.aspx

55
Q

Your network contains a server named Server1 and 10 Web servers. All servers run Windows Server 2012 R2.
You create a Windows PowerShell Desired State Configuration (DSC) to push the settings from Server1 to all of the Web servers.

On Server1, you modify the file set for the Web servers.

You need to ensure that all of the Web servers have the latest configurations.

Which cmdlet should you run on Server1?

Available Choices
A. Get-DcsConfiguration

B.  Restore-DcsConfiguration

C.  Set-DcsLocalConfigurationManager

D.  Start-DcsConfiguration
A

D. Start-DcsConfiguration

57
Q

You have a new server named Server1 that runs Windows Server 2012 R2.

Server1 has two dual-core processors and 32 GB of RAM.

You install the Hyper-V server role on Server1.

You create two virtual machines on Server1 that each have 8 GB of memory.

You need to minimize the amount of time it takes for both virtual machines to access memory.

What should you configure on each virtual machine?

Available Choices
A. Resource control

B.  Memory weight

C.  Dynamic Memory

D.  NUMA topology
A

C. Dynamic Memory

* Dynamic Memory is a new Hyper-V feature that helps you use physical memory more efficiently.
With Dynamic Memory, Hyper-V treats memory as a shared resource that can be reallocated automatically
among running virtual machines. Dynamic Memory adjusts the amount of memory available to a virtual
machine, based on changes in memory demand and values that you specify. Dynamic Memory is available for
Hyper-V in Windows Server 2008 R2 Service Pack 1 (SP1).
* Dynamic Memory helps you use memory resources more efficiently. Before this feature was introduced,
changing the amount of memory available to a virtual machine could be done only when the virtual machine
was turned off. With Dynamic Memory, Hyper-V can provide a virtual machine with more or less memory
dynamically in response to changes in the amount ofmemory required by the workloads or Applications running
in the virtual machine. As a result, Hyper-V can distribute memory more efficiently among the running virtual
machines configured with Dynamic Memory. Depending on factors such as workload, this efficiency can make
it possible to run more virtual machines at the same time on one physical computer.
Reference: Hyper-V Dynamic Memory Configuration Guide

58
Q

You have a server named Server1 that runs Windows Server 2012 R2.

You try to install the Microsoft .NET Framework 3.5 Features feature on Server1, but the installation fails repeatedly.

You need to ensure that the feature can be installed on Server1.

What should you do?

Available Choices
A. Install Windows Identity Foundation (WIF) 3.5.

B.  Install the Web Server (IIS) server role.

C.  Connect Server1 to the Internet.

D.  Run the Add-AppxProvisionedPackagecmdlet.
A

C. Connect Server1 to the Internet.

The files needed are no longer available on the local Hard drive. We need to connect the server to the Internet.
Important to note that when starting with Windows Server 2012 R2 and Windows 8, the feature files for .NET Framework 3.5 (which includes .NET Framework 2.0 and .NET Framework 3.0) are not available on the local computer by default. The files have been removed. Files for features that have been removed in a Features on Demand configuration, along with feature files for .NET Framework 3.5, are available through Windows Update. By default, if feature files are not available on the destination server that is running Windows Server 2012 R2 Preview or Windows Server 2012 R2, the installation process searches for the missing files by connecting to Windows Update. You can override the default behavior by configuring a Group Policy setting or specifying an alternate source path during installation, whether you are installing by using the Add Roles and Features Wizard GUI or a command line.

59
Q

You have a server named Server1 that runs Windows Server 2012 R2.

You need to enable access-based enumeration for a file share on Server1.

Which tool should you use?

Available Choices
A. File Server Resource Manager (FSRM)

B.  Share and Storage Management

C.  Server Manager

D.  File Explorer
A

C. Server Manager

60
Q

Your network contains an Active Directory domain named contoso.com. You have a Group Policy object (GPO) named GP1 that is linked to the domain.GP1 contains a software restriction policy that blocks an application named App1.

You have a workgroup computer named Computer1 that runs Windows 8.A local Group Policy on Computer1 contains an application control policy that allows App1.

You join Computer1 to the domain.

You need to prevent App1 from running on Computer1.

What should you do?

Available Choices
A. FromComputer1, run gpupdate /force.

B.  From Group Policy Management, add an application control policy to GP1.

C.  From Group Policy Management, enable the Enforced option on GP1.

D.  In the local Group Policy of Computer1, configure a software restriction policy.
A

B. From Group Policy Management, add an application control policy to GP1.

62
Q

You have two servers named Server1 and Server2 that run Windows Server 2012 R2.Server1 has the DHCP Server server role installed.

You need to create an IPv6 reservation for Server2.

Which two values should you obtain from Server2? (Each correct answer presents part of the solution. Choose two.)

  Available Choices (select all choices that are correct)
    A.  the hardware ID
B.  the DHCPv6 unique identifier

C.  the DHCPv6 identity association ID

D.  the SMSBIOS GUID

E.  the MAC address
A

B. the DHCPv6 unique identifier

C.  the DHCPv6 identity association ID

Explanation:
The Add-DhcpServerv6Reservation cmdlet reserves a specified IPv6 address for the client identified by the specified Dynamic Host Configuration Protocol (DHCP) v6 unique identifier (ID) (DUID) and identity association ID (IAID).

63
Q

You have a Hyper-V host named Server1 that runs Windows Server 2012 R2.

Server1 hosts a virtual machine named VM1 that runs Windows Server 2012 R2.

VM1 has several snapshots.

You need to modify the snapshot file location of VM1.

What should you do?

Available Choices
A. Delete the existing snapshots, and then modify the settings of VM1.

B.  Right-click VM1, and then click Move. ..

C.  Right-click VM1, and then click Export...

D.  PauseVM1, and then modify the settings of VM1.
A

Delete the existing snapshots, and then modify the settings of VM1.

you will need to navigate to the Hyper-V Management snap-in
(C:\ProgramData\Microsoft\Windows\Hyper-V) and from there access the Snapshot file Location tab where you can change the settings for the VM1 snapshot file location. However, since there are already several snapshots in existence, you will need to delete them first because you will not be able to change the location of the snapshot file while there is an existing snapshot.
You need to modify the snapshot file location of VM1.

64
Q

You are configuring the IPv6 network infrastructure for a branch office.

The corporate network administrator allocates the 2001:DB8:0:C000::/58 address space for use in the branch office.

You need to identify the maximum number of IPv6 subnets you can create.

How many IPv6 subnets should you identify?

Available Choices
A. 32

B.  64

C.  128

D.  1024
A

B. 64

Explanation:
IPv6 has 128-bit (16-byte) source and destination IP addresses. Although 128 bits can express over 3.4×1038 possible combinations, the large address space of IPv6 has been designed for multiple levels of subnetting and address allocation from the Internet backbone to the individual subnets within an organization.

References:
http://technet.microsoft.com/en-us/library/dd379516%28v=WS.10%29.aspx

65
Q

Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2.Client computers run either Windows 7 or Windows 8.

All of the computer accounts of the client computers reside in an organizational unit (OU) named Clients. A Group Policy object (GPO) named GPO1 is linked to the Clients OU. All of the client computers use a DNS server named Server1.

You configure a server named Server2 as an ISATAP router. You add a host (A) record for ISATAP to the contoso.com DNS zone.

You need to ensure that the client computers locate the ISATAP router.

What should you do?

Available Choices
A. Run the Set-DnsServerGlobalQueryBlockListcmdlet on Server1,

B.  Configure the Network Options Group Policy preference of GPO1.

C.  Run the Add-DnsServerResourceRecordcmdlet on Server1.

D.  Configure the DNS Client Group Policy setting of GPO1.
A

A. Run the Set-DnsServerGlobalQueryBlockListcmdlet on Server1,

Explanation:
The Set-DnsServerGlobalQueryBlockList command will change the settings of a global query block list which you can use to ensure that client computers locate the ISATAP router.

