Question 1
Question
Your network contains 25 Web servers that run Windows Server 2012 R2.
You need to configure auditing policies that meet the following requirements:
Generate an event each time a new process is created.
Generate an event each time a user attempts to access a file share.
Which two auditing policies should you configure? To answer, select the appropriate two
auditing policies in the answer area.
Answer
-
Audit access management (Not Defined)
-
Audit directory service access (Not Defined)
-
Audit logon events (Not Defined)
-
Audit Object (Not Defined)
-
Audit policy change(Not Defined)
-
Audit privilege use (Not Defined)
-
Audit process tracking (Not Defined)
-
Audit system events(Not Defined)
Question 2
Question
Your network contains an Active Directory domain named contoso.com. All domain
controllers run Windows Server 2012 R2.
Administrators use client computers that run Windows 8 to perform all management tasks.
A central store is configured on a domain controller named DC1.
You have a custom administrative template file named App1.admx. App1.admx contains
application settings for an application named Appl.
From a client computer named Computer1, you create a new Group Policy object (GPO)
named GPO1.
You discover that the application settings for App1 fail to appear in GPO1.
You need to ensure that the App1 settings appear in all of the new GPOs that you create.
What should you do?
Answer
-
From the Default Domain Controllers Policy, add App1.admx to the Administrative
Templates.
-
Copy App1.admx to \\Contoso.com\SYSVOL\Contoso.com\Policies\PolicyDefinitions\.
-
From the Default Domain Policy, add App1.admx to the Administrative Templates.
-
Copy App1.admx to \\Contoso.com\SYSVOL\Contoso.com\StarterGPOs.
Question 3
Question
Your network contains an Active Directory domain named contoso.com. The domain
contains a domain controller named DC1 that runs Windows Server 2012 R2.
You mount an Active Directory snapshot on DC1.
You need to expose the snapshot as an LDAP server.
Which tool should you use?
Answer
-
Ldp
-
ADSI Edit
-
Dsamain
-
Ntdsutil
Question 4
Question
Your network contains an Active Directory domain named contoso.com. You create a user account named User1. The properties of User1 are shown in the exhibit.
(Click the Exhibit button.)
You plan to use the User1 account as a service account. The service will forward
authentication requests to other servers.
You need to ensure that you can view the Delegation tab from the properties of the User1
account.
What should you do first?
Answer
-
Configure the Name Mappings of User1.
-
Modify the user principal name (UPN) of User1.
-
Configure a Service Principal Name (SPN) for User1.
-
Modify the Security settings of User1.
Question 5
Question
Your network contains one Active Directory domain named contoso.com. The forest
functional level is Windows Server 2012. All servers run Windows Server 2012 R2. All
client computers run Windows 8.1.
The domain contains 10 domain controllers and a read-only domain controller (RODC)
named RODC01. All domain controllers and RODCs are hosted on a Hyper-V host that
runs Windows Server 2012 R2.
You need to identify whether deleted objects can be recovered from the Active Directory
Recycle Bin.
Which cmdlet should you use?
Answer
-
Get-ADGroupMember
-
Get-ADDomainControllerPasswordReplicationPolicy
-
Get-ADDomainControllerPasswordReplicationPolicyUsage
-
Get-ADDomain
-
Get-ADOptionalFeature
-
Get-ADAccountAuthorizationGroup
Question 6
Question
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1 that runs Windows Server 2012 P.2. Server1 has the
Network Policy and Access Services server role installed.
Your company's security policy requires that certificate-based authentication must be used
by some network services.
You need to identify which Network Policy Server (NPS) authentication methods comply
with the security policy.
Which two authentication methods should you identify? (Each correct answer presents part
of the solution. Choose two.)
Answer
-
MS-CHAP
-
PEAP-MS-CHAP v2
-
Chap
-
EAP-TLS
-
MS-CHAP v2
Question 7
Question
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the
Network Policy Server server role installed.
You need to allow connections that use 802.1x.
