• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/100

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

100 Cards in this Set

  • Front
  • Back

​You want to provide scalability for an application installed on an NLB cluster composed of several servers. Which filtering mode should you use?

Multiple Hosts

​What do clients use to access a service provided by an NLB cluster?

Virtual IP address

What type of object is added to Active Directory when a failover cluster is created?​

Computer

​Which new failover cluster feature in Windows Server 2012 automates software updates on cluster servers and maintains cluster service availability?

CAU

What should you configure if you don't want a host to join an NLB cluster when the server starts and the host should not respond to remote NLB commands?​

Initial Host State: Suspended

​In a failover cluster, which option do you set if you want to revert to a preferred owner when it is available?

Allow Failback

​ ServerA is a member of an NLB cluster. ServerA is scheduled for routine maintenance that requires the server to be taken offline. What option should you use to take the server offline while not disrupting any client requests currently in progress?

Drainstop

You want to distribute the traffic load among four Web servers with static content. You must be able to distribute the traffic unevenly among the servers since some servers have more capacity than others.​ Which Windows Server 2012 R2 high availability feature should you use?

Network load balancing

What does a failover cluster node use to determine if another node is communicating?

Heartbeat

​Which affinity value should you choose when the application has dynamic data or the client state must be maintained?

Single

Which NLB cluster property is used to determine which server will handle traffic not covered by a port rule?​

Priority

​ If a cluster gets divided into multiple subclusters due to lack of communication between cluster nodes, what is the condition of the cluster?

Partitioned

​Which of the following is a step in configuring an NLB cluster?

Configuring port rules

In an NLB cluster, what should you configure to specify the types of traffic the cluster should respond to?​

Port rules

​When you specify the client access point, what gets created?

DNS host record

​ In a failover cluster, what do you call a server that will only respond to client requests if the server currently handling requests fails?

Passive Node

​ You have created a failover cluster that must include SMB 3.0 file share support and all cluster nodes must have read/write access to the shared storage. What type of storage should you use?

Cluster shared volume

​ After you have installed the Failover Clustering feature and verified the network and shared storage access, what should you do next, before creating the cluster?

Run the cluster validation wizard

​What is true about failover cluster network configuration?

The storage network should be on a separate subnet

​You’re configuring a failover cluster and want a quorum configuration in which cluster quorum data is located in a shared folder on a server in another location. Which quorum configuration should you choose?

Node And File Share majority

​Which of the following is a core cluster resource?

Network Name

​You want to destroy a cluster that is currently running two clustered roles. What should you do first?

Delete the cluster roles

​What should you do before performing maintenance operations on a cluster node?

Move Core Cluster resources

You are planning to build a failover cluster to provide high availability for an application. You have installed the Failover Cluster​ing feature on the first server and have set up shared storage. What should you run in Failover Cluster Manager before you create a cluster?

Validate a configuration

​A clustered storage space has several prerequisites. Which of the following is one of them?

Three disks dedicated to a pool

​Which feature of failover clusters is intended to prevent a situation in which no quorum can be reached?

Dynamic Witness

​Which of the following is NOT a quorum configuration option?

Configure the quorum witness IP address

You are configuring a Hyper-V failover cluster. The VMs will be stored on a network file share. Which of the following is the best configuration for performance and reliability?​

Scale-out file server

​ You are running a failover cluster that consists of two Windows Server 2008 nodes. You want to upgrade the cluster to Windows Server 2012 R2 and you have two new servers available. You add the two new servers to the cluster and transfer the roles and resources to the new servers. What is the next step?

Evict the two Window Server 2008 Nodes

​ Which virtual machine option in Windows Server 2012 R2 moves a VM to another cluster node if a network disconnect is detected on the virtual NIC?

Protected Network

You have a failover cluster consisting of four servers. You add another server to the cluster. Which of the following events takes place?

Quorum settings are updated

​What happens if you shutdown a clustered Windows Server 2012 R2 Hyper-V server without pausing it first?

The VMs are automatically live migrated

​ You have a cluster of eight nodes with node majority quorum. Four nodes are in SiteX and four are in SiteY. SiteX and SiteY can no longer communicate due to WAN failure. SiteY continues to provide clustered services but SiteX goes offline. What feature in Windows Server 2012 R2 caused SiteY to continue to provide services while SiteX did not?

Dynamic Quorum

What can happen if you manually remove a node's quorum vote on a Windows Server 2012 ​R2 failover cluster?

Dynamic quorum is disabled

​What's the first step in deploying a clustered storage space?