References:
Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 4: Deploying domain controllers, Lesson 4: Configuring IPv6/IPv4 Interoperability, p. 254-256 http://technet.microsoft.com/en-us/library/jj649942(v=wps.620).aspx http://technet.microsoft.com/en-us/library/jj649876(v=wps.620).aspx http://technet.microsoft.com/en-us/library/jj649874.aspx http://technet.microsoft.com/en-us/library/jj649909.aspx

66
Q

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1.Server1 runs Windows Server 2012 R2.

You need to create a 3-TB virtual hard disk (VHD) on Server1.

Which tool should you use?

Available Choices
A.  New-StoragePool

B.  Diskpart

C.  File Server Resource Manager (FSRM)

D.  New-StorageSubsytemVirtualDisk
A

B. Diskpart

You can create a VHD from either the Disk Management snap-in or the command line (diskpart). From the DiskPart command-line tool at an elevated command prompt, run the create vdisk command and specify the file (to name the file) and maximum (to set the maximum size in megabytes) parameters. The following code demonstrates how to create a VHD file at
C:\vdisks\disk1.vdh with a maximum file size of 16 GB (or 16,000 MB).
DiskPart
Microsoft DiskPart version 6.1.7100
Copyright (C) 1999-2008 Microsoft Corporation.
On computer: WIN7
DISKPART> create vdisk file=”C:\vdisks\disk1.vhd” maximum=16000

67
Q

Your network contains a production Active Directory forest named contoso.com and a test Active Directory forest named contoso.test. A trust relationship does not exist between the forests.

In the contoso.test domain, you create a backup of a Group Policy object (GPO) named GPO1.

You transfer the backup of GPO1 to a domain controller in the contoso.com domain.

You need to create a GPO in contoso.com based on the settings of GPO1.You must achieve this goal by using the minimum amount of administrative effort.

What should you do?

Available Choices
A. From Windows PowerShell, run the Get- GPO cmdlet and the Copy- GPO cmdlet.

B.  From Windows PowerShell, run the New- GPO cmdlet and the Import- GPO cmdlet.

C.  From Group Policy Management, create a new starter GPO.Right-click the new starter GPO, and then click Restore from Backup.

D.  From Group Policy Management, right-click the Croup Policy Objects container, and then click Manage Backups.
A

B. From Windows PowerShell, run the New- GPO cmdlet and the Import- GPO cmdlet.

Explanation:
Since the GPO’s original domain is different and there is no trust relationship between forests, you should execute the New-GPO command and import the already existing command into the `new’ domain.

69
Q

Your network contains an Active Directory forest named contoso.com. All domain controllers currently run Windows Server 2008 R2.

You plan to install a new domain controller named DC4 that runs Windows Server 2012 R2.

The new domain controller will have the following configurations:
Schema master
Global catalog server
Active Directory Federation Services server role
Active Directory Certificate Services server role

You need to identify which configuration can be fulfilled by using the Active Directory Domain Services Configuration Wizard.

Which configuration should you identify?

Available Choices
A. Enable the global catalog server.

B.  Install the DNS Server role.

C.  Install the Active Directory Certificate Services role.

D.  Transfer the schema master.
A

A. Enable the global catalog server.

70
Q

Your network contains a file server named Server1 that runs Windows Server 2012 R2.All client computers run Windows 8.

You need to ensure that when users are connected to the network, they always use local offline files that are cached from Server1.

Which Group Policy setting should you configure?

Available Choices
A.  Configure Slow link speed.

B.  Turn on economical application of administratively assigned Offline Files.

C.  Configure slow-link mode.

D.  Enable file synchronization on costed networks.
A

C. Configure slow-link mode.

Explanation:
Offline Files is used to provide faster access to cached files and redirected folders.

References:
http://technet.microsoft.com/en-us/library/hh968298.aspx http://technet.microsoft.com/en-us/library/cc957631.aspx http://technet.microsoft.com/en-us/library/jj127408.aspx

72
Q

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1.Server1 runs Windows Server 2012 R2.

You plan to create a shared folder. The shared folder will have a quota limit.

You discover that when you run the New Share Wizard, you cannot select the SMB Share - Advanced option.

You need to ensure that you can use SMB Share - Advanced to create the new share.

What should you do on Server1 before you run the New Share Wizard?

 Available Choices (select all choices that are correct)
    A.  Configure the Advanced system settings.
B.  Run the Install-WindowsFeaturecmdlet.

C.  Run the Set-SmbSharecmdlet.

D.  Install the Share and Storage Management tool.
A

B. Run the Install-WindowsFeaturecmdlet.

Explanation:
Install-WindowsFeature will install one or more Windows Server roles, role services, or features on either the local or a specified remote server that is running Windows Server 2012 R2. This cmdlet is equivalent to and replaces Add-WindowsFeature, the cmdlet that was used to install roles, role services, and features in Windows Server 2008 R2.

73
Q

Your network contains an Active Directory domain named contoso.com. The domain contains three servers named Server1, Server2, and Server3.

You create a server group named ServerGroup1.

You discover the error message shown in the following exhibit.(Click the Exhibit button.)

You need to ensure that Server2 can be managed remotely by using Server Manager.

What should you do?

Available Choices
A. On DC1, run the Enable-PSSessionConfigurationcmdlet.

B. On Server2, run the Add-Computer cmdlet.

C. On Server2/ modify the membership of the Remote Management Users group.

D. From Active Directory Users and Computers, add a computer account named Server2, and then restart Server2.

A

C. On Server2/ modify the membership of the Remote Management Users group.

Explanation/Reference:
This is a security issue. To be able to access Server2 remotely through Server Manager the user need to be a member of the Remote Management Users group.

74
Q

Your network contains an Active Directory domain named contoso.com. The network contains 500 client computers that run Windows 8.All of the client computers connect to the Internet by using a web proxy.

You deploy a server named Server1 that runs Windows Server 2012 R2.Server1 has the DNS Server server role installed.

You configure all of the client computers to use Server1 as their primary DNS server.

You need to prevent Server1 from attempting to resolve Internet host names for the client computers.

What should you do on Server1?

Available Choices
A.  Create a primary zone named "root".

B.  Create a primary zone named "GlobalNames".

C.  Create a forwarder that points to 169.254.0.1.

D.  Create a primary zone named ".".
A

A. Create a primary zone named “root”.

75
Q

In an isolated test environment, you deploy a server named Server1 that runs a Server Core Installation of Windows Server 2012 R2. The test environment does not have Active Directory Domain Services (AD DS) installed.

You install the Active Directory Domain Services server role on Server1.

You need to configure Server1 as a domain controller.

Which cmdlet should you run?

Available Choices
A. Install-ADDSDomain

B.  Install-ADDSDomainController

C.  Install-WindowsFeature

D.  Install-ADDSForest
A

D. Install-ADDSForest

76
Q

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2.Server1 has the Hyper-V server role installed. Server1 has a virtual switch named RDS Virtual.

You replace all of the network adapters on Server1 with new network adapters that support single-root I/O visualization (SR-IOV).

You need to enable SR-IOV for all of the virtual machines on Server1.

Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)

Available Choices
A. On each virtual machine, modify the Advanced Features settings of the network adapter.