What should you create?
Answer
-
A network policy that uses Microsoft Protected EAP (PEAP) authentication
-
A network policy that uses EAP-MSCHAP v2 authentication
-
A connection request policy that uses EAP-MSCHAP v2 authentication
-
A connection request policy that uses MS-CHAP v2 authentication
Question 8
Question
Your network contains two Active Directory forests named contoso.com and adatum.com.
The contoso.com forest contains a server named Server1.contoso.com. The adatum.com
forest contains a server named server2. adatum.com. Both servers have the Network
Policy Server role service installed.
The network contains a server named Server3. Server3 is located in the perimeter network
and has the Network Policy Server role service installed.
You plan to configure Server3 as an authentication provider for several VPN servers.
You need to ensure that RADIUS requests received by Server3 for a specific VPN server
are always forwarded to Server1.contoso.com.
Which two should you configure on Server3? (Each correct answer presents part of the
solution. Choose two.)
Answer
-
Remediation server groups
-
Remote RADIUS server groups
-
Connection request policies
-
Network policies
-
Connection authorization policies
Question 9
Question
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the
Remote Desktop Session Host role service installed. The computer account of Server1
resides in an organizational unit (OU) named OU1.
You create and link a Group Policy object (GPO) named GPO1 to OU1.
You need to prevent GPO1 from applying to your user account when you log on to Server1.
GPO1 must apply to every other user who logs on to Server1.
What should you configure?
Answer
-
Security Filtering.
-
WMI Filtering.
-
Block Inheritance.
-
Item-level targeting.
Question 10
Question
Your network contains an Active Directory domain named contoso.com. All domain
controllers run Windows Server 2012 R2.
An organizational unit (OU) named OU1 contains 200 client computers that run Windows 8
Enterprise. A Group Policy object (GPO) named GPO1 is linked to OU1.
You make a change to GPO1.
You need to force all of the computers in OU1 to refresh their Group Policy settings
immediately. The solution must minimize administrative effort.
Which tool should you use?
Question 11
Question
Your network contains an Active Directory domain named contoso.com. All domain
controllers run Windows Server 2012 R2.
An organizational unit (OU) named OU1 contains 200 client computers that run Windows 8
Enterprise. A Group Policy object (GPO) named GPO1 is linked to OU1.
You make a change to GPO1.
You need to force all of the computers in OU1 to refresh their Group Policy settings
immediately. The solution must minimize administrative effort.
Which tool should you use?
Question 12
Question
Your network contains an Active Directory domain named adatum.com. All domain
controllers run Windows Server 2012 R2. The domain contains a virtual machine named
DC2.
On DC2, you run Get-ADDCCIoningExcludedApplicationList and receive the output shown
in the following table.
You need to ensure that you can clone DC2.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)
Answer
-
Option A
-
Option B
-
Option C
-
Option D
-
Option E
Question 13
Question
Your network contains an Active Directory domain named contoso.com. The domain
contains an organizational unit (OU) named IT and an OU named Sales.
All of the help desk user accounts are located in the IT OU. All of the sales user accounts
are located in the Sales OU. The Sales OU contains a global security group named
G_Sales. The IT OU contains a global security group named G_HelpDesk.
You need to ensure that members of G_HelpDesk can perform the following tasks:
Reset the passwords of the sales users.
Force the sales users to change their password at their next logon.
What should you do?
Answer
-
Run the Set-ADAccountPasswordcmdlet and specify the -identity parameter.
-
Right-click the Sales OU and select Delegate Control.
-
Right-click the IT OU and select Delegate Control.
-
Run the Set-ADFineGrainedPasswordPolicycmdlet and specify the -identity parameter
Question 14
Question
Your network contains an Active Directory domain named adatum.com. The domain
contains 10 domain controllers that run Windows Server 2012 R2.
You plan to create a new Active Directory-integrated zone named contoso.com.
You need to ensure that the new zone will be replicated to only four of the domain
controllers.
