• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/19

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

19 Cards in this Set

  • Front
  • Back

Which processor architectures can be used for a clean Windows Server 2012 R2 installation?

64-Bit Processor Only

Which of the following paths is a valid upgrade path to Windows Server 2012 R2?



A. Win Server 2003 Std to Win Server 2012 R2 Std


B. Win Server 2008 Std to Win Server 2012 R2 Std


C. Win Server 2008 32-bit to Win Server 2012 R2 64-Bit


D. Win 7 Ultimate to Win Server 2012 R2 Essentials

B. Windows Server 2008 Standard to Windows Server 2012 R2 Standard

Which of the following features must be added to a Windows Server 2012 R2 Server Core installation to convert it to the Minimal Server Interface?



A. Graphical Management Tools and Infrastructure


B. Server Graphical Shell


C. Windows PowerShell


D. Microsoft Management Console


A. Graphical Management Tools and Infrastructure

Which of the following terms is the name of the directory where Windows stores all the operating system modules it might need to install at a later time?



A. Windows


B. System32


C. bin


D. WinSxS

D. WinSxS

Which of the following statements are valid reasons as to why administrators might want to install their Windows Server 2012 R2 servers by using the Server Core option? (Choose all that apply)



A. A Server Core installation can be converted to the full GUI without reinstalling the OS.


B. The WIn PowerShell 4.0 interface on Win Server 2012 R2 includes more than 10 times as many cmdlets as Windows PowerShell 2.0


C. The new Server Manager in Win Server 2012 R2 makes it much easier to administer servers remotely.


D. A Windows Server 2012 R2 Server Core license costs significantly less than a full GUI license.

A, C

Which feature must be removed from a full GUI installation of Win Server 2012 R2 in order to convert it to a Server Core installation? (Choose all that apply)



A. Windows Management Instrumentation (WMI)


B. Graphical Management Tools and Infrastructure


C. Desktop Experience


D. Server Graphical Shell

B, D

Which of the following NIC teaming modes provides fault tolerance and bandwidth aggregation?



A. Hyper-V live migration


B. Switch Independent Module


C. Switch Dependent Module


D. Link Aggregation Control Protocol

B. Switch Independent Module

Which of the following command-line tools are used to join a computer to a domain?



A. Net.exe


B. Netsh.exe


C. Netdom.exe


D. Ipconfig.exe

C. Netdom.exe

Which of the following statements about Server Manager is not true?



A. Server Manager can deploy roles to multiple servers at the same time.


B. Server Manager can deploy roles to VHDs while they are offline.


C. Server Manager can install roles and features at the same time.


D. Server Manager can install roles and features to any Windows Server 2012 R2 server on the network.

A. Server Manager can deploy roles to multiple servers at the same time.

Which of the following operations can you not perform on a service by using Server Manager? (Choose all that apply)



A. Stop a running service


B. Start a stopped service


C. Disable a service


D. Configure a service to start when the computer starts

C, D

Which of the following statements are true of striped volumes? (Choose all that apply)



A. Striped volumes provide enhanced performance over simple volumes


B. Striped volumes provide greater fault tolerance than simple volumes


C. You can extend striped volumes after creation.


D. If a single physical disk in the striped volume fails, all the data in the entire volume is lost.

A, D

Which of the following statements best describes the requirements for extending a volume on a dynamic disk? (Choose all that apply)



A. If you want to extend a simple volume, you can use only the available space on the same disk if the volume is to remain simple.


B. The volume must have a file system (a raw volume) before you can extend a simple or spanned volume.


C. You can extend a simple or spanned volume if you formatted it by using the FAT or FAT32 file systems.


D. You can extend a simple volume across additional disks if it is not a system volume or a boot volume.

A, D

Which of the following volume types supported by Windows Server 2012 R2 provide fault tolerance? (Choose all that apply)



A. Striped


B. Spanned


C. Mirrored


D. RAID-5

C, D

A JBOD drive array is an alternative to which of the following storage technologies?



A. SAN


B. SCSI


C. RAID


D. iSCSI

C. Raid

What is the maximum number of shadow copies a Windows Server 2012 R2 system can maintain for each volume?



A. 8


B. 16


C. 64


D. 128

C. 64

Which of the following terms describes the process of granting users access to file server shares by reading their permissions?



A. Authentication


B. Authorization


C. Enumeration


D. Assignment

B. Authorization

Which of the following are tasks you can perform by using the quotas in File Server Resource Manager but can't perform by using NTFS quotas? (Choose all that apply)



A. Send an email message to an administrator when users exceed their limits.


B. Specify different storage limits for each user.


C. Prevent users from consuming storage space on a volume beyond their allotted limit.


D. Generate warnings to users when they approach their allotted storage limit.

A. Send an email to an administrator when users exceed their limits.

In the Windows Server 2012 R2 NTFS permission system, combinations of advanced permissions are also known as ___________ permissions. (Choose all that apply)



A. Special


B. Basic


C. Share


D. Standard

B, D

Which of the following statements best describes the role of the security principal in file system permission assignments?



A. The security principal in file system permission assignments is the only person who can access a file that has no permissions assigned to it.


B. The security principal in file system permission assignments is the person responsible for creating permission policies.


C. The security principal in file system permission assignments is the person assigning the permissions.


D. The security principal in file system permission assignments is the person to whom the permissions are assigned.

D. The security principal in file system permission assignments is the person to whom the permissions are assigned.