B.  Modify the settings of the RDS Virtual virtual switch.

C.  On each virtual machine, modify the BIOS settings.

D.  Delete, and then recreate the RDS Virtual virtual switch.

E.  On each virtual machine, modify the Hardware Acceleration settings of the network adapter.
A

D. Delete, and then recreate the RDS Virtual virtual switch.

E.  On each virtual machine, modify the Hardware Acceleration settings of the network adapter.

Explanation:
The first step when allowing a virtual machine to have connectivity to a physical network is to create an external virtual switch using Virtual Switch Manager in Hyper-V Manager. The additional step that is necessary when using SR-IOV is to ensure the checkbox is checked when the virtual switch is being created. It is not possible to change a “non SR-IOV mode” external virtual switch into an “SR-IOV mode” switch. The choice must be made a switch creation time. Thus you should first delete the existing virtual switch and then recreate it.
E: Once a virtual switch has been created, the next step is to configure a virtual machine. SR- IOV in Windows Server “8” is supported on x64 editions of Windows “8” as a guest operating system (as in Windows “8” Server, and Windows “8” client x64, but not x86 client).We have rearranged the settings for a virtual machine to introduce sub-nodes under a network adapter, one of which is the hardware acceleration node. At the bottom is a checkbox to enable SR-IOV.

77
Q

Your network contains two Hyper-V hosts that run Windows Server 2012 R2. The Hyper-V hosts contains several virtual machines that run Windows Server 2012 R2.

You install the Network Load Balancing feature on the virtual machines.

You need to configure the virtual machines to support Network Load Balancing (NLB).

Which virtual machine settings should you configure?

Available Choices
A. DHCP guard

B.  Port mirroring

C.  Router guard

D.  MAC address
A

MAC address

78
Q

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1.Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed.

On Server1, you create and start a virtual machine named VM1.VM1 is configured as shown in the following table.

You need to recommend a solution to minimize the amount of disk space used for the checkpoint of VM1.

What should you do before you create the checkpoint?

Available Choices
A. Run the Resize-VHD cmdlet.

B. Convert Disk1.vhd to a dynamically expanding disk.

C. Shut down VM1.

D. Run the Convert-VHD cmdlet.

A

Convert Disk1.vhd to a dynamically expanding disk

80
Q

Your network contains an Active Directory domain named contoso.com. The network contains a server named Server1 that runs Windows Server 2012 R2 and a server named Server2 that runs Windows Server 2008 R2 Service Pack 1 (SP1).Server1 and Server2 are member servers.

You need to ensure that you can manage Server2 from Server1 by using Server Manager.

Which two tasks should you perform? (Each correct answer presents part of the solution. Choose two.)

Available Choices
A. Install Remote Server Administration Tools on Server1.

B.  Install Windows Management Framework 3.0 on Server2.

C.  Install the Windows PowerShell 2.0 engine on Server1.

D.  Install Microsoft .NET Framework 4 on Server2.

E.  Install Remote Server Administration Tools on Server2.
A

B. Install Windows Management Framework 3.0 on Server2.

D.  Install Microsoft .NET Framework 4 on Server2.

Explanation:
To be able to fully manage remote servers that run Windows Server 2008 or the R2 Service Pack 1 operating system, you should install the .NET Framework 4 on Server2 first followed by the Windows Management Framework 3.0.

81
Q

Your network contains a Windows Server 2012 R2 image named Server12.wim.Server12.wim contains the images shown in the following table.

You need to enable the Windows Server Migration Tools feature in the Windows Server 2012 R2 Datacenter image.

You want to achieve this goal by using the minimum amount of administrative effort.

Which command should you run first?

A.  dism.exe /image:c:\Server12.wim /enable-feature /featurename:servermigration

B.  dism.exe /mount-wim /wimfile:c:\Server12.wim /index:4 /mountdir:c:\mount

C.  imagex.exe /capture c: c:\Server12.wim "windows server 2012 r2 datacenter"

D.  imagex.exe /apply c:\Server12.wim 4 c:\
A

B. dism.exe /mount-wim /wimfile:c:\Server12.wim /index:4 /mountdir:c:\mount

Explanation:
This command will mount the image before making any changes.

References:
http://technet.microsoft.com/en-us/library/cc749447(v=ws.10).aspx http://technet.microsoft.com/en-us/library/dd744382(v=ws.10).aspx

82
Q

You have a server named Server1 that runs Windows Server 2012 R2.Server1 has six network adapters. Two of the network adapters are connected to a network named LAN1, two of the network adapters are connected to a network named LAN2, and two of the network adapters are connected to a network named LAN3.

You create a network adapter team named Team1 from the two adapters connected to LANI. You create a network adapter team named Team2 from the two adapters connected to LAN2.

A company policy states that all server IP addresses must be assigned by using a reServer1 address in DHCP.

You need to identify how many DHCP reservations you must create for Server1.

How many reservations should you identify?

3

4

6

8

A

4

83
Q

You have a server named Server1 that runs Windows Server 2012 R2.

You plan to create a storage pool that will contain a new volume.

You need to create a new 600-GB volume by using thin provisioning. The new volume must use the parity layout.
What is the minimum number of 256-GB disks required for the storage pool?

2

3

4

5

A

3

83
Q

Your network contains a Hyper-V host named Server1 that runs Windows Server 2012 R2.

Server1 hosts a virtual machine named VM1 that runs Windows Server 2012 R2.

You create a checkpoint of VM1, and then you install an application on VM1.You verify that the application runs properly.

You need to ensure that the current state of VM1 is contained in a single virtual hard disk file.

The solution must minimize the amount of downtime on VM1.

What should you do?

Available Choices
A. From a command prompt, run dism.exe and specify the /delete-image parameter.

B.  From a command prompt, run dism.exe and specify the /commit-image parameter.

C.  From Hyper-V Manager, delete the checkpoint.

D.  From Hyper-V Manager, inspect the virtual hard disk.
A

From Hyper-V Manager, delete the checkpoint.

84
Q

You have a server named Server1 that runs Windows Server 2012 R2. You add an additional disk to Server1 as shown in the exhibit.(Click the Exhibit button.)

You need to ensure that users can access the additional disk from drive C.

What should you do?

Available Choices
A. Convert Disk 0 to a dynamic disk and add a mirror.

B. Create a simple volume on Disk 1 and mount the volume to a folder.

C. Convert Disk 0 and Disk 1 to dynamic disks and extend a volume.

D. Convert Disk 1 to a dynamic disk and create a spanned volume.

A

B. Create a simple volume on Disk 1 and mount the volume to a folder.

85
Q

Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server 1.Server1 runs Windows Server 2012 R2 and has the DHCP Server server role installed.

You create two IPv4 scopes on Server1. The scopes are configured as shown in the following table.

The DHCP clients in Subnet_Tor can connect to the client computers in Subnet_Mtl by using an IP address or a FQDN. You discover that the DHCP clients in Subnet_Mtl can connect to client computers in Subnet_Tor by using an IP address only.

You need to ensure that the DHCP clients in both subnets can connect to any other DHCP client by using a FQDN.

What should you add?

Available Choices
A. The 006 DNS Servers option to Subnet_Mtl

B. The 006 DNS Servers option to Subnet_Tor

C. The 015 DNS Domain Name option to Subnet_Mtl

D. The 015 DNS Domain Name option to Subnet_Tor

A

A. The 006 DNS Servers option to Subnet_Mtl

85
Q

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2012 R2.

Server2 establishes an IPSec connection to Server1.

You need to view which authentication method was used to establish the initial IPSec connection.

What should you do?