What should you do first?
Answer
-
Create an application directory partition.
-
Create an Active Directory connection object.
-
Create an Active Directory site link.
-
Change the zone replication scope.
Question 15
Question
Your company has a main office and a branch office.
The network contains an Active Directory domain named contoso.com.
The main office contains a domain controller named DC1 that runs Windows Server 2012
R2. DC1 is a DNS server and hosts a primary zone for contoso.com. The branch office
contains a member server named Server1 that runs Windows Server 2012 R2. Server1 is a
DNS server and hosts a secondary zone for contoso.com.
The main office connects to the branch office by using an unreliable WAN link.
You need to ensure that Server1 can resolve names in contoso.com if the WAN link in
unavailable for three days.
Which setting should you modify in the start of authority (SOA) record?
Answer
-
Retry interval
-
Refresh interval
-
Expires after
-
Minimum (default) TTL
Question 16
Question
Your network contains an Active Directory domain named contoso.com. All domain
controllers run Windows Server 2012 R2.
An organizational unit (OU) named OU1 contains 200 client computers that run Windows 8
Enterprise. A Group Policy object (GPO) named GPO1 is linked to OU1.
You make a change to GPO1.
You need to force all of the computers in OU1 to refresh their Group Policy settings
immediately. The solution must minimize administrative effort.
Which tool should you use?
Question 17
Question
Your network contains two servers named Server1 and Server2. Both servers run Windows
Server 2012 R2 and have the DNS Server server role installed. Server1 hosts a primary
zone for contoso.com. Server2 hosts a secondary zone for contoso.com. The zone is not
configured to notify secondary servers of changes automatically.
You update several records on Server1.
You need to force the replication of the contoso.com zone records from Server1 to Server2.
What should you do from Server2?
Answer
-
Right-click the contoso.com zone and click Reload.
-
Right-click the contoso.com zone and click Transfer from Master
-
Right-click Server2 and click Update Server Data Files.
-
Right-click Server2 and click Refresh.
Question 18
Question
Your network contains an Active Directory domain named contoso.com. The domain
contains a member server that runs Windows Server 2012 R2 and has the Windows
Deployment Services (WDS) server role installed.
You create a new multicast session in WDS and connect 50 client computers to the
session.
When you open the Windows Deployment Services console, you discover that all of the
computers are listed as pending devices.
You need to ensure that any of the computers on the network can join a multicast
transmission without requiring administrator approval.
What should you configure?
To answer, select the appropriate tab in the answer area.
Answer
-
Multicast
-
Advanced
-
Network
-
TFTP
-
General
-
PXE Response
-
AD DS
-
Boot
-
Client
-
DHCP
Question 19
Question
Your network contains one Active Directory domain named contoso.com.
From the Group Policy Management console, you view the details of a Group Policy object
(GPO) named GPO1.
You need to ensure that the comments field of GPO1 contains a detailed description of
GPO1.
What should you do?
Answer
-
From Active Directory Users and Computers, edit the properties of
contoso.com/System/Policies/{229DCD27-9D98-ACC2-A6AE-ED765F065FF5}.
-
Open GPO1 in the Group Policy Management Editor, and then modify the properties of
GPO1
-
From Notepad, edit \\contoso.com\SYSVOL\ contoso.com\Policies\{229DCD27-9D98-
ACC2-A6AE-ED765F065FF5}\gpt.ini.
-
From Group Policy Management, click View, and then click Customize.
Question 20
Question
Your network contains an Active Directory domain named adatum.com. The domain
contains a file server named Server1 that runs Windows Server 2012 R2.
All client computers run Windows 7.
You need to ensure that user settings are saved to \\Server1\Users\.
What should you do?
Answer
-
From the properties of each user account, configure the Home folder settings.
-
From a Group Policy object (GPO), configure the Folder Redirection settings.
-
From the properties of each user account, configure the User profile settings
-
From a Group Policy object (GPO), configure the Drive Maps preference.
