• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/43

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

43 Cards in this Set

  • Front
  • Back
You are working as a help desk administrator for a corporate network and you receive a call from a user named Leo who is requesting access to the files for a new classified project called Contoso. The Contoso files are stored in a shared folder on a file server, which is locked in a secured underground data storage facility. After verifying that the user has the appropriate security clearance for the project, you create a new group on the file server called CONTOSO_USERS and add Leo’s user account to that group. Then you add the CONTOSO_USERS group to the access control list for the Contoso folder on the file server and assign the group the following NTFS permissions:
• Allow Modify
• Allow Read & Execute
• Allow List Folder Contents
• Allow Read
• Allow Write
Later, Leo calls to tell you that although he is able to access the Contoso folder and read the files stored there, he has been unable to save changes back to the server.
What is the most likely cause of the problem?

The most likely cause of the problem is that Leo does not have sufficient share permissions for read/write access to the Contoso files. Granting the CONTOSO_USERS group the Allow Full Control share permission should enable Leo to save his changes to the Contoso files.

Objective Summary – Permission and Folders:

• Creating folder shares makes the data stored on a file server’s disks accessible to network users.
• NTFS permissions enable you to control access to files and folders by specifying the tasks individual users can perform on them. Share permissions provide rudimentary access control for all the files on a network share. Network users must have the proper share and NTFS permissions to access file server shares.
• ABE applies filters to shared folders based on an individual user’s permissions to the files and subfolders in the share. Simply put, users who cannot access a particular shared resource are unable to see that resource on the network.
• Offline Files is a Windows feature that enables client systems to maintain local copies of files they access from server shares.
• Volume Shadow Copies is a Windows Server 2012 R2 feature that enables you to maintain previous versions of files on a server, so if users accidentally delete or overwrite a file, they can access a copy.
• NTFS quotas enable administrators to set a storage limit for users of a particular volume.
• Work Folders is a Windows Server 2012 R2 feature that synchronizes files between multiple client devices and a file server located on a private network.

1. What is the maximum number of shadow copies a Windows Server 2012 R2 system can maintain for each volume?
A. 8
B. 16
C. 64
D. 128

Correct answer: C
A. Incorrect: Windows Server 2012 R2 can maintain more than 8 volume shadow copies.
B. Incorrect: Windows Server 2012 R2 can maintain more than 16 volume shadow copies.
C. Correct: Windows Server 2012 R2 can maintain up to 64 volume shadow copies before it begins deleting the oldest data.
D. Incorrect: Windows Server 2012 R2 cannot maintain 128 volume shadow copies.

2. Which of the following terms describes the process of granting users access to file server shares by reading their permissions?
A. Authentication
B. Authorization
C. Enumeration
D. Assignment

Correct answer: B
A. Incorrect: Authentication is the process of verifying the user’s identity.
B. Correct: Authorization is the process by which a user is granted access to specific resources based on the permissions he or she possesses.
C. Incorrect: Access-based enumeration is a Windows feature that prevents users from seeing resources to which they do not have permissions.
D. Incorrect: Assignment describes the process of granting permissions, not reading permissions.


3. Which of the following are tasks you can perform by using the quotas in File Server Resource Manager but can’t perform by using NTFS quotas? (Choose all that apply.)
A. Send an email message to an administrator when users exceed their limits.
B. Specify different storage limits for each user.
C. Prevent users from consuming storage space on a volume beyond their allotted limit.
D. Generate warnings to users when they approach their allotted storage limit.

Correct answer: A
A. Correct: Using File Server Resource Manager, you can notify administrators with email messages when users exceed their allotment of storage.
B. Incorrect: Using NTFS Quotas, you can create quotas for individual users that specify different storage limits.
C. Incorrect: You can use NTFS quotas to prevent users from consuming storage space on a volume beyond their allotted limit.
D. Incorrect: You can use NTFS quotas to generate warnings to users when they approach their allotted storage limit.


