Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
70 Cards in this Set
- Front
- Back
Which of the following is a feature first introduced with the Windows Server 2012 R2 domain functional level? |
Protected Users group |
|
What are the reasons to use multiple domains? |
Need for different name identities, Replication control, Need for differing account policies |
|
A user calls the help desk to change her forgotten password. A minute later, she attempts to log on with the new password but gets a logon failed message. She verifies that she's enter-ing the correct password. She tries logging on again about 30 minutes later and is successful. What's the most likely cause of the delay in her ability to log on? |
The domain controller holding the PDC emulator role wasn't contacted by the domain controller that authenticated the user |
|
You have three sites: Boston, Chicago, and LA. You have created site links between Boston and Chicago and between Chicago and LA with the default site link settings. What do you need to do to make sure replication occurs between Boston and LA? |
Do nothing; replication will occur between Boston and LA with the current configuration (A) |
|
Which of the following is created automatically by the KCC and is responsible for replication parameters between intra site replication partners? |
Connection object (D) |
|
By default, how often does inter site replication occur? |
Every 180 minutes (D) |
|
What should you do if client computers can't find domain controller services? |
Configure entries in the hosts file (C) |
|
When does non-urgent intrasite replication occur? |
15 seconds after any change occurs, with a 3-second delay between partners |
|
Which of the following is true about using SMTP in site links? (Choose all that apply.) |
A certification authority must be configured, Domains can span the sites included in the site link, It's best used on slow or unreliable network links (A, B, C) |
|
Which of the following is true about site links? (Choose all that apply.) |
Determine replication schedule between DCs, Involved in intersite replication, Can be configured with differing schedules (A, C, D) |
|
Which of the following requires urgent replication? |
Changes to the password policy, Changes to the account lockout policy (A, D) |
|
What's the default lease duration on a Windows DHCP server? |
8 days |
|
What should you create if you need to service multiple IPv4 subnets on a single physical network? |
Super scope |
|
What do you configure if you need to assign addresses dynamically to applications or services that need a class D IP address? |
Multicast scope |
|
Which type of DNS query instructs the DNS server to process the query until it responds with an address that satisfies the query or with an "I don't know" message? |
Recursive |
|
Which of the following uses digital signatures contained in DNSSEC related resource records to verify DNS responses? |
Zone signing |
|
Which security feature should you use if you want to prevent DNS records retrieved from other DNS servers from being overwritten until the TTL is at least 75% expired? |
Cache locking |
|
You have four Web servers, all with the same name for load balancing. Your client computers are using a Web server in a remote subnet, even though there's a Web server in their local subnet. What should you do to ensure that client computers use the Web server in their local subnet whenever possible? |
Configure net mask ordering |
|
You want to give a junior administrator access to DNS servers so that he can configure zones and resource records, but you don't want to give him broader administrative rights in the domain. What should you do? |
Delegate control for the OU where the DNS computer accounts are |
|
Which of the following is true about the DHCP protocol? (Choose all that apply.) |
There are eight message types, It uses the UDP Transport-layer protocol |
|
You want to set DAC permissions on folders on several servers in the domain by using group policies. Which of the following should you do first? |
Create a central access policy |
|
You have just configured file servers in a new facility to share documents among all users. Users have been complaining that they're getting obscure messages when they try to access some shared folders, and they can't access the files. What should you do so that users get more helpful messages when they can't access shared folders? |
Use FSRM to create new file classifications |
|
You want to deploy IPAM in your network. You have four servers running and need to decide on which server you should install the IPAM Server feature. Which of the following server configurations is the best solution? |
Windows Server 2012 member server running DHCP |
|
You have just finished the Add Roles and Features Wizard and clicked the IPAM node in Server Manager. The IPAM Server Tasks window indicates that you're connected to the IPAM server. What should you do next? |
Start server discovery |
|
Which of the following is true about Dynamic Access Control? (Choose all that apply.) |
File classifications are a necessary component of DAC, Central access rules can contain NTFS permissions |
|
Which of the following is true about resource properties? (Choose all that apply.) |
They're disabled by default, You have to create any resource property you might want to use, They're used to classify resources |
|
You want shared network storage that's easy to set up and geared toward file sharing with several file-sharing protocols, but you don't want the device to be dedicated to file sharing. What should you consider buying? |
NAS |
|
You have four servers that need access to shared storage because you will configure the servers in a cluster. Which storage solution should you consider for this application? |
SAN |
|
You have installed a new disk and created a volume on it. What should you do before you can store files on it? |
Format it |
|
Which of the following is the correct sequence of steps for creating a volume with Storage Spaces? |
Disk pool, virtual disk, volume |
|
What is RAID 0? |
The capacity of a RAID 0 volume is the sum of the capacities of the disks in the set, the same as with a spanned volume. There is no added redundancy for handling disk failures, just as with a spanned volume |
|
RAID 1 |
Data mirroring, without parity or striping. Data is written identically to two (or more) drives, thereby producing a "mirrored set" of drives |
|
RAID 2 |
RAID 2 consists of bit-level striping with dedicated Hamming-code parity. All disk spindle rotation is synchronized and data is striped such that each sequential bit is on a different drive |
|
RAID 3 |
RAID 3 consists of byte-level striping with dedicated parity. All disk spindle rotation is synchronized and data is striped such that each sequential byte is on a different drive. Parity is calculated across corresponding bytes and stored on a dedicated parity drive |
