Pregunta 1
Pregunta
You work as a senior administrator at Contoso.com. The Contoso.com network consists of
a single domain named Contoso.com. All servers on the Contoso.com network have
Windows Server 2012 R2 installed.
You are running a training exercise for junior administrators. You are currently discussing
the new VHD format called VHDX.
Which of the following is TRUE with regards to VHDX? (Choose all that apply.) (2)
Respuesta
-
It supports virtual hard disk storage capacity of up to 64 GB.
-
It supports virtual hard disk storage capacity of up to 64 TB.
-
It does not provide protection against data corruption during power failures.
-
It has the ability to store custom metadata about the file that the user might want to
record.
Pregunta 2
Pregunta
Your network contains one Active Directory domain named contoso.com. The domain
contains 10 domain controllers and a read-only domain controller (RODC) named
RODC01.
You plan to replace a domain controller named DC1. DC1 has the schema operations master role.
You need to transfer the schema master role to another domain controller named DC10
before you remove Active Directory from DC1.
Which tool should you use?
Pregunta 3
Pregunta
You have a file server named Server1 that runs Windows Server 2012 R2. Server1
contains a folder named Folder1.
You share Folder1 as Share1 by using Advanced Sharing. Access-based enumeration is
enabled.
Share1 contains an application named Appl.exe.
You configure the NTFS permissions on Folder1 as shown in the following table
Group 1 - Read & Execute
Group 2 - Read & Execute, Write
The members of Group2 report that they cannot make changes to the files in Share1. The
members of Group1 and Group2 run Appl.exe successfully.
You need to ensure that the members of Group2 can edit the files in Share1.
What should you do?
Respuesta
-
Replace the NTFS permissions on all of the child objects.
-
Edit the Share permissions.
-
Edit the NTFS permissions.
-
Disable access-based enumeration.
Pregunta 4
Pregunta
You perform a Server Core Installation of Windows Server 2012 R2 on a server named
Server1.
You need to add a graphical user interface (GUI) to Server1.
Which tool should you use?
Respuesta
-
The Install-WindowsFeature cmdlet
-
The Install-Module cmdlet
-
The Install-RoleService cmdlet
-
The setup.exe command
Pregunta 5
Pregunta
You work as a senior administrator at Contoso.com. The Contoso.com network consists of
a single domain named Contoso.com. All servers on the Contoso.com network have
Windows Server 2012 R2 installed.
You are running a training exercise for junior administrators. You are currently discussing
the Windows Firewall with Advanced Security feature.
Which of the following is TRUE with regards to Windows Firewall with Advanced Security?
(Choose all that apply.) (2)
Respuesta
-
It provides host-based, two-way network traffic filtering for a computer.
-
It provides host-based, one-way network traffic filtering for a computer.
-
It blocks unauthorized network traffic flowing into or out of the local computer
-
It only blocks unauthorized network traffic flowing into the local computer
-
It only blocks unauthorized network traffic flowing out of the local computer.
Pregunta 6
Pregunta
Your network contains an Active Directory domain named contoso.com. All servers run
Windows Server 2012 R2. The domain contains a member server named Server1. Server1
has the File Server server role installed.
On Server1, you create a share named Documents. The Documents share will contain the
files and folders of all users.
You need to ensure that when the users connect to Documents, they only see the files to
which they have access.
What should you do?
Respuesta
-
Enable access-based enumeration.
-
Configure Dynamic Access Control.
-
Modify the Share permissions.
-
Modify the NTFS permissions.
Pregunta 7
Pregunta
You work as a senior administrator at Contoso.com. The Contoso.com network consists of
a single domain named Contoso.com. All servers on the Contoso.com network have
Windows Server 2012 installed, and all workstations have Windows 8 installed.
You are running a training exercise for junior administrators. You are currently discussing
the Always Offline Mode.
Which of the following is TRUE with regards to the Always Offline Mode? (Choose all that
apply.)
Respuesta
-
It allows for swifter access to cached files and redirected folders.
-
To enable Always Offline Mode, you have to satisfy the forest and domain functionallevel
requirements, as well as schema requirements
-
It allows for lower bandwidth usage due to users are always working offline
-
To enable Always Offline Mode, you must have workstations running Windows 7 or
Windows Server 2008 R2.
Pregunta 8
Pregunta
You have a server named Server1. Server1 runs Windows Server 2012 R2 and has the
File and Storage Services server role installed.
