70-411 Flashcards
Your network contains an Active Directory domain named contoso. com. The domain contains a server named Server1 that runs Windows Server 2012 R2.
Server1 has the following role services installed:
DirectAccess and VPN (RRAS)
Network Policy Server
Remote users have client computers that run either Windows XP, Windows 7, or Windows 8.
You need to ensure that only the client computers that run Windows 7 or Windows 8 can establish VPN connections to Server1.
What should you configure on Server1?
A - A condition of a Network Policy Server (NPS) network policy
B - A constraint of a Network Policy Server (NPS) network policy
C - a condition of a Network Policy Server (NPS) connection request policy
D - A vendor-specific RADIUS attribute of a Network Policy Server (NPS) connection request policy
A - A condition of a Network Policy Server (NPS) network policy
Explanation:
If you want to configure the Operating System condition, click Operating System, and then click Add. In Operating System Properties, click Add, and then specify the operating system settings that are required to match the policy.
The Operating System condition specifies the operating system (operating system version or service pack number), role (client or server), and architecture (x86, x64, or ia64) required for the computer configuration to match the policy.
You are a network administrator of an Active Directory domain named contoso. com.
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the DHCP Server server role and the Network Policy Server role service installed.
You enable Network Access Protection (NAP) on all of the DHCP scopes on Server1.
You need to create a DHCP policy that will apply to all of the NAP non-compliant DHCP clients. Which criteria should you specify when you create the DHCP policy?
The client identifier
The user class
The vendor class
The relay agent information
The user class
Your network contains an Active Directory domain named contoso. com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the Network Policy Server role service installed.
An administrator creates a RADIUS client template named Template1.
You create a RADIUS client named Client1 by using Template 1.
You need to modify the shared secret for Client1.
What should you do first?
Configure the Advanced settings of Template1.
Set the Shared secret setting of Template1 to Manual.
Clear Enable this RADIUS client for Client1.
Clear Select an existing template for Client1.
Clear Select an existing template for Client1.
Explanation:
Clear checkmark for Select an existing template in the new client wizard.
In New RADIUS Client, in Shared secret, do one of the following:
Ensure that Manual is selected, and then in Shared secret, type the strong password that is also entered on the RADIUS client. Retype the shared secret in Confirm shared secret.
Your network contains an Active Directory domain named contoso. com. All servers run Windows Server 2012 R2.
The domain contains a server named Server1 that has the Network Policy Server server role and the Remote Access server role installed. The domain contains a server named Server2 that is configured as a RADIUS server.
Server1 provides VPN access to external users.
You need to ensure that all of the VPN connections to Server1 are logged to the RADIUS server on Server2.
What should you run?
- Add-RemoteAccessRadius -ServerName Server1 -AccountingOnOffMsg Enabled -SharedSecret “Secret” -Purpose Accounting
- Set-RemoteAccessAccounting -AccountingOnOffMsg Enabled -AccountingOnOffMsg Enabled
- Add-RemoteAccessRadius -ServerName Server2 -AccountingOnOffMsg Enabled -SharedSecret “Secret” -Purpose Accounting
- Set-RemoteAccessAccounting -EnableAccountingType Inbox -AccountingOnOffMsg Enabled
Add-RemoteAccessRadius -ServerName Server2 -AccountingOnOffMsg Enabled -SharedSecret “Secret” -Purpose Accounting
Explanation:
Add-RemoteAccessRadius
Adds a new external RADIUS server for VPN authentication, accounting for DirectAccess (DA) and VPN, or one-time password (OTP) authentication for DA.
AccountingOnOffMsg<string><br></br>Indicates the enabled state for sending of accounting on or off messages. The acceptable values for this parameter are:<br></br>Enabled.<br></br>Disabled. This is the default value.<br></br>This parameter is applicable only when the RADIUS server is being added for Remote Access accounting.</string>
Your network contains four Network Policy Server (NPS) servers named Server1, Server2, Servers, and Server4.
Server1 is configured as a RADIUS proxy that forwards connection requests to a remote RADIUS server group named Group1.
You need to ensure that Server2 and Server3 receive connection requests. Server4 must only receive connection requests if both Server2 and Server3 are unavailable.
How should you configure Group1?
- Change the Weight of Server4 to 10.
- Change the Weight of Server2 and Server3 to 10.
- Change the Priority of Server2 and Server3 to 10.
- Change the Priority of Server4 to 10.
Change the Priority of Server4 to 10.
During the NPS proxy configuration process, you can create remote RADIUS server groups and then add RADIUS servers to each group. To configure load balancing, you must have more than one RADIUS server per remote RADIUS server group. While adding group members, or after creating a RADIUS server as a group member, you can access the Add RADIUS server dialog box to configure the following items on the Load Balancing tab:
Explanation:
Priority. Priority specifies the order of importance of the RADIUS server to the NPS proxy server. Priority level must be assigned a value that is an integer, such as 1, 2, or 3. The lower the number, the higher priority the NPS proxy gives to the RADIUS server. For example, if the RADIUS server is assigned the highest priority of 1, the NPS proxy sends connection requests to the RADIUS server first; if servers with priority 1 are not available, NPS then sends connection requests to RADIUS servers with priority 2, and so on. You can assign the same priority to multiple RADIUS servers, and then use the Weight setting to load balance between them.
Weight. NPS uses this Weight setting to determine how many connection requests to send to each group member when the group members have the same priority level. Weight setting must be assigned a value between 1 and 100, and the value represents a percentage of 100 percent. For example, if the remote RADIUS server group contains two members that both have a priority level of 1 and a weight rating of 50, the NPS proxy forwards 50 percent of the connection requests to each RADIUS server.
Advanced settings. These failover settingsprovide a way for NPS to determine whether the remote RADIUS server is unavailable. If NPS determines that a RADIUS server is unavailable, it can start sending connection requests to other group members. With these settings you can configure the number of seconds that the NPS proxy waits for a response from the RADIUS server before it considers the request dropped; the maximum number of dropped requests before the NPS proxy identifies the RADIUS server as unavailable; and the number of seconds that can elapse between requests before the NPS proxy identifies the RADIUS server as unavailable.
The default priority is 1 and can be changed from 1 to 65535. So changing server 2 and 3 to priority 10 is not the way to go.
http: //technet. microsoft. com/en-us/library/dd197433(WS. 10). aspx
Your network contains an Active Directory domain named adatum. com.
A network administrator creates a Group Policy central store.
After the central store is created, you discover that when you create new Group Policy objects (GPOs), the GPOs do not contain any Administrative Templates.
You need to ensure that the Administrative Templates appear in new GPOs.
What should you do?
- Add your user account to the Group Policy Creator Owners group.
- Configure all domain controllers as global catalog servers.
- Copy files from %Windir%\Policydefinitions to the central store.
- Modify the Delegation settings of the new GPOs.
Copy files from %Windir%\Policydefimtions to the central store.
Explanation:
To take advantage of the benefits of . admx files, you must create a Central Store in the SYSVOL folder on a domain controller. The Central Store is a file location that is checked by the Group Policy tools. The Group Policy tools use any . admx files that are in the Central Store. The files that are in the Central Store are later replicated to all domain controllers in the domain.
Your network contains an Active Directory domain named contoso. com. All domain controllers run Windows Server 2012 R2. The domain contains 500 client computers that run Windows 8 Enterprise.
You implement a Group Policy central store.
You have an application named App1. App1 requires that a custom registry setting be deployed to all of the computers.
You need to deploy the custom registry setting. The solution must minimize administrator effort.
What should you configure in a Group Policy object (GPO)?
- The Software Installation settings
- The Administrative Templates
- An application control policy
- The Group Policy preferences
The Group Policy preferences
Explanation:
Open the Group Policy Management Console . Right-click the Group Policy object (GPO) that should contain the new preference item, and then click Edit . In the console tree under Computer Configuration or User Configuration , expand the Preferences folder, and then expand the Windows Settings folder. Right-click the Registry node, point to New , and select Registry Item .
Group Policy preferences provide the means to simplify deployment and standardize configurations. They add to Group Policy a centralized system for deploying preferences (that is, settings that users can change later).
You can also use Group Policy preferences to configure applications that are not Group Policy-aware. By using Group Policy preferences, you can change or delete almost any registry setting, file or folder, shortcut, and more. You are not limited by the contents of Administrative Template files. The Group Policy Management
Editor (GPME) includes Group Policy preferences.
http: //technet. microsoft. com/en-us/library/gg699429. aspx http: //www. unidesk. com/blog/gpos-set-custom-registry-entries-virtual-desktops-disabling-machine- password
Your network contains two Active Directory forests named contoso. com and dev. contoso. com. The contoso. com forest contains a domain controller named DC1. The dev. contoso. com forest contains a domain controller named DC2. Each domain contains an organizational unit (OU) named OU1.
Dev. contoso. com has a Group Policy object (GPO) named GPO1. GPO1 contains 200 settings, including several settings that have network paths. GPO1 is linked to OU1.
You need to copy GPO1 from dev. contoso. com to contoso. com.
What should you do first on DC2?