Available Choices
A. From Windows Firewall with Advanced Security, view the quick mode security
association.
B. From Event Viewer, search the Application Log for events that have an ID of 1704

C.  From Event Viewer, search the Security Log for events that have an ID of 4672.

D.  From Windows Firewall with Advanced Security, view the main mode security
association.
A

D. From Windows Firewall with Advanced Security, view the main mode security
association.

Explanation:
Main mode negotiation establishes a secure channel between two computers by determining a set of cryptographic protection suites, exchanging keying material to establish a shared secret key, and authenticating computer and user identities. A security association (SA) is the information maintained about that secure channel on the local computer so that it can use the information for future network traffic to the remote computer. You can monitor main mode SAs for information like which peers are currently connected to this computer and which protection suite was used to form the SA.

References:
http://technet.microsoft.com/en-us/library/dd448497(v=ws.10).aspx

87
Q

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2.Server1 has the Hyper-V server role installed. The domain contains a virtual machine named VM1.

A developer wants to attach a debugger to VM1.

You need to ensure that the developer can connect to VM1 by using a named pipe.

Which virtual machine setting should you configure?

Available Choices
A. BIOS

B.  Network Adapter

C.  COM 1

D.  Processor
A

C. COM 1

Explanation:
Named pipes can be used to connect to a virtual machine by configuring COM 1.

References:

http: //support.microsoft.com/kb/819036
http: //support.microsoft.com/kb/141709

88
Q

Your network contains an Active Directory forest named contoso.com.

The forest contains two domains named contoso.com and child.contoso.com and two sites named Site1 and Site2. The domains and the sites are configured as shown in following table.

When the link between Site1 and Site2 fails, users fail to log on to Site2.

You need to identify what prevents the users in Site2 from logging on to the child.contoso.com domain.

What should you identify?

Available Choices (select all choices that are correct)
 A. The placement of the global catalog server

B. The placement of the infrastructure master

C. The placement of the domain naming master

D. The placement of the PDC emulator

A

D. The placement of the PDC emulator

89
Q

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2 and a client computer named Computer1 that runs windows 8.

DC1 is configured as a DHCP server as shown in the exhibit.(Click the Exhibit button.)

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2 and a client computer named Computer1 that runs windows 8.

DC1 is configured as a DHCP server as shown in the exhibit.(Click the Exhibit button.)

Available Choices
A. Disable the Allow filters.

B. Disable the Deny filters.

C. Authorize DC1.contoso.com.

D. Activate Scope [10.1.1.0] Contoso.com.

A

C. Authorize DC1.contoso.com.

Red down arrow indicates an unauthorized DHCP server

90
Q

Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2012 R2.

The domain contains a user named User1 and a global security group named Group1.

User1 logs on to a client computer named Computer1.

You need to disable the computer account of Computer1.
Which cmdlet should you run?

Available Choices
A. Add-AdPrincipalGroupMembership

B.  Install-AddsDomainControllcr

C.  Install-WindowsFeature

D.  Install-AddsDomain

E.  Rename-AdObject

F.  Set-AdAccountControl

G. Set-AdGroup

H.  Set-User
A

F. Set-AdAccountControl

Explanation:
The Rename-ADObject cmdlet changes the name of an Active Directory object.

References:
http://technet.microsoft.com/en-us/library/ee617225.aspx

91
Q

Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2.Server1 and Server2 are part of a workgroup.

On Server1 and Server2, you create a local user account named Admin1.You add the account to the local Administrators group. On both servers, Admin1 has the same password.

You log on to Server1 as Admin1.You open Computer Management and vol.connect to Server2. When you attempt to create a scheduled task, view the event logs, and manage the shared folders, you receive Access Denied messages.

You need to ensure that you can administer Server2 remotely from Server1 by using Computer Management.

What should you configure on Server2?

Available Choices
A. From Server Manager, modify the Remote Management setting.

B.  From Local Users and Groups, modify the membership of the Remote Management Users group.

C.  From Windows Firewall, modify the Windows Management Instrumentation (WMI) firewall rule.

D.  From Registry Editor, configure the LocalAccountTokenFilterPolicy registry value.
A

From Registry Editor, configure the LocalAccountTokenFilterPolicy registry value.

93
Q

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2.Server1 contains a virtual machine named VM1 that runs Windows Server 2012 R2.

You need to ensure that a user named User1 can install Windows features on VM1. The solution must minimize the number of permissions assigned to User1.

To which group should you add User1?

A.  Hyper-V Administrators on Server1

B.  Administrators on VM1

C.  Server Operators on Server1

D.  Power Users on VM1
A

B. Administrators on VM1

Explanation:
The user has to be an administrator on VM1 to be able to install features.

References:
Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 10: Implementing Group Policy, p.539

94
Q

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and a server named Server2 that runs Windows Server 2008 R2 Service Pack 1 (SP1).Both servers are member servers.

On Server2, you install all of the software required to ensure that Server2 can be managed remotely from Server Manager.

You need to ensure that you can manage Server2 from Server1 by using Server Manager.

Which two tasks should you perform on Server2? (Each correct answer presents part of the solution.Choose two.)

Available Choices
A. Run the systempropertiesremotE. execommanD.

B.  Run the Fnable-PsRemotingcmdlet.

C.  Run the Enable-PsSessionConfigurationcmdlet.

D.  Run the Confiqure-SMRemoting.ps1script.

E.  Run the Set-ExecutionPolicycmdlet.
A

D. Run the Confiqure-SMRemoting.ps1script.

E.  Run the Set-ExecutionPolicycmdlet.

Explanation:
The output of this command indicates whether Server Manager Remoting is enabled or disabled on the server. To configure Server Manager remote management by using Windows PowerShell On the computer that you want to manage remotely, open a Windows PowerShell session with elevated user rights.To do this, click Start, click All Programs, click Accessories, click Windows PowerShell, right-click the Windows PowerShell shortcut, and then click Run as administrator. In the Windows PowerShell session, type the following, and then press Enter.
Set-ExecutionPolicy -ExecutionPolicyRemoteSigned
Type the following, and then press Enter to enable all required firewall rule exceptions.
Configure-SMRemoting.ps1 -force ­enable

95
Q

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2012 R2.

You create a security template named Template1 by using the Security Templates snap-in.

You need to apply Template1 to Server2.

Which tool should you use?

Available Choices
A. Authorization Manager

B.  Local Security Policy

C.  Certificate Templates

D.  System Configuration
A

B. Local Security Policy

NOTE: THIS ANSWER IS WRONG ON TEST - NOT SURE RIGHT ANSWER - EVEN THE OPTIONS ARE DIFFERENT BUT SAME QUESTION

96
Q

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2 that run Windows Server 2012 R2.
You log on to Server1.

You need to retrieve a list of the active TCP connections on Server2.
Which command should you run from Server1?

Available Choices
A. winrm get server2

B.  netstat\> server2

C.  dsquery \* -scope base -attrip,server2

D.  winrs -r:server2netstat
A

winrs -r:server2netstat

98
Q

Your network contains an Active Directory domain named adatum.com. The domain contains a member server named Host1. Host1 runs Windows Server 2012 R2 and has the Hyper-V server role installed. Host1 hosts two virtual machines named VM5 and VM6. Both virtual machines connect to a virtual switch named Virtual1.

On VM5, you install a network monitoring application named Monitor1. You need to capture all of the inbound and outbound traffic to VM6 by using Monitor1.

Which two commands should you run from Windows PowerShell?

(Each correct answer presents part of the solution. Choose two.)

Get-VM “VM6” | Set-VMNetworkAdapter-IovWeight 1

Get-VM “VM5” I Set-VMNetworkAdapter -IovWeight 0

Get-VM “VM6” | Set-VMNetworkAdapter -PortMirroring Source

Get-VM “VM6” | Set-VMNetworkAdapter -AllowTeaming On

Get-VM “VM5” | Set-VMNetworkAdapter -PortMirroring Destination

Get-VM “VM5” | Set-VMNetworkAdapter -AllowTeaming On

A

Get-VM “VM6” | Set-VMNetworkAdapter -PortMirroring Source

Get-VM “VM5” | Set-VMNetworkAdapter -PortMirroring Destination

99
Q

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1.Server1 runs Windows Server 2012 R2.