|
RAID 4 |
RAID 4 consists of block-level striping with dedicated parity. The main advantage of RAID 4 over RAID 2 and 3 is I/O parallelism: in RAID 2 and 3, a single read/write I/O operation requires reading the whole group of data drives, while in RAID 4 one I/O read/write operation does not have to spread across all data drives. |
|
RAID 5 |
RAID 5 consists of block-level striping with distributed parity. Unlike RAID 4, parity information is distributed among the drives, requiring all drives but one to be present to operate. Upon failure of a single drive, subsequent reads can be calculated from the distributed parity such that no data is lost. RAID 5 requires at least three disks |
|
RAID 6 |
RAID 6 consists of block-level striping with double distributed parity. Double parity provides fault tolerance up to two failed drives. |
|
You need a disk system that provides the best performance for a new application that frequently reads and writes data to the disk. You aren't concerned about disk fault tolerance because the data will be backed up each day; performance is the main concern. What type of volume arrangement should you use? |
RAID 0 volume |
|
You have just installed Windows Server 2012 R2 and want to run a full server backup. What do you need to do first? |
Run Install –Windows Feature Windows -Server-Backup from a PowerShell prompt |
|
Which command should you use if you want a Windows Server 2012 R2 server to start in Safe Mode the next time it restarts? |
bcdedit |
|
What command should you use to revert a volume to an existing shadow copy? |
Disk shadow |
|
Which of the following is a disadvantage of using differential backups? |
More space is required for backups |
|
You have a domain controller that suffered a system crash, and you have to perform a full server recovery. You have two other DCs on the network, and they have been working fine during the two days the DC was offline. What type of Active Directory restore should you perform? |
Non authoritative restore |
|
Which command do you use to configure Windows Server 2012 R2 to boot to a virtual hard disk? |
bcdboot C:\Windows |
|
Which of the following situations typically requires the availability of a backup created by Windows Server Backup? (Choose all that apply.) |
You need continuous availability of a network service, There's been accidental deletion of folders or files, A server's registry appears to be corrupted. |
|
Which FSRM feature should you use if you want to set certain attributes of a file automatically based on its contents? |
Classification Management |
|
Which of the following is a logical storage space consisting of one or more virtual disks in an iSCSI system? |
iSCSI target |
|
What does iSCSI use to reference a logical drive provided by the iSCSI target? |
iSCSI Logical Unit Number (LUN) |
|
If you enable authentication on an iSCSI target, what authentication protocol is used? |
Challenge-Handshake Authentication Protocol (CHAP) |
|
Which of the following can benefit from using the Branch Cache role service? (Choose all that apply.) |
File Server, Web Server, Background Intelligence Transfer Service (BITS) |
|
What's created in Active Directory during the failover cluster creation process? |
A computer object with the name of the cluster |
|
Which of the following is a requirement for creating a failover cluster? (Choose all that apply.) |
Windows Server 2012 /R2 Standard or Data centre edition, Servers that are Active Directory domain members or domain controllers |
|
You need to perform maintenance on a cluster and must take the entire cluster offline. Which of the following is the best approach? |
Right-click the cluster name, point to More Actions, and click Shut Down Cluster |
|
Which of the following is a prerequisite for deploying a clustered storage space? |
You need at least three unallocated disks |
|
Version 1 templates can't be modified, but they can be duplicated and then modified. True or False? |
true |
|
Which of the following is used in both ends of the cryptography process (encryption and decryption) and must be known by both parties? |
Secret key |
|
Camille and Sophie want to engage in secure communication. Both hold a public/private key pair. Camille wants to send an encrypted message to Sophie. Which of the following happens first? |
Camille encrypts the message with her public key |
|
A certificate is issued on July 1, 2015. Its validity period is 2 years, and its renewal period is 2 months. When can the certificate first be renewed? |
September 1, 2017 |
|
Which role can renew the CA certificate? |
CA Administrator |
|
You want to begin using smart cards for user logon. The number of enrolment stations you have is limited, so you want to assign department administrators to enrol only other users in their departments in smart card certificates. How should you go about this? |
Issue the designated department administrators an Enrolment Agent certificate. Configure the CA server's properties to restrict enrolment agents. Publish the smart card certificate template. Have the designated enrolment agents use Web enrolment to enrol departmental users in the smart card certificates |
|
Which of the following steps is necessary to configure an online responder? |
Configure an OCSP Response Signing certificate template, Enrol the OR with the OCSP Response Signing certificate., Configure revocation for the OR |
|
In a federation trust, the company whose users are accessing resources is referred to as which of the following |
Account partner |
|
You're installing AD FS to facilitate transactions with a business partner. You want to keep the federation server secure behind a firewall and don't want direct communication between your partner's computer and the federation server. What should you use? |
Federation service proxy |
|
You have several Web applications that you want trusted Internet clients to be able to access with a single sign-on. The Internet clients aren't from a single company; they can be from anywhere on the Internet. Which AD DS design should you use? |
Web SSO |
|
Which of the following role services do you use with AD FS deployed on a Windows Server 2012 R2 server if you need a proxy on the perimeter network? |
Web Application Proxy |
|
What should you configure in AD FS when you want the claims provider to trust the relying party from which claims are made? |
Claims provider trust |
|
What should you configure if certain attributes from the claims provider must be mapped to attributes the relying party can accept? |
Authentication policies |
|
Which of the following is true about an AD RMS deployment? |
The service account must be a regular domain user |
|
Which of the following is true about AD RMS installation and configuration? |
A self-signed certificate can be used for the server certificate |
|
Which of the following contains the public key of the AD RMS server? |
Server licensor certificate |