Question 1
Question
You run a Windows Server 2012 R2, what is the PowerShell command to set preferred dns
server. Note: Other config such as ip address should not be changed.
Question 2
Question
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has five
network adapters. Three of the network adapters are connected to a network named LAN1.
The two other network adapters are connected to a network named LAN2.
You need to create a network adapter team from the three network adapters connected to
LAN1.
Which tool should you use?
Answer
-
Routing and Remote Access
-
Network and Sharing Center
-
Server Manager
-
Network Load Balancing Manager
Question 3
Question
You have a virtual machine named VM1.
You install Windows Server 2012 R2 on VM1.
You plan to use VM1 as an image that will be distributed to sales users to demonstrate the
features of a custom application. The custom application only requires the Web Server (IIS)
server role to be installed.
You need to ensure that the VHD file for VM1 only contains the required Windows Server
2012 R2 source files.
Which tool should you use?
Answer
-
servermanagercmd.exe
-
dism.exe
-
ocsetup.exe
-
imagex.exe
Question 4
Question
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1. Server1 runs Windows Server 2012 R2 and has the
Hyper-V server role installed. You need to log the amount of system resources used by
each virtual machine. What should you do?
Answer
-
From Windows PowerShell, run the Enable-VMResourceMetering cmdlet.
-
From Windows System Resource Manager, enable Accounting.
-
From Windows System Resource Manager, add a resource allocation policy
-
From Windows PowerShell, run the Measure-VM cmdlet.
Question 5
Question
Which of the following is not a correct reason for creating an OU?
Answer
-
To create a permanent container that cannot be moved or renamed
-
To duplicate the divisions in your organization
-
To delegate administration tasks
-
To assign different Group Policy settings to a specific group of users or computers
Question 6
Question
You work as an administrator at Contoso.com. The Contoso.com network consists of a
single domain named Contoso.com. Subsequent to deploying a Server Core Installation of
Windows Server 2012 on a new Contoso.com server, you are instructed to add a graphical
user interface (GUI) to the server.
You want to achieve this goal from the command prompt. Which of the following actions
should you take?
Answer
-
You should consider making use of the dism.exe command
-
You should consider making use of the dsquery.exe command.
-
You should consider making use of the dsadd.exe command.
-
You should consider making use of the dsrm.exe command.
Question 7
Question
Your network contains a file server named Server1 that runs Windows Server 2012 R2. All
client computers run Windows 8. Server1 contains a folder named Folder1. Folder1
contains the installation files for the company’s desktop applications. A network technician
shares Folder1 as Share 1.
You need to ensure that the share for Folder1 is not visible when users browse the
network.
What should you do?
Answer
-
From the properties of Folder1, deny the List Folder Contents permission for the
Everyone group
-
From the properties of Folder1, remove Share1, and then share Folder1 as Share1$.
-
From the properties of Folder1, configure the hidden attribute
-
From the properties of Share1, configure access-based enumeration
Question 8
Question
You have a server named Server1 that has a Server Core installation of Windows Server
2008 R2.
Server1 has the DHCP Server server role and the File Server server role installed.
You need to upgrade Server1 to Windows Server 2012 R2 with the graphical user interface
(GUI).
The solution must meet the following requirements:
Preserve the server roles and their configurations.
Minimize administrative effort.
What should you do?
Answer
-
On Server1, run setup.exe from the Windows Server 2012 R2 installation media and
select Server with a GUI.
-
Start Server1 from the Windows Server 2012 R2 installation media and select Server
Core Installation.
When the installation is complete, add the Server Graphical Shell feature.
-
Start Server1 from the Windows Server 2012 R2 installation media and select Server
with a GUI.
-
On Server1, run setup.exe from the Windows Server 2012 R2 installation media and
select Server Core Installation.
When the installation is complete, add the Server Graphical Shell feature
Question 9
Question
You have a domain controller named Server1 that runs Windows Server 2012 R2 and has
the DNS Server server role installed. Server1 hosts a DNS zone named contoso.com and a
GlobalNames zone.
You discover that the root hints were removed from Server1.
You need to view the default root hints of Server1.
