Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
53 Cards in this Set
- Front
- Back
- 3rd side (hint)
Which of the following is NOT a component of the IPAM infrastructure?
|
Discovery agent
|
a. IPAM server
b. Managed server c. Discovery agent d. IPAM client |
|
Which of the following are problems you might be able to solve with IPAM? (Choose allthat apply.)
|
Managing DHCP scope changes across several servers
Keeping track of address use across multiple domains |
a. Synchronizing DNS zone changes across multiple servers
b. Preventing rogue DHCP servers on standalone serversc. Managing DHCP scope changes across several serversd. Keeping track of address use across multiple domains |
|
DAC is a replacement for NTFS permissions.
T or F |
FALSE |
TRUE OR FALSE |
|
On which server should you install the IPAM Server feature?
|
A member server running
Windows Server 2012 R2 |
a. A standalone server running Windows Server 2012 with DHCP
b. A domain controller running Windows Server 2012 c. A member server running Windows Server 2012 R2 d. A member server running Windows Server 2012 with DHCP |
|
Which tool allows you to configure automatic classification of files using resourceproperties?
|
FSRM
|
a. IPAM
b. FSRM c. ADAC d. GPMC |
|
What must you do if you want to use a user account's job title attribute to restrict access to afolder using the Permission Entry dialog box?
|
Create a claim type
|
a. Create a claim type
b. Create a central access policyc. Create a resource property d. Create a compound condition |
|
Central access policies can be targeted to specific servers using Group Policy.
T or F |
TRUE |
TRUE OR FALSE
|
|
Which of the following is the minimum requirement to support DAC on clients and servers?(Choose all that apply.)
|
Windows 8 or later
Windows Server 2012 or later domain functional level |
a. Windows Server 2012 R2 or later forest functional level
b. Windows 8.1 or later c. Windows 8 or later d. Windows Server 2012 or later domain functional level |
|
Which Windows feature must be installed to use file classifications to control access to files?
|
DAC |
a. IPAM
b. DAC c. BranchCache d. GPT |
|
What must be true about a resource property before a file server can download and use it?
|
It must be a member of a
resource property list |
a. It must be removed from the Global Resource Property List
b. It must have the "downloadable" attribute set c. It must be named with the "_MS" suffix d. It must be a member of a resource property list |
|
Which of the following is an IPAM topology you can configure when you have multiplesites? (Choose all that apply.)
|
Distributed
Hybrid Centralized |
a. Distributed
b. Mesh c. Hybrid d. Centralized |
|
What feature introduced in Windows Server 2012 allows users to solve problems related tofile and folder access?
|
Accessdenied assistance
|
a. Useraccess help system
b. Accessdenied assistance c. Central access messages d. File classification reports |
|
Which of the following is true about resource properties? (Choose all that apply.)
|
They can have suggested values
They can be used for authorization |
a. Predefined properties are enabled by default
b. They can have suggested values c. They can be used for authorization d. You use FSRM to define them |
|
You have six DHCP servers on your network, but only four of them are being displayed inthe IPAM Server Inventory window. What action should you take that will most likely causethe other two servers to be displayed?
|
Make the other two servers domain members |
a. Set the DHCP inventory limit to 10
b. Make the other two servers domain members c. Demote the two missing servers d. Configure the IPAM server as a DHCP server |
|
In the IPAM address space, no IP address blocks are defined until you create them.
T or F |
TRUE |
TRUE OR FALSE |
|
You have recently completed IPAM installation and configuration. You have several each ofDHCP servers, DNS servers, and domain controllers. Server discovery has completed butwhen you view the inventory, no DHCP servers are being displayed. Which of the followingactions is most likely to solve the problem?
|
Uninstall DHCP on the IPAM server |
a. Configure the IPAM server as a domain controller
b. Make the IPAM server a standalone server c. Uninstall DHCP on the IPAM server d. Reinstall IPAM on a server that runs DHCP |
|
Which of the following sets permissions on targeted resources and can contain DAC andNTFS permissions.
|
Central access rule
|
a. Claim type
b. File classification c. Resource property d. Central access rule |
|
What's the best way to change IPAM storage from the WID to an SQL server?
|
Run the MoveIpamDatabase
cmdlet |
a. Run the MoveIpamDatabase cmdlet
b. Reinstall IPAM and select the Preserve data option c. From the SQL server, run the ImportWID cmdlet d. From the IPAM console select Export to SQL |
|
You have several member computers on your network running Windows 8.1 that containsensitive files. Your DCs are running Windows Server 2012 R2. You need to be able toclassify those files so that access is restricted based on the classification. What do you needto do first?
