• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/59

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

59 Cards in this Set

  • Front
  • Back

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2008 R2. Youplan to test Windows Server 2012 by using native-boot virtual hard disks (VHDs). You attach a new VHD to Server1. You need to install Windows Server 2102 inthe VHD. What should you do?


A. Run dism.exe and specify the /apply-image parameter.


B. Run dism.exe and specify the /append-image parameter.


C. Run imagex.exe and specify the /export parameter.


D. Run imagex.exe and specify the /append parameter.

A. Run dism.exe and specify the /apply-image parameter.

You have a server named Admin1 that runs Windows Server 2012. On Admin1, you configure a custom Data Collector Set (DCS) named DCS1. DCS1 isconfigured to store performance log data in C:\Logs. You need to ensure that the contents of C:\Logs are deleted automatically when the folder reaches 100 MB insize. What should you configure?


A. A File Server Resource Manager (FSRM) quota on the C:\Logs folder


B. A File Server Resource Manager (FSRM) file screen on the C:\Logs folder


C. A schedule for DCS1


D. The Data Manager settings of DCS1

D. The Data Manager settings of DCS1

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 and a servernamed Server2 that has the File Services server role installed. You install the Windows Deployment Services server role on Server1. You plan to use Server2 as areference computer. You need to create an image of Server2 by using Windows Deployment Services. Which type of image should you add to Server1 first?


A. InstallB. BootC. DiscoveryD. Capture

B. Boot

You have a server named Server1 that runs Windows Server 2012. You create a Data Collector Set (DCS) named DCS1. You need to configure DCS1 to log datato D:\logs. What should you do?


A. Right-click DCS1 and click Properties.


B. Right-click DCS1 and click Save template.


C. Right-click DCS1 and click Data Manager.


D. Right-click DCS1 and click Export list.

A. Right-click DCS1 and click Properties.

You have a server named WSUS1 that runs Windows Server 2012. WSUS1 has the Windows Server Update Services server role installed and has one volume.You add a new hard disk to WSUS1 and then create a volume on the hard disk. You need to ensure that the Windows Server Update Services (WSUS) update filesare stored on the new volume. What should you do?


A. From a command prompt, run wsusutil.exe and specify the move content parameter.


B. From the Update Services console, run the Windows Server Update Services Configuration Wizard.


C. From the Update Services console, configure the Update Files and Languages option.


D. From a command prompt, run wsusutil.exe and specify the export parameter.

A. From a command prompt, run wsusutil.exe and specify the move content parameter.

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012. Server1has the DHCP Server role installed. The network contains 400 client computers that run Windows 8. All of the client computers are joined to the domain and areconfigured DHCP clients. You install a new server named Server2 that runs Windows Server 2012. On Server2, you install the Network Policy Server role serviceand you configure Network Access Protection (NAP) to use the DHCP enforcement method. You need to ensure that Server1 only provides a valid default gatewayto computers that pass the system health validation. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)


A. From the DHCP console, configure the 016 Swap Server option.


B. From the DHCP console, create a new policy.


C. From the NAP Client Configuration console, enable the DHCP Quarantine Enforcement Client.


D. From the DHCP console, enable NAP on all scopes.


E. From Server Manager, install the Network Policy Server role service.

D. From the DHCP console, enable NAP on all scopes.




E. From Server Manager, install the Network Policy Server role service.

Your network contains an Active Directory domain named adatum.com. The domain contains a server named Server1 that runs Windows Server 2012. Server1 isconfigured as a Network Policy Server (NPS) server and as a DHCP server. You need to ensure that only computers that send a statement of health are checkedfor Network Access Protection (NAP) health requirements. Which two settings should you configure? (Each correct answer presents part of the solution.Choose two.)