Which file should you open?
Answer
-
Netlogon.dns
-
Cache.dns
-
Globalnames.dns
-
Place.dns
Question 10
Question
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1. Server1 runs Windows Server 2012 R2.
You plan to create a shared folder. The shared folder will have a quota limit.
You discover that when you run the New Share Wizard, you cannot select the SMB Share
– Advanced option.
You need to ensure that you can use SMB Share – Advanced to create the new share.
What should you do on Server1 before you run the New Share Wizard?
Answer
-
Run the Set-SmbShare cmdlet.
-
Install the File Server Resource Manager role service
-
Configure Dynamic Access Control and Apply a central access policy.
-
Configure the Advanced system settings
Question 11
Question
Your network contains an Active Directory domain named contoso.com. The domain
contains two servers named Server1 and Server2 that run Windows Server 2012 R2.
You create a security template named Template1 by using the Security Templates snap-in.
You need to apply Template1 to Server2.
Which tool should you use
Answer
-
Authorization Manager
-
Local Security Policy
-
Certificate Templates
-
System Configuration
Question 12
Question
Your network contains an Active Directory domain named contoso.com. All domain
controllers run Windows Server 2012 R2.
The domain contains a server named Server1 that runs Windows Server 2012 R2.
You need to ensure that when users log on to Server1, their user account is added
automatically to a local group named Group1 during the log on process.
Which Group Policy settings should you modify?
Answer
-
User Rights Assignment
-
Preferences
-
Security Options
-
Restricted Groups
Question 13
Question
Your network contains an active directory domain named contoso.com. The domain
contains a domain controller named DCS. DCS has a server core installation of windows
server 2012. You need to uninstall Active Directory from DCS manually. Which tool should
you use?
Question 14
Question
A company has a forest with 4 sites. Subnets are as follows:
MainOffice 172.16.1.0 Subnet: 255.255.255.0 Gateway 172.16.1.254
Site1 192.168.12.0 Subnet: 255.255.255.0
Site 2 192.168.13.0 Subnet: 255.255.255.0
Site 3 192.168.14.0 Subnet: 255.255.255.0
Site 4 192.168.15.0 Subnet: 255.255.255.0
You add a new server to the MainOffice and it needs to be able to communicate to all sites.
Which route command would you run?
Answer
-
route add -p 192.168.8.0 netmask 255.255.252.0 172.16.1.254
-
route add -p 192.168.0.0 netmask 255.255.248.0 172.16.1.254
-
route add -p 192.168.12.0 netmask 255.255.252.0 172.16.1.254
-
route add -p 192.168.12.0 netmask 255.255.240.0 172.16.1.254
Question 15
Question
You work as a senior administrator at Contoso.com. The Contoso.com network consists of
a single domain named Contoso.com. All servers on the Contoso.com network have
Windows Server 2012 R2 installed
You are running a training exercise for junior administrators. You are currently discussing
what happens when you run the Remove-NetLbfoTeam Windows PowerShell cmdlet.
Which of the following describes the results of running this cmdlet?
Answer
-
It removes one or more network adapters from a specified NIC team.
-
It removes a team interface from a NIC team.
-
It removes a specified NIC team from the host.
-
It removes a network adapter member from a switch team
Question 16
Question
Your network contains two servers named Server1 and Server2 that run Windows Server
2012 R2. Server1 is a DHCP server that is configured to have a scope named Scope1.
Server2 is configured to obtain an IP address automatically.
In Scope1, you create a reservation named Res_Server2 for Server2.
A technician replaces the network adapter on Server2.
You need to ensure that Server2 can obtain the same IP address.
What should you modify on Server1?
Answer
-
The Name Protection settings of Scope1
-
The MAC address of Res_Server2
-
The Advanced settings of Res_Server2
-
The Network Access Protection Settings of Scope1
Question 17
Question
You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain, including
domain controllers, have Windows Server 2012 R2 installed.
Contoso.com has a Hyper-V server, named ENSUREPASS-SR13, which hosts multiple
virtual machines.
You have enabled the use of Single-root I/O virtualization.