4. In the Windows Server 2012 R2 NTFS permission system, combinations of advanced permissions are also known as _____________ permissions. (Choose all that apply.)
A. Special
B. Basic
C. Share
D. Standard

Correct answers: B, D
A. Incorrect: In Windows Server versions prior to Windows Server 2012 R2, special permissions are combined to form standard permissions.
B. Correct: Basic permissions are formed by creating various combinations of advanced permissions.
C. Incorrect: Share permissions are a system that is separate from the NTFS permission system.
D. Correct: In Windows Server versions prior to Windows Server 2012 R2, standard permissions are formed by creating various combinations of special permissions.


5. Which of the following statements best describes the role of the security principal in file system permission assignments?
A. The security principal in file system permission assignments is the only person who can access a file that has no permissions assigned to it.
B. The security principal in file system permission assignments is the person responsible for creating permission policies.
C. The security principal in file system permission assignments is the person assigning the permissions.
D. The security principal in file system permission assignments is the person to whom the permissions are assigned.

A. Incorrect: The owner is the only person who can access a file that has no permissions assigned to it.
B. Incorrect: The security principal is not the person responsible for creating an organization’s permission policies.
C. Incorrect: The security principal receives permissions; the security principal does not create them.
D. Correct: The security principal is the user or computer to which permissions are assigned.


The printer
is associated with a printer driver that takes the commands generated by the application and converts them into a printer control language (PCL), a language understood by the printer. PCLs can be standardized, like the PostScript language, or they can be proprietary languages developed by the print device manufacturer.

The printer driver
enables you to configure the print job to use the various capabilities of the print device. These capabilities are typically incorporated into the printer’s Properties sheet. For example, your word-processing application does not know if your print device is color or monochrome or if it supports duplex printing. The printer driver provides support for print device features such as these.

Print Spooler
After the printer processes a print job, it stores the job in a print queue, known as a spooler

four fundamental configurations that are the basis of most Windows printer deployments:

• Direct printing
• Locally attached printer sharing
• Network-attached printing
• Network-attached printer sharing


Direct Printing
The simplest print architecture consists of one print device connected to one computer, also known as a locally attached print device

Locally Attached Printer Sharing
In addition to printing from an application running on that computer, you can also share the printer (and the print device) with other users on the same network.


Network-Attached Printing:
You can connect a print device directly to the network instead. Many print device models are equipped with network interface adapters, enabling you to attach a standard network cable. Some print devices have expansion slots into which you can install a network printing adapter you have purchased separately. Finally, for print devices with no networking capabilities, standalone network print servers are available, which connect to the network and enable you to attach one or more print devices.


Network-Attached Printer Sharing:
you install a printer on one computer (which becomes the print server) and configure it to access the print device directly through a TCP port. You then share the printer, just as you would a locally attached print device, and configure the clients to access the print share.


Network-Attached Printer Sharing advantages:

• All the client jobs are stored in a single print queue, so users and administrators can see a complete list of the jobs waiting to be printed.
• Part of the job-rendering burden is shifted to the print server, returning control of the client computer to the user more quickly.
• Administrators can manage all the queued jobs from a remote location.
• Print error messages appear on all client computers.
• Administrators can implement printer pools and other advanced printing features.
• Administrators can manage security, auditing, monitoring, and logging functions from a central location.

Advanced Printing Configurations:

• You can connect a single printer to multiple print devices, creating what is called a printer pool. On a busy network with many print clients, the print server can distribute large numbers of incoming jobs among several identical print devices to provide more timely service and better fault tolerance. To create a printer pool, you must have at least two identical print devices, or at least two print devices that use the same printer driver. The print devices must be in the same location because there is no way to tell which print device will process a given document. You must also connect all the print devices in the pool to the same print server.
• You can connect multiple print devices that support different paper forms and various paper sizes to a single printer, which will distribute jobs with different requirements to the appropriate print devices.
• You can connect multiple printers to a single print device. By creating multiple printers, you can configure different priorities, security settings, auditing, and monitoring parameters for different users. For example, you can create a high-priority printer for company executives and a lower-priority printer for junior users. This ensures that the executives’ jobs get printed first, even if the printers are connected to the same print device.