- From the Group Policy Management console, right-click GPO1 and select Copy.
- Run the mtedit. exe command and specify the /Domaintcontoso. com /DC: DC 1 parameter.
- Run the Save-NetGpocmdlet
- Run the Backup-Gpocmdlet.
*
From the Group Policy Management console, right-click GPO1 and select Copy.
Explination:
To copy a Group Policy object:
In the GPMC console tree, right-click the GPO that you want to copy, and then click Copy.
To create a copy of the GPO in the same domain as the source GPO, right-click Group Policy objects , click Paste , specify permissions for the new GPO in the Copy GPO box, and then click OK .
For copy operations to another domain, you may need to specify a migration table.
The Migration Table Editor (MTE) is provided with Group Policy Management Console (GPMC) to facilitate the editing of migration tables. Migration tables are used for copying or importing Group Policy objects (GPOs) from one domain to another, in cases where the GPOs include domain-specific information that must be updated during copy or import.
Source WS2008R2: Backup the existing GPOs from the GPMC, you need to ensure that the “Group Policy Objects” container is selected for the “Backup Up All” option to be available.
Copy a Group Policy Object with the Group Policy Management Console (GPMC)
You can copy a Group Policy object (GPO) either by using the drag-and-drop method or right-click method.
Applies To: Windows 8, Windows Server 2008 R2, Windows Server 2012 Ref: http://technet.microsoft.com/en-us/library/cc785343(v=WS.10).aspx
http://technet.microsoft.com/en-us/library/cc733107.aspx
Your network contains an Active Directory domain named contoso. com. All servers run Windows Server 2012 R2.
Client computers run either Windows 7 or Windows 8. All of the client computers have an application named App1 installed.
The domain contains a Group Policy object (GPO) named GPO1 that is applied to all of the client computers.
You need to add a system variable named App1Data to all of the client computers.
Which Group Policy preference should you configure?
- Environment
- ini files
- Data Sources
- Services
Environment
Explanation:
Environment Variable preference items allow you to create, update, replace, and delete user and system environment variables or semicolon-delimited segments of the PATH variable. Before you create an Environment Variable preference item, you should review the behavior of each type of action possible with this extension.
Your network contains an Active Directory domain named contoso. com.
All user accounts reside in an organizational unit (OU) named OU1.
You create a Group Policy object (GPO) named GPO1. You link GPO1 to OU1. You configure the Group Policy preference of GPO1 to add a shortcut named Link1 to the desktop of each user. You discover that when a user deletes Link1, the shortcut is removed permanently from the desktop. You need to ensure that if a user deletes Link1, the shortcut is added to the desktop again.
What should you do?
- Enforce GPO1.
- Modify the Link1 shortcut preference of GPO1.
- Enable loopback processing in GPO1.
- Modify the Security Filtering settings of GPO1.
Modify the Link1 shortcut preference of GPO1.
Explanation:
Replace Delete and recreate a shortcut for computers or users. The net result of the Replace action is to overwrite the existing shortcut. If the shortcut does not exist, then the Replace action creates a new shortcut.
This type of preference item provides a choice of four actions: Create, Replace, Update, and Delete. The behavior of the preference item varies with the action selected and whether the shortcut already exists.
http: //technet. microsoft. com/en-us/library/cc753580. aspx http: //technet. microsoft. com/en-us/library/cc753580. aspx
You manage a server that runs Windows Server 2012 R2. The server has the Windows Deployment Services server role installed.
You have a desktop computer that has the following configuration:
Computer name: Computer1
Operating system: Windows 8
MAC address: 20-CF-30-65-D0-87
GUID: 979708BF-C04B-4525-9FE0-C4150BB6C618
You need to configure a pre-staged device for Computer1 in the Windows Deployment Services console.
Which two values should you assign to the device ID? (Each correct answer presents a complete solution. Choose two. )
Available Choices (select all choices that are correct) A. 20CF3065D08700000000000000000000
B. 979708BFC04B45259FE0C4150BB6C618 C. 979708BF-C04B-452S-9FE0-C4150BB6C618 D. 0000000000000000000020CF306SD087 E. 00000000-0000-0000-0000-C41S0BB6C618
C. 979708BF-C04B-452S-9FE0-C4150BB6C618
D. 0000000000000000000020CF306SD087
Explanation:
In the text box, type the client computer’s MAC address preceded with twenty zeros or the globally unique identifier (GUID) in the format: {XXXXXXXX-XXXX-XXXX-XXX-XXXXXXXXXXXX}.
* To add or remove pre-staged client to/from AD DS, specify the name of the computer or the device ID, which is a GUID, media access control (MAC) address, or Dynamic Host Configuration Protocol (DHCP) identifier associated with the computer.
* Example: Remove a device by using its ID from a specified domain This command removes the pre-staged device that has the specified ID. The cmdlet searches the domain named TSQA. Contoso. com for the device.
Windows PowerShell
PS C: \> Remove-WdsClient -DeviceID “5a7a1def-2e1f-4a7b-a792-ae5275b6ef92” -Domain -DomainName “TSQA. Contoso. com”
You have Windows Server 2012 R2 installation media that contains a file named Install. wim. You need to identify the permissions of the mounted images in Install. wim.
What should you do?
Available Choices
A. Run dism. exe and specify the /get-mountedwiminfo parameter.
B. Run imagex. exe and specify the /verify parameter. C. Run imagex. exe and specify the /ref parameter. D. Run dism. exe and specify the/get-imageinfo parameter.
Run dism. exe and specify the /get-mountedwiminfo parameter.
Explanation:
/Get-MountedWimInfo Lists the images that are currently mounted and information about the mounted image such as read/write permissions, mount location, mounted file path, and mounted image
index.
http: //technet. microsoft. com/en-us/library/cc749447(v=ws. 10). aspx
http: //technet. microsoft. com/en-us/library/dd744382(v=ws. 10). aspx
http: //technet. microsoft. com/en-us/library/hh825224. aspx
You have a server named Server1 that runs Windows Server 2012 R2. You create a Data Collector Set (DCS) named DCS1.
You need to configure DCS1 to log data to D: \logs.
What should you do?
Available Choices A. Right-click DCS1 and click Properties. B. Right-click DCS1 and click Export list. . . C. Right-click DCS1 and click Data Manager. . . D. Right-click DCS1 and click Save template. . .
Right-click DCS1 and click Properties.
Explanation:
The Root Directory will contain data collected by the Data Collector Set. Change this setting if you want to store your Data Collector Set data in a different location than the default. Browse to and select the directory, or type the directory name.
To view or modify the properties of a Data Collector Set after it has been created, you can:
* Select the Open properties for this data collector set check box at the end of the Data Collector Set Creation Wizard.
* Right-click the name of a Data Collector Set, either in the MMC scope tree or in the console window, and click Properties in the context menu.
Directory tab:
In addition to defining a root directory for storing Data Collector Set data, you can specify a single Subdirectory or create a Subdirectory name format by clicking the arrow to the right of the text entry field.
Your network contains an Active Directory domain named adatum. com. The domain contains a member server named Server1 and 10 web servers. All of the web servers are in an organizational unit (OU) named WebServers_OU. All of the servers run Windows Server 2012 R2.
On Server1, you need to collect the error events from all of the web servers. The solution must ensure that when new web servers are added to WebServers_OU, their error events are collected automatically on Server1.
What should you do?
Available Choices
A. On Server1, create a source computer initiated subscription. From a Group Policy object (GPO), configure the Configure target Subscription Manager setting.
B. On Server1, create a source computer initiated subscription. From a Group Policy object (GPO), configure the Configure forwarder resource usage setting. C. On Server1, create a collector initiated subscription. From a Group Policy object (GPO), configure the Configure forwarder resource usage setting. D. On Server1, create a collector initiated subscription. From a Group Policy object (GPO), configure the Configure target Subscription Manager setting.
A. On Server1, create a source computer initiated subscription. From a Group Policy object (GPO), configure the Configure target Subscription Manager setting.
Explanation:
Source-initiated subscriptions allow you to define a subscription on an event collector computer without defining the event source computers, and then multiple remote event source computers can be set up (using a group policy setting) to forward events to the event collector computer. This differs from a collector initiated subscription because in the collector initiated subscription model, the event collector must define all the event sources in the event subscription.
1. Run the following command from an elevated privilege command prompt on the Windows Server domain controller to configure Windows Remote Management: winrm qc -q
2. Start group policy by running the following command: %SYSTEMROOT%\System32\gpedit. msc
3. Under the Computer Configuration node, expand the Administrative Templates node, then expand the Windows Components node, then select the Event Forwarding node.
4. Right-click the SubscriptionManager setting, and select Properties. Enable the SubscriptionManager setting, and click the Show button to add a server address to the setting. Add at least one setting that specifies the event collector computer. The SubscriptionManager Properties window contains an Explain tab that describes the syntax for the setting.
5. After the SubscriptionManager setting has been added, run the following command to ensure the policy is applied: gpupdate /force.
If you want to configure a source computer-initiated subscription, you need to configure the following group policies on the computers that will act as the event forwarders:
* (A) Configure Target Subscription Manager This policy enables you to set the location of the collector computer.