You create a group Managed Service Account named gservice1.

You need to configure a service named Service1 to run as the gservice1 account.

How should you configure Service1?

Available Choices
A. From the Services console, configure the General settings.

B.  From Windows PowerShell, run Set-Service and specify the -StartupType parameter

C.  From a command prompt, run sc.exe and specify the config parameter.

D.  From a command prompt, run sc.exe and specify the privs parameter.
A

C. From a command prompt, run sc.exe and specify the config parameter.

Explanation:
Executing the ss.exe command with the config parameter will modify service configuration.

100
Q

Your network contains an Active Directory forest that contains three domains.

A group named Group1 is configured as a domain local distribution group in the forest root domain.

You plan to grant Group1 read-only access to a shared folder named Share1.Share1 is located in a child domain.

You need to ensure that the members of Group1 can access Share1.

What should you do first?

Available Choices
A. Convert Group1 to a universal security group.

B.  Convert Group1 to a global distribution group.

C.  Convert Group1 to a universal distribution group.

D.  Convert Group1 to a domain local security group.
A

A. Convert Group1 to a universal security group.

Explanation:
Universal can be used for any domain or forest. Furthermore a Universal group can span multiple domains, even the entire forest.

101
Q

You plan to deploy a file server to a temporary location.

The temporary location experiences intermittent power failures. The file server will contain a dedicated volume for shared folders.

You need to create a volume for the shared folders. The solution must minimize the likelihood of file corruption if a power failure occurs.

Which file system should you use?

Available Choices 
A.  NFS

B.  FAT32

C.  ReFS

D.  NTFS
A

C. ReFS

The ReFS file system allows for resiliency against corruptions with the option to salvage amongst many other key features like Metadata integrity with checksums, Integrity streams with optional user data integrity, and shared storage pools across machines for additional failure tolerance and load balancing, etc.

102
Q

Your network contains an Active Directory domain named adatum.com. The domain contains several thousand member servers that run Windows Server 2012 R2.All of the computer accounts for the member servers are in an organizational unit (OU) named ServersAccounts.

Servers are restarted only occasionally.

You need to identify which servers were restarted during the last two days.

What should you do?

Available Choices
A. Run Get-ADComputer and specify the SearchScope parameter.

B.  Run dsquery computer and specify the -stalepwd parameter.

C.  Run dsquery server and specify the -o parameter.

D.  Run Get-ADComputer and specify the lastLogon property.
A

D. Run Get-ADComputer and specify the lastLogon property.

104
Q

Your network contains an Active Directory domain named contoso.com.

An organizational unit (OU) named OU1 contains the computer accounts for laptops and desktop computers.

A Group Policy object (GPO) named GP1 is linked to OU1.

You need to ensure that the configuration settings in GP1 are applied only to a user named User1.
What should you do?

Available Choices
A. Modify the security settings of OU1.

B.  Modify the GPO Status of GP1.

C.  Modify the security settings of GP1.

D.  Configure the WMI Filter of GP1.
A

D. Configure the WMI Filter of GP1.

Explanation:
WMI filtering
Windows Management Instrumentation (WMI) filters allow you to dynamically determine the scope of Group Policy objects (GPOs) based on attributes of the target computer. When a GPO that is linked to a WMI filter is applied on the target computer, the filter is evaluated on the target computer. If the WMI filter evaluates to false, the GPO is not applied (except if the client computer is running Windows Server, in which case the filter is ignored and the GPO is always applied). If the WMI filter evaluates to true, the GPO is applied.

References:
Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 10: Implementing Group Policy, p. 470, 482
http://technet.microsoft.com/en-us/library/jj134176
WMI filtering using GPMC

105
Q

Your network contains a server named Server1 that runs Windows Server 2012 R2.Server1 has the Hyper-V server role installed. Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.Server1 is configured as shown in the following table.

You need to configure VM4 to track the CPU, memory, and network usage.

What should you configure?

Available Choices
A. NUMA topology

B. Resource control

C. Resource metering

D. Virtual Machine Chimney

E. The VLAN ID

F. Processor Compatibility

G. The startup order

H. Automatic Start Action

I. Integration Services

J. Port mirroring

K. Single-root I/O virtualization

A

C. Resource metering

Explanation:
Metrics collected for each virtual machine using resource metering:
Average CPU usage, measured in megahertz over a period of time.
Average physical memory usage, measured in megabytes.
Minimum memory usage (lowest amount of physical memory). Maximum memory usage (highest amount of physical memory). Maximum amount of disk space allocated to a virtual machine. Total incoming network traffic, measured in megabytes, for a virtual network adapter.
Total outgoing network traffic, measured in megabytes, for a virtual network adapter

References:
http://blogs.technet.com/b/meamcs/archive/2012/05/28/hyper-v-resource-metering-in-windows- server-2012-server-8-beta.aspx

106
Q

You have a server named Server1 that runs Windows Server 2012 R2.You need to create a script that will create and mount a virtual hard disk.

Which tool should you use?

Available Choices
A. diskpart.exe

B.  vdsldr.exe

C.  fsutil.exe

D.  vds.exe
A

A. diskpart.exe

107
Q

Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server1 and a domain controller named DC2.All servers run Windows Server 2012 R2.All domain controllers are configured as DNS servers.

On Server1, you open Server Manager and you add DC2 as another server to manage.

From Server Manager on Server1, you right-click DC2 as shown in the exhibit. (Click the Exhibit button.)

You need to ensure that when you right-click DC2, you see the option to run DNS Manager.

What should you do?

Available Choices
A. On Server1, install the Role Administration Tools.

B. In the domain, add Server1 to the DNS Admins group.

C. On DC2 and Server1, run winrmquickconfig.

D. On DC2, install the Feature Administration Tools.

A

A. On Server1, install the Role Administration Tools.

The Domain Name System (DNS) role is a role that provides a standard method for associating names with numeric Internet addresses. This lets users refer to network computers by using easy-to-remember names instead of a long series of numbers. Windows DNS services can be integrated with DHCP services, eliminating the need to add DNS records as computers are added to the network.

108
Q

Your network contains an Active Directory domain named adatum.com.

You discover that when users join computers to the domain, the computer accounts are created in the Computers container.

You need to ensure that when users join computers to the domain, the computer accounts are automatically created in an organizational unit (OU) named All_Computers.

What should you do?

Available Choices
A. From a command prompt, run the redircmp.exe command.

B.  From ADSI Edit, configure the properties of the Computers container.

C.  From Ldp, configure the properties of the Computers container.

D.  From Windows PowerShell, run the Move-ADObjectcmdlet.
A

A. From a command prompt, run the redircmp.exe command.

Explanation:
This command redirects the default container for newly created computers to a specified, target organizational unit (OU) so that newly created computer objects are created in the specific target OU instead of in All_Computers.

References:
http://technet.microsoft.com/en-us/library/cc770619.aspx

109
Q

Your network contains an Active Directory forest named contoso.com. All domain controllers currently run Windows Server 2008 R2.

You plan to install a new domain controller named DC4 that runs Windows Server 2012 R2.

The new domain controller will have the following configurations:
Schema master
Global catalog server
DNS Server server role
Active Directory Certificate Services server role

You need to identify which configurations cannot be fulfilled by using the Active Directory Domain Services Configuration Wizard.

Which two configurations should you identify? (Each correct answer presents part of the solution. Choose two.)

Available Choices
A. Install the DNS Server role.