To install Additional Print Drivers:
to install a 32-bit driver for a printer on a server running Windows Server 2012 R2, you must access the printer’s Properties sheet from a computer running a 32-bit version of Windows. You can do this by accessing the printer directly through the network by using File Explorer or by running the Print Management snap-in on the 32-bit system and using it to manage your Windows Server 2012 R2 print server.

Easy Print:
The component that enables Remote Desktop clients to print to their local print devices is called Easy Print. Easy Print takes the form of a printer driver that is installed on the server along with the Remote Desktop Session Host role service.


• Installing the Print And Document Services add the following options:

Print Server. Installs the Print Management console for Microsoft Management Console (MMC), which enables administrators to deploy, monitor, and manage printers throughout the enterprise
• Distributed Scan Server. Enables the computer to receive documents from network-based scanners and forward them to the appropriate users
• Internet Printing. Creates a website that enables users on the Internet to send print jobs to shared Windows printers
• LPD Service. Enables UNIX clients running the line printer remote (LPR) program to send their print jobs to Windows printers


Print Server Manager Default View:

• All Printers. Contains a list of all the printers hosted by all the print servers which have been added to the console
• All Drivers. Contains a list of all the printer drivers installed on all the print servers which have been added to the console
• Printers Not Ready. Contains a list of all printers that are not reporting a Ready status
• Printers With Jobs. Contains a list of all the printers that currently have jobs waiting in the print queue

To use AD DS to deploy printers to clients
you must configure the appropriate policies in a Group Policy object (GPO). You can link a GPO to any domain, site, or organizational unit (OU) in the AD DS tree. When you configure a GPO to deploy a printer, all the users or computers in that domain, site, or OU will receive the printer connection by default when they log on.

You are a desktop support technician for a law firm with a group of 10 legal secretaries who provide administrative support to the attorneys. All the secretaries use a single, shared, high-speed laser printer that is connected to a dedicated Windows print server. The secretaries print multiple copies of large documents on a regular basis, and although the laser printer is fast, it runs almost constantly. Sometimes the secretaries have to wait 20 minutes or more after submitting a print job for their documents to reach the top of the queue. The office manager has offered to purchase additional printers for the department. However, the secretaries are accustomed to just clicking Print and don’t like the idea of having to examine multiple print queues to determine which has the fewest jobs before submitting a document.
With this in mind, answer the following question.
What can you do to provide the office with a printing solution that will enable the secretaries to utilize additional printers most efficiently?

Install additional, identical printers, connecting them to the same Windows Server 2012 R2 print server, and create a printer pool by selecting the appropriate check box on the Ports tab of the printer’s Properties sheet.

1. Which of the following terms best describes the software interface through which a computer communicates with a print device?
A. Printer
B. Print server
C. Printer driver
D. Print Management console

Correct answer: A
A. Correct: In Windows, a printer is the software interface through which a computer communicates with a print device.
B. Incorrect: A print server is a device that receives print jobs from clients and sends them to print devices that are either attached locally or connected to the network.
C. Incorrect: A printer driver is a device driver that converts the print jobs generated by applications into an appropriate string of commands for a specific print device.
D. Incorrect: The Print Management snap-in is a tool that administrators can use to manage printers all over the network.


2. You are setting up a printer pool on a computer running Windows Server 2012 R2. The printer pool contains three identical print devices. You open the Properties dialog box for the printer and select the Enable Printer Pooling option on the Ports tab. Which of the following steps must you perform next?
A. Configure the LPT1 port to support three printers.
B. Select or create the ports mapped to the three printers.
C. On the Device Settings tab, configure the installable options to support two additional print devices.
D. On the Advanced tab, configure the priority for each print device so that printing is distributed among the three print devices.