Which of the following is TRUE with regards to using Single-root I/O virtualization? (Choose
all that apply.)
Answer
-
It maximizes network throughput, while minimizing network latency
-
It maximizes network throughput, as well as network latency
-
It avoids the virtual switch stack and allows the virtual machine direct access to the
actual network switch
-
It prevents the virtual machine from accessing the network switch directly.
Question 18
Question
You work as an administrator at Contoso.com. The Contoso.com network consists of a
single domain named Contoso.com. All servers on the Contoso.com network have
Windows Server 2012 installed.
Contoso.com has a server, named ENSUREPASS-SR07, which has the AD DS, DHCP,
and DNS server roles installed. Contoso.com also has a server, named ENSUREPASSSR08,
which has the DHCP, and Remote Access server roles installed. You have
configured a server, which has the File and Storage Services server role installed, to
automatically acquire an IP address.
The server is named ENSUREPASS-SR09. You then create a filter on ENSUREPASSSR07.
Which of the following is a reason for this configuration?
Answer
-
To make sure that ENSUREPASS-SR07 issues ENSUREPASS-SR09 an IP address
-
To make sure that ENSUREPASS-SR07 does not issue ENSUREPASS-SR09 an IP
address.
-
To make sure that ENSUREPASS-SR09 acquires a constant IP address from
ENSUREPASS-SR08 only.
-
To make sure that ENSUREPASS-SR09 is configured with a static IP address
Question 19
Question
Your network contains an Active Directory domain named contoso.com.
All servers run Windows Server 2012 R2.
An application named Appl.exe is installed on all client computers. Multiple versions of
Appl.exe are installed on different client computers. Appl.exe is digitally signed.
You need to ensure that only the latest version of Appl.exe can run on the client computers.
What should you create?
Answer
-
An application control policy packaged app rule
-
A software restriction policy certificate rule
-
An application control policy Windows Installer rule
-
An application control policy executable rule
Question 20
Question
Your network contains an Active Directory domain named contoso.com. The network
contains a member server named Server1 that runs Windows Server 2012 R2. Server1 has
the DNS Server server role installed and has a primary zone for contoso.com. The Active
Directory domain contains 500 client computers. There are an additional 20 computers in a
workgroup. You discover that every client computer on the network can add its record to
the contoso.com zone.
You need to ensure that only the client computers in the Active Directory domain can
register records in the contoso.com zone.
What should you do first?
Answer
-
A. Move the contoso.com zone to a domain controller that is configured as a DNS server
-
Configure the Dynamic updates settings of the contoso.com zone
-
Sign the contoso.com zone by using DNSSEC
-
Configure the Security settings of the contoso.com zone.
Question 21
Question
Your network contains an Active Directory domain. The domain contains a server named
Server28.
The computer account of Server 28 is located in an organizational unit (OU) named OU1. A
Group Policy object (GPO) named Application Restriction Policy is linked to OU1.
The settings of the GPO are configured as shown in the GPO Settings exhibit. (Click the
Exhibit button.)
The Services console on Server28 is shown in the Services exhibit. (Click the Exhibit
button.)
Select Yes if the statement can be shown to be true based on the available information;
otherwise select No. Each correct selection is worth one point.
Question 22
Question
Your network contains two subnets. The subnets are configured as shown in the following
table.
You have a server named Server1 that runs Windows Server 2012 R2. Server1 is
connected to LAN1.
You run the route print command as shown in the exhibit. (Click the Exhibit button.)
You need to ensure that Server1 can communicate with the client computers on LAN2.
What should you do?
Answer
-
Change the default gateway address.
-
Set the state of the Microsoft ISATAP Adapter #2 interface to disable
-
Change the metric of the 10.10.1.0 route
-
Set the state of the Teredo interface to disable.
Question 23
Question
Your company’s security policy states that all of the servers deployed to a branch office
must not have the graphical user interface (GUI) installed. In a branch office, a support
technician installs a server with a GUI installation of Windows Server 2012 on a new
server, and then configures the server as a DHCP server.
You need to ensure that the new server meets the security policy. You want to achieve this
goal by using the minimum amount of Administrative effort. What should you do?