|
Move the files to a member server running Windows Server 2012 R2
|
a. Create a central access policy and deploy it to each member computer
b. On each computer, access the Classifications tab for the files c. Link a GPO that classifies the files to an OU containing the computer accounts d. Move the files to a member server running Windows Server 2012 R2 |
|
Which of the following should you do first if you want to set DAC permissions on severalservers using Group Policy?
|
Create a central access rule |
a. Create a central access policy
b. Enable central access policies on each server c. Configure central access deployment in Group Policy d. Create a central access rule |
|
By default, claims are enabled on domain controllers.
T or F |
FALSE |
TRUE OR FALSE |
|
Which Windows feature must be installed to use file classifications to control access to files?
|
DAC
|
a. BranchCache
b. IPAM c. DAC d. GPT |
|
What must you do to enable claims for use in DAC and Kerberos authentication?
|
Configure a GPO and link it to the Domain Controllers OU
|
a.Start FSRM and configure the Use claims for DAC and Kerberos authenticationoption
b. Use ADAC to create a claim and specify DAC and Kerberos in the usage list c. Create a central access policy and enable DAC claims d. Configure a GPO and link it to the Domain Controllers OU |
|
You have recently completed IPAM installation and configuration. You have several each ofDHCP servers, DNS servers, and domain controllers. Server discovery has completed butwhen you view the inventory, no DHCP servers are being displayed. Which of the followingactions is most likely to solve the problem?
|
Uninstall DHCP on the IPAM server |
a. Uninstall DHCP on the IPAM server
b. Make the IPAM server a standalone server c. Reinstall IPAM on a server that runs DHCP d. Configure the IPAM server as a domain controller |
|
What should you do if you need to change the provisioning method for IPAM?
|
Uninstall and reinstall IPAM and select a different provisioning method
|
a. Select the provisioning method from the IPAM console
b. Run the ConfigureIPAMProvisioning cmdlet c. Uninstall and reinstall IPAM and select a different provisioning method d. Configure the provisioning method in a GPO |
|
DAC is a replacement for NTFS permissions.
T or F |
FALSE |
TRUE OR FALSE |
|
An IPAM client is a Windows 8 or higher member computer in the scope of IPAM serverdiscovery.
|
FALSE |
TRUE OR FALSE |
|
A user account named JaneDoe with the job title Administration is a member of two security groups that have Read and Full Control permission respectively, to a folder named Marketing via assigned NTFS permissions. You create a central access policy that grants Modify permission to the folder to users with the job title Administration. What is JaneDoe's permission to the Marketing folder?
|
Modify
|
a. Full Control
b. None c. Modify d. Read |
|
What property of a central access rule do you need to configure if you want the rule to affectonly files with certain properties?
|
Target Resources
|
a. Target Resources
b. Limit to the Following c. Resource Scope d. Exceptions |
|
After you have install an IPAM server and have connected to it in Server Manager, what taskshould you perform next?
|
Provision the IPAM server
|
a. Retrieve data from managed servers
b. Start server discovery c. Configure server discovery d. Provision the IPAM server |
|
Which authentication protocol can be used to allow an iSCSI target to authenticate to theiSCSI initiator?
|
Reverse CHAP
|
a. Reverse CHAP
b. PEAP c. Kerberos d. MSCHAPv2 |
|
Which of the following is a step involved in file classification management? (Choose all thatapply.)
|
Create file classification properties
Configure file auditing policies |
a. Create file classification properties
b. Create file classification rules c. Carry out file management tasks d. Configure file auditing policies |
|
Which of the following allows you to manage a group of iSCSI devices from a centralserver?
|
iSNS Server
|
a. NFS data store
b. NFS iSCSI role service c. iSNS Server d. iSCSI Target Server |
|
Before you can classify files, you must install the File Screening Management role service.