You attach four 500-GB disks to Server1.
You need to configure the storage to meet the following requirements:
Storage for an application named Application1 must be provided. Application1
requires 20 GB and will require a maximum of 800 GB in three years.
Storage for an application named Application2 must be provided. Application2
requires 20 GB and will require a maximum of 900 GB in three years.
The solution must provide the ability to dynamically add storage without requiring
configuration changes to the applications.
The storage must be available if a single disk fails.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)
Respuesta
-
From File and Storage Services, create virtual disks by using fixed provisioning.
-
From File and Storage Services, create virtual disks by using thin provisioning.
-
From File and Storage Services, create a storage pool that uses all four disks.
-
From Disk Management, create a new RAID-5 volume that uses all four disks.
-
From Disk Management, create two new mirror volumes that use two disks each.
Pregunta 9
Pregunta
You work as an administrator at Contoso.com. The Contoso.com network consists of a
single domain named Contoso.com. All servers in the Contoso.com domain, including
domain controllers, have Windows Server 2012 R2 installed.
You have just executed the Uninstall-WindowsFeature Server-Gui-Shell Contoso.com
server, named ENSUREPASS-SR13.
Which of the following is the reason for doing this?
Respuesta
-
To only remove Windows Explorer from ENSUREPASS-SR13.
-
To only remove the Windows Internet Explorer from ENSUREPASS-SR13.
C. To
-
To only remove the components and files related to Windows Explorer from
ENSUREPASSSR13.
-
To remove Windows Explorer, Windows Internet Explorer, and all associated
components and files from ENSUREPASS-SR13.
Pregunta 10
Pregunta
Your network contains an Active Directory domain named contoso.com.
You have a starter Group Policy object (GPO) named GPO1 that contains more than 100 settings.
You need to create a new starter GPO based on the settings in GPO1.
You must achieve this goal by using the minimum amount of administrative effort.
What should you do?
Respuesta
-
Run the New-GPStarterGPO cmdlet and the Copy-GPO cmdlet.
-
Create a new starter GPO and manually configure the policy settings of the starter GPO.
-
Right-click GPO1, and then click Back Up. Create a new starter GPO. Right-click the
new GPO, and then click Restore from Backup.
-
Right-click GPO1, and then click Copy. Right-click Starter GPOs, and then click Paste
Pregunta 11
Pregunta
A company’s server deployment team needs to install fourteen Windows Server 2012 R2 to
handle the expected increase in holiday traffic. The team would like the option of switching
the servers between Server Core and Full GUI servers and do not want to be locked in to
their first choice.
The server team would like four of the servers to include the Windows 8 Shell.
Which installation option is required for these servers?
Respuesta
-
Server Core
-
Desktop Experience
-
Server with a GUI
-
Minimal Server Interface
Pregunta 12
Pregunta
You have a Hyper-V host named server1 that runs windows server 2012 R2.server1 host
50 virtual machines that run windows server 2012 R2
You enable and configure enhanced session mode on Server1.
You need to identify a new functionality available for the virtual machines hosted on
server1.
What should you identify?
Respuesta
-
Smart card authentication using virtual machine connections
-
Redirection of RemoteFX USB drivers by using remote desktop connections
-
Redirection of RemoteFX USB drivers using virtual machine connections
-
smart card authentication using the remote desktop client.
Pregunta 13
Pregunta
You have a server named Server1 that runs Windows Server 2012 R2. You promote
Server1 to domain controller. You need to view the service location (SVR) records that
Server1 registers on DNS. What should you do on Server1?
Pregunta 14
Pregunta
Your network contains an Active Directory domain named contoso.com. The domain
contains a member server named Server1. Server1 runs Windows Server 2012 R2 and has
the File and Storage Services server role installed.
On Server1, you create a share named Documents.
You need to ensure that users can recover files that they accidently delete from
Documents.
What should you do?
Respuesta
-
Enable shadow copies by using Computer Management.
-
Create a storage pool that contains a two-way mirrored volume by using Server
Manager.
-
Modify the Startup type of the Volume Shadow Copy Service (VSS) by using the
Services console.
-
Create a recovery partition by using Windows Assessment and Deployment Kit
(Windows ADK).