Correct answer: B
A. Incorrect: Whether the printers are pooled or not, each one must be connected to a separate port.
B. Correct: To set up printer pooling, select the Enable Printer Pooling check box and select or create the ports corresponding to printers that will be part of the pool.
C. Incorrect: You do not use the installable options settings to create a printer pool.
D. Incorrect: Priorities have nothing to do with printer pooling.


3. One of your print devices is not working properly, so you want to temporarily prevent users from sending jobs to the printer serving that device. Which of the following actions should you take?
A. Stop sharing the printer.
B. Remove the printer from Active Directory.
C. Change the printer port.
D. Rename the share.

Correct answer: A
A. Correct: If you stop sharing the printer, users will no longer be able to use the print device.
B. Incorrect: Removing the printer from Active Directory will prevent users from finding the printer by using a search, but they can still access it.
C. Incorrect: Changing the printer port will prevent the printer from sending jobs to the print device, but it will not prevent users from sending jobs to the printer.
D. Incorrect: Renaming the share can make it difficult for users to find the printer, but they can still use it when they do find it.


4. You are administering a computer running Windows Server 2012 R2 configured as a print server. Users in the Marketing group report that they cannot print documents using a printer on the server. You view the permissions in the printer’s properties. The Marketing group is allowed Manage Documents permission. Which of the following statements best explains why the users cannot print to the printer?
A. The Everyone group must be granted the Manage Documents permission.
B. The Administrators group must be granted the Manage Printers permission.
C. The Marketing group must be granted the Print permission.
D. The Marketing group must be granted the Manage Printers permission.

Correct answer: C
A. Incorrect: The Manage Documents permission does not allow users to send jobs to the printer.
B. Incorrect: The Manage Printers permission does not allow users to send jobs to the printer.
C. Correct: The Print permission allows users to send documents to the printer; the Manage Documents permission does not.
D. Incorrect: The Manage Documents permission does not allow users to send jobs to the printer.

5. You are administering a print server running Windows Server 2012 R2. You want to perform maintenance on a print device physically connected to the print server. There are several documents in the print queue. You want to prevent the documents from being printed to the printer, but you don’t want users to have to resubmit the documents to the printer. Which of the following statements best describes the best way to do this?
A. Open the printer’s Properties dialog box, select the Sharing tab, and select the Do Not Share This Printer option.
B. Open the printer’s Properties dialog box and select a port that is not associated with a print device.
C. Open the printer’s queue window, select the first document, and select Pause from the Document window.
D. Open the printer’s queue window and select the Pause Printing option from the Printer menu.

Correct answer: D
A. Incorrect: A printer that is not shared will continue to process jobs that are already in the queue.
B. Incorrect: Changing the port will require the users to resubmit the jobs that were in the queue.
C. Incorrect: Pausing the first document in the queue will not prevent the other queued jobs from printing.
D. Correct: When you select the Pause Printing option, the documents will remain in the print queue until you resume printing. This option applies to all documents in the queue.

To manage a non-domain joined server using Server Manager, you must first complete the following tasks:

• Supply administrative credentials for the non-domain joined server;
 To add non-domain joined servers to Server Manager, you must use the DNS option or the Import option in the Add Servers Wizard. After creating the server entries, you must right-click each one and select Manage As from the context menu. This displays a Windows Security dialog box, in which you can supply credentials for an account with administrative privileges on the remote server.
Add the non-domain joined server to the system’s WS-Management TrustedHosts list: he TrustedHosts list exists on a logical drive called WSMan:; the path to the list itself is WSMan:\localhost\Client\TrustedHosts. To add a computer to the list, use the Set-Item cmdlet in Windows PowerShell. After opening a Windows PowerShell session with administrative privileges on the computer running Server Manager, use the following command to add the servers you want to manage to the list:
Set-Item WSMan:\localhost\Client\TrustedHosts –value -force