Install the MPIO feature

​ You have assigned a junior administrator to create a Windows Server 2012 R2 failover cluster. The administrator does not have the Create Computer objects permission in Active Directory. What should you tell the junior administrator to do?

Run the New-Cluster cmdlet using the -AdministrativeAccessPoint DNS option.

​ Which highly available share option should you choose if you have applications that leave files open for extended periods of time, such as a Hyper-V server where virtual machines are stored on a file share?

Scale-Out File Server for application data

​Which command removes a vote from a cluster node?

(Get-ClusterNode ServerName).NodeWeight=0

​Which cmdlet removes a clustered role from a cluster?

Remove-ClusterGroup

What is the default location for cluster shared volumes?​

C:\ClusterStorage

​ You have recently installed Windows Server 2012 R2. You have configured a number of services and installed some applications. You decide that it would be a good time to perform a full server backup. What do you need to do first?

Install Windows Server Backup

​What type of quorum configuration should be used on a failover cluster in a network that consists of three sites with four cluster nodes on each of two of the sites and no cluster nodes on the third site?

Node and file share majority

​What command should you type at a command prompt if you want Windows to boot to a command prompt the next time it restarts?

bcdedit / set

​Which of the following is a PowerShell cmdlet that lists the backups that have been created for a server?

Get-WBBackupSet

Which of the following commands should you use if you want to see a list of shadow copies on the current system?​

vssadmin

​You have a network of 300 users. You are finding that you must frequently restore files from backup that users have accidentally deleted or for which an earlier version of the file is required. What feature can you enable to reduce the number of restoration procedures you must perform?

Shadow Copies

​You have a Windows Server 2012 R2 server that is running in Windows RE mode. When you try to boot the system normally, you see a message that states "Bootmgr is Missing." You need to repair the BCD store. What command should you use?

bootrec

​Which configuration ensures high availability of VMs running in multiple sites and will not result in the loss of data in the event of a failover?

Multisite Hyper-V Cluster

​What is a possible negative consequence of using differential backups?

Write performance on the source volume is decreased

​You need to change the heartbeat frequency on a cluster due to failovers that occur when they shouldn't due to periods of high network traffic. All nodes in the cluster share the same network ID. What command can help prevent these premature failovers?

cluster /cluster:MyCluster /prop SameSubnetDelay=1500

​What type of restore procedure should you perform on Active Directory if you don't want the restoration process to overwrite changes made to Active Directory objects on other domain controllers?

Non authoritative restore

​Which of the following commands initializes the system partition with BCD files from the \Windows folder on drive F: and creates a boot entry in the BCD store?

bcdboot F:\Windows

​Which of the following is NOT a task you can perform using the Windows Server Backup console?

Boot the system into Windows RE mode

​You recently made changes to the registry that you thought would fix a problem. However, when you next tried to boot the system, the boot was unsuccessful. What boot option should you try?

Last Known Good Configuration

​Which command lists the boot entries on a Windows Server 2012 R2 system?

bcdedit/ enum

On a Windows Server 2012 R2 system, which of the following will you usually find on the reserved partition that is created when Windows is installed and contains boot configuration information?

BCD Store

​Which command should you run if you need to retrieve a system file from \Windows\System32\dllcache?

sfc

You are configuring Hyper-V Replica. The VM to be replicated is very large and the replica server is located across a low bandwidth link. What option should you configure to reduce the bandwidth required for the initial replica copy?

Send initial copy using external media

​Which option do you configure in Microsoft Azure Backup that specifies how long a backup should be kept?

Retention range in days

​What should you do if you want a junior administrator to be able to back up files and directories, restore files and directories, and shut down the system without giving the user broad administrative access to the domain?

Add the user to the Server Operators group

​What type of key is used in symmetric cryptography, must be known by both parties, and is used for both encryption and decryption?

Shared secret

​You want to configure automatic key archival to ease the burden of managing backup of private keys. What role must you assign to at least one trusted user in the organization?

KRA

You r​un a PKI that has issued tens of thousands of certificates to hundreds of thousands of clients. You have found that the traffic created when clients download the CRL is becoming excessive. What can you do to reduce the traffic caused by clients downloading the CRL?

Use A Delta CRL

​After you install AD CS, you want to begin issuing certificates for the encrypting file system. What should you do first?

Modify a certificate template

​What type of algorithm is used to sign the CA certificate?

Hash

If you configure the issuance requirements for a certificate issued from a template so that more than one signature is required before a certificate can be issued, which of the following is true?