Pregunta 15
Pregunta
A company’s server virtualization team needs to provision a series of Hyper-V workloads to
use existing network storage arrays. The team has chosen to use Fibre Channel ports
within the guest operating systems.
Which of the following Windows Server versions can be used as guest operating systems
when using Hyper-V Fibre Channel ports?
Pregunta 16
Pregunta
Your network contains an Active Directory domain named contoso.com. The domain
contains a user account named User1 that resides in an organizational unit (OU) named
OU1.
A Group Policy object (GPO) named GPO1 is linked to OU1. GPO1 is used to publish
several applications to a user named User1.
In the Users container, you create a new user named User2.
You need to ensure that the same applications are published to User2.
What should you do?
Respuesta
-
Modify the settings in GPO1
-
Move User2 to OU1
-
Link a WMI filter to GPO1
-
Modify the security of GPO1.
Pregunta 17
Pregunta
Your network contains two Active Directory forests named contoso.com and adatum.com.
All servers run Windows Server 2012 R2.
A one-way external trust exists between contoso.com and adatum.com.
Adatum.com contains a universal group named Group1. You need to prevent Group1 from
being used to provide access to the resources in contoso.com.
What should you do?
Respuesta
-
Modify the Managed By settings of Group1
-
Modify the Allowed to Authenticate permissions in adatum.com.
-
Change the type of Group1 to distribution.
-
Modify the name of Group1.
Pregunta 18
Pregunta
Your network contains an Active Directory domain named contoso.com. The domain
contains an application server named Server1. Server1 runs Windows Server 2012 R2.
You have a client application named App1 that communicates to Server1 by using dynamic
TCP ports.
On Server1, a technician runs the following command: New-NetFirewallRule -DisplayName
AllowDynamic - Direction Outbound -LocalPort 1024- 65535 -Protocol TCP.
Users report that they can no longer connect to Server1 by using App1.
You need to ensure that App1 can connect to Server1.
What should you run on Server1?
Respuesta
-
Set-NetFirewallRule -DisplayName AllowDynamic -Action Allow
-
netsh advfirewall firewall set rule name=allowdynamic new action = allow
-
Set-NetFirewallRule -DisplayName AllowDynamic -Direction Inbound
-
netsh advfirewall firewall add rule name=allowdynamic action=allow
Pregunta 19
Pregunta
You work as a senior administrator at Contoso.com. The Contoso.com network consists of
a single domain named Contoso.com. All servers on the Contoso.com network have
Windows Server 2012 R2 installed.
You are running a training exercise for junior administrators. You are currently discussing
printer pooling.
Which of the following is TRUE with regards to printer pooling? (Choose all that apply.)
Respuesta
-
Printers in a pool must be of the same model, and use the same printer driver.
-
Each printer in the pool must have a different printer driver.
-
Printer ports used in the pool must be of the same type
-
The types of printer ports used in the pool must be mixed
-
Pooled printers appear to workstations as a single printer
-
A minimum of three printers are required to configure a printer pool
Pregunta 20
Pregunta
You work as an administrator at Contoso.com. The Contoso.com network consists of a
single domain named Contoso.com. All servers on the Contoso.com network have
Windows Server 2008 R2 installed.
Most of the Contoso.com servers have 64 – bit CPU’s installed, while the rest have 32 – bit
CPU’s installed. You are informed that Contoso.com wants to deploy Windows Server 2012
R2 on all their servers.
You need to make recommendations to ensure that this is possible.
Which of the following would you recommend?
Respuesta
-
You should inform Contoso.com that the deployment can proceed without any changes.
-
You should inform Contoso.com that the servers with 32 bit CPU’s must be upgraded to
include 64 bit CPU’s for the deployment to proceed.
-
You should inform Contoso.com that the servers with 64 bit CPU’s must be upgraded to
include 32 bit CPU’s for the deployment to proceed.
-
You should inform Contoso.com that the deployment is not in any way possible.
Pregunta 21
Pregunta
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the
Hyper-V server role installed.
An iSCSI SAN is available on the network.
Server1 hosts four virtual machines named VM1, VM2, VM3, VM4.
You create a LUN on the SAN.
You need to provide VM1 with access to the LUN. The solution must prevent other virtual
machines from accessing the LUN.
What should you configure?
Pregunta 22
Pregunta
You work as a senior administrator at Contoso.com. The Contoso.com network consists of
a single domain named Contoso.com. All servers on the Contoso.com network have
Windows Server 2012 R2 installed.