B.  Enable the global catalog server.

C.  Install the Active Directory Certificate Services role.

D.  Transfer the schema master.
A

C. Install the Active Directory Certificate Services role.

D.  Transfer the schema master.

Installation Wizard will automatically install DNS and allows for the option to set it as a global catalog server. ADCS and schema must be done separately.

110
Q

You have a server named Server1 that runs Windows Server 2012 R2.You add a 4-TB disk named Disk 5 to Server1.

You need to ensure that you can create a 3-TB volume on Disk 5.

What should you do?

[[NOTE: EXHIBIT IS MISSING!!!]]

Available Choices
A. Create a storage pool.

B.  Convert the disk to a GPT disk.

C.  Convert the disk to a dynamic disk.

D.  Create a VHD, and then attach the VHD.
A

B. Convert the disk to a GPT disk.

The exhibit shows Disk1 to be a basic disk. The disk must be GPT since GPT disks allows for partitioning.
References:
Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 8: File Services and Storage, Lesson 2: Provisioning and managing shared storage, p. 379-384 http://msdn.microsoft.com/en-us/library/windows/hardware/gg463525.aspx

111
Q

Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2012 R2.

The domain contains a user named User1 and a global security group named Group1.

You need to prevent User1 from changing his password. The solution must minimize administrative effort.

Which cmdlet should you run?

Available Choices
A. Add-AdPrincipalGroupMembership

B.  Install-AddsDomainController

C.  Install-WindowsFeature

D.  Install-AddsDomain

E.  Rename AdObject

F.  Set AdAccountControl

G. Set-AdGroup

H.  Set-User
A

F. Set AdAccountControl

112
Q

Your network contains an Active Directory domain named adatum.com. The domain contains a member server named Server1 and a domain controller named DC2.All servers run Windows Server 2012 R2.

On DC2, you open Server Manager and you add Server1 as another server to manage.

From Server Manager on DC2, you right-click Server1 as shown in the exhibit. (Click the Exhibit button.)

You need to ensure that when you right-click Server1, you see the option to run the DHCP console.

What should you do?

Available Choices
A. In the domain, add DC2 to the DHCP Administrators group.

B. On Server1, install the Feature Administration Tools,

C. On DC2 and Server1, run winrmquickconfig.

D. On DC2, install the Role Administration Tools.

A

D. On DC2, install the Role Administration Tools.

References:
http://technet.microsoft.com/en-us/library/ee441255(v=ws.10).aspx

113
Q

You have a Hyper-V host named Server1 that runs Windows Server 2012 R2 Datacenter.Server1 is located in an isolated network that cannot access the Internet.

On Server1, you install a new virtual machine named VM1.VM1 runs Windows Server 2012 R2 Essentials and connects to a private virtual network.

After 30 days, you discover that VM1 shuts down every 60 minutes.

You need to resolve the issue that causes VM1 to shut down every 60 minutes.

What should you do?

A.  OnVM1, run slmgr.exe and specify the /ipk parameter.
B.  OnServer1, run slmgr.exe and specify the /rearm-sku parameter.

C.  Create a new internal virtual network and attach VM1 to the new virtual network.

D.  On Server1, run Add-WindowsFeatureVolumeActivation.
A

OnVM1, run slmgr.exe and specify the /ipk parameter.

115
Q

Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. All servers runs Windows Server 2012 R2. The domain contains two domain controllers named DC1 and DC2.Both domain controllers are virtual machines on a Hyper-V host.

You plan to create a cloned domain controller named DC3 from an image of DC1.

You need to ensure that you can clone DC1.

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

Available Choices
A. Add the computer account of DC3 to the Cloneable Domain Controllers group.

B.  Modify the contents of the DefaultDCCIoneAllowList.xml file on DC1.

C.  Run the Enable-AdOptionalFeaturecmdlet.

D.  Create a DCCIoneConfig.xml file on DC1.

E.  Add the computer account of DC1 to the Cloneable Domain Controllers group.
A

D. Create a DCCIoneConfig.xml file on DC1.

E.  Add the computer account of DC1 to the Cloneable Domain Controllers group.

Explanation/Reference
*Cloneable Domain Controllers Group (located in the Users container). Membership in this group dictates whether a DC can or cannot be cloned. This group has some permissions set on the domain head that should not be removed. Removing these permissions will cause cloning to
fail. Also, as a best practice, DCs shouldn’t be added to the group until you plan to clone and DCs should be removed from the group once cloning is complete. Cloned DCs will also end up in the Cloneable Domain Controllers group.
*DCCloneConfig.xml is an XML configuration file that contains all of the settings the cloned DC will take when it boots. This includes network settings, DNS, WINS, AD site name, new DC name and more.

117
Q

Your network contains three servers that run Windows Server 2012 R2. The servers are configured as shown in the following table.

Server3 is configured to obtain an IP address automatically.

You need to prevent Server3 from receiving an IP address from Server1.

What should you create on Server1?

Available Choices
A. An exclusion

B. A scope option

C. A filter

D. A reservation

A

C. A filter

Explanation:
Filter to exclude MAC address of Server3.

References:
Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2: Objective 5.3 Create and manage Active Directory groups and Organization units, Chapter 3: Configure Hyper-V, p. http://technet.microsoft.com/en-us/magazine/ff521761.aspx http://technet.microsoft.com/en-us/library/cc726954(v=ws.10).aspx

118
Q

You have a Hyper-V host named Hyperv1 that runs Windows Server 2012 R2.Hyperv1 hosts a virtual machine named Server1.Server1 uses a disk named Server1.vhdx that is stored locally on Hyperv1.

You stop Server1, and then you move Server1.vhdx to an iSCSI target that is located on another server.

You need to configure Server1 to meet the following requirements:
Ensure that Server1 can start by using Server1.vhdx.
Prevent Server1.vhdx from consuming more than 500 IOPS on the iSCSI target.

Which two objects should you configure?
To answer, select the appropriate two objects in the answer area.

A

SEE IMAGE

119
Q

Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2012 R2.

The domain contains a user named User1 and a global security group named Group1.

You need to modify the SAM account name of Group1.

Which cmdlet should you run?

Available Choices
A. Add-AdPrincipalGroupMembership

B.  Install-AddsDomainController

C.  Install-WindowsFeature

D.  Install-AddsDomain

E.  Rename AdObject

F.  Set AdAccountControl

G. Set-AdGroup

H.  Set-User
A

E. Rename AdObject

120
Q

Your network contains an Active Directory domain named contoso.com. All client computer accounts are in an organizational unit (OU) named AllComputers. Client computers run either windows 7 or Windows 8.

You create a Group Policy object (GPO) named GP1.

You link GP1 to the AllComputers OU.

You need to ensure that GP1 applies only to computers that have more than 8 GB of memory.

What should you configure?

Available Choices
A. The Security settings of GP1

B.  The Block Inheritance option for AllComputers

C.  The Security settings of AllComputers

D.  The WMI filter for GP1
A

D. The WMI filter for GP1

Explanation:
Windows Management Instrumentation (WMI) filters allow you to dynamically determine the scope of Group Policy objects (GPOs) based on attributes of the target computer. When a GPO that is linked to a WMI filter is applied on the target computer, the filter is evaluated on the target computer. If the WMI filter evaluates to false, the GPO is not applied (except if the client computer is running Windows Server, in which case the filter is ignored and the GPO is always applied).If the WMI filter evaluates to true, the GPO is applied.

References:
Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 10: Implementing Group Policy, p.470, 482
http://technet.microsoft.com/en-us/library/jj134176
WMI filtering using GPMC

121
Q

You have a server named Server1.Server1 runs Windows Server 2012 R2.

Server1 has a thin provisioned disk named Disk1.