Your network contains a Hyper-V host named Hyperv1. Hyperv1 runs Windows Server 2012 R2. Hyperv1 hosts four virtual machines named VM1, VM2, VM3, and VM4. AH of the virtual machines run Windows Server 2008 R2.
You need to view the amount of memory resources and processor resources that VM4 currently uses.
Which tool should you use on Hyperv1?
Available Choices A. Windows System Resource Manager (WSRM) B. Task Manager C. Hyper-V Manager D. Resource Monitor
C. Hyper-V Manager
Explanation:
Hyper-V Performance Monitoring Tool
Know which resource is consuming more CPU. Find out if CPUs are running at full capacity or if they are being underutilized. Metrics tracked include Total CPU utilization, Guest CPU utilization, Hypervisor CPU utilization, idle CPU utilization, etc.
WSRM is deprecated starting with Windows Server 2012
Your network contains an Active Directory domain named contoso. com. The domain contains a member server named Server1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed.
Server1 hosts 10 virtual machines. A virtual machine named VM1 runs Windows Server 2012 R2 and hosts a processor-intensive application named App1.
Users report that App1 responds more slowly than expected. You need to monitor the processor usage on VM1 to identify whether changes must be made to the hardware settings of VM1.
Which performance object should you monitor on Server1?
Available Choices
A. Processor
B. Hyper-V Hypervisor Virtual Processor C. Hyper-V Hypervisor Logical Processor D. Hyper-V Hypervisor Root Virtual Processor E. Process
C. Hyper-V Hypervisor Logical Processor
Explanation:
In the simplest way of thinking the virtual processor time is cycled across the available logical processors in a round-robin type of fashion. Thus all the processing power gets used over time, and technically nothing ever sits idle.
To accurately measure the processor utilization of a guest operating system, use the “\Hyper-V Hypervisor Logical Processor(_Total)\% Total Run Time” performance monitor counter on the Hyper- V host operating system.
Your network contains an Active Directory domain named contoso. com. All servers run Windows Server 2012 R2. The functional level of both the domain and the forest is Windows Server 2008 R2.
The domain contains a domain-based Distributed File System (DFS) namespace that is configured as shown in the exhibit. (Click the Exhibit button. )
You need to enable access-based enumeration on the DFS namespace.
What should you do first?
Available Choices
A. Raise the domain functional level.
B. Raise the forest functional level. C. Install the File Server Resource Manager role service on Server3 and Server5. D. Delete and recreate the namespace.
D. Delete and recreate the namespace.
Access-based enumeration is only supported on a Domain-based Namespace in Windows Server 2008 Mode. This type of Namespace requires a minimum Windows Server 2003 forest functional level and a minimum Windows Server 2008 domain functional level.
The exhibit indicates that the current namespace is a Domain-based Namespace in Windows Server 2000 Mode. To migrate a domain-based namespace from Windows 2000 Server mode to Windows Server 2008 mode, you must export the namespace to a file, delete the namespace, recreate it in Windows Server 2008 mode, and then import the namespace settings.
Ref: http://msdn.microsoft.com/en-us/library/cc770287.aspx
http://msdn.microsoft.com/en-us/library/cc753875.aspx
Your network contains an Active Directory domain named contoso. com. The domain contains a server named Server1 that runs Windows Server 2012 R2.
A local account named Admin1 is a member of the Administrators group on Server1.
You need to generate an audit event whenever Admin1 is denied access to a file or folder.
What should you run?
Available Choices (select all choices that are correct) A. auditpol. exe /set /userradmin1 /failure: enable
B. auditpol. exe /set /user: admin1 /category: "detailed tracking" /failure: enable C. auditpol. exe /resourcesacl /set /type: file /user: admin1 /failure D. auditpol. exe /resourcesacl /set /type: key /user: admin1 /failure /access: ga
auditpol. exe /resourcesacl /set /type: file /user: admin1 /failure
Explanation:
http: //technet. microsoft. com/en-us/library/ff625687. aspx To set a global resource SACL to audit successful and failed attempts by a user to perform generic read and write functions on files or folders:
auditpol /resourceSACL /set /type: File /user: MYDOMAINmyuser /success /failure /access: FRFW http: //technet. microsoft. com/en-us/library/ff625687%28v=ws. 10%29. aspx Syntax
auditpol /resourceSACL
[/set /type: <resource> [/success] [/failure] /user: <user> [/access: <access>]] [/remove /type: <resource> /user: <user> [/type: <resource>]] [/clear [/type: <resource>]]<br></br>[/view [/user: <user>] [/type: <resource>]]<br></br>http: //technet. microsoft. com/en-us/library/ff625687%28v=ws. 10%29. aspx http: //technet. microsoft. com/en-us/library/ff625687%28v=ws. 10%29. aspx http: //technet. microsoft. com/en-us/library/ff625687. aspx http: //technet. microsoft. com/en-us/library/ff625687%28v=ws. 10%29. aspx</resource></user></resource></resource></user></resource></access></user></resource>
You have a server named Server1 that runs Windows Server 2012 R2. An administrator creates a quota as shown in the Quota exhibit. (Click the Exhibit button. )
You run the dir command as shown in the Dir exhibit. (Click the Exhibit button. )
You need to ensure that D: \Folder1 can only consume 100 MB of disk space.
What should you do?
Available Choices
A. From File Server Resource Manager, create a new quota.
B. From File Server Resource Manager, edit the existing quota. C. From the Services console, set the Startup Type of the Optimize drives service to Automatic. D. From the properties of drive D, enable quota management.
A. From File Server Resource Manager, create a new quota.
Explanation:
1. In Quota Management, click the Quota Templates node.
2. In the Results pane, select the template on which you will base your new quota.
3. Right-click the template and click Create Quota from Template (or select Create Quota from Template from the Actions pane). This opens the Create Quota dialog box with the summary properties of the quota template displayed.
4. Under Quota path, type or browse to the folder that the quota will apply to.
5. Click the Create quota on path option. Note that the quota properties will apply to the entire folder.
Note
To create an auto apply quota, click the Auto apply template and create quotas on existing and new subfolders option. For more information about auto apply quotas, see Create an Auto Apply Quota.
6. Under Drive properties from this quota template, the template you used in step 2 to create your new quota is preselected (or you can select another template from the list). Note that the template’s properties are displayed under Summary of quota properties.
7. Click Create.
Create a new Quota on path, without using the auto apply template and create quota on existing and new subfolders.
http: //technet. microsoft. com/en-us/library/cc755603(v=ws. 10). aspx
Your company has a main office and two branch offices. The main office is located in New York. The branch offices are located in Seattle and Chicago.
The network contains an Active Directory domain named contoso. com. An Active Directory site exists for each office. Active Directory site links exist between the main office and the branch offices. All servers run Windows Server 2012 R2.
The domain contains three file servers. The file servers are configured as shown in the following table.
You implement a Distributed File System (DFS) replication group named ReplGroup.
ReplGroup is used to replicate a folder on each file server. ReplGroup uses a hub and spoke topology.
NYC-SVR1 is configured as the hub server.
You need to ensure that replication can occur if NYC-SVR1 fails.
What should you do?
Available Choices
A. Create an Active Directory site link bridge.
B. Create an Active Directory site link.
C. Modify the properties of Rep1Group. D. Create a connection in Rep1Group.
Create a connection in Rep1Group.
Explination:
The Bridge all site links option in Active Directory must be enabled. (This option is available in the Active Directory Sites and Services snap-in. ) Turning off Bridge all site links can affect the ability of DFS to refer client computers to target computers that have the least expensive connection cost. An Intersite Topology Generator that is running Windows Server 2003 relies on the Bridge all site links option being enabled to generate the intersite cost matrix that DFS requires for its site-costing functionality. If you turn off this option, you must create site links between the Active Directory sites for which you want DFS to calculate accurate site costs.
Any sites that are not connected by site links will have the maximum possible cost. For more information about site link bridging, see “Active Directory Replication Topology Technical Reference.
“
Your network contains an Active Directory domain named contoso. com. The domain contains a file server named Server1 that runs Windows Server 2012 R2. Server1 has a share named Share1.
When users without permission to Share1 attempt to access the share, they receive the Access Denied message as shown in the exhibit. (Click the Exhibit button. )
You deploy a new file server named Server2 that runs Windows Server 2012 R2.
You need to configure Server2 to display the same custom Access Denied message as Server1.
What should you install on Server2?
Available Choices
A. The Remote Assistance feature
B. The Storage Services server role C. The File Server Resource Manager role service D. The Enhanced Storage feature
C. The File Server Resource Manager role service
Explanation:
Access-Denied Assistance is a new role service of the File Server role in Windows Server 2012.
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the File Server Resource Manager role service installed.
Each time a user receives an access-denied message after attempting to access a folder on Server1, an email notification is sent to a distribution list named DL1.
You create a folder named Folder1 on Server1, and then you configure custom NTFS permissions for Folder1.
You need to ensure that when a user receives an access-denied message while attempting to access Folder1, an email notification is sent to a distribution list named DL2. The solution must not prevent DL1 from receiving notifications about other access-denied messages.