You are running a training exercise for junior administrators. You are currently discussing
connection security rules.
Which of the following is TRUE with regards to connection security rules? (Choose all that
apply.) (3)
Respuesta
-
Connection security rules allows for traffic to be secured via IPsec.
-
Connection security rules do not allow the traffic through the firewall.
-
Connection security rules are applied to programs or services.
-
Connection security rules are applied between two computers.
Pregunta 23
Pregunta
Your company has an Active Directory domain. You log on to the domain controller. The
Active Directory Schema snap-in is not available in the Microsoft Management Console
(MMC).
You need to access the Active Directory Schema snap-in. What should you do?
Respuesta
-
Register Schmmgmt.dll.
-
Log off and log on again by using an account that is a member of the Schema Admins
group.
-
Use the Ntdsutil.exe command to connect to the schema master operations master and
open the schema for writing.
-
Add the Active Directory Lightweight Directory Services (AD/LDS) role to the domain
controller by using Server Manager.
Pregunta 24
Pregunta
Your network contains an Active Directory domain named contoso.com. The domain
contains an application server named Server1. Server1 runs Windows Server 2012 R2.
You have a client application named App1 that communicates to Server1 by using dynamic
TCP ports.
On Server1, a technician runs the following command:
New-NetFirewallRule -DisplayNameAllowDynamic -Direction Outbound -LocalPort 1024-
65535 -Protocol TCP. Users report that they can no longer connect to Server1 by using
Appl.
You need to ensure that App1 can connect to Server1.
What should you run on Server1?
Respuesta
-
Set-NetFirewallRule -DisplayNameAllowDynamic -Action Allow
-
netshadvfirewall firewall add rule name=allowdynamic action-allow
-
netshadvfirewall firewall set rule name-allowdynamic new action- allow
-
Set-NetFirewallRule -DisplayNameAllowDynamic -Direction Inbound
Pregunta 25
Pregunta
You have a server named Server1. Server1 runs a Server Core installation of Windows
Server 2012 R2. The local area connection on Server1 has the following configuration:
IP address: 10.1.1.1
Subnet mask: 255.255.240.0
Default gateway: 10.1.1.254
Preferred DNS server: <none>
The network contains a DNS server that has an IPv4 address of 10.1.1.200. You need to
configure Server1 to use 10.1.1.200 as the preferred DNS server. The solution must not
change any other settings on Server1.
Which command should you run?
Respuesta
-
sconfig.cmd
-
net.exe
-
Set-NetIPInterface
-
netsh.exe
Pregunta 26
Pregunta
You work as an administrator at Contoso.com. The Contoso.com network consists of a
single domain named Contoso.com. All servers on the Contoso.com network have
Windows Server 2008 R2 installed. Some of Contoso.com’s workstations have Windows 7
installed, while the rest have Windows 8 installed.
After installing a new Windows Server 2012 computer in the Contoso.com domain, you
configure it to run the File and Storage Services server role. You are instructed to create a
shared folder on the new server, and configure the use of Previous Versions for restoring
files located in the shared folder.
Which of the following actions should you take?
Respuesta
-
You should consider configuring the Shadow Copies settings on the new server
-
You should consider configuring the Snapshot settings on the new server.
-
You should consider configuring the Background Copy settings on the new server.
-
You should consider configuring the Permission settings on the new server.
Pregunta 27
Pregunta
You have a file server named Server1 that runs Windows Server 2012 R2. Server1 has
following hardware configurations:
- 16GB of RAM
- A single quad-core CPU
- Three network teams that have two network adapters each
You add additional CPUs and RAM to Server 1.
You repurpose Server1 as a virtualization host. You install the Hyper-V server role on
Server1. You need to create four external virtual switches in Hyper-V. Which cmdlet should
you run first?
Respuesta
-
Set-NetAdapter.
-
Add-Net1.bfoTeamNic
-
Add-VMNetworkAdapter
-
Remove-NetLbfoTeam
Pregunta 28
Pregunta
You work as a senior administrator at Contoso.com. The Contoso.com network consists of
a single domain named Contoso.com. All servers in the Contoso.com domain, including
domain controllers, have Windows Server 2012 R2 installed.
You are running a training exercise for junior administrators. You are currently discussing
the Virtual Fibre Channel SAN feature.