Answer
-
Reinstall Windows Server 2012 on the server
-
From Windows PowerShell, run Uninstall-WindowsFeature Desktop-Experience.
-
From Windows PowerShell, run Uninstall-WindowsFeature PowerShell-ISE.
-
From Server Manager, uninstall the User Interfaces and Infrastructure feature.
Question 24
Question
A company’s server deployment team needs to introduce many new Windows Server 2012
R2 domain controllers throughout the network into a single Windows Server 2008 R2
domain. The team has chosen to use Windows PowerShell.
Which Windows PowerShell module includes the command-line options for installing
domain controllers?
Question 25
Question
You work as an administrator at Contoso.com. The Contoso.com network consists of a
single domain named Contoso.com.
Contoso.com has a domain controller, named ENSUREPASS-DC01, which has Windows
Server 2012 R2 installed. Another Contoso.com domain controller, named ENSUREPASSDC02,
has Windows Server 2008 R2 installed.
You have deployed a server, named ENSUREPASS-SR15, on Contoso.com’s perimeter
network. ENSUREPASSSR15 is running a Server Core Installation of Windows Server
2012 R2.
You have been instructed to make sure that ENSUREPASS-SR15 is part of the
Contoso.com domain.
Which of the following actions should you take?
Answer
-
You should consider making use of Set-Computer Windows PowerShell cmdlet on
ENSUREPASS-SR15.
-
You should consider making use of Get-Computer Windows PowerShell cmdlet on
ENSUREPASS-SR15.
-
You should consider making use of Test-Computer Windows PowerShell cmdlet on
ENSUREPASS-SR15.
-
You should consider making use of Add-Computer Windows PowerShell cmdlet on
ENSUREPASS-SR15
Question 26
Question
You have external virtual switch with srv-io enabled with 10 Virtual Machines on it. You
need to make the Virtual Machines able to talk only to each other.
Question 27
Question
Your network contains an Active Directory domain named contoso.com. The domain
contains two servers named Server1 and Server2 that run Windows Server 2012 R2.
From Server2, you attempt to connect to Server1 by using Computer Management and you
receive the following error message: "Computer\ \Server1 cannot be found. The network
path was not found."
From Server1, you successfully connect to Server2 by using Server Manager.
You need to ensure that you can manage Server1 remotely from Server2 by using
Computer Management.
What should you configure? To answer, select the appropriate option in the answer area.
Answer
-
Windows firewall
-
Remote management
-
Remote desktop
-
NIC Teaming
-
Ethernet
Question 28
Question
Your network contains an Active Directory domain named adatum.com. The domain
contains a file server named Server2 that runs Windows Server 2012 R2. Server2 contains
a shared folder named Home. Home contains the home folder of each user.
All users have the necessary permissions to access only their home folder.
A user named User1 opens the Home share as shown in the exhibit. (Click the Exhibit
button.
You need to ensure that all users see only their own home folder when they access Home.
What should you do from Server2?
Answer
-
From Windows Explorer, modify the properties of Home.
-
From Server Manager, modify the properties of the volume that contains Home.
-
From Windows Explorer, modify the properties of the volume that contains Home.
-
From Server Manager, modify the properties of Home
Question 29
Question
Your network contains an Active Directory domain named contoso.com. The domain
contains two servers named CONT1 and CONT2. Both servers run Windows Server 2012
R2.
CONT1 has a shared printer named Printer1. CONT2 connects to Printer1 on CONT1.
When you attempt to remove Printer1 from CONT2, you receive the error message shown
in the exhibit. (Click the Exhibit button.)
You successfully delete the other printers installed on CONT2.
You need to identify what prevents you from deleting Printer1 on CONT2.
What should you identify?
Answer
-
Printer1 is deployed as part of a mandatory profile
-
Printer1 is deployed by using a Group Policy object (GPO).
-
Your user account is not a member of the Print Operators group on CONT2.
-
Your user account is not a member of the Print Operators group on CONT1.
Question 30
Question
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1 that runs Windows Server 2012 R2 and has the Web
Server (US) server role installed.
