Question 1
Question
Your network contains an Active Directory domain named contoso.com. All domain
controllers run Windows Server 2012 R2.
The domain contains an organizational unit (OU) named OU1. OU1 contains an OU named
OU2. OU2 contains a user named user1.
User1 is the member of a group named Group1. Group1 is in the Users container.
You create five Group Policy objects (GPO). The GPOs are configured as shown in the
following table.
Your network contains an Active Directory domain named contoso.com. All domain
controllers run Windows Server 2012 R2.
The domain contains an organizational unit (OU) named OU1. OU1 contains an OU named
OU2. OU2 contains a user named user1.
User1 is the member of a group named Group1. Group1 is in the Users container.
You create five Group Policy objects (GPO). The GPOs are configured as shown in the
following table.
Answer
-
GPO 2
-
GPO 3
-
GPO 4
-
GPO 5
-
GPO 1
Question 2
Question
Your network contains an Active Directory domain named contoso.com. The domain contains more than 100 Group Policy objects (GPOs). Currently, there are no enforced
GPOs.
A network administrator accidentally deletes the Default Domain Policy GPO.
You do not have a backup of any of the GPOs.
You need to recreate the Default Domain Policy GPO.
What should you use?
Answer
-
Dcgpofix
-
Get-GPOReport
-
Gpfixup
-
Gpresult
-
Gpedit. msc
-
Import-GPO
-
Restore-GPO
-
Set-GPInheritance
Question 3
Question
Your network contains an Active Directory domain named contoso.com. The domain
contains more than 100 Group Policy objects (GPOs). Currently, there are no enforced
GPOs.
The domain is renamed to adatum.com.
Group Policies no longer function correctly.
You need to ensure that the existing GPOs are applied to users and computers. You want
to achieve this goal by using the minimum amount of administrative effort.
What should you use?
Answer
-
Dcgpofix
-
Get-GPOReport
-
Gpfixup
-
Gpresult
-
Gpedit. msc
-
Import-GPO
-
Restore-GPO
-
Set-GPInheritance
-
Set-GPLink
Question 4
Question
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1. Server1 is configured as a VPN server.
You need to configure Server1 to perform network address translation (NAT).
What should you do?
Answer
-
From Network Connections, modify the Internet Protocol Version 4 (TCP/IPv4) setting of
each network adapter.
-
From Network Connections, modify the Internet Protocol Version 6 (TCP/IPv6) setting of
each network adapter.
-
From Routing and Remote Access, add an IPv6 routing protocol
-
From Routing and Remote Access, add an IPv4 routing protocol.
Question 5
Question
Your network contains a RADIUS server named Server1.
You install a new server named Server2 that runs Windows Server 2012 R2 and has
Network Policy Server (NPS) installed.
You need to ensure that all accounting requests for Server2 are forwarded to Server1.
On Server2, you configure a Connection Request Policy.
What else should you configure on Server2? To answer, select the appropriate node in the
answer area.
Answer
-
Radius Clients
-
Remote Radius Server Groups
-
Connection Request Policies
-
Network Policies
-
Health Policies
-
System Health Validators
-
Remediation Server Groups
Question 6
Question
Your company has two offices. The offices are located in Montreal and Seattle.
The network contains an Active Directory domain named contoso.com. The domain
contains servers named Server1 and Server2. Server1 is located in the Seattle office.
Server2 is located in the Montreal office. Both servers run Windows Server 2012 R2 and
have the Windows Server Update Services (WSUS) server role installed.
You need to configure Server2 to download updates that are approved on Server1 only.
What cmdlet should you run? To answer, select the appropriate options in the answer area.
Question 7
Question
Your network contains an Active Directory domain named contoso.com. All servers run
Windows Server 2012 R2. The functional level of both the domain and the forest is
Windows Server 2008 R2.
The domain contains a domain-based Distributed File System (DFS) namespace that is
configured as shown in the exhibit. (Click the Exhibit button.)
You need to enable access-based enumeration on the DFS namespace.
What should you do first?
Answer
-
Raise the domain functional level.
-
Raise the forest functional level.
-
Install the File Server Resource Manager role service on Server3 and Server5.
