• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/70

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

70 Cards in this Set

  • Front
  • Back

Which of the following is a feature first introduced with the Windows Server 2012 R2 domain functional level?

Protected Users group

What are the reasons to use multiple domains?

Need for different name identities, Replication control, Need for differing account policies

A user calls the help desk to change her forgotten password. A minute later, she attempts to log on with the new password but gets a logon failed message. She verifies that she's enter-ing the correct password. She tries logging on again about 30 minutes later and is successful. What's the most likely cause of the delay in her ability to log on?

The domain controller holding the PDC emulator role wasn't contacted by the domain controller that authenticated the user

You have three sites: Boston, Chicago, and LA. You have created site links between Boston and Chicago and between Chicago and LA with the default site link settings. What do you need to do to make sure replication occurs between Boston and LA?

Do nothing; replication will occur between Boston and LA with the current configuration (A)

Which of the following is created automatically by the KCC and is responsible for replication parameters between intra site replication partners?

Connection object (D)

By default, how often does inter site replication occur?

Every 180 minutes (D)

What should you do if client computers can't find domain controller services?

Configure entries in the hosts file (C)

When does non-urgent intrasite replication occur?

15 seconds after any change occurs, with a 3-second delay between partners

Which of the following is true about using SMTP in site links? (Choose all that apply.)

A certification authority must be configured, Domains can span the sites included in the site link, It's best used on slow or unreliable network links (A, B, C)

Which of the following is true about site links? (Choose all that apply.)

Determine replication schedule between DCs, Involved in intersite replication, Can be configured with differing schedules (A, C, D)

Which of the following requires urgent replication?

Changes to the password policy, Changes to the account lockout policy (A, D)

What's the default lease duration on a Windows DHCP server?

8 days

What should you create if you need to service multiple IPv4 subnets on a single physical network?

Super scope

What do you configure if you need to assign addresses dynamically to applications or services that need a class D IP address?

Multicast scope

Which type of DNS query instructs the DNS server to process the query until it responds with an address that satisfies the query or with an "I don't know" message?

Recursive

Which of the following uses digital signatures contained in DNSSEC related resource records to verify DNS responses?

Zone signing

Which security feature should you use if you want to prevent DNS records retrieved from other DNS servers from being overwritten until the TTL is at least 75% expired?

Cache locking

You have four Web servers, all with the same name for load balancing. Your client computers are using a Web server in a remote subnet, even though there's a Web server in their local subnet. What should you do to ensure that client computers use the Web server in their local subnet whenever possible?

Configure net mask ordering

You want to give a junior administrator access to DNS servers so that he can configure zones and resource records, but you don't want to give him broader administrative rights in the domain. What should you do?

Delegate control for the OU where the DNS computer accounts are

Which of the following is true about the DHCP protocol? (Choose all that apply.)

There are eight message types, It uses the UDP Transport-layer protocol

You want to set DAC permissions on folders on several servers in the domain by using group policies. Which of the following should you do first?

Create a central access policy

You have just configured file servers in a new facility to share documents among all users. Users have been complaining that they're getting obscure messages when they try to access some shared folders, and they can't access the files. What should you do so that users get more helpful messages when they can't access shared folders?

Use FSRM to create new file classifications

You want to deploy IPAM in your network. You have four servers running and need to decide on which server you should install the IPAM Server feature. Which of the following server configurations is the best solution?

Windows Server 2012 member server running DHCP

You have just finished the Add Roles and Features Wizard and clicked the IPAM node in Server Manager. The IPAM Server Tasks window indicates that you're connected to the IPAM server. What should you do next?

Start server discovery

Which of the following is true about Dynamic Access Control? (Choose all that apply.)

File classifications are a necessary component of DAC, Central access rules can contain NTFS permissions

Which of the following is true about resource properties? (Choose all that apply.)

They're disabled by default, You have to create any resource property you might want to use, They're used to classify resources

You want shared network storage that's easy to set up and geared toward file sharing with several file-sharing protocols, but you don't want the device to be dedicated to file sharing. What should you consider buying?

NAS

You have four servers that need access to shared storage because you will configure the servers in a cluster. Which storage solution should you consider for this application?

SAN

You have installed a new disk and created a volume on it. What should you do before you can store files on it?

Format it

Which of the following is the correct sequence of steps for creating a volume with Storage Spaces?

Disk pool, virtual disk, volume

What is RAID 0?

The capacity of a RAID 0 volume is the sum of the capacities of the disks in the set, the same as with a spanned volume. There is no added redundancy for handling disk failures, just as with a spanned volume

RAID 1

Data mirroring, without parity or striping. Data is written identically to two (or more) drives, thereby producing a "mirrored set" of drives

RAID 2

RAID 2 consists of bit-level striping with dedicated Hamming-code parity. All disk spindle rotation is synchronized and data is striped such that each sequential bit is on a different drive

RAID 3

RAID 3 consists of byte-level striping with dedicated parity. All disk spindle rotation is synchronized and data is striped such that each sequential byte is on a different drive. Parity is calculated across corresponding bytes and stored on a dedicated parity drive

RAID 4

RAID 4 consists of block-level striping with dedicated parity. The main advantage of RAID 4 over RAID 2 and 3 is I/O parallelism: in RAID 2 and 3, a single read/write I/O operation requires reading the whole group of data drives, while in RAID 4 one I/O read/write operation does not have to spread across all data drives.

