Server 2012 R2- Install and Configure Server 2012 R2 Flashcards
This protocol allows a host to find clients within the local subnet. It can be used with IPv4 and IPv6 and uses multicasts instead of broadcasts.
A. DNS
B. HOSTS file
C. Link-local Multicast Name Resolution (LLMNR)
D. DNS suffix search list
C. Link-local multicast Name Resolution (LLMNR)
Review Chapter 5
A client needs to find a domain name that is not part of the local domain. The DNS server is not authoritative for the domain the client is trying to find and does not have any forwarders to it. What two things must be done for the DNS server to forward the request?
The root zone must be deleted and root hints must be configured.
Review Chapter 5
A forward lookup zone does what?
A. forwards DNS requests to other zones
B. provides hostname-to-ipaddress resolution
C. provides ipaddress-to-hostname resolution
B. Provides hostname-to-ipaddress resolution
Review Chapter 5
A domain has three DNS servers. Two servers are the Primary and backup DNS servers. The third needs a read-only copy of the DNS records. What zone should be used?
A Secondary Zone.
Review Chapter 5
In Domain contoso.com all DNS servers are also Domain Controllers. All DNS servers need to have the ability to read and write DNS changes to the domain. What type of zone should be used?
Active Directory Integrated Zone
Review Chapter 5
DallasServer1.contoso.com has an “A” Record in DNS. It needs to be accessed by a simple name. What record should be created in DNS to facilitate this?
A “CNAME” record
Review Chapter 5
This record is used for reverse lookup and is contained in the in-addr.arpa namespace or the ip6.arpa namespace. A. "A" Record B. "AAA" Record C. "SRV" Record D. "PTR" Record
D. “PTR” Record
Review Chapter 5
The domain adatum.com utilizes Microsoft and Unix/Linux devices. In order to communicate with UNIX DNS servers, the admin must change the BIND Settings on the Microsoft DNS Server. Where would the BIND properties be found? A. Forwarders Tab B. Security Tab C. Monitoring Tab D. Advanced Tab
D. Advanced Tab
Review Chapter 5
Client A cannot communicate with ClientB. What command can be used to determine if it is a DNS issues? A. NSLookup B. ipconfig C. Netsh D. Ping
D. Ping
Review Chapter 5
This Sever version supports up to 64GB of RAM, 25 LAN connections, 250 RRAS or RD Connections. A. Server 2012 R2 Essentials B. Server 2012 R2 Standard C. Server 2012 R2 Enterprise D. Server 2012 R2 Server Core
A. Server 2012 R2 Essentials
Review Chapter 1
You need to utilize Server 2012 R2 for your company. You need some servers to be Server Core and you need at least 2 Hyper-V gues OS sessions using the same license key as the host. What server edition do you need? A. Server 2012 R2 Essentials B. Server 2012 R2 Standard C. Server 2012 R2 DataCenter D. Server 2012 R2 Server Core
B. Server 2012 R2 Standard
Review Chapter 1
You are the admin of a large corporation spanning the United States. There are hundreds of servers across each region and you need unlimited Hyper-V guest OS sessions using the same license key as the host. What server edition best fits your situation? A. Server 2012 R2 Essentials B. Server 2012 R2 Standard C. Server 2012 R2 DataCenter D. Server 2012 R2 Server Core
C. Server 2012 R2 DataCenter
Review Chapter 1
A Windows Server 2008 R2 Enterprise or Standard Edition with SP1 can be upgraded to which 2012 edition?
Server 2012 R2 Standard or DataCenter
Review Chapter 1
A Windows Web Server 2008 R2 edition can be upgraded to which 2012 edition?
Server 2012 R2 Standard
What DISM module allows you to view installed features on a remote computer? A. Get-WindowsRemoteFeature B. Get-WindowsOptionalFeature-Online C. Get-RemoteOnlineFeature D. Winrm
B. Get-WindowsOptionalFeature-Online
The most secure Server 2012 installation type is which one?
Server Core
What utility is used to display the Server Core Server Configuration Utility? A. winconfig B. Get-configutility C. Sconfig D. serverconfig
C. Sconfig
What command do you use to configure network options on a Server Core installation?
A. netsh
B. ipconfig
C. netconfig
A. Netsh
You want to remotely send commands to a managed server. What command must you run on the managed server? A. winrm config B. config winrm C. manage serverremote D. winrm quickconfig
D. winrm quickconfig
All Directory data is stored in this file. A. dir.dit B. dir.dat C. ntds.dit D. ntds.dat
C. NTDS.dit
What is the first command used prior to promoting a 2012 server to a Domain Controller?
A. Dcpromo
B. Install-WindowsFeature
C. Install-DomainController
B. Install-WindowsFeature
Why should you have a local DC when using Windows Azure?
Azure does not support Group Policies
Review Chapter 4
You need to apply a GPO to all computers in the sales department. Twelve of their computers are in the ‘Sales’ OU, two are in the ‘default computers’ OU. The OU is created. What is the next step?
The computers in the default computers OU must be moved to the Sales OU. The GPO needs to be applied to the Sales OU.