A. The Called Station ID constraints


B. The MS-Service Class conditions


C. The Health Policies conditions


D. The NAS Port Type constraints


E. The NAP-Capable Computers conditions

C. The Health Policies conditions




E. The NAP-Capable Computers conditions

Your network contains an Active Directory domain named adatum.com. The domain contains aserver named Server1 that runs Windows Server 2012. Server1 is configured as a Network Policy Server (NPS) server and as a DHCP server. You need to log allDHCP clients that have Windows Firewall disabled. Which three actions should you perform in sequence? To answer, move the three appropriate actions from thelist of actions to the answer area and arrange them in the correct order.


A. Create a connection request policy


B. Create Network Policy


C. Create remediation server group


D. Create Windows Security Health Validator


E. Create a health Policy

B. Create Network Policy




D. Create Windows Security Health Validator




E. Create a health Policy

Force an authoritative and non-authoritative synchronization for DFSR-replicated SYSVOL




A. dfsgui.mscB. ultrasoundC. rplmonD. frsutil

C. rplmon

Force an authoritative and non-authoritative synchronization for DFSR-replicated SYSVOL




A. ldpB. dfsgui.mscC. ultrasoundD. rplmon

D. rplmon

How to give the minimum required permission to a user who wants to promote a RODC.




A. member of the Domain Admins group


B. allowed to attach the server to the RODC computer account


C. Local admin


D. organization admin

B. allowed to attach the server to the RODC computer account




C. Local admin

Your network contains an Active Directory domain named adatum.com. You need to audit changes to the files in the SYSVOL shares on all of the domaincontrollers. The solution must minimize the amount of SYSVOL replication traffic caused by the audit. Which two settings should you configure? (Each correctanswer presents part of the solution. Choose two.)


A. Audit Policy\Audit system events


B. Advanced Audit Policy Configuration\DS Access


C. Advanced Audit Policy Configuration\Global Object Access Auditing


D. Audit Policy\Audit object access


E. Audit Policy\Audit directory service access


F. Advanced Audit Policy Configuration\Object Access

D. Audit Policy\Audit object access




F. Advanced Audit Policy Configuration\Object Access

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012. The domain contains 500 client computers that run Windows 8 Enterprise. You implement a Group Policy central store. You have an application named App1. App1 requires that a custom registrysetting be deployed to all of the computers. You need to deploy the custom registry setting. The solution must minimize administrator effort. What should youconfigure in a Group Policy object (GPO)?


A. The Administrative Templates


B. An application control policy


C. The Group Policy preferences


D. Software installation setting

D. Software installation setting

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012. Youcreate an Active Directory snapshot of DC1 each day. You need to view the contents of an Active Directory snapshot from two days ago. What should you do first?


A. Run the dsamain.exe command.


B. Stop the Active Directory Domain Services (AD DS) service.


C. Run the ntdsutil.exe command.


D. Start the Volume Shadow Copy Service (VSS).

C. Run the ntdsutil.exe command.

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012. You pre-create a read-only domaincontroller (P.QDC) account named RODC1. You export the settings of RODC1 to a file named File1.txt. You need to promote RODC1 by using File1.txt. Which toolshould you use?


A. The Dcpromo command


B. The Install-WindowsFeature cmdlet


C. The Install-ADDSDomainController cmdlet


D. The Add-WindowsFeature cmdlet


E. The Dism command

A. The Dcpromo command

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2008 R2. The domain contains three serversthat run Windows Server 2012. The servers are configured as shown in the following table.


Svr 1 - Web Svr Role Svr 2 - Web Svr Svr 3 - SQL Svr


Server1 and Server2 are configured in a Network Load Balancing (NLB) cluster. The NLB cluster hosts a website named Web1 that uses an application pool named App1. Web1 uses a database named DB1 as its data store. You create an account named User1. You configure User1, as the identity of App1. You need to ensurethat contoso.com domain users accessing Web1 connect to DB1 by using their own credentials. Which two actions should you perform? (Each correct answerpresents part of the solution. Choose two.)