What should you do?
Available Choices
A. From Server Manager, run the New Share Wizard to create a share for Folder1 by selecting the SMB Share - Advanced option.
B. From the File Server Resource Manager console, modify the Access-Denied Assistance settings. C. From the File Server Resource Manager console, modify the Email Notifications settings. D. From Server Manager, run the New Share Wizard to create a share for Folder1 by selecting the SMB Share -Applications option.
From the File Server Resource Manager console, modify the Email Notifications settings.
Explanation:
Configure the email notification settings
You must configure the email notification settings on each file server that will send the access-denied assistance messages.
- Open File Server Resource Manager. In Server Manager, click Tools, and then click File Server Resource Manager.
- Right-click File Server Resource Manager (Local), and then click Configure Options.
- Click the Email Notifications tab.
- Configure the following settings:
In the SMTP server name or IP address box, type the name of IP address of the SMTP server in your organization.
In the Default administrator recipients and Default “From” e-mail address boxes, type the email address of the file server administrator.
- Click Send Test E-mail to ensure that the email notifications are configured correctly.
Click OK.
Ref: http://technet.microsoft.com/en-us/library/cc754526.aspx
Your network contains an Active Directory domain named contoso. com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2. DC1 is backed up daily.
The domain has the Active Directory Recycle Bin enabled.
During routine maintenance, you delete 500 inactive user accounts and 100 inactive groups. One of the deleted groups is named Group1. Some of the deleted user accounts are members of some of the deleted groups.
For documentation purposes, you must provide a list of the members of Group1 before the group was deleted.
You need to identify the names of the users who were members of Group1 prior to its deletion.
You want to achieve this goal by using the minimum amount of administrative effort.
What should you do first?
Available Choices
A. Mount the most recent Active Directory backup.
B. Reactivate the tombstone of Group1. C. Perform an authoritative restore of Group1. D. Use the Recycle Bin to restore Group1.
Mount the most recent Active Directory backup.
Explanation:
The Active Directory Recycle Bin does not have the ability to track simple changes to objects. If the object itself is not deleted, no element is moved to the Recycle Bin for possible recovery in the future. In other words, there is no rollback capacity for changes to object properties, or, in other words, to the values of these properties.
Your network contains an Active Directory domain named contoso. com. The domain contains six domain controllers. The domain controllers are configured as shown in the following table.
The network contains a server named Server1 that has the Hyper-v server role installed. DC6 is a virtual machine that is hosted on Server1.
You need to ensure that you can clone DC6.
Which FSMO role should you transfer to DC2?
Available Choices
A. Rid master
B. Domain naming master C. PDC emulator D. Infrastructure master
PDC Emulator
Explanation:
The clone domain controller uses the security context of the source domain controller (the domain controller whose copy it represents) to contact the Windows Server 2012 R2 Primary Domain Controller (PDC) emulator operations master role holder (also known as flexible single master operations, or FSMO). The PDC emulator must be running Windows Server 2012 R2, but it does not have to be running on a hypervisor.
http: //technet. microsoft. com/en-us/library/hh831734. aspx
Your network contains an Active Directory domain named contoso. com. All domain controllers run either Windows Server 2008 or Windows Server 2008 R2.
You deploy a new domain controller named DC1 that runs Windows Server 2012 R2.
You log on to DC1 by using an account that is a member of the Domain Admins group.
You discover that you cannot create Password Settings objects (PSOs) by using Active Directory Administrative Center.
You need to ensure that you can create PSOs from Active Directory Administrative Center.
What should you do?
Available Choices
A. Modify the membership of the Group Policy Creator Owners group.
B. Transfer the PDC emulator operations master role to DC1. C. Upgrade all of the domain controllers that run Window Server 2008. D. Raise the functional level of the domain.
Raise the functional level of the domain.
Explanation:
Fine-grained password policies allow you to specify multiple password policies within a single domain so that you can apply different restrictions for password and account lockout policies to different sets of users in a domain. To use a fine-grained password policy, your domain functional level must be at least Windows Server 2008. To enable fine-grained password policies, you first create a Password Settings Object (PSO). You then configure the same settings that you configure for the password and account lockout policies. You can create and apply PSOs in the Windows Server 2012 environment by using the Active Directory Administrative Center (ADAC) or Windows PowerShell.
Step 1: Create a PSO
Applies To: Windows Server 2008, Windows Server 2008 R2
http: //technet. microsoft. com/en-us//library/cc754461%28v=ws. 10%29. aspx
Your network contains an Active Directory forest named contoso. com. The functional level of the forest is Windows Server 2008 R2.
All of the user accounts in the marketing department are members of a group named Contoso\MarketingUsers. All of the computer accounts in the marketing department are members of a group named Contoso\MarketingComputers.
A domain user named User1 is a member of the Contoso\MarketingUsers group. A computer named Computer1 is a member of the Contoso\MarketingComputers group. You have five Password Settings objects (PSOs). The PSOs are defined as shown in the following table.
When User1 logs on to Computer1 and attempts to change her password, she receives an error message indicating that her password is too short.
You need to tell User1 what her minimum password length is.
What should you tell User1?
(Note: JUST MEMORIZE THIS ONE IT MAKES NO SENSE EVEN WITH THE PICTURE)
Available Choices
A. 10
B. 11 C. 12 D. 14
10
Explanation:
One PSO has a precedence value of 2 and the other PSO has a precedence value of 4. In this case, the PSO that has the precedence value of 2 has a higher rank and, hence, is applied to the object.
Your network contains an Active Directory domain named contoso. com. The Active Directory Recycle bin is enabled for contoso. com.
A support technician accidentally deletes a user account named User1. You need to restore the User1 account.
Which tool should you use?
Available Choices
A. Ldp
B. Esentutl C. Active Directory Administrative Center D. Ntdsutil
Active Directory Administrative Center
Your network contains an Active Directory forest named contoso. com. The forest contains a single domain. All domain controllers run Windows Server 2012 R2.
The domain contains two domain controllers. The domain controllers are configured as shown in the following table.
Active Directory Recycle Bin is enabled.
You discover that a support technician accidentally removed 100 users from an Active Directory group named Group1 an hour ago.
You need to restore the membership of Group1.
What should you do?
Available Choices A. Recover the items by using Active Directory Recycle Bin. B. Modify the is Recycled attribute of Group1. C. Perform tombstone reanimation. D. Perform an authoritative restore.
Recover the items by using Active Directory Recycle Bin.
Explanation:
Active Directory Recycle Bin helps minimize directory service downtime by enhancing your ability to preserve and restore accidentally deleted Active Directory objects without restoring Active Directory data from backups, restarting Active Directory Domain Services (AD DS), or rebooting domain controllers.
When you enable Active Directory Recycle Bin, all link-valued and non-link-valued attributes of the deleted Active Directory objects are preserved and the objects are restored in their entirety to the same consistent logical state that they were in immediately before deletion. For example, restored user accounts automatically regain all group memberships and corresponding access rights that they had immediately before deletion, within and across domains.
Your network contains an Active Directory domain named contoso. com. The domain contains a read- only domain controller (RODC) named RODC1.
You create a global group named RODC_Admins.
You need to provide the members of RODC_Admins with the ability to manage the hardware and the software on R0DC1. The solution must not provide RODC_Admins with the ability to manage Active Directory objects.
What should you do?
Available Choices
A. From Active Directory Site and Services, configure the Security settings of the RODC1 server object.
B. From Windows PowerShell, run the Set-ADAccountControlcmdlet. C. From a command prompt, run the dsmgmt local roles command. D. From Active Directory Users and Computers, configure the Member Of settings of the RODC1 account.
From a command prompt, run the dsmgmt local roles command.
Explanation:
RODC: using the dsmgmt. exe utility to manage local administrators One of the benefits of of RODC is that you can add local administrators who do not have full access to the domain administration. This gives them the abiltiy to manage the server but not add or change active directory objects unless those roles are delegated. Adding this type of user is done using the dsmdmt. exe utility at the command prompt.
Your network contains an Active Directory domain named contoso. com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2.
You create an Active Directory snapshot of DC1 each day.
You need to view the contents of an Active Directory snapshot from two days ago.
What should you do first?
Available Choices
A. Run the dsamain. exe command.
B. Stop the Active Directory Domain Services (AD DS) service. C. Start the Volume Shadow Copy Service (VSS). D. Run the ntdsutil. exe command.
Run the dsamain. exe command.
Dsamain.exe exposes Active Directory data that is stored in a snapshot or backup as a Lightweight Directory Access Protocol (LDAP) server.
Ref: http://technet.microsoft.com/en-us/library/cc772168.aspx
Your network contains an Active Directory domain named contoso. com. All domain controllers run Windows Server 2012 R2.
In a remote site, a support technician installs a server named DC10 that runs Windows Server 2012 R2.
DC10 is currently a member of a workgroup.
You plan to promote DC10 to a read-only domain controller (RODC).
You need to ensure that a user named Contoso\User1 can promote DC10 to a RODC in the contoso. com domain. The solution must minimize the number of permissions assigned to User1.