Autoenrollment is disabled

​Which of the following is the international standard that defines a PKI and certificate formats?

X.509

​Two users, UserA and UserB are engaging in secure communication using only asymmetrical encryption. UserA needs to send a secure message to UserB. What occurs first?

UserB sends UserA UserB's public key

​You were issued a certificate on March 1st 2015 for your secure Web server. The validity period is three years and the renewal period is four months. What is the earliest date you can renew this certificate?

November 1, 2017

​Which of the following is not a required PKI component but identifies the CA and describes the security practices in place for maintaining CA integrity?

Certificate Practice Statement

Which of the following is created using a hash algorithm and can be used to verify the authenticity of a document?​

Digital Signature

​You have a network that consists of Windows 8.1 and Windows 10 clients computers as well as some Mac OS and Linux computers. You need to install a PKI using Windows Server 2012 R2 that will be able to issue certificates to all your client computers. What should you install?

Online stand-alone CA

​Which type of cryptography provides the most security?

Asymmetric cryptography

​ You have a number of Cisco routers and switches that you wish to secure using IPsec. You want IPsec authentication to use digital certificates. You already have a PKI in place using Certificate Services on Windows Server 2012 R2. What should you install to secure your devices?

NDES role service

What type of certificate enrollment issues certificates that users can use to log on to a system by entering a PIN?​

Smart card enrollment

If an employee leaves a company, what should happen to any certificates held by that employee that were issued by the company's PKI?

They should be put on the CRL

​On a Windows Server 2012 R2 CA, what is the default CRL publication interval?

1 week

​Which service provided by a PKI ensures that a party in a communication can't dispute the validity of the transaction?

Nonrepudiation

​Which type of CA in the three-level hierarchy is sometimes referred to as a policy CA and issues certificates to issuing CAs?

Intermediate

​A server configured for Web enrollment is referred to as which of the following?

CA Web Proxy

​Which of the following contains a list of users and specifies what the users can do with a rights-protected document?

Publishing License

​ Which of the following is the first step to allow third-party devices to perform Workplace Join to access domain resources from the Internet?

Install certificate from a third-party CA

​What is issued by the root cluster and contains a computer's public key when and AD RMS application is used?

Machine certificate

​Which of the following is created on the AD FS server that causes the claims provider to trust the relying party claims are being made for?

Relying party trust

​Which of the following is the company whose users are accessing resources from another company?

Account partner

​ You have several marketing documents that are published through AD RMS. However, you have three new marketing employees that require additional training before they should be able to access these documents. These employees should have all other rights and permissions as members of the Marketing group. What should you do to prevent these users from accessing these rights-protected documents?

Configure a user exclusion policy in AD RMS

​Which of the following hosts resources that are made available to the account partner?

Relying party

Which of the following is NOT a feature of AD RMS?​

Workplace join

​ You need to allow your network technician to view the RMS logs and reports, but no additional permissions should be granted to this technician. What can you do?

Delegate the AD RMS auditor role

​Which of the following is a self-signed certificate and identifies the AD RMS cluster?

Server licensor certificate

​ Which of the following usually includes the user's logon name, group memberships, and other user attributes in an AD FS-enabled network?

Claim

​ Which AD DS design should you use if you want your design to support business-to-business relationships where the account federation server validates credentials and no Active Directory trust is created?

Federated Web SSO

​What is the last step in the Add Relying Party Trust Wizard?

Choose issuance authorization rules

Which of the following is used to map attributes from the claims provider to claims attributes acceptable to the relying party?

Acceptance transform rules

​You have a network of Windows Server 2012 R2 servers and you wish to deploy a proxy on the perimeter network for an AD FS design. Which role service should you use?

Web Application Proxy

​In which LDAP-compatible database are claims values stored?

Attribute Store

​Which of the following is issued to users when they request access to a rights-protected document?

Use license

What can you install on a Windows Server 2012 R2 server that can scan documents and apply rights policy templates automatically based on resource properties? ​

FSRM

​ Your company deals with highly confidential information, some of which is transmitted via email among employees. Some documents have been forwarded via email, making the documents more difficult to track. You want to be able to prevent employees from forwarding certain emails. What should you deploy?

AD RMS

​ In a new partnership with XYZ Company, ABC company wants to share documents securely using Web-based applications. All communication must be secure and document usage must be controlled. Both companies run Windows Server 2012 R2 domains but must remain in separate forests. What can you implement to facilitate this partnership?

Ad Federation Services And AD Rights Management Services