A. Configure the delegation settings of Server3.


B. Create a Service Principal Name (SPN) for User1.


C. Configure the delegation settings of User1.


D. Create a matching Service Principal Name (SPN) for Server1 and Server2.


E. Configure the delegation settings of Server1 and Server2.

B. Create a Service Principal Name (SPN) for User1.




E. Configure the delegation settings of Server1 and Server2.

Your network contains an Active Directory domain named contoso.com. Domain controllers run either Windows Server 2003, Windows Server 2008 R2, orWindows Server 2012. A support technician accidentally deletes a user account named User1. You need to use tombstone reanimation to restore the User1account. Which tool should you use?


A. Ntdsutil


B. Ldp


C. Esentutl


D. Active Directory Administrative Center

B. Ldp

Your network contains an Active Directory domain named contoso.com. The domain contains adomain controller named DC4 that runs Windows Server 2012. You create a DCCloneConfig.xml file. You need to clone DC4. Where should you placeDCCloneConfig.xml on DC4?


A. %Systemroot%\SYSVOL


B. %Programdata%\Microsoft


C. %Systemroot%\NTDS


D. %Systemdrive%

C. %Systemroot%\NTDS

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1. You run ntdsutil (as shown in theexhibit).


cmd window:


c:\ntdsutil


ntdsutil: snapshot


snapshot: list all


1. 2012/04/13:10:56 {79f94f82-5926-4f448af0-2f56d827a57d}


2. C: {7385b8ee-cedac-445c-aa93-e322c16b8d9f} c:\$snap_201204131056_volumec$\


snapshot:


You need to ensure that you can access the contents of the mounted snapshot. What should you do?


A. From a command prompt, run dsamain.exe -dbpathc:\$snap_201204131056_volumec$\windows\ntds\ntds.dit - Idapport 33389.


B. From a command prompt, run dsamain.exe -dbpathc:\$snap_201204131056_volumec$\windows\ntds\ntds.dit - Idapport 389.


C. From the snapshot context of ntdsutil, run activate instance "NTDS".


D. From the snapshot context of ntdsutil, run mount (79f94f82-5926-4f44-8af0-2f56d827a57d).

A. From a command prompt, run dsamain.exe -dbpath c:\$snap_201204131056_volumec$\windows\ntds\ntds.dit - Idapport 33389.

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1. On DC1, you add a new volume andyou stop the Active Directory Domain Services (AD DS) service. You run ntdsutil.exe and you set NTDS as the active instance. You need to move the ActiveDirectory database to the new volume. Which Ntdsutil context should you use?


A. Configurable SettingsB. Partition managementC. IFMD. Files

D. Files

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012. On all of the domain controllers, Windowsis installed in C:\Windows and the Active Directory database is located in D:\Windows\NTDS\. All of the domain controllers have a third-party application installed.The operating system fails to recognize that the application is compatible with domain controller cloning. You verify with the application vendor that the applicationsupports domain controller cloning. You need to prepare a domain controller for cloning. What should you do?


A. In D:\Windows\NTDS\, create an XML file named DCCloneConfig.xml and add the application information to the file.


B. In D:\Windows\NTDS\, create an XML file named CustomDCCloneAllowList.xml and add the application information to the file.


C. In the root of a USB flash drive, add the application information to an XML file named DefaultDCCloneAllowList.xml.


D. In D:\Windows\NTDS, create an XML file named DefaultDCCloneAllowList.xml and add the application information to the file.

B. In D:\Windows\NTDS\, create an XML file named CustomDCCloneAllowList.xml and add the application information to the file.

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012. On all of the domain controllers, Windowsis installed in C:\Windows and the Active Directory database is located in D:\Windows\NTDS\. All of the domain controllers have a third-party application installed.The operating system fails to recognize that the application is compatible with domain controller cloning. You verify with the application vendor that the applicationsupports domain controller cloning. You need to prepare a domain controller for cloning. What should you do?