-
Delete and recreate the namespace
Question 8
Question
Your network contains an Active Directory domain named contoso.com. The domain
contains the users shown in the following table
You have a Network Policy Server (NPS) server that has the network policies shown in the
following table.
User1, User2, and User3 plan to connect to the network by using a VPN. You need to
identify which network policy will apply to each user.
What should you identify?
To answer, select the appropriate policy for each user in the answer area
Answer
-
User 1 Policy 1
-
User 1 Policy 2
-
User 1 Policy 3
-
User 2 Policy 1
-
User 2 Policy 2
-
User 2 Policy 3
-
User 3 Policy 1
-
User 3 Policy 2
-
User 3 Policy 3
Question 9
Question
You have a server named Server1 that runs Windows Server 2012 R2. You create a Data
Collector Set (DCS) named DCS1.
You need to configure DCS1 to log data to D:\logs.
What should you do?
Answer
-
Right-click DCS1 and click Properties.
-
Right-click DCS1 and click Export list.
-
Right-click DCS1 and click Data Manager.
-
Right-click DCS1 and click Save template
Question 10
Question
You have a server named Server 1.
You enable BitLocker Drive Encryption (BitLocker) on Server 1.
You need to change the password for the Trusted Platform Module (TPM) chip.
What should you run on Server1?
Answer
-
Manage-bde.exe
-
Set-TpmOwnerAuth
-
bdehdcfg.exe
-
tpmvscmgr.exe
Question 11
Question
Your network contains an Active Directory forest. The forest contains two domains named
contoso.com and fabrikam.com. All of the DNS servers in both of the domains run
Windows Server 2012 R2.
The network contains two servers named Server1 and Server2. Server1 hosts an Active
Directory-integrated zone for contoso.com. Server2 hosts an Active Directory-integrated
zone for fabrikam.com. Server1 and Server2 connect to each other by using a WAN link.
Client computers that connect to Server1 for name resolution cannot resolve names in
fabnkam.com.
You need to configure Server1 to support the resolution of names in fabnkam.com. The
solution must ensure that users in contoso.com can resolve names in fabrikam.com if the
WAN link fails.
What should you do on Server1?
Question 12
Question
Your company has a main office and two branch offices. The main office is located in
Seattle. The two branch offices are located in Montreal and Miami. Each office is
configured as an Active Directory site.
The network contains an Active Directory domain named contoso.com. Network traffic is
not routed between the Montreal office and the Miami office.
You implement a Distributed File System (DFS) namespace named \\contoso.com\public.
The namespace contains a folder named Folder1. Folder1 has a folder target in each
office.
You need to configure DFS to ensure that users in the branch offices only receive referrals
to the target in their respective office or to the target in the main office.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)
Answer
-
Set the Ordering method of \\contoso.com\public to Random order.
-
Set the Advanced properties of the folder target in the Seattle office to Last among all
targets.
-
Set the Advanced properties of the folder target in the Seattle office to First among
targets of equal cost.
-
Set the Ordering method of \\contoso.com\public to Exclude targets outside of the
client's site.
-
Set the Advanced properties of the folder target in the Seattle office to Last among
targets of equal cost.
-
Set the Ordering method of \\contoso.com\public to Lowest cost.
Question 13
Question
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1 that runs Windows Server 2012 P.2. Server1 has the
Network Policy and Access Services server role installed.
You plan to deploy 802. lx authentication to secure the wireless network.
You need to identify which Network Policy Server (NPS) authentication method supports
certificate-based mutual authentication for the 802.1x deployment.
Which authentication method should you identify?
Answer
-
MS-CHAP
-
PEAP-MS-CHAPv2
-
EAP-TLS
-
MS-CHAP v2
Question 14
Question
Your network contains an Active Directory domain named contoso.com. All servers run
Windows Server 2012 R2.
Client computers run either Windows 7 or Windows 8. All of the client computers have an
application named App1 installed.
The domain contains a Group Policy object (GPO) named GPO1 that is applied to all of the
client computers.
You need to add a system variable named App1Data to all of the client computers.
Which Group Policy preference should you configure?