What should you do?
Available Choices A. From Active Directory Users and Computers, run the Delegation of Control Wizard on the contoso. com domain object. B. From Active Directory Administrative Center, pre-create an RODC computer account. C. From Ntdsutil, run the local roles command. D. Join DC10 to the domain. Run dsmod and specify the /server switch.
From Active Directory Administrative Center, pre-create an RODC computer account.
Explanation:
A staged read only domain controller (RODC) installation works in two discrete phases:
1. Staging an unoccupied computer account
2. Attaching an RODC to that account during promotion
Reference: Install a Windows Server 2012 R2 Active Directory Read-Only Domain Controller (RODC)
Your network contains an Active Directory domain named contoso. com. The domain contains more than 100 Group Policy objects (GPOs). Currently, there are no enforced GPOs.
You have two GPOs linked to an organizational unit (OU) named OU1.
You need to change the precedence order of the GPOs.
What should you use?
Available Choices
A. Dcgpofix
B. Get-GPOReport C. Gpfixup D. Gpresult E. Gpedit. msc F. Import-GPO G. Restore-GPO H. Set-GPInheritance I. Set-GPLink J. Set-GPPermission K. Gpupdate L. Add-ADGroupMember
Set-GPLink
Your network contains an Active Directory domain named contoso. com. The domain contains more than 100 Group Policy objects (GPOs). Currently, there are no enforced GPOs.
A network administrator accidentally deletes the Default Domain Policy GPO.
You do not have a backup of any of the GPOs.
You need to recreate the Default Domain Policy GPO.
What should you use?
Available Choices
A. Dcgpofix
B. Get-GPOReport C. Gpfixup D. Gpresult E. Gpedit. msc F. Import-GPO G. Restore-GPO H. Set-GPInheritance I. Set-GPLink J. Set-GPPermission K. Gpupdate L. Add-ADGroupMember
A. Dcgpofix
Explanation:
Dcgpofix
Restores the default Group Policy objects to their original state (that is, the default state after initial installation).
http: //technet. microsoft. com/en-us/library/hh875588(v=ws. 10). aspx
Your network contains an Active Directory domain named contoso. com. The domain contains more than 100 Group Policy objects (GPOs). Currently, there are no enforced GPOs. The domain contains a top-level organizational unit (OU) for each department. A group named Group1 contains members from each department.
You have a GPO named GPO1 that is linked to the domain.
You need to configure GPO1 to apply settings to Group1 only.
What should you use?
Available Choices
A. Dcgpofix
B. Get-GPOReport C. Gpfixup D. Gpresult E. Gpedit. msc F. Import-GPO G. Restore-GPO H. Set-GPInheritance I. Set-GPLink J. Set-GPPermission K. Gpupdate L. Add-ADGroupMember
Set-GPPermission
Explanation:
Set-GPPermission grants a level of permissions to a security principal (user, security group, or computer) for one GPO or all the GPOs in a domain. You use the TargetName and TargetType parameters to specify a user, security group, or computer for which to set the permission level.
-Replace <switchparameter><br></br>Specifies that the existing permission level for the group or user is removed before the new permission level is set. If a security principal is already granted a permission level that is higher than the specified permission level and you do not use the Replace parameter, no change is made.</switchparameter>
http: //technet. microsoft. com/en-us/library/ee461038. aspx
Your network contains an Active Directory domain named contoso. com. The domain contains more than 100 Group Policy objects (GPOs). Currently, there are no enforced GPOs.
The domain is renamed to adatum. com.
Group Policies no longer function correctly.
You need to ensure that the existing GPOs are applied to users and computers. You want to achieve this goal by using the minimum amount of administrative effort.
What should you use?
Available Choices
A. Dcgpofix
B. Get-GPOReport C. Gpfixup D. Gpresult E. Gpedit. msc F. Import-GPO G. Restore-GPO H. Set-GPInheritance I. Set-GPLink J. Set-GPPermission K. Gpupdate L. Add-ADGroupMember
Gpfixup
Explanation:
You can use the gpfixup command-line tool to fix the dependencies that Group Policy objects (GPOs) and Group Policy links in Active Directory Domain Services (AD DS) have on Domain Name System (DNS) and NetBIOS names after a domain rename operation.
http: //technet. microsoft. com/en-us/library/hh852336(v=ws. 10). aspx
Your network contains an Active Directory domain named contoso. com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Remote Access server role installed.
You log on to Server1 by using a user account named User2.
From the Remote Access Management Console, you run the Getting Started Wizard and you receive a warning message as shown in the exhibit. (Click the Exhibit button. )
You need to ensure that you can configure DirectAccess successfully. The solution must minimize the number of permissions assigned to User2.
To which group should you add User2?
Available Choices
A. Enterprise Admins
B. Administrators C. Account Operators D. Server Operators
B. Administrators
Explanation:
You must have privileges to create WMI filters in the domain in which you want to create the filter. Permissions can be changed by adding a user to the Administrators group.
Administrators (A built-in group)
After the initial installation of the operating system, the only member of the group is the Administrator account. When a computer joins a domain, the Domain Admins group is added to the Administrators group. When a server becomes a domain controller, the Enterprise Admins group also is added to the Administrators group. The Administrators group has built-in capabilities that give its members full control over the system. The group is the default owner of any object that is created by a member of the group.
This example logs in as a test user who is not a domain user or an administrator on the server. This results in the error specifying that DA can only be configured by a user with local administrator permissions.
Ref: http://technet.microsoft.com/en-us/library/cc780416(v=ws.10).aspx
http://technet.microsoft.com/en-us/library/cc775497(v=ws.10).aspx
Your network contains an Active Directory domain named contoso. com.
You need to install and configure the Web Application Proxy role service.
What should you do?
Available Choices
A. Install the Active Directory Federation Services server role and the Remote Access server role on different servers.
B. Install the Active Directory Federation Services server role and the Remote Access server role on the same server. C. Install the Web Server (IIS) server role and the Application Server server role on the same server. D. Install the Web Server (IIS) server role and the Application Server server role on different servers.
Install the Active Directory Federation Services server role and the Remote Access server role on different servers
Web Application Proxy is a new Remote Access role service in Windows Server® 2012 R2.
Your network contains an Active Directory domain named contoso. com. The domain contains a server named Server1. Server1 is configured as a VPN server.
You need to configure Server1 to perform network address translation (NAT).
What should you do?
Available Choices
A. From Network Connections, modify the Internet Protocol Version 4 (TCP/IPv4) setting of each network adapter.
B. From Network Connections, modify the Internet Protocol Version 6 (TCP/IPv6) setting of each network adapter. C. From Routing and Remote Access, add an IPv6 routing protocol. D. From Routing and Remote Access, add an IPv4 routing protocol.
D. From Routing and Remote Access, add an IPv4 routing protocol.
Explanation:
To configure an existing RRAS server to support both VPN remote access and NAT routing:
1. Open Server Manager.
2. Expand Roles, and then expand Network Policy and Access Services.
3. Right-click Routing and Remote Access, and then click Properties.
4. Select IPv4 Remote access Server or IPv6 Remote access server, or both.
You have a DNS server named Served that has a Server Core Installation on Windows Server 2012 R2.
You need to view the time-to-live (TTL) value of a name server (NS) record that is cached by the DNS Server service on Server1.
What should you run?
Available Choices A. Show-DNSServerCache B. nslookup. exe C. ipconfig. exe /displaydns D. dnscacheugc. exe
Show-DNSServerCache
Explanation:
The Show-DNSServerCache shows all cached Domain Name System (DNS) server resource records in the following format: Name, ResourceRecordData, Time-to-Live (TTL).
You have a DNS server named DN51 that runs Windows Server 2012 R2.
On DNS1, you create a standard primary DNS zone named adatum. com.
You need to change the frequency that secondary name servers will replicate the zone from DNS1.
Which type of DNS record should you modify?
Available Choices
A. Name server (NS)
B. Start of authority (SOA) C. Host information (HINFO) D. Service location (SRV)
Start of authority (SOA)
Explanation:
The time to live is specified in the Start of Authority (SOA) record Note: TTL (time to live) - The number of seconds a domain name is cached locally before expiration and return to authoritative nameservers for updated information.
Your network contains an Active Directory domain named contoso. com. The domain contains three servers. The servers are configured as shown in the following table.
You need to ensure that end-to-end encryption is used between clients and Server2 when the clients connect to the network by using DirectAccess.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two. )
Available Choices (select all choices that are correct) A. From the Remote Access Management Console, reload the configuration.
B. Add Server2 to a security group in Active Directory. C. Restart the IPSec Policy Agent service on Server2. D. From the Remote Access Management Console, modify the Infrastructure Servers settings. E. From the Remote Access Management Console, modify the Application Servers settings.
Add Server2 to a security group in Active Directory.
From the Remote Access Management Console, modify the Application Servers settings.
Explanation:
Unsure about these answers.
A public key infrastructure must be deployed.
Windows Firewall must be enabled on all profiles.
ISATAP in the corporate network is not supported. If you are using ISATAP, you should remove it and use native IPv6.