Question 21
Question
Your network contains an Active Directory domain named contoso.com. All domain
controllers run Windows Server 2012.
You pre-create a read-only domain controller (P.QDC) account named RODC1.
You export the settings of RODC1 to a file named Filel.txt.
You need to promote RODC1 by using File1.txt.
Which tool should you use?
Answer
-
The Install-WindowsFeature cmdlet
-
The Add-WindowsFeature cmdlet
-
The Dism command
-
The Install-ADDSDomainController cmdlet
-
the Dcpromo command
Question 22
Question
You have a server named Server1 that runs Windows Server 2012 R2.
You discover that the performance of Server1 is poor.
The results of a performance report generated on Server1 are shown in the following table.
You need to identify the cause of the performance issue.
What should you identify?
Answer
-
Driver malfunction
-
Insufficient RAM
-
Excessive paging
-
NUMA fragmentation
Question 23
Question
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1 that runs Windows Server 2012 R2.
You enable and configure Routing and Remote Access (RRAS) on Server1.
You create a user account named User1.
You need to ensure that User1 can establish VPN connections to Server1.
What should you do?
Answer
-
Modify the members of the Remote Management Users group
-
Add a RADIUS client
-
Modify the Dial-in setting of User1
-
Create a connection request policy
Question 24
Question
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1 that runs Windows Server 2008 R2.
You plan to test Windows Server 2012 R2 by using native-boot virtual hard disks (VHDs).
You have a Windows image file named file1.wim.
You need to add an image of a volume to file1.wim.
What should you do?
Answer
-
Run imagex.exe and specify the /append parameter.
-
Run imagex.exe and specify the /export parameter
-
Run dism.exe and specify the /image parameter.
-
Run dism.exe and specify the /append-image parameter.
Question 25
Question
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1 that runs Windows Server 2012 R2.
Server1 has the following BitLocker Drive Encryption (BitLocker) settings:
You need to ensure that drive D will unlock automatically when Server1 restarts. What
command should you run? To answer, select the appropriate options in the answer area.
Answer
-
Add BitLockerkey Protector
-
Enable BitLocker AutoUnlock
-
Mount Point C
-
Mount Point D
-
Ad Account or Group Protector Contoso\ Server
-
Pin $Secure string
-
Service
-
Tpm And Pin And start up key protector
-
Tpm and Pin Protector
Question 26
Question
Your network has a router named Router1 that provides access to the Internet. You have a
server named Server1 that runs Windows Server 2012 R2. Server1 to use Router1 as the
default gateway.
A new router named Router2 is added to the network. Router2 provides access to the
Internet. The IP address of the internal interface on Router2 is 10.1.14.2S4.
You need to configure Server1 to use Router2 to connect to the Internet if Router1 fails.
What should you do on Server1?
Answer
-
Add a route for 10.1.14.0/24 that uses 10.1.14.254 as the gateway and set the metric to
1.
-
Add 10.1.14.254 as a gateway and set the metric to 1.
-
Add a route for 10.1.14.0/24 that uses 10.1.14.254 as the gateway and set the metric to
500.
-
Add 10.1.14.254 as a gateway and set the metric to 500.
Question 27
Question
Your network contains an Active Directory domain named adatum.com. The domain
contains a server named Server1 that runs Windows Server 2012 R2. Server1 is
configured as a Network Policy Server (NPS) server and as a DHCP server.
You need to ensure that only computers that send a statement of health are checked for
Network Access Protection (NAP) health requirements.
Which two settings should you configure? (Each correct answer presents part of the
solution. Choose two.)
Answer
-
The Called Station ID constraints
-
The MS-Service Class conditions
-
The Health Policies conditions
-
The NAS Port Type constraints
-
The NAP-Capable Computers conditions
Question 28
Question
Your network contains one Active Directory domain named contoso.com. The forest
functional level is Windows Server 2012. All servers run Windows Server 2012 R2. All
client computers run Windows 8.1.