Windows Remote Management (WinRM)
is enabled by default on Windows Server 2012 R2.
Configuring WinRM (indicated by Remote Management on the Server manager)
WinRM enables administrators to manage a computer from a remote location by using tools based on Windows Management Instrumentation (WMI) and Windows PowerShell. If the default WinRM setting has been modified, or if you want to change it manually, you can do so through the Server Manager interface.
To manage WinRM from a Windows PowerShell session, as in the case of a computer with a Server Core installation, use the following command:
Configure-SMRemoting.exe –Get|–Enable|-Disable
• -Get Displays the current WinRM status
• -Enable Enables WinRM
• -Disable Disables WinRM

if you attempt to launch MMC snap-ins targeting a remote server, such as the Computer Management console, you will receive an error because of the default Windows Firewall settings in Windows Server 2012 R2. MMC uses the Distributed Component Object Model (DCOM) for remote management instead of WinRM, and these settings are not enabled by default.

To address this problem, you must enable the following inbound Windows Firewall rules on the remote server you want to manage:
• COM+ Network Access (DCOM-In)
• Remote Event Log Management (NP-In)
• Remote Event Log Management (RPC)
• Remote Event Log Management (RPC-EPMAP)
To modify the firewall rules on the remote system, you can use any one of the following methods:
• Open the Windows Firewall with Advanced Security MMC snap-in on the remote server (if it is a Full GUI installation).
• Use the NetSecurity module in Windows PowerShell.
• Create a GPO containing the appropriate settings and apply it to the remote server.
• Run the Netsh AdvFirewall command from an administrative command prompt.

configure the Windows Firewall rules required for remote server management using DCOM on a Server Core installation, you can use the following Windows PowerShell syntax:

Set-NetFirewallRule –name –enabled True
To obtain the Windows PowerShell names for the preconfigured rules in Windows Firewall, use the Get-NetFirewallRule command. The resulting commands to enable the four rules listed earlier are as follows:
Set-NetFirewallRule –name
ComPlusNetworkAccess-DCOM-In –enabled True
Set-NetFirewallRule –name
RemoteEventLogSvc-In-TCP –enabled True
Set-NetFirewallRule –name RemoteEventLogSvc-NP-In-TCP
–enabled True
Set-NetFirewallRule –name
RemoteEventLogSvc-RPCSS-In-TCP –enabled True
the Group Policy method provides distinct advantages. It not only enables you to configure the firewall on the remote system without accessing the server console directly but enables you to configure the firewall on Server Core installations without having to work from the command line.

By default, when you add servers running Windows Server 2008 or Windows Server 2008 R2 to the Windows Server 2012 R2 Server Manager, they appear with a manageability status that reads “Online - Verify WinRM 3.0 service is installed, running, and required firewall ports are open.”
To add WinRM support to servers running Windows Server 2008 or Windows Server 2008 R2, you must download and install the following updates:

• NET Framework 4.0
• Windows Management Framework 3.0
These updates are available from the Microsoft Download Center at the following URLs:
• http://www.microsoft.com/en-us/download/details.aspx?id=17718
• http://www.microsoft.com/en-us/download/details.aspx?id=34595
After you install the updates, the system automatically starts the Windows Remote Management service, but you must still complete the following tasks on the remote server:
• Enable the Windows Remote Management (HTTP-In) rules in Windows Firewall
• Create a WinRM listener by running the winrm quickconfig command at a command prompt with Administrative privileges.
• Enable the COM+ Network Access and Remote Event Log Management rules in Windows Firewall, as described in the previous section.
After installing the updates listed here, there are still limitations to the management tasks you can perform on earlier versions of Windows Server from a remote location. For example, you cannot use the Add Roles And Features Wizard in Server Manager to install roles and features on earlier versions of Windows Server. These servers do not appear in the server pool on the Select Destination Server page.
However, you can use Windows PowerShell to install roles and features on servers running Windows Server 2008 and Windows Server 2008 R2 remotely, as in the following procedure.
1. Open a Windows PowerShell session with Administrative privileges.
2. Establish a Windows PowerShell session with the remote computer by using the following command:
Enter-PSSession -credential
3. Type the password associated with the user name you specified and press Enter.
4. Display a list of the roles and features on the remote server by using the following command:
Get-WindowsFeature
5. Using the short name of the role or service as it appears in the Get-WindowsFeature display, install the component by using the following command:
Add-WindowsFeature
6. Close the session with the remote server by using the following command:
Exit-PSSession
7. Close the Windows PowerShell window.