Answer
-
Environment
-
Ini Files
-
Data Sources
-
Services
Question 15
Question
Your network contains an Active Directory domain named contoso.com. The domain
contains more than 100 Group Policy objects (GPOs). Currently, there are no enforced
GPOs.
The domain contains a top-level organizational unit (OU) for each department. A group
named Group1 contains members from each department.
You have a GPO named GPO1 that is linked to the domain.
You need to configure GPO1 to apply settings to Group1 only.
What should you use?
Answer
-
Dcgpofix
-
Get-GPOReport
-
Gpfixup
-
Gpresult
-
Gpedit. msc
-
Import-GPO
-
Restore-GPO
-
Set-GPInheritance
-
Set-GPLink
-
Set-GPPermission
Question 16
Question
Your network contains an Active Directory domain named contoso.com. The Active
Directory Recycle bin is enabled for contoso.com.
A support technician accidentally deletes a user account named User1. You need to
restore the User1 account.
Which tool should you use?
Question 17
Question
Your network contains a Hyper-V host named Server1 that hosts 20 virtual machines.
You need to view the amount of memory resources and processor resources each virtual
machine uses currently.
Which tool should you use on Server1?
Question 18
Question
Your network contains an Active Directory forest named contoso.com.
The domain contains three servers. The servers are configured as shown in the following
table.
You need to identify which server role must be deployed to the network to support the
planned implementation.
Which role should you identify?
Answer
-
Network Policy and Access Services
-
Volume Activation Services
-
Windows Deployment Services
-
Active Directory Rights Management Services
Question 19
Question
Your network contains an Active Directory domain named contoso.com. All domain
controllers run either Windows Server 2008 or Windows Server 2008 R2.
You deploy a new domain controller named DC1 that runs Windows Server 2012 R2.
You log on to DC1 by using an account that is a member of the Domain Admins group.
You discover that you cannot create Password Settings objects (PSOs) by using Active
Directory Administrative Center.
You need to ensure that you can create PSOs from Active Directory Administrative Center.
What should you do?
Answer
-
Modify the membership of the Group Policy Creator Owners group.
-
Transfer the PDC emulator operations master role to DC1.
-
Upgrade all of the domain controllers that run Window Server 2008.
-
Raise the functional level of the domain
Question 20
Question
Your network contains an Active Directory domain named contoso.com. The domain
contains two servers named Server1 and Server2. Server1 has the Network Policy Server
server role installed. Server2 has the DHCP Server server role installed. Both servers run
Windows Server 2012 R2.
You are configuring Network Access Protection (NAP) to use DHCP enforcement.
You configure a DHCP scope as shown in the exhibit. (Click the Exhibit button.)
You need to ensure that non-compliant NAP clients receive different DHCP options than
compliant NAP clients.
What should you configure on each server? To answer, select the appropriate options for
each server in the answer area.
Answer
-
Health Policies
-
Identity - Type
-
Ms-Service Class
-
Service - Type
-
Filters
-
A policy
-
Scope options
-
Server options
Question 21
Question
Your network contains an Active Directory domain named contoso.com.
You create an organizational unit (OU) named OU1 and a Group Policy object (GPO)
named GPO1. You link GPO1 to OU1.
You move several file servers that store sensitive company documents to OU1. Each file
server contains more than 40 shared folders.
You need to audit all of the failed attempts to access the files on the file servers in OU1.
The solution must minimize administrative effort.
Which two audit policies should you configure in GPO1? To answer, select the appropriate
two objects in the answer area.
Question 22
Question
Your network contains four Network Policy Server (NPS) servers named Server1, Server2,
Servers, and Server4.
Server1 is configured as a RADIUS proxy that forwards connection requests to a remote
RADIUS server group named Group1.
You need to ensure that Server2 and Server3 receive connection requests. Server4 must
only receive connection requests if both Server2 and Server3 are unavailable.
How should you configure Group1?
Answer
-
Change the Weight of Server4 to 10.
-
Change the Weight of Server2 and Server3 to 10.
-
Change the Priority of Server2 and Server3 to 10.