Which of the following is TRUE with regards to the Virtual Fibre Channel SAN feature?
(Choose all that apply.)
Respuesta
-
It prevents virtual machines from connecting directly to Fibre Channel storage.
-
It allows for virtual machines to connect to Fibre Channel storage directly.
-
It includes support for virtual SANs, live migration, and multipath I/O.
-
It includes support for virtual SANs, and live migration, but not multipath I/O.
Pregunta 29
Pregunta
Your network contains an Active Directory domain named contoso.com. The domain
contains servers named Server1 and Server2 that run Windows Server 2012 R2. Server1
has the Active Directory Federation Services server role installed.Server2 is a file server.
Your company introduces a Bring Your Own Device (BYOD) policy.
You need to ensure that users can use a personal device to access domain resources by
using Single Sign-On (SSO) while they are connected to the internal network.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)
Respuesta
-
Enable the Device Registration Service in Active Directory.
-
Publish the Device Registration Service by using a Web Application Proxy
-
Configure Active Directory Federation Services (AD FS) for the Device Registration
Service.
-
Install the Work Folders role service on Server2.
-
Create and configure a sync share on Server2.
Pregunta 30
Pregunta
You perform a Server Core Installation of Windows Server 2012 R2 on a server named
Server1.
You need to add a graphical user interface (GUI) to Server1.
Which tool should you use? (2)
Respuesta
-
the dism.exe command
-
the Add-WindowsFeature cmdlet
-
the imagex.exe command
-
the setup.exe command
-
the ocsetup.exe command
-
the Add-WindowsPackage cmdlet
-
the Install-Module cmdlet
-
the Install-RoleService cmdlet
Pregunta 31
Pregunta
You work as an administrator at Contoso.com. The Contoso.com network consists of a
single domain named Contoso.com. All servers in the Contoso.com domain, including
domain controllers, have Windows Server 2012 installed.
You have been instructed to modify an Active Directory computer object.
Which of the following actions should you take?
Respuesta
-
You should consider making use of the Get-ADComputer Windows PowerShell cmdlet
-
You should consider making use of the Set-ADComputer Windows PowerShell cmdlet
-
You should consider making use of the New-ADComputer Windows PowerShell cmdlet
-
You should consider making use of the Get-ADComputerServiceAccount Windows
PowerShell cmdlet
Pregunta 32
Pregunta
You perform a Server Core Installation of Windows Server 2012 on a server named Server1. You need to add a graphical user interface (GUI) to Server1. Which tool should you use?
Pregunta 33
Pregunta
Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server2 runs Windows Server 2012. You create a security template named Template1 by using the Security Templates snap-in. You need to apply Template1 to Server2. Which tool should you use?
Pregunta 34
Pregunta
Your network contains an Active Directory domain named contoso.com. The domain contains two servers that run Windows Server 2012, Server1 and Server2. You create a security template named Template1 by using the Security Templates snap-in. You need to apply Template1 to Server2. Which tool should you use?
Pregunta 35
Pregunta
Your network contains an Active Directory domain named contoso.com. The domain contains a print server named Server1 that runs Windows Server 2012. Server1 contains a local group named Group1. You share a printer named Printer1 on Server1. You need to configure Printer1 to meet the following requirements:
Ensure that the members of Group1, the Server Operators group, the Administrators group, and the Print Operators group can send print jobs to Printer1.
Prevent other users from sending print jobs to Printer1.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
Respuesta
-
Assign the Print permission to the Server Operators group
-
Remove the permissions for the Creator Owner group.
-
Remove the permissions for the Everyone group.
-
Assign the Print permission to Group1.
-
Assign the Print permission to the Administrators group.
Pregunta 36
Pregunta
Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2. Server1 runs Windows Server 2012. Server2 runs Windows Server 2008 R2 Service Pack 1 (SP1) and has the DHCP Server server role installed. You need to manage DHCP on Server2 by using the DHCP console on Server1. What should you do first?
Respuesta
-
From Server Manager on Server2, enable Windows Remote Management.
-
From a command prompt on Server2, run winrm.exe.
-
From Server Manager on Server1, install a feature.
-
From the Microsoft Management Console on Server1, add a snap-in.