Review Chapter 4
What variable is used in the Profile Path to create a roaming profile?
%username%
Review Chapter 4
Use this command to import and export AD objects. It does not modify existing objects.
A. csvde
B. ldifde
C. import-exportobject
A. csvde
Review Chapter 4
You can use this command to alter passwords on already existing accounts. It is used for bulk operations.
A. csvde
B. ldifde
C. modify-password
B. ldifde
Review Chapter 4
At what group level should permissions be allied in an AD environment?
Domain Local Security Group
Review Chapter 4
At what group level should users be directly joined for security purposes?
Global Security Group
Review Chapter 4
What are the 2 modes of NIC Teaming? What are they used for?
Switch dependent- increase bandwidth/loadbalancing
Switch independent- failover
This disk type supports spanned, striped and mirrored disks. It supports extending volumes to include non-contiguous space. A. Fixed Disk B. Dynamic Disk C. Expanding Disk D. Healthy Disk
B. Dynamic Disk
You need to increase performance and redundancy on your server. Which would you configure?
A. Raid 0
B. Raid 1
C. Raid 5
C. Raid 5
You need to create a virtual disk that can only be 500 GB in size and is optimized for performance. What type of vdh or vhdx would you use?
A fixed disk
Review Chapter 3
You need to manage a vhd file using command line. What command would be used?
A. manage-vhd
B. diskpart
C. vhd-manage
B. diskpart
Review Chapter 3
What type of storage layout is used to provide redundancy if two storage devices fail at one time? A. Raid 5 B. Striped C. Three-way mirror D. Raid 10
C. Three-way mirror
What steps must be done if a thin-provisioned storage space is unmounted due to insufficient space? (choose two).
A. Add physical storage space and allocate it
B. It will automatically detect and remount
C. manually bring it back online
D. Run ‘compress disk’
E. Run ‘cleanup’
A. Add physical storage space and allocate it
C. Manually bring it back online
This feature allows a VM to restart even if there is no available physical memory. A. virtual memory B. paging memory C. smart paging D. vm fixed memory
C. Smart paging
Review Chapter 3
How do you enable resource metering on a VM? A. Enable-resourcemetering B. Enable-vmresourcemetering C. resourcemeter-enable D. start resourcemetering
B. Enable-vmresourcemetering
Review Chapter 3
What command is used to check VM resource usage? A. Get-vmusage B. Check-vmresourceusage C. Measure-vm D. Measure-resourceusage
C. Measure-vm
Review Chapter 3
You need to create a VM that allows PXE boot using standard network adapter. What generation VM do you need and what type of VM file is used? A. 1st generation, vhdx B. 1st generation, vhd C. 2nd generation, vhd D. 2nd generation, vhdx
D. 2nd generation, vhdx
Review Chapter 3
What command is used to create a snapshot of a running VM?
A. Checkpoint-vm
B. Snapshot-vm
C. Create-vmsnapshot
A. checkpoint-vm
Review Chapter 3
Several VMs need to communicate with each other and with the host OS, but not the physical network. What network type should be utilized? A. Public B. Private C. Internal D. External
C. Internal
Review Chapter 3
What option must be configured to allow a guest OS to use a physical network adapter directly? A. resource sharing B. VM tools C. Single Root/IO Virtualization D. Virtual Network Sharing
C. Single Root/IO Virtualization (SR-IOV)
Review Chapter 3
What are the 2 network adapter types in generation 2 VMs? (choose 2) A. Standard B. Legacy C. Ether channel D. Fibre channel
A. Standard
D. Fibre channel
Review Chapter 3
You have five network adapter. All traffic coming into adapter 1 must be monitored. What network feature is needed to evaluate the traffic? A. Port security B. Port mirroring C. Root guard D. Failover
B. Port mirroring
Review Chapter 3
What is used in order to control the throughput of data to the virtual disks?
Input/Output operations per second (IOPS)
Review Chapter 3
You have a server named Shared1 that has a directory of shared folders. There is a parent folder named Sales and a subfolder named Contracts. You need to disinherit permissions from Sales on the Contracts folder for the NTFS options. Where do you go?
A. Sharing tab and Advanced Sharing
B. Security tab and Advanced
C. Security tab and Edit
B. Security tab and Advanced
Review Chapter 6
You need to copy a folder and keep all NTFS permissions. What command will do this?
Robocopy or xcopy
Review Chapter 6
You need to prevent users from seeing folders that they have no permissions to. What feature you do you need to enable?
Access Based Enumeration
Review Chapter 6
Where do you go to enable or disable Access Based Enumeration (ABE)?
A. File Share permissions
B. File and Storage Services in Server Management
C. Share and Storage Management in Server Management
B. File and Storage Services in Server Management
Review Chapter 6
Users often complain that they must contact an admin to recover files on the shared drive because of accidental deletion or changes. What feature would allow users to restore files and folders to previous versions quickly?
Volume Shadow Copy
Review Chapter 6
Permissions for file shares are effective between the NTFS and Share permissions. Where are the permissions normally granted to control access to the shared files?