-
Change the Priority of Server4 to 10
Question 23
Question
Your network contains an Active Directory domain named contoso.com. All domain
controllers run Windows Server 2012 R2.
The domain contains 200 Group Policy objects (GPOs).
An administrator named Admin1 must be able to add new WMI filters from the Group Policy
Management Console (GPMC).
You need to delegate the required permissions to Admin1. The solution must minimize the
number of permissions assigned to Admin1.
What should you do?
Answer
-
From Active Directory Users and Computers, add Admin1 to the
WinRMRemoteWMIUsers__group.
-
From Group Policy Management, assign Creator Owner to Admin1 for the WMI Filters
container.
-
From Active Directory Users and Computers, add Admin1 to the Domain Admins group.
-
From Group Policy Management, assign Full control to Admin1 for the WMI Filters
container.
Question 24
Question
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the
File Server Resource Manager role service installed.
Server1 has a folder named Folder1 that is used by the human resources department.
You need to ensure that an email notification is sent immediately to the human resources
manager when a user copies an audio file or a video file to Folder1.
What should you configure on Server1?
Answer
-
a storage report task
-
a file screen exception
-
a file screen
-
a file group
Question 25
Question
Your network contains an Active Directory forest named contoso.com. The forest contains
a single domain. All domain controllers run Windows Server 2012 R2.
The domain contains two domain controllers. The domain controllers are configured as
shown in the following table.
Active Directory Recycle Bin is enabled.
You discover that a support technician accidentally removed 100 users from an Active
Directory group named Group1 an hour ago.
You need to restore the membership of Group1.
What should you do?
Answer
-
Recover the items by using Active Directory Recycle Bin
-
Modify the Recycled attribute of Group1
-
Perform tombstone reanimation.
-
Perform an authoritative restore.
Question 26
Question
Your network contains an Active Directory domain named contoso.com. The domain
contains a Web server named www.contoso.com. The Web server is available on the
Internet.
You implement DirectAccess by using the default configuration.
You need to ensure that users never attempt to connect to www.contoso.com by using
DirectAccess. The solution must not prevent the users from using DirectAccess to access
other resources in contoso.com.
Which settings should you configure in a Group Policy object (GPO)?
Question 27
Question
Your network contains an Active Directory domain named contoso.com. The domain
contains three servers. The servers are configured as shown in the following table.
You need to ensure that end-to-end encryption is used between clients and Server2 when
the clients connect to the network by using DirectAccess.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)
Answer
-
From the Remote Access Management Console, reload the configuration.
-
Add Server2 to a security group in Active Directory.
-
Restart the IPSec Policy Agent service on Server2.
-
From the Remote Access Management Console, modify the Infrastructure Servers
settings.
-
From the Remote Access Management Console, modify the Application Servers
settings.
Question 28
Question
Your network contains an Active Directory domain named contoso.com. The domain
contains a member server named Server1. Server1 runs Windows Server 2012 R2 and has
the Hyper-V server role installed.
Server1 hosts 10 virtual machines. A virtual machine named VM1 runs Windows Server
2012 R2 and hosts a processor-intensive application named App1.
Users report that App1 responds more slowly than expected.
You need to monitor the processor usage on VM1 to identify whether changes must be
made to the hardware settings of VM1.
Which performance object should you monitor on Server1?
Answer
-
Processor
-
Hyper-V Hypervisor Virtual Processor
-
Hyper-V Hypervisor Logical Processor
-
Hyper-V Hypervisor Root Virtual Processor
-
Process
Question 29
Question
You have Windows Server 2012 R2 installation media that contains a file named
Install.wim.
You need to identify which images are present in Install.wim.
What should you do?
Answer
-
Run imagex.exe and specify the /ref parameter
-
Run dism.exe and specify the /get-mountedwiminfo parameter
-
Run dism.exe and specify the /get-imageinfo parameter.
-
Run imagex.exe and specify the /verify parameter.
Question 30
Question
You are a network administrator of an Active Directory domain named contoso.com.
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the
Web Server (IIS) server role installed.
Server1 will host a web site at URL https: //secure.contoso.com. The application pool
identity account of the web site will be set to a domain user account named AppPool1.