T or F |
FALSE |
TRUE OR FALSE |
|
Which of the following is an attribute of a file that can be used to categorize the file'scontents?
|
Classification property
|
a. Compress or encrypt attributes
b. Regular expression c. File auditing d. Classification property |
|
What feature available in Storage Spaces lets you combine traditional mechanical HDDswith SSDs to get better performance?
|
Tiered storage
|
a. Features on demand
b. Thin provisioning c. Tiered storage d. iSCSI SAN |
|
Which feature of HyperV running on Windows Server 2012 R2 can help reduce the space used by virtual disks?
|
Automatic trim and unmap
|
a. filelevel storage
b. Storage tiering c. Automatic trim and unmap d. Distributed caching |
|
If you want to be able to install roles and features on Windows Server 2012 R2 servers usinga file share, what should you create?
|
Feature file store
|
a. FSRM
b. Feature file store c. Services for NFS d. Branch Cache |
|
You plan to create 4 VMs on a new HyperV server. The HyperV server has 2 TB of freedisk space. You want each VM to have up to 600 GB of hard drive space. Which featureshould you use when configuring these VMs?
|
Thin provisioning
|
a. Automatic provisioning
b. Thin provisioning c. Differencing disks d. Features on Demand |
|
You must create a global object access auditing policy for each server you wish to audit.
T or F |
FALSE |
TRUE OR FALSE |
|
You have an internetwork of four LANs connected via routers. You want to configureBranchCache to support all four LANs. What should you configure?
|
Hosted cache mode
|
a. Distributed cache mode b. File store mode d. NFS sharing mode |
|
With BranchOffice, when a computer in a branch office requests a file for the first time, onlythe content information is transferred.
T or F |
FALSE |
TRUE OR FALSE |
|
Which of the following is true about tiered storage? (Choose all that apply.)
|
It combines the high capacity of SSDs with the speed of iSCSI disks
It supports automatic trim and unmap |
a. It combines the high capacity of SSDs with the speed of iSCSI disks
b. It supports automatic trim and unmap c. It was first introduced in Windows Server 2012 R2 d. One SSD can be used with multiple virtual disks |
|
Which of the following is a component of an IQN? (Choose all that apply.)
|
The string "iqn" followed by a period
The name of the iSCSI target or initiator |
a. The string "iqn" followed by a period
b. The iSCSI target storage provider name c. The name of the iSCSI target or initiator d. The iSCSI LUN identifier |
|
Which command shows you the Windows features that have been removed from the defaultfeature store?
|
GetWindowsFeature | where
InstallState eq Removed |
a. ShowFeatureStore | GetRemovedFeatures
b. GetWindowsFeature | where InstallState eq Removed c. ShowFeatureStore Status Removed d. GetWindowsFeature | where InstallState eq Unavailable |
|
You want to configure a BranchCache server in hosted cache mode. What is the minimumOS version requirement to do so?
|
Windows Server 2008 R2
|
a. Windows Server 2003 SP3 c. Windows Server 2008 d. Windows Server 2012 |
|
Which of the following allows you to manage a group of iSCSI devices from a centralserver?
|
iSNS Server
|
a. iSNS Server
b. NFS iSCSI role service c. NFS data store d. iSCSI Target Server |
|
An application server running BITS can take advantage of BranchCache
T or F |
TRUE |
TRUE OR FALSE |
|
If you use Features on Demand, from where are the roles and features files removed?
|
C:\Windows\WinSxS
|
a. Tiered storage
b. C:\Windows\WinSxS c. Feature file store d. C:\Program Files\FeaturesOnDemand |
|
Which of the following is a reference ID to a logical drive used by the iSCSI initiator?
|
iSCSI LUN
|
a. iSCSI LUN
b. IQN identifier c. iSCSI qualified name d. iSCSI target ID |
|
Which of the following are BranchCache modes of operation? (Choose all that apply.)
|
Hosted Distributed |
a. Hosted
b. Distributed c. Ondemand d. Failover |
|
A group of engineers are working on a new project. The engineers have decided that theLinux OS works best for this particular project but they still need access to shared files onthe Windows Server 2012 R2 servers. You want to allow the engineers to access the sharedfiles using native Linux file sharing. What should you do?
|
Install Server for NFS role service on the servers
|
a. Install SAMBA on each of the engineer's computers
b. Install Server for NFS role service on the servers c. Install an iSCSI IQN on the servers and iSCSI initiator on the engineer's computers d. Install tiered storage on both the servers and Linux computers |
|
Which of the following is true about global object access auditing policies? (Choose all thatapply.)
|
Events can be triggered based on resource properties
They are be configured using Group Policy |
a. You can configure global auditing or the SACL manually, but not both
b. It was introduced starting with Windows Server 2012 R2 c. They are be configured using Group Policy d. Events can be triggered based on resource properties |