Pregunta 37
Pregunta
You have a server named Server1 that runs a Server Core installation of Windows Server 2012. Server1 is configured to obtain an IPv4 address by using DHCP. You need to configure the IPv4 settings of the network connection on Server1 as follows:
IP address: 10.1.1.1
Subnet mask: 255.255.240.0
Default gateway: 10.1.1.254
What should you run?
Respuesta
-
Set-NetlPInterface
-
netcfg.exe
-
New-NetlPAddress
-
msconfig.exe
Pregunta 38
Pregunta
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012. You create a new inbound rule by using Windows Firewall with Advanced Security. You need to configure the rule to allow Server1 to accept unsolicited inbound packets that are received through a network address translation (NAT) device on the network. Which setting in the rule should you configure?
Respuesta
-
Edge traversal
-
Authorized computers
-
Interface types
-
Remote IP address
Pregunta 39
Pregunta
Your network contains two Hyper-V hosts that run Windows Server 2012. The Hyper-V hosts contains several virtual machines that run Windows Server 2012.
You install the Network Load Balancing feature on the virtual machines.
You need to configure the virtual machines to support Network Load Balancing (NLB).
Which virtual machine settings should you configure?
Respuesta
-
Port mirroring
-
DHCP guard
-
Router guard
-
MAC address
Pregunta 40
Pregunta
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012.
You need to create 3-TB virtual hard disk (VHD) on Server1.
Which tool should you use?
Pregunta 41
Pregunta
You have a new server named Server1 that runs Windows Server 2012. Server1 has two dual-core processors and 32 GB of RAM. You install the Hyper-V server role on Server1.
You create two virtual machines on Server1 that each have 8 GB of memory.
You need to minimize the amount of time it takes for both virtual machines to access memory.
What should you configure on each virtual machine?
Respuesta
-
Resource control
-
Dynamic Memory
-
NUMA topology
-
Memory weight
Pregunta 42
Pregunta
You have a server named Server1 that runs Windows Server 2012. You plan to enable Hyper-V Network Visualization on Server1.
You need to install the Windows Network Virtualization Filter Driver on Server1.
Which Windows PowerShell cmdlet should you run?
Pregunta 43
Pregunta
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 and has the HyperV server role installed.
You need to log the amount of system resources used by each virtual machine. What should you do?
Respuesta
-
From Windows PowerShell, run the Enable-VMResourceMetering cmdlet.
-
From Windows System Resource Manager, enable Accounting.
-
From Windows System Resource Manager, add a resource allocation policy.
-
From Windows PowerShell, run the Measure-VM cmdlet.
Pregunta 44
Pregunta
You have two servers named Server1 and Server2 that run Windows Server 2012. Server1 and Server2 are part of a workgroup. On Server1, you add Server2 to Server Manager. When you attempt to connect to Server2 from Server Manager, you receive the following error message:
"Credentials not valid."
You need to ensure that you can manage Server2 from Server1 by using Server Manager on Server1.
What should you do?
Respuesta
-
On Server 2, run the Configure-SmRemoting cmdlet.
-
On Server 1, run the Set-NetFirewallRule cmdlet.
-
On Server 1, run the Set-Item cmdlet.
-
On Server 2, install the Remote Server Administration Tools (RSAT).
Pregunta 45
Pregunta
You have a server named Server1 that runs a Server Core installation of Windows Server 2012 Standard.
You establish a Remote Desktop session to Server1.
You need to identify which task can be performed on Server1 from within the Remote Desktop session.
What should you identify?
Respuesta
-
Modify the network settings by using Sconfig.
-
Join a domain by using the System Properties.
-
Disable services by using Msconfig.
-
Install a feature by using Server Manger.
Pregunta 46
Pregunta
You have a server named Server1. Server1 runs Windows Server 2012 and is located in a perimeter network.
You need to configure a custom connection security rule on Server1. The rule must encrypt network communications across the Internet to a computer at another company.
Which authentication method should you configure in the connection security rule?
Pregunta 47
Pregunta
Your network contains two Active Directory forests named contoso.com and adatum.com.
All servers run Windows Server 2012. A one-way external trust exists between contoso.com and adatum.com. Adatum.com contains a universal group named Group1.
You need to prevent Group1 from being used to provide access to the resources in contoso.com
What should you do?
Respuesta
-
Modify the Managed By settings of Group1
-
Modify the Allowed to Authenticate permissions in adatum.com
-
Change the type of Group1 to distribution
-
Modify the name of Group1