You need to identify the setspn.exe command that you must run to configure the
appropriate Service Principal Name (SPN) for the web site.
What should you run?
To answer, drag the appropriate objects to the correct location. Each object may be used
once, more than once, or not at all. You may need to drag the split bar between panes or
scroll to view content.
Answer
-
-r
-
-s
-
App pool 1
-
http/contoso
-
https/contoso
-
http/secure.contoso.com
-
https/secure.contoso.com
Question 31
Question
Your network contains an Active Directory domain named contoso.com. The domain
contains a domain controller named DC1 that runs Windows Server 2012 R2.
All client computers run Windows 8 Enterprise.
DC1 contains a Group Policy object (GPO) named GPO1.
You need to deploy a VPN connection to all users.
What should you configure from User Configuration in GPO1?
Answer
-
Policies/Administrative Templates/Network/Windows Connect Now
-
Policies/Administrative Templates/Network/Network Connections
-
Policies/Administrative Templates/Windows Components/Windows Mobility Center
-
Preferences/Control Panel Settings/Network Options
Question 32
Question
Your company has a main office and two branch offices. The main office is located in New
York. The branch offices are located in Seattle and Chicago.
The network contains an Active Directory domain named contoso.com. An Active Directory
site exists for each office. Active Directory site links exist between the main office and the
branch offices. All servers run Windows Server 2012 R2.
The domain contains three file servers. The file servers are configured as shown in the
following table.
You implement a Distributed File System (DFS) replication group named ReplGroup.
ReplGroup is used to replicate a folder on each file server. ReplGroup uses a hub and
spoke topology. NYC-SVR1 is configured as the hub server.
You need to ensure that replication can occur if NYC-SVR1 fails.
What should you do?
Answer
-
Create an Active Directory site link bridge.
-
Create an Active Directory site link.
-
Modify the properties of Rep1Group.
-
Create a connection in Rep1Group.
Question 33
Question
Your network contains an Active Directory domain named adatum.com.
A network administrator creates a Group Policy central store.
After the central store is created, you discover that when you create new Group Policy
objects (GPOs), the GPOs do not contain any Administrative Templates.
You need to ensure that the Administrative Templates appear in new GPOs.
What should you do?
Answer
-
Add your user account to the Group Policy Creator Owners group.
-
Configure all domain controllers as global catalog servers
-
Copy files from %Windir%\Policydefinitions to the central store.
-
Modify the Delegation settings of the new GPOs.
Question 34
Question
Your network contains an Active Directory domain named contoso.com. The domain
contains a domain controller named DC1 that runs Windows Server 2012 R2.
You create an Active Directory snapshot of DC1 each day.
You need to view the contents of an Active Directory snapshot from two days ago.
What should you do first?
Answer
-
Run the dsamain.exe command.
-
Stop the Active Directory Domain Services (AD DS) service.
-
Start the Volume Shadow Copy Service (VSS).
-
Run the ntdsutil.exe command.
Question 35
Question
You have a server named WSUS1 that runs Windows Server 2012 R2. WSUS1 has the
Windows Server Update Services server role installed and has one volume.
You add a new hard disk to WSUS1 and then create a volume on the hard disk.
You need to ensure that the Windows Server Update Services (WSUS) update files are
stored on the new volume.
What should you do?
Answer
-
From the Update Services console, configure the Update Files and Languages option.
-
From the Update Services console, run the Windows Server Update Services
Configuration Wizard.
-
From a command prompt, run wsusutil.exe and specify the export parameter.
-
From a command prompt, run wsusutil.exe and specify the movecontent parameter.
Question 36
Question
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the
File Server Resource Manager role service installed.
Each time a user receives an access-denied message after attempting to access a folder
on Server1, an email notification is sent to a distribution list named DL1.
You create a folder named Folder1 on Server1, and then you configure custom NTFS
permissions for Folder1.
You need to ensure that when a user receives an access-denied message while attempting
to access Folder1, an email notification is sent to a distribution list named DL2. The
solution must not prevent DL1 from receiving notifications about other access-denied
messages.
What should you do?