You need to expand Disk1.

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

Available Choices
A. From File and Storage Services, extend Disk1.

B.  From File and Storage Services, add a physical disk to the storage pool.

C.  From Disk Management, extend the volume.

D.  From Disk Management, delete the volume, create a new volume, and then format the volume.

E.  From File and Storage Services, detach Disk1.
A

A. From File and Storage Services, extend Disk1.

B. From File and Storage Services, add a physical disk to the storage pool.

Step 1 (B): if required add physical disk capacity.
Step 2 (A): Dynamically extend the virtual disk (not volume). The File and Storage Services role and the Storage Services role service are installed by default, but without any additional role services. This basic functionality enables you to use Server Manager or Windows PowerShell to manage the storage functionality of your servers.
122
Q

You have a server named dc2.contoso.com that runs Windows Server 2012 R2 and has the DNS Server server role installed.

You open DNS Manager as shown in the exhibit.(Click the Exhibit button.)

You need to view the DNS server cache from DNS Manager.
What should you do first?

Available Choices
A. From the View menu, click Filter…

B. From the Action menu, click Configure a DNS Server…

C. From the Action menu, click Properties.

D. From the View menu, click Advanced.

A

D. From the View menu, click Advanced.

123
Q

Your network contains an Active Directory forest. The forest functional level is Windows Server 2012 R2. The forest contains a single domain. The domain contains a member server named Server1.Server1 runs windows Server 2012 R2.

You purchase a network scanner named Scanned that supports Web Services on Devices (WSD).
You need to share the network scanner on Server1.

Which server role should you install on Server1?

Available Choices
A. Web Server (IIS)

B.  Fax Server

C.  Print and Document Services

D.  File and Storage Services
A

C. Print and Document Services

Explanation:
The Print and Document Services role allows for the configuration to share printers, scanners and fax devices.

References:
Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2, Chapter 1: Installing and Configuring servers, Objective 1.2: Configure servers, p. 8 http://technet.microsoft.com/en-us/library/hh831468.aspx

125
Q

You have a Hyper-V host named Server1 that runs Windows Server 2012 R2.Server1 has the virtual switches listed in the following table.

You create a virtual machine named VM1.VM1 has two network adapters. One network adapter connects to vSwitch1. The other network adapter connects to vSwitch2.You configure NIC teaming on VM1. You need to ensure that if a physical NIC fails on Server1, VM1 remains connected to the network. What should you do on Server1?

  • Run the Set-VmNetworkAdaptercmdlet.
  • Add a new network adapter to VM1.
  • Create a new virtual switch on Server 1.
  • Modify the properties of vSwitch1 and vSwitch2.
A

Run the Set-VmNetworkAdaptercmdlet.

126
Q

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named Server1 that runs Windows Server 2012 R2.

On Server1, you create a work folder named Work1.

A user named User1 connects to Work1 from a computer named Computer1.

You need to identify the last time the documents in Work1 were synchronized successfully from Computer1.
What should you do?

Available Choices
A. From Server Manager, review the properties of Computer1.

B.  From Windows PowerShell, run the Get-SyncUserSettingscmdlet.

C.  From Windows PowerShell, run the Get-SyncSharecmdlet.

D.  From Server Manager, review the properties of User1.
A

From Server Manager, review the properties of User1.

127
Q

You have a server named Print1 that runs Windows Server 2012 R2.

On Print1, you share a printer named Printer1.

You need to ensure that only the members of the Server Operators group, the Administrators group, and the Print Operators group can send print jobs to Printer1.

What should you do?

Available Choices
A. Remove the permissions for the Creator Owner group.

B.  Assign the Print permission to the Server Operators group.

C.  Remove the permissions for the Everyone group.

D.  Assign the Print permission to the Administrators group.
A

Remove the permissions for the Everyone group.

By default Everyone can print. This permissions need to be removed.

128
Q

You have a server named Server1 that runs Windows Server 2012 R2.

You promote Server1 to a domain controller.

You need to view the service location (SRV) records that Server1 registers in DNS.

What should you do on Server1?

Available Choices
A. Open the Srv.sys file.

B.  Open the Netlogon.dns file.

C.  Run ipconfig /displaydns,

D.  Run Get-DnsServerDiagnostics.
A

B. Open the Netlogon.dns file

129
Q

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1.Server1 runs Windows Server 2012 R2.

You need to create a 3-TB virtual hard disk (VHD) on Server1.

Which tool should you use?

Available Choices 
A.  Share and Storage Management

B.  New-StoragePool

C.  New-VirtualDisk

D.  Diskpart
A

D. Diskpart

130
Q

Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server 1.Server1 runs Windows Server 2012 R2 and has the DHCP Server server role installed.

You create two IPv4 scopes on Server1. The scopes are configured as shown in the following table.

The DHCP clients in Subnet1 can connect to the client computers in Subnet2 by using an IP address or a FQDN.

You discover that the DHCP clients in Subnet2 can connect to client computers in Subnet1 by using an IP address only.

You need to ensure that the DHCP clients in both subnets can connect to any other DHCP client by using a FQDN.
What should you add?

Available Choices
A. The 015 DNS Domain Name option to Subnet1

B. The 015 DNS Domain Name option to Subnet2

C. The 006 DNS Servers option to Subnet2

D. The 006 DNS Servers option to Subnet1

A

C. The 006 DNS Servers option to Subnet2

References:
http://technet.microsoft.com/en-us/library/ee941136%28v=WS.10%29.aspx Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 6: Network Administration, p.253

131
Q

Your network contains an Active Directory domain named contoso.com. The domain contains a DHCP server named Server1 that runs Windows Server 2012 R2.

You create a DHCP scope named Scope1. The scope has a start address of 192.168.1.10, an end address of 192.168.1.50, and a subnet mask of 255.255.255.192.

You need to ensure that Scope1 has a subnet mask of 255.255.255.0.
What should you do first?

Available Choices
A. From the DHCP console, reconcile Scope1.

B.  From the DHCP console, delete Scope1.

C.  From the DHCP console, modify the Scope Options of Scope1.

D.  From Windows PowerShell, run the Set-DhcpServerv4Scope cmdlet.
A

B. From the DHCP console, delete Scope1.

The only way to change the subnet mask of a scope is to delete and recreate the scope.
Set-DhcpServerv4Scope does not include a parameter for the subnet mask.

132
Q

You have a server that runs a Server Core installation of Windows Server 2012 R2.

You need to change the DNS server used by IPv6.

What should you do?

Available Choices
A. From Sconfig.configure the Network Settings.

B.  Run the sc.exe command and specify the config parameter.

C.  From Windows PowerShell, run the Set-NetIpv6Protocol cmdlet.

D.  From Windows PowerShell, run the Set-DnsClientServerAddresscmdlet.
A

D. From Windows PowerShell, run the Set-DnsClientServerAddresscmdlet.

Explanation:
The Set-DnsClientServerAddress cmdlet sets one or more IP addresses for DNS servers associated with an interface. This cmdlet statically adds DNS server addresses to the interface. If this cmdlet is used to add DNS servers to the interface, then the DNS servers will override any DHCP configuration for that interface.
PS C:\> Set-DnsClientServerAddress -InterfaceIndex 12 -ServerAddresses “10.0.0.1”,”10.0.0.2”)

References:
http://technet.microsoft.com/en-us/library/jj592692.aspx http://technet.microsoft.com/en-us/library/jj590768.aspx

133
Q

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2.Server1 runs Windows Server 2012 R2.Server2 runs Windows Server 2008 R2 Service Pack 1 (SP1) and has the DHCP Server server role installed.

You need to manage DHCP on Server2 by using the DHCP console on Server1.