RAID 5

RAID 5 consists of block-level striping with distributed parity. Unlike RAID 4, parity information is distributed among the drives, requiring all drives but one to be present to operate. Upon failure of a single drive, subsequent reads can be calculated from the distributed parity such that no data is lost. RAID 5 requires at least three disks

RAID 6

RAID 6 consists of block-level striping with double distributed parity. Double parity provides fault tolerance up to two failed drives.

You need a disk system that provides the best performance for a new application that frequently reads and writes data to the disk. You aren't concerned about disk fault tolerance because the data will be backed up each day; performance is the main concern. What type of volume arrangement should you use?

RAID 0 volume

You have just installed Windows Server 2012 R2 and want to run a full server backup. What do you need to do first?

Run Install –Windows Feature Windows -Server-Backup from a PowerShell prompt

Which command should you use if you want a Windows Server 2012 R2 server to start in Safe Mode the next time it restarts?

bcdedit

What command should you use to revert a volume to an existing shadow copy?

Disk shadow

Which of the following is a disadvantage of using differential backups?

More space is required for backups

You have a domain controller that suffered a system crash, and you have to perform a full server recovery. You have two other DCs on the network, and they have been working fine during the two days the DC was offline. What type of Active Directory restore should you perform?

Non authoritative restore

Which command do you use to configure Windows Server 2012 R2 to boot to a virtual hard disk?

bcdboot C:\Windows

Which of the following situations typically requires the availability of a backup created by Windows Server Backup? (Choose all that apply.)

You need continuous availability of a network service, There's been accidental deletion of folders or files, A server's registry appears to be corrupted.

Which FSRM feature should you use if you want to set certain attributes of a file automatically based on its contents?

Classification Management

Which of the following is a logical storage space consisting of one or more virtual disks in an iSCSI system?

iSCSI target

What does iSCSI use to reference a logical drive provided by the iSCSI target?

iSCSI Logical Unit Number (LUN)

If you enable authentication on an iSCSI target, what authentication protocol is used?

Challenge-Handshake Authentication Protocol (CHAP)

Which of the following can benefit from using the Branch Cache role service? (Choose all that apply.)

File Server, Web Server, Background Intelligence Transfer Service (BITS)

What's created in Active Directory during the failover cluster creation process?

A computer object with the name of the cluster

Which of the following is a requirement for creating a failover cluster? (Choose all that apply.)

Windows Server 2012 /R2 Standard or Data centre edition, Servers that are Active Directory domain members or domain controllers

You need to perform maintenance on a cluster and must take the entire cluster offline. Which of the following is the best approach?

Right-click the cluster name, point to More Actions, and click Shut Down Cluster

Which of the following is a prerequisite for deploying a clustered storage space?

You need at least three unallocated disks

Version 1 templates can't be modified, but they can be duplicated and then modified. True or False?

true

Which of the following is used in both ends of the cryptography process (encryption and decryption) and must be known by both parties?

Secret key

Camille and Sophie want to engage in secure communication. Both hold a public/private key pair. Camille wants to send an encrypted message to Sophie. Which of the following happens first?

Camille encrypts the message with her public key

A certificate is issued on July 1, 2015. Its validity period is 2 years, and its renewal period is 2 months. When can the certificate first be renewed?

September 1, 2017

Which role can renew the CA certificate?

CA Administrator

You want to begin using smart cards for user logon. The number of enrolment stations you have is limited, so you want to assign department administrators to enrol only other users in their departments in smart card certificates. How should you go about this?

Issue the designated department administrators an Enrolment Agent certificate. Configure the CA server's properties to restrict enrolment agents. Publish the smart card certificate template. Have the designated enrolment agents use Web enrolment to enrol departmental users in the smart card certificates

Which of the following steps is necessary to configure an online responder?

Configure an OCSP Response Signing certificate template, Enrol the OR with the OCSP Response Signing certificate., Configure revocation for the OR

In a federation trust, the company whose users are accessing resources is referred to as which of the following

Account partner

You're installing AD FS to facilitate transactions with a business partner. You want to keep the federation server secure behind a firewall and don't want direct communication between your partner's computer and the federation server. What should you use?

Federation service proxy

You have several Web applications that you want trusted Internet clients to be able to access with a single sign-on. The Internet clients aren't from a single company; they can be from anywhere on the Internet. Which AD DS design should you use?

Web SSO

Which of the following role services do you use with AD FS deployed on a Windows Server 2012 R2 server if you need a proxy on the perimeter network?

Web Application Proxy

What should you configure in AD FS when you want the claims provider to trust the relying party from which claims are made?

Claims provider trust

What should you configure if certain attributes from the claims provider must be mapped to attributes the relying party can accept?

Authentication policies

Which of the following is true about an AD RMS deployment?

The service account must be a regular domain user

Which of the following is true about AD RMS installation and configuration?

A self-signed certificate can be used for the server certificate

Which of the following contains the public key of the AD RMS server?

Server licensor certificate