Server1 has a web site named Web1. Web1 is configured to use digest authentication.
You need to ensure that a user named User1 can access Web1.
What should you do from Active Directory Users and Computers?
Answer
-
From the properties of User1, select Store password using reversible encryption
-
From the properties of User1, select Use Kerberos DES encryption types for this
account.
-
From the properties of Server1, select Trust this computer for delegation to any service
(Kerberos only).
-
From the properties of Server1, assign the Allowed to Authenticate permission to User1
Question 31
Question
Server1, you plan to create an inbound firewall rule that contains the following settings:
Allows inbound connections to an application named App1.exe
Applies to the domain profile
Overrides any block rules
You need to identify the minimum information required to create the rule.
Which two pieces of information should you identify? Each correct answer presents part of
the solution.
Answer
-
the list of computers that are authorized to use the application
-
the list of Active Directory users who are authorized to use the application
-
the hash of the application
-
the name of the IPSec policies that apply to Server1
-
the local path of the application
Question 32
Question
You have a server named Server1 that runs Windows Server 2012 R2.
You apply a security policy to server1 by using the Security Configuration Wizard (CWM).
You plan to roll back the security policy.
You need to identify the settings that are prevented from rolling back running the CWM Witch settings should you identify.
Answer
-
The secure startup order
-
The outbound authentication methods
-
The network security rules
-
The system access control list
Question 33
Question
You work as a senior administrator at Contoso.com. The Contoso.com network consists of
a single domain named Contoso.com. All servers on the Contoso.com network have
Windows Server 2012 installed.
You are running a training exercise for junior administrators. You are currently discussing
NIC Teaming.
Which of the following is TRUE with regards to NIC Teaming? (Choose all that apply.)
Answer
-
It allows for traffic failover to prevent connectivity loss if a network component fails.
-
It prevents bandwidth aggregation
-
The Windows Server 2012 implementation of NIC Teaming supports a maximum of 5
NICs in a team.
-
The Windows Server 2012 implementation of NIC Teaming supports a maximum of 32
NICs in a team.
Question 34
Question
You work as an administrator at Contoso.com. The Contoso.com network consists of two Active Directory forests, named Contoso.com and test.com. There is no trust relationship
configured between the forests.
A backup of Group Policy object (GPO) from the test.com domain is stored on a domain
controller in the Contoso.com domain.
You are informed that a GPO must be created in the Contoso.com domain, and must be
based on the settings of the GPO in the test.com domain.
You start by creating the new GPO using the New-GPO Windows PowerShell cmdlet. You
want to complete the task via a Windows PowerShell cmdlet.
Which of the following actions should you take?
Answer
-
You should consider making use of the Invoke-GPUpdate Windows PowerShell cmdlet.
-
You should consider making use of the Copy-GPO Windows PowerShell cmdlet
-
You should consider making use of the New-GPLink Windows PowerShell cmdlet
-
You should consider making use of the Import-GPO Windows PowerShell cmdlet.
Question 35
Question
Your network contains an Active Directory domain named adatum.com. The domain
contains several thousand member servers that run Windows Server 2012 R2. All of the
computer accounts for the member servers are in an organizational unit (OU) named
ServersAccounts. Servers are restarted only occasionally.
You need to identify which servers were restarted during the last two days.
What should you do?
Answer
-
Run dsquery computer and specify the -stalepwd parameter
-
Run dsquery server and specify the -o parameter.
-
Run Get-ADComputer and specify the lastlogon property.
-
Run Get-ADComputer and specify the SearchScope parameter
Question 36
Question
You work as a senior administrator at Contoso.com. The Contoso.com network consists of
a single domain named Contoso.com. All servers on the Contoso.com network have
Windows Server 2012 installed.
You are running a training exercise for junior administrators. You are currently discussing
spanned volumes.
Which of the following is TRUE with regards to spanned volumes? (Choose all that apply.)
Answer
-
Spanned volumes do not provide fault tolerance
-
Spanned volumes are a fault tolerant solution.
-
You can extend a spanned volume onto a maximum of 16 dynamic disks.