What should you do first?

Available Choices
A. From the Microsoft Management Console on Server1, add a snap-in.

B.  From Windows PowerShell on Server1, run Install-WindowsFeature.

C.  From Windows Firewall with Advanced Security on Server2, create an inbound rule.

D.  From Internet Explorer on Server2, download and install Windows Management Framework 3.0.
A

B. From Windows PowerShell on Server1, run Install-WindowsFeature.

Explanation:
The DHCP snap-in isn’t available unless the DHCP feature is installed. Server 1 is stated to not have DHCP installed, so the snap-in therefore cannot be added. We must add the DHCP server role.

References:
Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 6 Network Administration, p.228

134
Q

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2012 R2.

You create a security template named Template1 by using the Security Templates snap-in.

You need to apply Template1 to Server2.

Which tool should you use?

Available Choices
A. System Configuration

B.  Local Security Policy

C.  Certificate Templates

D.  computer Management
A

B. Local Security Policy

Explanation:
A security policy is a combination of security settings that affect the security on a computer. You can use your local security policy to edit account policies and local policies on your local computer.

135
Q

Your company has a main office and two branch offices. The offices connect to each other by using a WAN link.

In the main office, you have a server named Server1 that runs Windows Server 2012 R2.
Server1 is configured to use an IPv4 address only.

You need to assign an IPv6 address to Server1. The IP address must be private and routable.

Which IPv6 address should you assign to Server1?

A.  2001:ab32:145c::32cc:401b

B.  ff00:3rff:65df:145c:dca8::82a4

C.  fd00:ab32:14:ad88:ac:58:abc2:4

D.  fe80:ab32:145c::32cc:401b
A

C. fd00:ab32:14:ad88:ac:58:abc2:4

Explanation:
Unique local addresses
Unique local addresses are IPv6 addresses that are private to an organization in the same way that private addresses–such as 10.x.x.x, 192.168.x.x, or 172.16.0.0 - 172.31.255.255–can be used on an IPv4 network.

Unique local addresses, therefore, are not routable on the IPv6 Internet in the same way that an address like 10.20.100.55 is not routable on the IPv4 Internet.

A unique local address is always structured as follows:
The first 8 bits are always 11111101 in binary format. This means that a unique local address always begins with FD and has a prefix identifier of FD00::/8.

136
Q

Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2012 R2.

The domain contains a user named User1 and three global security groups named Group1, Group2 and, Group3.

You need to add User1 to Group1, Group2, and Group3.

Which cmdlet should you run?

Available Choices
A. Add-AdPrincipalGroupMembership

B.  Install-AddsDomainControllcr

C.  Install-WindowsFeature

D.  Install-AddsDomain

E.  Rename-AdObject

F.  Set-AdAccountControl

G. Set-AdGroup

H.  Set-User
A

A. Add-AdPrincipalGroupMembership

Explanation:
The Add-ADPrincipalGroupMembership cmdlet adds a user, group, service account, or computer as a new member to one or more Active Directory groups.

References:
http://technet.microsoft.com/en-us/library/ee617203.aspx http://technet.microsoft.com/en-us/library/hh974723.aspx

137
Q

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2.

On a server named Server2, you perform a Server Core Installation of Windows Server 2012 R2.You join Server2 to the contoso.com domain.

You need to ensure that you can manage Server2 by using the Computer Management console on Server1.

What should you do on Server2?

Available Choices
A. Install Windows Management Framework.

B.  Run sconfig.exe and configure Remote Server Administration Tools (RSAT).

C.  Install Remote Server Administration Tools (RSAT).

D.  Run sconfig.exe and configure remote management.
A

D. Run sconfig.exe and configure remote management.

Explanation:
In Windows Server 2012 R2, you can use the Server Configuration tool (Sconfig.cmd) to configure and manage several common aspects of Server Core installations. You must be a member of the Administrators group to use the tool. Sconfig.cmd is available in the Minimal Server Interface and in Server with a GUI mode.

References:
http://technet.microsoft.com/en-us/library/jj647766.aspx Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 2: Deploying servers, p. 80

138
Q

Your network contains an Active Directory domain named contoso.com. The domain contains an organizational unit (OU) named OU1.

You need to ensure that when new client computers join the domain, their computer accounts are created in OU1 by default.

What should you do?

Available Choices
A. From Windows PowerShell, run the Move-ADObjectcmdlet.

B.  From a command prompt, run the redircmp.exe command.

C.  From ADSI Edit, configure the properties of the OU1 object.

D.  From Ldp, configure the properties of the Computers container.
A

B. From a command prompt, run the redircmp.exe command.

Explanation:
Redirects the default container for newly created computers to a specified, target organizational unit (OU) so that newly created computer objects are created in the specific target OU instead of in CN=Computers.
The CN=Computers container is a computer-protected object. For backward compatibility reasons, you cannot (and must not) remove it.

References:
http://technet.microsoft.com/en-us/library/cc770619.aspx

139
Q

Your network contains an Active Directory domain named contoso.com.

You have a DHCP server named Server1 that runs Windows Server 2008.

You install Windows Server 2012 R2 on a server named Server2.You install the DHCP Server server role on Server2.

You need to migrate the DHCP services from Server1 to Server2. The solution must meet the following requirements:
Ensure that existing leases are migrated.
Prevent lease conflicts.

Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.)

Available Choices (select all choices that are correct)
    A.  On Server1, run the Export-DhcpServercmdlet.
B.  On Server1, run the Stop-Service cmdlet.

C.  On Server2, run the Receive-SmigServerDatacmdlet.

D.  On Server2, run the Stop-Service cmdlet.

E.  On Server2, run the Import-DhcpServercmdlet.

F.  On Server1, run the Send-SmigServerDatacmdlet.
A
Available Choices (select all choices that are correct)
    A.  On Server1, run the Export-DhcpServercmdlet.
B.  On Server1, run the Stop-Service cmdlet.

E.  On Server2, run the Import-DhcpServercmdlet.
140
Q

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1.Server1 runs Windows Server 2012 R2.

You create a group Managed Service Account named gservice1.

You need to configure a service named Service1 to run as the gservice1 account.

How should you configure Service1?

Available Choices
A. From the Services console, configure the General settings.

B.  From Windows PowerShell, run Set-Service and specify the -StartupType parameter.

C.  From a command prompt, run sc.exe and specify the config parameter.

D.  From a command prompt, run sc.exe and specify the privs parameter.
A

C. From a command prompt, run sc.exe and specify the config parameter.

141
Q

Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2012 R2.

The domain contains a user named User1 and a global security group named Group1.

You need to add a new domain controller to the domain.

You install Windows Server 2012 R2 on a new server named DC3.

Which cmdlet should you run next?

Available Choices
A. Add-AdPrincipalGroupMembership

B.  Install-AddsDomainController

C.  Install-WindowsFeature

D.  Install-AddsDomain

E.  Rename AdObject

F.  Set AdAccountControl

G. Set-AdGroup

H.  Set-User
A

C. Install-WindowsFeature

142
Q

Your network contains an Active Directory domain named adatum.com. The domain contains a server named Server1 that runs Windows Server 2012 R2.

On a server named Corel, you perform a Server Core Installation of Windows Server 2012 R2.You join Corel to the adatum.com domain.

You need to ensure that you can use Event Viewer on Server1 to view the event logs on Corel.

What should you do on Corel?

Available Choices
A. Run the Enable-NetFirewallRulecmdlet.

B.  Run the Disable-NetFirewallRulecmdlet.

C.  Install Windows Management Framework.

D.  Install Remote Server Administration Tools (RSAT).
A

Run the Enable-NetFirewallRulecmdlet.

143
Q
A
144
Q
A