NTFS
Review Chapter 6
If User1 has NTFS Read & Write access to a folder and only has Read access in the share permissions, what permissions does User1 have when accessing the folder through the network? A. Read & Write B. Read C. None D. Full Control
B. Read
Review Chapter 6
You are creating a new shared folder using the New Share Wizard. Your environment consists primarily of Windows systems, however there are several UNIX systems that need access to the shares. What protocol should be used to create the share? A. SMB B. NFS C. NTFS D. UBX
B. NFS
Review Chapter 6
Server1 has a FQDN that is publicly registered. You are required to set-up a system where the CEO and Branch Chiefs can access their work folders from their mobile devices. What do you need to enable for this to work? A. Shared Folders B. Roaming Profiles C. Work Folders D. Cloud Folders
C. Work Folders
Review Chapter 6
Server1 is the printer server for contoso.com. Unix devices must print to printers that are shared through Server1. The print spooler service is restarted. What is the next step to ensure full functionality?
A. Nothing, the print spooler is restarted so printing can resume
B. The print server must be rebooted so computers can reconnect
C. The LPDSVC service must be restarted
C. The LPDSVC service must be restarted
Review Chapter 7
If you want to reduce the resources on the print server, what option should you enable in the print Sharing tab? A. List in the directory B. Render print jobs on client computers C. Additional Drivers D. Cache print jobs in the printer
B. Render print jobs on client computers
Review Chapter 7
This feature allows clients to send print jobs to a single printer, and the print server chooses from multiple printers to send the job to.
Printer pooling
Review Chapter 7
All users need rights to print and are granted the Print permission. Dave is the designated HR admin and needs the ability to make changes to printer properties. What permission does Dave need?
A. Manage Printer
B. Manage Documents
C. Creator Owner
A. Manage Printer
Review Chapter 7
The Sales Branch Manager shares a printer with the rest of the Sales Department. When preparing documents for meetings with the CEO he constantly has to wait for the printer, causing delays in high level meetings. What feature in Print Management needs to be configured to allow him to have a higher priority than the other users? A. Printer Permissions B. Printer Pooling C. Multiple Printer Objects D. Deploy with Group Policy
C. Multiple Printer Objects
Review Chapter 7
Your Organization uses Group Policy to manage configuration settings for users and computers. You need to add an option to disallow users the ability to Shut the System down. What setting category would you go configure? A. Account Policies B. Local Policies/Security Options C. Administrative Templates D. Local Policies/User Rights Assignment
D. Local Policies/User Rights Assignment
Review Chapter 8
What GPO setting category would you configure if you need to customize the Start Menu, taskbar or desktop environment? A. Account Policies B. Registry C. Administrative Templates D. Local Policies/Security Options
C. Administrative Templates
Review Chapter 8
You use an Administrative Template to create Group Policies. You want other domain administrators to be able to edit the templates. What must you do?
Create a Central Store
Review Chapter 8
Which of the following are true regarding GPOs?
A. Computer GPOs are applied when the computer boots
B. computer GPOs are applied when the computer is signed into
C. User policies are applied when the computer boots
D. User policies are applied when the computer is signed into
E. GPOs must be linked to a site, domain or OU
F. GPOs are automatically enforced to all OUs
A. Computer GPOs are applied when the computer boots
D. User policies are applied when the computer is signed into
E. GPOs must be linked to a site, domain or OU
Review Chapter 8
Place the GPOs in the correct order of how they are applied.
A. GPO linked to the domain
B. GPO associated with a site
C. The local Group Policy on the computer
D. GPO linked to the OU
C, B, A, D
Review Chapter 8
You can use this method of GPOs to dynamically determine the scope of a GPO based on specific data. The script results in a ‘yes’ or ‘no’ response.
WMI Filtering
Review Chapter 8
All users must use the default domain password policy. The HR department deals with sensitive user data and it was determined they need more stringent password policies to protect PII. All HR personnel belong to the HR Global Security Group. What do you need to do to enforce this?
Create a granular password policy (or Password Settings Object)
Review Chapter 8
You need to restrict CD-ROM drive access to locally logged on users. Where would you do this?
A. Security settings, Accounts category
B. Security settings, Devices category
C. Security settings, Interactive logon category
D. User rights settings, security category
B. Security settings, Devices category
Review Chapter 8
You need all users to logon using a standard user name and password. All admins have a separate admin username and password, but are restricted from logging onto systems directly. You need to make sure that performing administrative actions are done with the admin username and password. What do you configure?
A. ‘Behavior of the elevation prompt for administors in Admin Approval Mode’ set to ‘Prompt for consent on the secure desktop’
B. ‘User Account Control: Switch to the secure desktop when prompting for elevation’ set to ‘enabled’
C. ‘Behavior of the elevation prompt for administrators in Admin Approval Mode’ set to ‘Elevate without prompting’
A. ‘Behavior of the elevation prompt for administors in Admin Approval Mode’ set to ‘Prompt for consent on the secure desktop’
Review Chapter 8