The domain contains 10 domain controllers and a read-only domain controller (RODC)
named RODC01. All domain controllers and RODCs are hosted on a Hyper-V host that
runs Windows Server 2012 R2.
You need to identify which security principals are authorized to have their password cached
on RODC1.
Which cmdlet should you use?
Answer
-
Get-ADGroupMember
-
Get-ADDomainControllerPasswordReplicationPolicy
-
Get-ADDomainControllerPasswordReplicationPolicyUsage
-
Get-ADDomain
-
Get-ADOptionalFeature
-
Get-ADAccountAuthorizationGroup
Question 29
Question
Your company has four offices. The offices are located in Montreal, Seattle, Sydney, and
New York.
The network contains an Active Directory domain named contoso.com. The domain
contains a server named Server2 that runs Windows Server 2012 R2. Server2 has the
DHCP Server server role installed.
All client computers obtain their IPv4 and IPv6 addresses from DHCP.
You need to ensure that Network Access Protection (NAP) enforcement for DHCP applies
to all of the client computers except for the client computers in the New York office.
Which two nodes should you configure? To answer, select the appropriate two nodes in the
answer area.
Question 30
Question
You have a server named Servers that runs Windows Server 2012 R2. Servers has the
Windows Deployment Services server role installed.
Server5 contains several custom images of Windows 8.
You need to ensure that when 32-bit client computers start by using PXE, the computers
automatically install an image named Image 1.
What should you configure?
To answer, select the appropriate tab in the answer area.
Answer
-
Multicast
-
Advanced
-
Network
-
TFTP
-
General
-
PXE Response
-
AD DS
-
Boot
-
Client
-
DHCP
Question 31
Question
Your network contains an Active Directory domain named contoso.com. The functional
level of the forest is Windows Server 2008 R2.
Computer accounts for the marketing department are in an organizational unit (OU) named
Departments\Marketing\Computers. User accounts for the marketing department are in an
OU named Departments\Marketing\Users.
All of the marketing user accounts are members of a global security group named
MarketingUsers. All of the marketing computer accounts are members of a global security
group named MarketingComputers.
In the domain, you have Group Policy objects (GPOs) as shown in the exhibit. (Click the Exhibit button.)
You create two Password Settings objects named PSO1 and PSO2. PSO1 is applied to
MarketingUsers. PSO2 is applied to MarketingComputers.
The minimum password length is defined for each policy as shown in the following table.
You need to identify the minimum password length required for each marketing user.
What should you identify?
Question 32
Question
You have the following Windows PowerShell Output.
You need to create a Managed Service Account.
What should you do?
Answer
-
Run New-ADServiceAccount –Name “service01” –DNSHostName
service01.contoso.com –SAMAccountName service01.
-
Run New-AuthenticationPolicySilo, and then run New-ADServiceAccount –Name
“service01” –DNSHostName service01.contoso.com.
-
Run Add-KDSRootKey, and then run New-ADServiceAccount –Name “service01”
–DNSHostName service01.contoso.com.
-
Run Set-KDSConfiguration, and then run New-ADServiceAccount –Name
“service01” –DNSHostName service01.contoso.com.
Question 33
Question
Your network contains an Active Directory domain named contoso.com. All domain
controllers run Windows Server 2012 R2.
A domain controller named DO has the ADMX Migrator tool installed. You have a custom
Administrative Template file on DC1 named Template1.adm.
You need to add a custom registry entry to Template1.adm by using the ADMX Migrator
tool.
Which action should you run first?
Answer
-
Load Template
-
New Policy Setting
-
Generate ADMX from ADM
-
New Category
Question 34
Question
Your network contains an Active Directory domain named adatum.com. The domain
contains five servers. The servers are configured as shown in the following table.
All desktop computers in adatum.com run Windows 8 and are configured to use BitLocker
Drive Encryption (BitLocker) on all local disk drives.