A. In the root of a USB flash drive, add the application information to an XML file named DefaultDCCloneAllowList.xml.


B. In C:\Windows\system32\sysprep\actionfiles\, add the application information to an XML file named Specialize .xml."Best Material, Great Results". www.certkingdom.com 160 70-411


C. In D:\Windows\NTDS\, create an XML file named CustomDCCloneAllowList.xml and add the application information to the file.


D. In C:\Windows\system32\sysprep\actionfiles\add the application information to an XML file named Respecialize .xml.

C. In D:\Windows\NTDS\, create an XML file named CustomDCCloneAllowList.xml and add the application information to the file.

Your network contains an Active Directory domain named contoso.com. You create a user account named User1. The properties of User1 are shown in the exhibit.


(User 1 Properties Window is shown w/ no data)


You plan to use the User1 account as a service account. The service will forward authentication requests to other servers. You need to ensure that you can view theDelegation tab from the properties of the User1 account. What should you do first?


A. Modify the Security settings of User1.


B. Modify the user principal name (UPN) of User1.


C. Configure a Service Principal Name (SPN) for User1.


D. Configure the Name Mappings of User1.

C. Configure a Service Principal Name (SPN) for User1.

Your network contains an Active Directory domain named adatum.com. The domain contains a domain controller named DC1. On DC1, you create a new volumenamed E. You restart DC1 in Directory Service Restore Mode. You open ntdsutil.exe and you set NTDS as the active instance. You need to move the ActiveDirectory logs to E:\NTDS\. Which Ntdsutil context should you use?


A. IFMB. Configurable SettingsC. Partition managementD. Files

D. Files

Your network contains an Active Directory domain named contoso.com. The domain contains six domain controllers. The domain controllers are configured asshown in the following table.


DC1: 08R2 - PDC Emulator DC2: 2012 Schema


DC3: 08R2 - Infrastructure DC4: 08R2 Domain Nameing


DC5: 08R2 - RID DC6: 2012 No FSMO Roles


The network contains a server named Server1 that has the Hyper-V server role installed. DC6 is a virtual machine that is hosted on Server1. You need to ensurethat you can clone DC6. Which FSMO role should you transfer to DC2?


A. Infrastructure Master


B. RID Master


C. Domain Naming Master


D. PDC emulator

D. PDC emulator

Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server1. Server1 runs Windows Server2012 and has the Hyper-V server role installed. Server1 hosts 10 virtual machines. A virtual machine named VM1 runs Windows Server 2012 and hosts aprocessor-intensive application names App1. Users report that App1 responds more slowly than expected. You need to monitor the processor usage on VM1 toidentify whether changes must be made to the hardware settings of VM1. Which performance object should you monitor on Server1?


A. Processor


B. Hyper-V Hypervisor Root Virtual Processor


C. Hyper-V Hypervisor Logical Processor


D. Process


E. Hyper-V Hypervisor Virtual Processor

E. Hyper-V Hypervisor Virtual Processor

The contoso.com domain contains 2 domain controllers running Server 2012, AD recycle bin is enabled for the domain. DC1 is configured to take AD snapshotsdaily, DC2 is set to take snapshots weekly. Someone deletes a group containing 100 users, you need to recover this group. What should you do?


A. Authoritative Restore


B. Non Authoritative Restore


C. Tombstone Reanimation


D. Modify attribute isdeleted=true

C. Tombstone Reanimation

You have a RODC named Server1 running Server 2012. You need to add a RODC Administrator.How do you complete the task?


A. dsmgmt.exe


B. ntdsutil


C. Add user to Local Administrator Group on Server1


D. Use Security Group and modify RODC Delegated Administrator

D. Use Security Group and modify RODC Delegated Administrator

Your network contains an Active Directory domain named contoso.com. You need to create an AD Snapshot. Which four actions should you perform?To answer, move the four appropriate actions from the list of actions to the answer area and arrange them in the correct order.Select and Place:


create


mount


snapshot


list instance


ntdsutil


files


activate instance ntds

ntdsutil


snapshot


activate instance ntds


create

Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. All domain controllers run Windows Server 2012. Thedomain contains two domain controllers. The domain controllers are configured as shown in the following table.