Computers that are running the following operating systems are supported as DirectAccess clients:
Windows Server® 2012 R2
Windows 8. 1 Enterprise
Windows Server® 2012
Windows 8 Enterprise
Windows Server® 2008 R2
Windows 7 Ultimate
Windows 7 Enterprise
Force tunnel configuration is not supported with KerbProxy authentication. Changing policies by using a feature other than the DirectAccess management console or Windows PowerShell cmdlets is not supported.
Separating NAT64/DNS64 and IPHTTPS server roles on another server is not supported.
Your network contains an Active Directory forest. The forest contains two domains named contoso. com and fabrikam. com. All of the DNS servers in both of the domains run Windows Server 2012 R2.
The network contains two servers named Server1 and Server2. Server1 hosts an Active Directory- integrated zone for contoso. com. Server2 hosts an Active Directory-integrated zone for fabrikam. com. Server1 and Server2 connect to each other by using a WAN link.
Client computers that connect to Server1 for name resolution cannot resolve names in fabnkam. com.
You need to configure Server1 to support the resolution of names in fabnkam. com. The solution must ensure that users in contoso. com can resolve names in fabrikam. com if the WAN link fails.
What should you do on Server1?
Available Choices
A. Create a stub zone.
B. Add a forwarder. C. Create a secondary zone. D. Create a conditional forwarder.
Create a secondary zone.
Explanation:
http: //technet. microsoft. com/en-us/library/cc771898. aspx When a zone that this DNS server hosts is a secondary zone, this DNS server is a secondary source for information about this zone. The zone at this server must be obtained from another remote DNS server computer that also hosts the zone
With secondary, you have ability to resolve records from the other domain even if its DNS servers are temporarily unavailable
While secondary zones contain copies of all the resource records in the corresponding zone on the master name server, stub zones contain only three kinds of resource records:
A copy of the SOA record for the zone.
Copies of NS records for all name servers authoritative for the zone. Copies of A records for all name servers authoritative for the zone. http: //www. windowsnetworking. com/articles-tutorials/windows-2003/DNS_Stub_Zones. html
http: //technet. microsoft. com/en-us/library/cc771898. aspx
http: //redmondmag. com/Articles/2004/01/01/The-Long-and-Short-of-Stub-Zones. aspx?Page=2
Your network contains two servers named Server1 and Server2. Both servers run Windows Server 2012 R2 and have the DNS Server server role installed.
On Server1, you create a standard primary zone named contoso. com.
You need to ensure that Server2 can host a secondary zone for contoso. com.
What should you do from Server1?
Available Choices
A. Add Server2 as a name server.
B. Create a trust anchor named Server2. C. Convert contoso. com to an Active Directory-integrated zone. D. Create a zone delegation that points to Server2.
Add Server2 as a name server.
Explanation:
Typically, adding a secondary DNS server to a zone involves three steps:
1. On the primary DNS server, add the prospective secondary DNS server to the list of name servers that are authoritative for the zone.
2. On the primary DNS server, verify that the transfer settings for the zone permit the zone to be transferred to the prospective secondary DNS server.
3. On the prospective secondary DNS server, add the zone as a secondary zone.
You must add a new Name Server. To add a name server to the list of authoritative servers for the zone, you must specify both the server’s IP address and its DNS name. When entering names, click Resolve to resolve the name to its IP address prior to adding it to the list. Secondary zones cannot be AD-integrated under any circumstances.
You want to be sure Server2 can host, you do not want to delegate a zone.
Secondary Domain Name System (DNS) servers help provide load balancing and fault tolerance. Secondary DNS servers maintain a read-only copy of zone data that is transferred periodically from the primary DNS server for the zone. You can configure DNS clients to query secondary DNS servers instead of (or in addition to) the primary DNS server for a zone, reducing demand on the primary server and ensuring that DNS queries for the zone will be answered even if the primary server is not available.
How-To: Configure a secondary DNS Server in Windows Server 2012 We need to tell our primary DNS that it is ok for this secondary DNS to pull information from it. Otherwise replication will fail and you will get this big red X.
Head over to your primary DNS server, launch DNS manager, expand Forward Lookup Zones, navigate to your primary DNS zone, right-click on it and go to Properties.
Go to “Zone Transfers” tab, by default, for security reasons, the “Allow zone transfers: “ is un-checked to protect your DNS information. We need to allow zone transfers, if you value your DNS records, you do not want to select “To any server” but make sure you click on “Only to servers listed on the Name Servers tab”
Head over to the “Name Servers” tab, click Add
You will get “New Name Server Record” window, type in the name of your secondary DNS server. it is always better to validate by name not IP address to avoid future problems in case your IP addresses change. Once done, click OK.
You will see your secondary DNS server is now added to your name servers selection, click OK.
Now if you head back to to your secondary DNS server and refresh, the big red X will go away and your primary zone data will populate
Your secondary DNS is fully setup now. You can not make any DNS changes from your secondary DNS. Secondary DNS is a read-only DNS, Any DNS changes have to be done from the primary DNS.
http: //technet. microsoft. com/en-us/library/cc816885%28v=ws. 10%29. aspx http: //technet. microsoft. com/en-us/library/cc816814%28v=ws. 10%29. aspx http: //blog. hyperexpert. com/how-to-configure-a-secondary-dns-server-in-windows-server-2012/ http: //technet. microsoft. com/en-us/library/cc770984. aspx http: //support. microsoft. com/kb/816101
http: //technet. microsoft. com/en-us/library/cc753500. aspx http: //technet. microsoft. com/en-us/library/cc771640(v=ws. 10). aspx http: //technet. microsoft. com/en-us/library/ee649280(v=ws. 10). aspx
Your network contains an Active Directory domain named contoso. com. The domain contains a Web server named www. contoso. com. The Web server is available on the Internet.
You implement DirectAccess by using the default configuration. You need to ensure that users never attempt to connect to www. contoso. com by using DirectAccess. The solution must not prevent the users from using DirectAccess to access other resources in contoso.
com.
Which settings should you configure in a Group Policy object (GPO)?
Available Choices
A. DirectAccess Client Experience Settings
B. DNS Client C. Name Resolution Policy D. Network Connections
Name Resolution Policy
Explanation:
For DirectAccess, the NRPT must be configured with the namespaces of your intranet with a leading dot (for example, . internal. contoso. com or . corp. contoso. com). For a DirectAccess client, any name request that matches one of these namespaces will be sent to the specified intranet Domain Name System (DNS) servers.
Include all intranet DNS namespaces that you want DirectAccess client computers to access. There are no command line methods for configuring NRPT rules. You must use Group Policy settings. To configure the NRPT through Group Policy, use the Group Policy add-in at Computer Configuration \Policies\Windows Settings\Name Resolution Policy in the Group Policy object for DirectAccess clients. You can create a new NRPT rule and edit or delete existing rules. For more information, see Configure the NRPT with Group Policy.
Your network contains an Active Directory domain named contoso. com.
All user accounts for the marketing department reside in an organizational unit (OU) named OU1. All user accounts for the finance department reside in an organizational unit (OU) named OU2.
You create a Group Policy object (GPO) named GPO1. You link GPO1 to OU2. You configure the Group Policy preference of GPO1 to add a shortcut named Link1 to the desktop.
You discover that when a user signs in, the Link1 is not added to the desktop.
You need to ensure that when a user signs in, Link1 is added to the desktop.
What should you do?
Available Choices
A. Enforce GPO1.
B. Enable loopback processing in GPO1. C. Modify the Link1 shortcut preference of GPO1. D. Modify the Security Filtering settings of GPO1.
Modify the Security Filtering settings of GPO1.
Explanation:
Security filtering is a way of refining which users and computers will receive and apply the settings in a Group Policy object (GPO). Using security filtering, you can specify that only certain security principals within a container where the GPO is linked apply the GPO. Security group filtering determines whether the GPO as a whole applies to groups, users, or computers; it cannot be used selectively on different settings within a GPO.
Your network contains an Active Directory domain named contoso. com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2.
All client computers run Windows 8 Enterprise.
DC1 contains a Group Policy object (GPO) named GPO1.
You need to deploy a VPN connection to all users.
What should you configure from User Configuration in GPO1?
Available Choices
A. Policies/Administrative Templates/Network/Windows Connect Now
B. Policies/Administrative Templates/Network/Network Connections C. Policies/Administrative Templates/Windows Components/Windows Mobility Center D. Preferences/Control Panel Settings/Network Options
Preferences/Control Panel Settings/Network Option
Explanation:
- Open the Group Policy Management Console . Right-click the Group Policy object (GPO) that should contain the new preference item, and then click Edit .
- In the console tree under Computer Configuration or User Configuration , expand the Preferences folder, and then expand the Control Panel Settings folder.
- Right-click the Network Options node, point to New , and select VPN Connection .
The Network Options extension allows you to centrally create, modify, and delete dial-up networking and virtual private network (VPN) connections. Before you create a network option preference item, you should review the behavior of each type of action possible with the extension. http: //technet. microsoft. com/en-us/library/cc772449. aspx
Your network contains an Active Directory domain named contoso. com. All client computers run Windows 8. 1.