Answer
-
From Server Manager, run the New Share Wizard to create a share for Folder1 by
selecting the SMB Share - Advanced option
-
From the File Server Resource Manager console, modify the Access-Denied Assistance
settings
-
From the File Server Resource Manager console, modify the Email Notifications
settings.
-
From Server Manager, run the New Share Wizard to create a share for Folder1 by
selecting the SMB Share -Applications option.
Question 37
Question
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the
Remote Access server role installed.
You have a client named Client1 that is configured as an 802. IX supplicant.
You need to configure Server1 to handle authentication requests from Client1. The solution
must minimize the number of authentication methods enabled on Server1.
Which authentication method should you enable? To answer, select the appropriate
authentication method in the answer area.
Answer
-
EAP
-
MS-CHAP v2
-
CHAP
-
PAP
-
IKEv2
Question 38
Question
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1 that runs Windows Server 2008 R2.
You plan to test Windows Server 2012 R2 by using native-boot virtual hard disks (VHDs).
You attach a new VHD to Server1.
You need to install Windows Server 2012 R2 in the VHD.
What should you do?
Answer
-
Run imagex.exe and specify the /append parameter.
-
Run dism.exe and specify the /apply-image parameter
-
Run imagex.exe and specify the /export parameter
-
Run dism.exe and specify the /append-image parameter
Question 39
Question
Your network contains an Active Directory forest named contoso.com. The forest contains
a Network Policy Server (NPS) server named NPS1 and a VPN server named VPN1.
VPN1 forwards all authentication requests to NPS1.
A partner company has an Active Directory forest named adatum.com. The adatum.com
forest contains an NPS server named NPS2.
You plan to grant users from adatum.com VPN access to your network.
You need to authenticate the users from adatum.com on VPN1.
What should you create on each NPS server?
To answer, drag the appropriate objects to the correct NPS servers. Each object may be
used once, more than once, or not at all. You may need to drag the split bar between
panes or scroll to view content.
Question 40
Question
Your network contains an Active Directory domain named contoso.com. The domain
contains a file server named Server1 that runs Windows Server 2012 R2. Server1 has a
share named Share1.
When users without permission to Share1 attempt to access the share, they receive the
Access Denied message as shown in the exhibit. (Click the Exhibit button.)
You deploy a new file server named Server2 that runs Windows Server 2012 R2.
You need to configure Server2 to display the same custom Access Denied message as
Server1.
What should you install on Server2?
Answer
-
The Remote Assistance feature
-
The Storage Services server role
-
The File Server Resource Manager role service
-
The Enhanced Storage feature
Question 41
Question
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1 that runs Windows Server 2012 R2.
Server1 has the following role services installed:
DirectAccess and VPN (RRAS)
Network Policy Server
Remote users have client computers that run either Windows XP, Windows 7, or Windows
8.
You need to ensure that only the client computers that run Windows 7 or Windows 8 can
establish VPN connections to Server1.
What should you configure on Server1?
Answer
-
A condition of a Network Policy Server (NPS) network policy
-
A constraint of a Network Policy Server (NPS) network policy
-
a condition of a Network Policy Server (NPS) connection request policy
-
A vendor-specific RADIUS attribute of a Network Policy Server (NPS) connection
request policy
Question 42
Question
Your network contains two Active Directory domains named contoso.com and adatum.com.
The network contains a server named Server1 that runs Windows Server 2012 R2. Server1
has the DNS Server server role installed. Server1 has a copy of the contoso.com DNS
zone.
You need to configure Server1 to resolve names in the adatum.com domain. The solution
must meet the following requirements:
Prevent the need to change the configuration of the current name servers that host zones
for adatum.com. Minimize administrative effort.
Which type of zone should you create?
Answer
-
Secondary
-
Stub
-
Reverse lookup
-
Primary
Question 43
Question
Your network contains two servers named Server1 and Server2. Both servers run Windows
Server 2012 R2 and have the DNS Server server role installed.
On Server1, you create a standard primary zone named contoso.com.
You need to ensure that Server2 can host a secondary zone for contoso.com.
What should you do from Server1?
Answer
-
Add Server2 as a name server.
-
Create a trust anchor named Server2.