You can use Windows PowerShell to install roles and features on servers running Windows Server 2008 and Windows Server 2008 R2 remotely, as in the following procedure.

1. Open a Windows PowerShell session with Administrative privileges.
2. Establish a Windows PowerShell session with the remote computer by using the following command:
Enter-PSSession -credential
3. Type the password associated with the user name you specified and press Enter.
4. Display a list of the roles and features on the remote server by using the following command:
Get-WindowsFeature
5. Using the short name of the role or service as it appears in the Get-WindowsFeature display, install the component by using the following command:
Add-WindowsFeature
6. Close the session with the remote server by using the following command:
Exit-PSSession
7. Close the Windows PowerShell window.


However, administrators have found it most efficient to use their client computers to manage servers remotely (especially with the introduction of cloud-based services).

To manage Windows servers from a workstation, you must download and install the Remote Server Administration Tools package for the version of Windows running on your workstation from the Microsoft Download Center at http://www.microsoft.com/download.

Server Manager provides three basic methods for addressing remote servers, as follows:

• Contextual tasks. When you right-click a server in a Servers tile anywhere in Server Manager, you see a shortcut menu that provides access to tools and commands pointed at the selected server. Some of these are commands that Server Manager executes on the remote server, such as Restart Server and Windows PowerShell. Others launch tools on the local system and direct them at the remote server, such as MMC snap-ins and the Install Roles And Features Wizard. Still others modify Server Manager itself by removing servers from the interface. Other contextual tasks sometimes appear in the Tasks menus for specific panes.
• Noncontextual tasks. The menu bar at the top of the Server Manager console provides access to internal tasks, such as launching the Add Server Wizard and the Install Roles And Features Wizard, and the Server Manager Properties dialog box, in which you can specify the console’s refresh interval.
• Noncontextual tools. The console’s Tools menu provides access to external programs, such as MMC snap-ins and the Windows PowerShell interface, that are directed at the local system.


CHAPTER SUMMARY

• Windows Server 2012 R2 is designed to facilitate remote server management so administrators rarely if ever have to work directly at the server console. This conserves server resources that can better be devoted to applications.
• When you add servers running Windows Server 2012 R2 to Server Manager, you can immediately begin using the Add Roles and Features Wizard to install roles and features on any of the servers you have added.
• The Windows Firewall rules you have to enable for remote servers running Windows Server 2012 R2 are also disabled by default on computers running versions earlier than Windows Server 2012, so you also have to enable them there.
• For administrators of enterprise networks, it might be necessary to add a large number of servers to Server Manager. To avoid having to work with a long scrolling list of servers, you can create server groups based on server locations, functions, or any other organizational paradigm.
• You can manage remote servers from any computer running Windows Server 2012 R2; all the required tools are installed by default. However, the new administrative method that Microsoft is promoting urges administrators to keep servers locked away and use a workstation to manage servers from a remote location.

Ralph is responsible for the 24 servers running a particular application and the servers are scattered across his company’s enterprise network. Ralph wants to use Server Manager on his Windows 8 workstation to manage those servers and monitor the events that occur on them. To do this, he must enable the incoming COM+ Network Access and Remote Event Log Management rules in Windows Firewall on the servers.
Because he can’t travel to the locations of all the servers and many of the sites do not have trustworthy IT personnel, Ralph has decided to use Group Policy to configure Windows Firewall on all the servers. The company’s Active Directory Domain Services tree is organized geographically, which means that Ralph’s servers are located in many different OUs under one domain.
With this in mind, answer the following question.
• How can Ralph use Group Policy to deploy the required Windows Firewall rule settings to his 24 servers and only those servers?