DC1: Physical Svr: Daily snapshots of AC


DC2: Hyper V Machine: Daily snapshots of VM & Daily backups of sys state


Active Directory Recycle Bin is enabled. You discover that a support technician accidentally removed 100 users from an Active Directory group named Group1 anhour ago. What should you do?


A. Perform a non-authoritative restore.


B. Modify the Recycled attribute of Group1.


C. Perform an authoritative restore.


D. Recover the items by using Active Directory Recycle Bin.

D. Recover the items by using Active Directory

Your network contains an Active Directory domain named contoso.com. The domain contains a read-only domain controller (RODC) named RODC1. You create aglobal group named RODC_Admins. You need to provide the members of RODC_Admins with the ability to manage the hardware and the software on RODC1.The solution must not provide RODC_Admins with the ability to manage Active Directory objects. What should you do?


A. From Active Directory Users and Computers, configure the Managed By settings of the RODC1 account.


B. From Active Directory Sites and Services, run the Delegation of Control Wizard


C. From Active Directory Users and Computers, run the Delegation of Control Wizard.


D. From a command prompt, run the dsadd computer command.

A. From Active Directory Users and Computers, configure the Managed By settings of the RODC1 account.

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012. In a remote site, a support technicianinstalls a server named DC10 that runs Windows Server 2012. DC10 is currently a member of a workgroup. You plan to promote DC10 to a read-only domaincontroller (RODC). You need to ensure that a user named Contoso/User1 can promote DC10 to a RODC in the contoso.com domain. The solution must minimizethe number of permissions assigned to User1. What should you do?


A. Join DC10 to the domain. Modify the properties of the DC10 computer account.


B. From Active Directory Administrative Center, pre-create an RODC computer account.


C. Join DC10 to the domain. Run dsmod and specify the /server switch.


D. From Active Directory Administrative Center, modify the security settings of the Domain Controllers organizational unit (OU).

B. From Active Directory Administrative Center, pre-create an RODC computer account.

Your network contains an Active Directory domain named contoso.com. The domain contains sixdomain controllers. The domain controllers are configured as shown in the following table.


DC1: 08R2 - PDC Emulator DC2: 2012 Schema


DC3: 08R2 - Infrastructure DC4: 08R2 Domain Nameing


DC5: 08R2 - RID DC6: 2012 No FSMO Roles


The network contains a server named Server1 that has the Hyper-V server role installed. DC6 is a virtual machine that is hosted on Server1. You need to ensurethat you can clone DC6. What should you do?


A. Transfer the schema master to DC6.


B. Transfer the schema master to DC4.


C. Transfer the PDC emulator to DC2.


D. Transfer the PDC emulator to DC5.

C. Transfer the PDC emulator to DC2.

Your network contains an Active Directory forest named contoso.com. All servers run Windows Server 2012. You need to create a custom Active Directoryapplication partition. Which tool should you use?


A. DsaddB. DsmodC. NetdomD. Ntdsutil

D. Ntdsutil

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012. The domain contains two servers. Theservers are configured as shown in the following table.


Svr1: 2012 - Web svr w/ Network Load Balance feat


Svr2: 2012 Web Svr w/ Network Load balance feat


Server1 and Server2 host a load-balanced website named Web1. Web1 runs by using an application pool named WebApp1. WebApp1 uses a group ManagedService Account named gMSA1 as its identity. Domain users connect to Web1 by using either the name webl.contoso.com or the alias myweb.contoso.com. Youdiscover the following:* When the users access Web1 by using webl.contoso.com, they authenticate by using Kerberos.* When the users access Web1 by using myweb.contoso.com, they authenticate by using NTLM.You need to ensure that the users can authenticate by using Kerberos when they connect by using myweb.contoso.com. What should you do?