-
You cannot create a spanned volume using a system volume or boot volume
Question 37
Question
You work as an administrator at Contoso.com. The Contoso.com network consists of a
single domain named Contoso.com. All servers in the Contoso.com domain, including
domain controllers, have Windows Server 2012 R2 installed.
Contoso.com has a server, named ENSUREPASS-SR15, which is configured as a file
server.
You have received instructions to make sure that a user, named Mia Hamm, has the ability
to generate a complete backup of ENSUREPASS-SR15 via Windows Server Backup.
Which of the following actions should you take?
Answer
-
You should consider making use of Computer Management to configure the local
groups.
-
You should consider making use of Computer Management to configure the domain
local groups.
-
You should consider making use of Computer Management to configure the global
groups
-
You should consider making use of Computer Management to configure the
administrator groups
Question 38
Question
You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain have Windows
Server 2012 R2 installed, while domain controllers have Windows Server 2008 R2
installed.
You are then tasked with deploying a new Windows Server 2012 R2 domain controller. You
are preparing to install the DNS Server role, and enable the global catalog server option.
Which of the following actions should you take?
Answer
-
You should consider making use of Server Manager.
-
You should consider making use of the Active Directory Installation Wizard.
-
You should consider making use of the DHCP Installation Wizard
-
You should consider making use of TS Manager
Question 39
Question
You work as an administrator at Contoso.com. The Contoso.com network consists of a
single domain named Contoso.com. All servers in the Contoso.com domain, including
domain controllers, have Windows Server 2012 R2 installed.
Contoso.com has a domain controller, named ENSUREPASS-DC01.
You have been instructed to make sure that the Group Policy Administrative Templates are
available centrally.
Which of the following actions should you take?
Answer
-
You should consider copying the policies folder to the PolicyDefinitions folder in the
Contoso.com domain’s SYSVOL folder.
-
You should consider copying the PolicyDefinitions folder to the policies folder in the
Contoso.com domain’s SYSVOL folder.
-
You should consider copying the PolicyDefinitions folder to the policies folder in the
Contoso.com domain’s systemroot folder
-
You should consider copying the PolicyDefinitions folder to the policies folder in the
Contoso.com domain’s logonserver folder.
Question 40
Question
Your network contains an Active Directory domain named contoso.com. The domain
contains three member servers.
The servers are configured as shown in the following table.
All client computers run Windows 8. All client computers receive updates from Server2.
On Server3, you add a shared printer named Printer1. Printer1 uses a Type 4 driver that is
not included in the Windows 8 installation media.
You need to ensure that when users connect to the printer for the first time, the printer
driver is installed automatically on their client computer.
What should you do?
Answer
-
From the Windows Deployment Services console on Server1, add the driver package for
Printer1.
-
From the Update Services console on Server2, import and approve updates.
-
From Windows PowerShell on Server3, run the Add-PrinterDriver cmdlet
-
From the Print Management console on Server3, add additional drivers for Printer1
Question 41
Question
You are attempting to delete a global security group in the Active Directory Users and
Computers console, and the console will not let you complete the task.
Which of the following could possibly be causes for the failure? (Choose all answers that
are correct.)
Answer
-
There are still members in the group.
-
One of the group’s members has the group set as its primary group
-
You do not have the proper permissions for the container in which the group is located.
-
You cannot delete global groups from the Active Directory Users and Computers
console.
Question 42
Question
In a domain running at the Windows Server 2012 R2 domain functional level, which of the
following security principals can be members of a global group? (Choose all answers that
are correct.)
Answer
-
Users
-
Computers
-
Universal groups
-
Global groups
Question 43
Question
A company’s server security team needs a solution that will prevent users from installing
and using unauthorized applications on their Windows 8 desktop computers.
Which technology should the team choose?
Question 44
Question
You work as an administrator at Contoso.com. The Contoso.com network consists of a
single domain named Contoso.com. All servers in the Contoso.com domain, including
domain controllers, have Windows Server 2012 installed.
Contoso.com has a server, named ENSUREPASS-SR07, which has four network
adapters. Contoso.com has two SR07’s network adapters are connected to the one LAN,
local area networks (LANs). Two of ENSUREPASS – while the other two are connected to
the other LAN.