The network contains a shared folder named FinancialData that contains five files.
You need to ensure that the FinancialData folder and its contents are copied to all of the client computers.
Which two Group Policy preferences should you configure? (Each correct answer presents part of the solution. Choose two. )
Available Choices (select all choices that are correct) A. Shortcuts
B. Network Shares C. Environment D. Folders E. Files
Folders & Files
Explanation:
Folder preference items allow you to create, update, replace, and delete folders and their contents. (To configure individual files rather than folders, see Files Extension. ) Before you create a Folder preference item, you should review the behavior of each type of action possible with this extension. File preference items allow you to copy, modify the attributes of, replace, and delete files. (To configure folders rather than individual files, see Folders Extension. ) Before you create a File preference item, you should review the behavior of each type of action possible with this extension.
Your network contains an Active Directory domain named contoso. com. All domain controllers run Windows Server 2012 R2.
You have a Group Policy object (GPO) named GPO1 that contains hundreds of settings. GPO1 is linked to an organizational unit (OU) named OU1. OU1 contains 200 client computers.
You plan to unlink GPO1 from OU1.
You need to identify which GPO settings will be removed from the computers after GPO1 is unlinked from OU1.
Which two GPO settings should you identify? (Each correct answer presents part of the solution.
Choose two. )
Available Choices
A. The managed Administrative Template settings
B. The unmanaged Administrative Template settings C. The System Services security settings D. The Event Log security settings E. The Restricted Groups security settings
The managed Administrative Template settings
The Event Log security settings
Explanation:
http: //technet. microsoft. com/en-us/library/cc778402(v=ws. 10). aspx
http: //technet. microsoft. com/en-us/library/bb964258. aspx
There are two kinds of Administrative Template policy settings: Managed and Unmanaged . The Group Policy service governs Managed policy settings and removes a policy setting when it is no longer within scope of the user or computer
Your network contains an Active Directory domain named contoso. com. All domain controllers run Windows Server 2012 R2. The domain contains 500 client computers that run Windows 8. 1 Enterprise and Microsoft Office 2013.
You implement a Group Policy central store.
You need to modify the default Microsoft Office 2013 Save As location for all client computers. The solution must minimize administrative effort.
What should you configure in a Group Policy object (GPO)?
Available Choices
A. The Group Policy preferences
B. An application control policy C. The Administrative Templates D. The Software Installation settings
The Group Policy preferences
Explanation:
Group Policy preferences provide the means to simplify deployment and standardize configurations. They add to Group Policy a centralized system for deploying preferences (that is, settings that users can change later). You can also use Group Policy preferences to configure applications that are not Group Policy-aware. By using Group Policy preferences, you can change or delete almost any registry setting, file or folder, shortcut, and more. You are not limited by the contents of Administrative Template files.
Ref: http://technet.microsoft.com/en-us/library/dn581922.aspx
Your network contains an Active Directory domain named contoso. com. All domain controllers run Windows Server 2012 R2.
The domain contains 200 Group Policy objects (GPOs).
An administrator named Admin1 must be able to add new WMI filters from the Group Policy Management Console (GPMC).
You need to delegate the required permissions to Admin1. The solution must minimize the number of permissions assigned to Admin1.
What should you do?
Available Choices
A. From Active Directory Users and Computers, add Admin1 to the WinRMRemoteWMIUsers__group.
B. From Group Policy Management, assign Creator Owner to Admin1 for the WMI Filters container. C. From Active Directory Users and Computers, add Admin1 to the Domain Admins group. D. From Group Policy Management, assign Full control to Admin1 for the WMI Filters container.
From Group Policy Management, assign Full control to Admin1 for the WMI Filters container.
Explanation:
Users with Full control permissions can create and control all WMI filters in the domain, including WMI filters created by others.
Users with Creator owner permissions can create WMI filters, but can only control WMI filters that they create.
Ref: http://technet.microsoft.com/en-us/library/cc757429(v=ws.10).aspx
Your network contains two DNS servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 hosts a primary zone for contoso. com. Server2 hosts a secondary zone for contoso. com.
You need to ensure that Server2 replicates changes to the contoso. com zone every five minutes. Which setting should you modify in the start of authority (SOA) record?
Retry Interval
Refresh Interval
Expires After
Minimum (default) TTL
Refresh Interval
Explanation:
By default, the refresh interval for each zone is set to 15 minutes. The refresh interval is used to determine how often other DNS servers that load and host the zone must attempt to renew the zone.
Your network contains two Active Directory domains named contoso. com and adatum. com.
The network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the DNS Server server role installed. Server1 has a copy of the contoso. com DNS zone.
You need to configure Server1 to resolve names in the adatum. com domain. The solution must meet the following requirements:
Prevent the need to change the configuration of the current name servers that host zones for adatum.com.
Minimize administrative effort.
Which type of zone should you create?
Security
Stub
Reverse Lookup
Primary
Stub
Explanation:
When a zone that this DNS server hosts is a stub zone, this DNS server is a source only for information about the authoritative name servers for this zone. The zone at this server must be obtained from another DNS server that hosts the zone. This DNS server must have network access to the remote DNS server to copy the authoritative name server information about the zone.
A stub zone is a copy of a zone that contains only necessary resource records (Start of Authority (SOA), Name Server (NS), and Address/Host (A) record) in the master zone and acts as a pointer to the authoritative name server. The stub zone allows the server to forward queries to the name server that is authoritative for the master zone without going up to the root name servers and working its way down to the server. While a stub zone can improve performance, it does not provide redundancy or load sharing.
You can use stub zones to:
Keep delegated zone information current. By updating a stub zone for one of its child zones regularly, the DNS server that hosts both the parent zone and the stub zone will maintain a current list of authoritative DNS servers for the child zone.
Improve name resolution. Stub zones enable a DNS server to perform recursion using the stub zone’s list of name servers, without having to query the Internet or an internal root server for the DNS namespace.
Simplify DNS administration. By using stub zones throughout your DNS infrastructure, you can distribute a list of the authoritative DNS servers for a zone without using secondary zones. However, stub zones do not serve the same purpose as secondary zones, and they are not an alternative for enhancing redundancy and load sharing.
There are two lists of DNS servers involved in the loading and maintenance of a stub zone:
The list of master servers from which the DNS server loads and updates a stub zone. A master server may be a primary or secondary DNS server for the zone. In both cases, it will have a complete list of the DNS servers for the zone.
The list of the authoritative DNS servers for a zone. This list is contained in the stub zone using name server (NS) resource records.
When a DNS server loads a stub zone, such as widgets. tailspintoys. com, it queries the master servers, which can be in different locations, for the necessary resource records of the authoritative servers for the zone widgets. tailspintoys. com. The list of master servers may contain a single server or multiple servers, and it can be changed anytime.
http: //technet. microsoft. com/en-us/library/cc771898. aspx http: //technet. microsoft. com/en-us/library/cc754190. aspx http: //technet. microsoft. com/en-us/library/cc730980. aspx
Your network contains an Active Directory domain named contoso. com. The domain contains six domain controllers named DC1, DC2, DC3, DC4, DC5, and DC6. Each domain controller has the DNS Server server role installed and hosts an Active Directory-integrated zone for contoso. com.
You plan to create a new Active Directory-integrated zone named litwareinc. com that will be used for testing.
You need to ensure that the new zone will be available only on DC5 and DCG.
What should you do first?
`Change the zone replication scope
`Create an Active Directory connection object.
`Create an Active Directory site link.
`Create an application directory partition.
Create an application directory partition.
Explanation:
You can store Domain Name System (DNS) zones in the domain or application directory partitions of Active Directory Domain Services (AD DS). A partition is a data structure in AD DS that distinguishes data for different replication purposes. When you create an application directory partition for DNS, you can control the scope of replication for the zone that is stored in that partition.
Your network contains an Active Directory domain named contoso. com. The domain contains a server named NPS1 that has the Network Policy Server server role installed. All servers run Windows Server 2012 R2.
You install the Remote Access server role on 10 servers.
You need to ensure that all of the Remote Access servers use the same network policies.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two. )
`Configure each Remote Access server to use the Routing and Remote Access service (RRAS) to authenticate connection requests.
`On NPS1, create a remote RADIUS server group. Add all of the Remote Access servers to the remote RADIUS server group.
`On NPS1, create a new connection request policy and add a Tunnel-Type and a Service-Type condition.
`Configure each Remote Access server to use a RADIUS server named NPS1.
On NPS1, create a RADIUS client template and use the template to create RADIUS clients.
`On NPS1, create a new connection request policy and add a Tunnel-Type and a Service-Type condition.
`Configure each Remote Access server to use a RADIUS server named NPS1.
Connection request policies are sets of conditions and settings that allow network administrators to designate which RADIUS servers perform the authentication and authorization of connection requests that the server running Network Policy Server (NPS) receives from RADIUS clients. Connection request policies can be configured to designate which RADIUS servers are used for RADIUS accounting.