A. Modify the properties of the WebApp1 application pool.


B. Run the Add-ADComputerServiceAccount cmdlet.


C. Modify the properties of the Web1 website.


D. Modify the properties of the gMSA1 service account.

B. Run the Add-ADComputerServiceAccount cmdlet.

Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server1. Server1 runs Windows Server2012 and has the Hyper-V server role installed. Server1 hosts 10 virtual machines. A virtual machine named VM1 runs Windows Server 2012 and hosts aprocessor-intensive application named Appl. Users report that App1 responds more slowly than expected. You need to monitor the processor usage on VM1 toidentify whether changes must be made to the hardware settings of VM1. Which performance object should you monitor on Server1?


A. Processor


B. Hyper-V Hypervisor Virtual Processor


C. Hyper-V Hypervisor Root Virtual Processor


D. Process


E. Hyper-V Hypervisor Logical Processor

B. Hyper-V Hypervisor Virtual Processor

Your network contains an Active Directory domain named adatum.com. The domain contains 10domain controllers that run Windows Server 2012.You plan to create a new Active Directory-integrated zone named contoso.com. You need to ensure that the new zone will be replicated to only four of the domaincontrollers.What should you do first?


A. Create an Active Directory connection object.


B. Create an application directory partition.


C. Change the zone replication scope.


D. Create an Active Directory site link.

B. Create an application directory partition.

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012. You pre-create a read-only domaincontroller (P.QDC) account named RODC1. You export the settings of RODC1 to a file named Filel.txt. You need to promote RODC1 by using Filel.txt. Which toolshould you use?


A. The Install-WindowsFeature cmdlet


B. The Add-WindowsFeature cmdlet


C. The Dism command


D. The Install-ADDSDomainController cmdlet


E. the Dcpromo command

E. the Dcpromo command

How to configure IIS to change the authentication (kerberos or ntlm) Solution:cscript adsutil.vbs set w3svc/WebSite/root/NTAuthenticationProviders "Negotiate,NTLM"




A. TrueB. False

A. True

You need to enable three of your domain controllers as global catalog servers. Where would you configure the domain controllers as global catalogs?


A. Forest, NTDS settings


B. Domain, NTDS settings


C. Site, NTDS settings


D. Server, NTDS settings

D. Server, NTDS settings

You are the network administrator for your organization. Your company uses a Windows Server 2012 Enterprise certification authority to issue certificates. Youneed to start using key archival.What should you do?


A. Implement a distribution CRL.


B. Install the smart card key retrieval.


C. Implement a Group Policy object (GPO) that enables the Online Certificate Status Protocol (OCSP) responder.


D. Archive the private key on the server

D. Archive the private key on the server

Which parameter do you need to use to import GUID and MAC address?


A. /get-AutoAddDevices


B. /get-Device


C. /add


D. /enable

B. /get-Device

A computer does not support PXE, what kind of image do you need to create?




A. bootB. installC. discoveryD. capture

C. discovery

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012. The domain contains two organizationalunits (OUs) named OU1 and OU2 in the root of the domain. Two Group Policy objects (GPOs) named GPO1 and GPO2 are created. GPO1 is linked to OU1. GPO2is linked to OU2. OU1 contains a client computer named Computer1. OU2 contains a user named User1. You need to ensure that the GPOs applied to Computer1are applied to User1 when User1 logs on. What should you configure?


A. Item-level targeting


B. Group Policy loopback processing mode


C. the Enforced setting


D. Block Inheritance

B. Group Policy loopback processing mode

Your network contains a single Active Directory domain named contoso.com. The domain contains a member server named Server1 that runs Windows Server2012. Server1 has the Windows Server Updates Services server role installed and is configured to download updates from the Microsoft Update servers. You needto ensure that Server1 only downloads Critical Updates from the Microsoft Update servers. What should you do from the Update Services console?