You are required to configure one of the network adapter pairs into a network adapter
team.
Which of the following actions should you take?
Answer
-
You should consider accessing the Group Policy Management Console (GPMC) on
ENSUREPASS-SR07.
-
You should consider accessing the TS Manager console on ENSUREPASS-SR07
-
You should consider accessing the Server Manager console on ENSUREPASS-SR07.
-
You should consider accessing the Remote Desktop Gateway Manager console on
ENSUREPASS-SR07.
Question 45
Question
You have a server named Server1. Server1 runs Windows Server 2012 R2.
A user named Admin1 is a member of the local Administrators group.
You need to ensure that Admin1 receives a User Account Control (UAC) prompt when
attempting to open Windows PowerShell as an administrator.
Which setting should you modify from the Local Group Policy Editor?
To answer, select the appropriate setting in the answer area.
Question 46
Question
You work as an administrator at Contoso.com. The Contoso.com network consists of a
single domain named Contoso.com. All servers in the Contoso.com domain, including
domain controllers, have Windows Server 2012 R2 installed.
You have been instructed to add a new domain controller to Contoso.com’s existing
environment.
Which of the following actions should you take?
Answer
-
You should consider making use of Server Manager
-
You should consider making use of Authorization Manager
-
You should consider making use of Remote Desktop Gateway Manager.
-
You should consider making use of Network Load Balancing Manager
Question 47
Question
You work as a senior administrator at Contoso.com. The Contoso.com network consists of
a single domain named Contoso.com. All servers on the Contoso.com network have
Windows Server 2012 R2 installed.
You are running a training exercise for junior administrators. You are currently discussing
the use of Non-Uniform Memory Architecture (NUMA).
Which of the following is TRUE with regards to Non-Uniform Memory Architecture
(NUMA)? (Choose two.)
Answer
-
It is a computer architecture used in multiprocessor systems
-
It is a computer architecture used in single processor systems
-
It allows a processor to access local memory faster than it can access remote memory
-
It allows a processor to access remote memory faster than it can access local memory.
Question 48
Question
Your network contains an Active Directory domain named contoso.com. The domain
contains a member server named HVServer1. HVServer1 runs Windows Server 2012 R2
and has the Hyper-V server role installed.
HVServer1 hosts 10 generation 1 virtual machines. All of the virtual machines connect to a
virtual switch named Switch1. Switch1 is configured as a private network. All of the virtual
machines have the DHCP guard and the router guard settings enabled.
You install the DHCP server role on a virtual machine named Server1. You authorize
Server1 as a DHCP server in contoso.com. You create an IP scope. You discover that the virtual machines connected to Switch1 do not receive IP settings
from Server1.
You need to ensure that the virtual machines can use Server1 as a DHCP server.
What should you do?
Answer
-
Enable MAC address spoofing on Server1.
-
Enable single-root I/O visualization (SR-IOV) on Server1.
-
Disable the DHCP guard on Server1.
-
Disable the DHCP guard on all of the virtual machines that are DHCP clients
Question 49
Question
You work as an administrator at Contoso.com. The Contoso.com network consists of a
single domain named Contoso.com. All servers on the Contoso.com network have
Windows Server 2012 installed.
You have received instructions to install the Remote Desktop Services server role on a
server, named ENSUREPASS-SR07. You want to achieve this remotely from a server,
named ENSUREPASS-SR06.
Which of the following actions should you take?
Answer
-
You should consider accessing the Server Manager console on ENSUREPASS-SR07
-
You should consider accessing the Server Manager console on ENSUREPASS-SR06.
-
You should consider accessing the TS Manager console on ENSUREPASS-SR07
-
You should consider accessing the TS Manager console on ENSUREPASS-SR06.
Question 50
Question
You have a server named Server1 that runs a Server Core Installation of Windows Server
2012 R2. You attach a 4-TB disk to Server1.
The disk is configured as an MBR disk. You need to ensure that you can create a 4-TB
volume on the disk.
Which Diskpart command should you use?
Answer
-
Expand
-
Attach
-
Automount
-
Convert