When you configure Network Policy Server (NPS) as a Remote Authentication Dial-In User Service (RADIUS) proxy, you use NPS to forward connection requests to RADIUS servers that are capable of processing the connection requests because they can perform authentication and authorization in the domain where the user or computer account is located. For example, if you want to forward connection requests to one or more RADIUS servers in untrusted domains, you can configure NPS as a RADIUS proxy to forward the requests to the remote RADIUS servers in the untrusted domain.
To configure NPS as a RADIUS proxy, you must create a connection request policy that contains all of the information required for NPS to evaluate which messages to forward and where to send the messages.
Ref: http://technet.microsoft.com/en-us/library/cc730866(v=ws.10).aspx
Your network contains a server named Server1 that has the Network Policy and Access Services server role installed.
All of the network access servers forward connection requests to Server1.
You create a new network policy on Server1.
You need to ensure that the new policy applies only to connection requests from the 192. 168. 0. 0/24 subnet.
What should you do?
Set the Client IP4 Address condition to 192. 168. 0. 0/24.
Set the Client IP4 Address condition to 192. 168. 0.
Set the Called Station ID constraint to 192. 168. 0. 0/24.
Set the Called Station ID constraint to 192. 168. 0.
Set the Client IP4 Address condition to 192. 168. 0.
Explanation:
RADIUS client properties
Following are the RADIUS client conditions that you can configure in network policy. Calling Station ID: Specifies the network access server telephone number that was dialed by the dial-up access client.
Client Friendly Name: Specifies the name of the RADIUS client that forwarded the connection request to the NPS server.
Client IPv4 Address: Specifies the Internet Protocol (IP) version 4 address of the RADIUS client that forwarded the connection request to the NPS server. Client IPv6 Address: Specifies the Internet Protocol (IP) version 6 address of the RADIUS client that forwarded the connection request to the NPS server. Client Vendor: Specifies the name of the vendor or manufacturer of the RADIUS client that sends connection requests to the NPS server.
MS RAS Vendor: Specifies the vendor identification number of the network access server that is requesting authentication.
Your network contains an Active Directory domain named contoso. com. The domain contains a server named Server1 that runs Windows Server 2012 P. 2. Server1 has the Network Policy and Access Services server role installed.
You plan to deploy 802. lx authentication to secure the wireless network. You need to identify which Network Policy Server (NPS) authentication method supports certificate- based mutual authentication for the 802. 1x deployment.
Which authentication method should you identify?
MS-CHAP
PEAP-MS-CHAPv2
EAP-TLS
MS-CHAP v2
EAP-TLS
Explanation:
802. 1X uses EAP, EAP-TLS, EAP-MS-CHAP v2, and PEAP authentication methods:
EAP (Extensible Authentication Protocol) uses an arbitrary authentication method, such as certificates, smart cards, or credentials.
EAP-TLS (EAP-Transport Layer Security) is an EAP type that is used in certificate- based security environments, and it provides the strongest authentication and key determination method.
EAP-MS-CHAP v2 (EAP-Microsoft Challenge Handshake Authentication Protocol version 2) is a mutual authentication method that supports password-based user or computer authentication.
PEAP (Protected EAP) is an authentication method that uses TLS to enhance the security of other EAP authentication protocols.
Your network contains an Active Directory domain named contoso. com. The domain contains client computers that run either Windows XP or Windows 8.
Network Policy Server (NPS) is deployed to the domain.
You plan to create a system health validator (SHV).
You need to identify which policy settings CAN be applied to the Windows XP computers.
Which three policy settings should you identify? (Each correct answer presents part of the solution.
Choose three. )
Antispyware is up to date.
Automatic updating is enabled.
Antivirus is up to date.
A firewall is enabled for all network connections.
An antispyware application is on.
Automatic updating is enabled.
Antivirus is up to date.
A firewall is enabled for all network connections.
Explanation:
The WSHA on NAP client computers running Windows XP SP3 does not monitor the status of antispyware applications.
Your network contains two servers named Server1 and Server2 that run windows Server 2012 R2. Server1 and 5erver2 have the Windows Server Update Services server role installed.
Server1 synchronizes from Microsoft Update. Server2 is a Windows Server Update Services (WSUS) replica of Server1.
You need to configure replica downstream servers to send Server1 summary information about the computer update status.
What should you do?
From Server1, configure Reporting Rollup.
From Server2, configure Reporting Rollup.
From Server2, configure Email Notifications.
From Server1, configure Email Notifications.
From Server1, configure Reporting Rollup.
Explanation:
WSUS Reporting Rollup Sample Tool
This tool uses the WSUS application programming interface (API) to demonstrate centralized monitoring and reporting for WSUS. It creates a single report of update and computer status from the WSUS servers into your WSUS environment. The sample package also contains sample source files to customize or extend the tool functionality of the tool to meet specific needs. The WSUS Reporting Rollup Sample Tool and files are provided AS IS. No product support is available for this tool or sample files. For more information read the readme file.
http: //technet. microsoft. com/en-us/windowsserver/bb466192. aspx
You manage a server that runs Windows Server 2012 R2. The server has the Windows Deployment Services server role installed.
You start a virtual machine named VM1 as shown in the exhibit. (Click the Exhibit button. )
You need to configure a pre-staged device for VM1 in the Windows Deployment Services console.
Which two values should you assign to the device ID? (Each correct answer presents a complete solution. Choose two. )
979708BFC04B45259FE0C4150BB6C618
979708BF-C04B-4525-9FE0-C4150BB6C618
00155D000F1300000000000000000000
0000000000000000000000155D000F13
00000000-0000-0000-0000-C4150BB6C618
979708BF-C04B-4525-9FE0-C4150BB6C618
0000000000000000000000155D000F13
Explanation:
Use client computer’s media access control (MAC) address preceded with twenty zeros or the globally unique identifier (GUID) in the format: {XXXXXXXX-XXXX-XXXX-XXX-XXXXXXXXXXXX}. http: //technet. microsoft. com/en-us/library/cc754469. aspx
You have a server named Server1 that runs Windows Server 2012 R2.
On Server1, you configure a custom Data Collector Set (DCS) named DCS1. DCS1 is configured to store performance log data in C: \Logs.
You need to ensure that the contents of C: \Logs are deleted automatically when the folder reaches 100 MB in size.
What should you configure?
A File Server Resource Manager (FSRM) file screen on the C: \Logs folder
The Data Manager settings of DCS1
A schedule for DCS1
A File Server Resource Manager (FSRM) quota on the C: \Logs folder
The Data Manager settings of DCS1
Explanation:
To configure data management for a Data Collector Set
1. In Windows Performance Monitor, expand Data Collector Sets and click User Defined.
2. In the console pane, right-click the name of the Data Collector Set that you want to configure and click Data Manager.
3. On the Data Manager tab, you can accept the default values or make changes according to your data retention policy. See the table below for details on each option. When Minimum free disk or Maximum folders is selected, previous data will be deleted according to the Resource policy you choose (Delete largest or Delete oldest) when the limit is reached. When Apply policy before the data collector set starts is selected, previous data will be deleted according to your selections before the data collector set creates its next log file. When Maximum root path size is selected, previous data will be deleted according to your selections when the root log folder size limit is reached.
4. Click the Actions tab. You can accept the default values or make changes. See the table below for details on each option.
5. When you have finished making your changes, click OK.
You have Windows Server 2012 R2 installation media that contains a file named Install. wim.
You need to identify which images are present in Install. wim.
What should you do?
Run imagex. exe and specify the /ref parameter.
Run dism. exe and specify the /get-mountedwiminfo parameter.
Run dism. exe and specify the /get-imageinfo parameter.
Run imagex. exe and specify the /verify parameter.
Run dism. exe and specify the /get-imageinfo parameter.
Explanation:
Option:
/Get-ImageInfo
Arguments:
/ImageFile: <path_to_image.><br></br>[{/Index: <image_index> | /Name: <image_name>}]</image_name></image_index></path_to_image.>
Displays information about the images that are contained in the . wim, vhd or . vhdx file. When used with the / Index or /Name argument, information about the specified image is displayed, which includes if an image is a WIMBoot image, if the image is Windows 8. 1 Update, see Take Inventory of an Image or Component Using DISM. The /Name argument does not apply to VHD files. You must specify /Index: 1 for VHD files.
http: //technet. microsoft. com/en-us/library/cc749447(v=ws. 10). aspx
http: //technet. microsoft. com/en-us/library/dd744382(v=ws. 10). aspx
http: //technet. microsoft. com/en-us/library/hh825224. aspx
Your network contains an Active Directory domain named contoso. com. The domain contains a server named Server1 that runs Windows Server 2008 R2.
You plan to test Windows Server 2012 R2 by using native-boot virtual hard disks (VHDs).
You attach a new VHD to Server1.
You need to install Windows Server 2012 R2 in the VHD.
What should you do?
`Run imagex. exe and specify the /append parameter.
`Run dism. exe and specify the /apply-image parameter.
`Run imagex. exe and specify the /export parameter.
`Run dism. exe and specify the /append-image parameter.
`Run dism. exe and specify the /apply-image parameter.
Run dism. exe and specify the /append-image parameter.