A. From the Automatic Approvals options, configure the Update Rules settings.


B. From the Products and Classifications options, configure the Classifications settings.


C. From the Products and Classifications options, configure the Products settings.


D. From the Update Files and Languages options, configure the Update Files settings.

B. From the Products and Classifications options, configure the Classifications settings.

Your network contains an Active Directory domain named contoso.com. The network contains a server named Server1 that runs Windows Server 2012. Server1has the Network Policy and Access Services server role installed. You plan to deploy additional servers that have the Network Policy and Access Services serverrole installed. You must standardize as many settings on the new servers as possible. You need to identify which settings can be standardized by using the NetworkPolicy Server (NPS) templates. Which three settings should you identify? (Each answer presents part of the solution. Choose three.)


A. IP filters


B. shared secrets


C. health policies


D. network policies


E. connection request policies

A. IP filters


B. shared secrets


C. health policies

From where can you enable NAT?




A. Routing and Remote Access ==> IPv4 ==> Create new Routing Protocol



A. Routing and Remote Access ==> IPv4 ==> Create new Routing Protocol

You are the network administrator for a midsize computer company. You have a single Active Directory forest, and your DNS servers are configured as ActiveDirectory Integrated zones. When you look at the DNS records in Active Directory, you notice that there are many records for computers that do not exist on yourdomain. You want to make sure only domain computers register with your DNS servers. What should you do to resolve this issue?


A. Set dynamic updates to None.


B. Set dynamic updates to Nonsecure And Secure.


C. Set dynamic updates to Domain Users Only.


D. Set dynamic updates to Secure Only.

D. Set dynamic updates to Secure Only.

Your network contains an Active Directory domain named adatum.com. You have a standard primary zone named adatum.com. You need to provide a user namedUser1 the ability to modify records in the zone. Other users must be prevented from modifying records in the zone. What should you do first?


A. From the properties of the zone, modify the start of authority (SOA) record.


B. Run the Zone Signing Wizard for the zone.


C. Run the New Delegation Wizard for the zone.


D. From the properties of the zone, change the zone type.

D. From the properties of the zone, change the zone type.

You have a server named Server1 that runs Windows Server 2012. Server1 has 2 dual-core processors and 16 GB of RAM. You install the Hyper-V server role inServer1. You plan to create two virtual machines on Server1. You need to ensure that both virtual machines can use up to 8 GB of memory. The solution mustensure that both virtual machines can be startedsimultaneously. What should you configure on each virtual machine?


A. Dynamic Memory


B. NUMA topology


C. Memory weight


D. Resource Control

A. Dynamic Memory

You have a server named Server1 that runs Windows Server 2012. You promote Server1 to domain controller. You need to view the service location (SVR) recordsthat Server1 registers on DNS. What should you do on Server1?


A. Open the Srv.sys file


B. Open the Netlogon.dns file


C. Run ipconfig/displaydns


D. Run Get-DnsServerDiagnostics

B. Open the Netlogon.dns file

Your company has a remote office that contains 600 client computers on a single subnet. You need to select a subnet mask for the network that will support all ofthe client computers. The solution must minimize the number of unused addresses. Which subnet mask should you select?


A. 255.255.252.0


B. 255.255.254.0


C. 255.255.255.0


D. 255.255.255.128

A. 255.255.252.0

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Admin1 and Server2. Both servers run WindowsServer 2012. Both servers have the File and Storage Services server role, the DFS Namespaces role service, and the DFS Replication role service installed.Admin1 and Server2 are part of a Distributed File System (DFS) Replication group named Group1. Admin1 and Server2 are separated by a low-speed WANconnection. You need to limit the amount of bandwidth that DFS can use to replicate between Admin1 and Server2. What should you modify?


A. The cache duration of the namespace


B. The staging quota of the replicated folder


C. The referral ordering of the namespace


D. The schedule of the replication group

D. The schedule of the replication group

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012. One of the domain controllers is namedDC1. The DNS zone for the contoso.com zone is Active Directory-integrated and has the default settings. A server named Server1 is a DNS server that runs aUNIX-based operating system. You plan to use Server1 as a secondary DNS server for the contoso.com zone. You need to ensure that Server1 can host asecondary copy of the contoso.com zone. What should you do?