-
Convert contoso.com to an Active Directory-integrated zone.
-
Create a zone delegation that points to Server2.
Question 44
Question
Your network contains an Active Directory domain named contoso.com. The domain
contains a member server named Server1. Server1 runs Windows Server 2012 R2.
You enable the EventLog-Application event trace session.
You need to set the maximum size of the log file used by the trace session to 10 MB.
From which tab should you perform the configuration? To answer, select the appropriate
tab in the answer area.
Answer
-
File
-
Directory
-
Stop Condition
-
Trace Providers
-
Trace Session
-
Security
Question 45
Question
Your network contains an Active Directory domain named contoso.com. The domain
contains six domain controllers named DC1, DC2, DC3, DC4, DC5, and DC6. Each domain
controller has the DNS Server server role installed and hosts an Active Directory-integrated
zone for contoso.com.
You plan to create a new Active Directory-integrated zone named litwareinc.com that will
be used for testing.
You need to ensure that the new zone will be available only on DC5 and DCG.
What should you do first?
Answer
-
Change the zone replication scope
-
Create an Active Directory connection object
-
Create an Active Directory site link.
-
Create an application directory partition.
Question 46
Question
Your network contains an Active Directory domain named contoso.com.
All user accounts for the marketing department reside in an organizational unit (OU) named
OU1. All user accounts for the finance department reside in an organizational unit (OU)
named OU2.
You create a Group Policy object (GPO) named GPO1. You link GPO1 to OU2. You
configure the Group Policy preference of GPO1 to add a shortcut named Link1 to the
desktop.
You discover that when a user signs in, the Link1 is not added to the desktop.
You need to ensure that when a user signs in, Link1 is added to the desktop.
What should you do?
Answer
-
Enforce GPO1.
-
Enable loopback processing in GPO1.
-
Modify the Link1 shortcut preference of GPO1.
-
Modify the Security Filtering settings of GPO1
Question 47
Question
You have a server named Server1 that runs Windows Server 2012 R2.
On Server1, you configure a custom Data Collector Set (DCS) named DCS1. DCS1 is
configured to store performance log data in C:\Logs.
You need to ensure that the contents of C:\Logs are deleted automatically when the folder
reaches 100 MB in size.
What should you configure?
Answer
-
A File Server Resource Manager (FSRM) file screen on the C:\Logs folder
-
The Data Manager settings of DCS1
-
A schedule for DCS1
-
A File Server Resource Manager (FSRM) quota on the C:\Logs folder
Question 48
Question
Your network contains an Active Directory domain named contoso.com. The domain
contains a read-only domain controller (RODC) named RODC1.
You create a global group named RODC_Admins.
You need to provide the members of RODC_Admins with the ability to manage the
hardware and the software on R0DC1. The solution must not provide RODC_Admins with
the ability to manage Active Directory objects.
What should you do?
Answer
-
From Active Directory Site and Services, configure the Security settings of the RODC1
server object
-
From Windows PowerShell, run the Set-ADAccountControlcmdlet
-
From a command prompt, run the dsmgmt local roles command
-
From Active Directory Users and Computers, configure the Member Of settings of the
RODC1 account.
Question 49
Question
Your network contains an Active Directory domain named contoso.com. The domain
contains three servers named Server2, Server3, and Server4.
Server2 and Server4 host a Distributed File System (DFS) namespace named
Namespace1.
You open the DFS Management console as shown in the exhibit. (Click the Exhibit button.)
To answer, complete each statement according to the information presented in the exhibit.
Each correct selection is worth one point
Answer
-
Server 2 only
-
Server 2 and Server 3 only
-
Server 2 and Server 4 only
-
Server 3 and Server 4 only
-
server 2, server 3 and server 4
Question 50
Question
Your network contains an Active Directory domain named contoso.com.
You have several Windows PowerShell scripts that execute when users log on to their
client computer.
You need to configure Server1 to meet the following requirements:
Ensure that old files in a folder named Folder1 are archived automatically to a
folder named Archive1.
Ensure that all storage reports are saved to a network share.
Which two nodes should you configure? To answer, select the appropriate two nodes in the
answer area.