After creating a GPO containing the required Windows Firewall settings, Ralph should create a security group containing all the 24 computer objects representing his servers. Then he should link the GPO to the company domain and use security filtering to limit the scope of the GPO to the group he created.






1. Which of the following tasks must you perform before you can manage a remote server running Windows Server 2012 R2 using the Computer Management snap-in?
A. Enable WinRM on the remote server.
B. Enable the COM+ Network Access rule on the remote server.
C. Enable the Remote Event Log Management rules on the remote server.
D. Install Remote Server Administration Tools on the remote server.

Correct answer: B
A. Incorrect: WinRM is enabled by default on Windows Server 2012 R2.
B. Correct: The COM+ Network Access rule must be enabled on the remote server for MMC snap-ins to connect.
C. Incorrect: The Remote Event Log Management rules are not necessary to connect to a remote server using an MMC snap-in.
D. Incorrect: The remote server does not have to be running Remote Server Administration Tools.

2. Which of the following Windows PowerShell cmdlets can you use to list the existing Windows Firewall rules on a computer running Windows Server 2012 R2? (Choose all that apply.)
A. Get-NetFirewallRule
B. Set-NetFirewallRule
C. Show-NetFirewallRule
D. New-NetFirewallRule

Correct answers: A, C
A. Correct: The Get-NetFirewallRule cmdlet displays a list of all the rules on a system running Windows Firewall.
B. Incorrect: The Set-NetFireWallRule cmdlet is for managing specific rules, not listing them.
C. Correct: The Show-NetFirewallRule cmdlet displays a list of all the rules on a system running Windows Firewall.
D. Incorrect: The New-NetFireWallRule cmdlet is for creating rules, not listing them.

3. Which of the following tasks can you not perform remotely on a server running Windows Server 2008?
A. Install roles by using Server Manager
B. Install roles by using Windows PowerShell
C. Connect to the remote server by using the Computer Management snap-in
D. Monitor event log entries

Correct answer: A
A. Correct: You cannot install roles on a remote server running Windows Server 2008 by using Server Manager.
B. Incorrect: You can install roles on a remote server running Windows Server 2008 by using Windows PowerShell.
C. Incorrect: You can connect to a remote server running Windows Server 2008 by using the Computer Management console as long as you enable the COM+ Network Access rule.
D. Incorrect: You can monitor event log entries on a remote server running Windows Server 2008 as long as you enable the Remote Event Log Management rules.

4. Which of the following updates must you install on a server running Windows Server 2008 before you can connect to it by using Windows Server 2012 R2 Server Manager? (Choose all that apply.)
A. .NET Framework 3.5
B. .NET Framework 4.0
C. Windows Management Framework 3.0
D. Windows Server 2008 R2

Correct answers: B, C
A. Incorrect: .NET Framework 3.5 is not needed for Server Manager to connect to Windows Server 2008.
B. Correct: .NET Framework 4.0 is needed for Server Manager to connect to Windows Server 2008.
C. Correct: Windows Management Framework 3.0 is needed for Server Manager to connect to Windows Server 2008.
D. Incorrect: It is not necessary to upgrade to Windows Server 2008 R2 for Server Manager to connect to Windows Server 2008.


5. When you run Server Manager from a Windows 8 workstation using Remote Server Administration Tools, which of the following elements do not appear in the default display?
A. The Dashboard
B. The Local Server home page
C. The All Servers home page
D. The Welcome tile

Correct answer: B
A. Incorrect: The Dashboard does appear in the default Server Manager display.
B. Correct: The Local Server home page does not appear, because the local system is a workstation, not a server.
C. Incorrect: The All Servers home page does appear in the default Server Manager display.
D. Incorrect: The Welcome tile does appear in the default Server Manager display.