A. From Windows PowerShell, run the Set-DnsServerForwarder cmdlet and specify the contoso.com zone as a target.


B. From Windows PowerShell, run the Set-DnsServerSetting cmdlet and specify DC1 as a target.


C. From Windows PowerShell, run the Set-DnsServerPrimaryZone cmdlet and specify the contoso.com zone as a target.


D. From DNS Manager, modify the Advanced settings of DC1.

C. From Windows PowerShell, run the Set-DnsServerPrimaryZone cmdlet and specify the contoso.com zone as a target.

Your network contains two Active Directory domains named contoso.com and adatum.com. The contoso.com domain contains a server namedServer1.contoso.com. The adatum.com domain contains a server named server2.adatum.com. Server1 and Server2 run Windows Server 2012 and have theDirectAccess and VPN (RRAS) role service installed. Server1 has the default network policies and the default connection request policies. You need to configureServer1 to perform authentication and authorization of VPN connection requests to Server2. Only users who are members of Adatum\Group1 must be allowed toconnect. Which two actions should you perform on Server1? (Each correct answer presents part of the solution. Choose two.)


A. Network policies


B. Connection request policies


C. Create a network policy.


D. Create a connection request policy.

A. Network policies




D. Create a connection request policy.

You are a network administrator of an Active Directory domain named contoso.com. You have a server named Server1 that runs Windows Server 2012. Server1has the DHCP Server server role and the Network Policy Server role service installed. You enable Network Access Protection (NAP) on all of the DHCP scopes on Server1. You need to create a DHCP policy that will apply to all of the NAP non-compliant DHCP clients. Which criteria should you specify when you create theDHCP policy?


A. The relay agent information


B. The user class


C. The vendor class


D. The client identifier

B. The user class

Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. All domain controllers run Windows Server 2012. Thedomain contains two domain controllers. The domain controllers are configured as shown in the following table.




DC1 Physical Svr - daily snapshots of AD


DC2 Hyper V VM - Daily snapshots of VM & backup of sys state



You discover that a support technician accidentally removed 100 users from an Active Directory group named Group1 an hour ago. You need to restore themembership of Group1. What should you do?


A. Apply a virtual machine snapshot to VM1.


B. Perform an authoritative restore.


C. Perform a non-authoritative restore.


D. Perform tombstone reanimation.

B. Perform an authoritative restore.

Your network contains an Active Directory domain named contoso.com. The domain contains a read-only domain controller (RODC) named RODC1. You create aglobal group named RODC_Admins. You need to provide the members of RODC_Admins with the ability to manage the hardware and the software on RODC1.The solution must not provide RODC_Admins with the ability to manage Active Directory objects. What should you do?


A. From Active Directory Site and Services, configure the Security settings of the RODC1 server object.


B. From Active Directory Sites and Services, run the Delegation of Control Wizard.


C. From Windows PowerShell, run the Set-ADAccountControl cmdlet.


D. From Active Directory Users and Computers, configure the Managed By settings of the RODC1 account.

D. From Active Directory Users and Computers, configure the Managed By settings of the RODC1 account.

Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012. The domain contains a file server named Server1.All client computers run Windows8. Users share the client computers and frequently log on to different client computers. You need to ensure that when the users save files in the Documents folder,the files are saved automatically to \\Server1\Users\. The solution must minimize the amount of network traffic that occurs when the users log on to the clientcomputers. What should you do?


A. From a Group Policy object (GPO), configure the Folder Redirection settings.


B. From the properties of each user account, configure the Home folder settings.


C. From the properties of each user account, configure the User profile settings.


D. From a Group Policy object (GPO), configure the Drive Maps preference.

A. From a Group Policy object (GPO), configure the Folder Redirection settings.