You need to deploy the Network Unlock feature. The solution must minimize the number of
features and server roles installed on the network.
To which server should you deploy the feature?
Answer
-
Server3
-
Server1
-
DC2
-
Server2
-
DC1
Question 35
Question
Your network contains one Active Directory domain named contoso.com. The forest
functional level is Windows Server 2012. All servers run Windows Server 2012 R2. All
client computers run Windows 8.1.
The domain contains 10 domain controllers and a read-only domain controller (RODC)
named RODC01. All domain controllers and RODCs are hosted on a Hyper-V host that
runs Windows Server 2012 R2.
You need to identify which domain controller must be online when cloning a domain
controller.
Which cmdlet should you use?
Answer
-
Get-ADGroupMember
-
Get-ADDomainControllerPasswordReplicationPolicy
-
Get-ADDomainControllerPasswordReplicationPolicyUsage
-
Get-ADDomain
-
Get-ADOptionalFeature
-
Get-ADAccountAuthorizationGroup
Question 36
Question
Your network contains an Active Directory domain named contoso.com. The domain
contains a domain controller named DC1. DC1 is a DNS server for contoso.com. The
properties of the contoso.com zone are configured as shown in the exhibit. (Click the
Exhibit button.)
The domain contains a server named Server1 that is part of a workgroup named
Workgroup. Server1 is configured to use DC1 as a DNS server.
You need to ensure that Server1 dynamically registers a host (A) record in the
contoso.com zone.
What should you configure?
Answer
-
The workgroup name of Server1
-
The Security settings of the contoso.com zone
-
The Dynamic updates setting of the contoso.com zone
-
The primary DNS suffix of Server1
Question 37
Question
Your network contains an Active Directory forest named contoso.com. The forest contains
a single domain. All domain controllers run Windows Server 2012 R2 and are configured as
DNS servers. All DNS zones are Active Directory-integrated. Active Directory Recycle Bin
is enabled.
You need to modify the amount of time deleted objects are retained in the Active Directory
Recycle Bin.
Which naming context should you use? To answer, select the appropriate naming context
in the answer area.
Answer
-
RootDSE
-
Schema
-
Forest DNS Zones
-
Domain DNS Zones
-
Configuration
-
Default naming context
Question 38
Question
Your network contains an Active Directory domain named contoso.com. All domain
controllers run Windows Server 2012 R2.
On all of the domain controllers, Windows is installed in C:\Windows and the Active
Directory database is located in D:\Windows\NTDS\.
All of the domain controllers have a third-party application installed.
The operating system fails to recognize that the application is compatible with domain
controller cloning.
You verify with the application vendor that the application supports domain controller
cloning.
You need to prepare a domain controller for cloning.
What should you do?
Answer
-
In D:\Windows\NTDS\, create an XML file named DCCloneConfig.xml and add the
application information to the file.
-
In the root of a USB flash drive, add the application information to an XML file named
DefaultDCCIoneAllowList.xml.
-
In D:\Windows\NTDS\, create an XML file named CustomDCCloneAllowList.xml and add
the application information to the file.
-
In C:\Windows\System32\Sysprep\Actionfiles\, add the application information to an
XML file named Respecialize.xml.
Question 39
Question
Your network contains an Active Directory domain named contoso.com.
All user accounts reside in an organizational unit (OU) named OU1. All of the users in the
marketing department are members of a group named Marketing. All of the users in the
human resources department are members of a group named HR.
You create a Group Policy object (GPO) named GPO1. You link GPO1 to OU1. You
configure the Group Policy preferences of GPO1 to add two shortcuts named Link1 and
Link2 to the desktop of each user.
You need to ensure that Link1 only appears on the desktop of the users in Marketing and
that Link2 only appears on the desktop of the users in HR.
What should you configure?
Answer
-
Security Filtering
-
WMI Filtering
-
Group Policy Inheritance
-
Item-level targeting
Question 40
Question
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1. Server1 has the DHCP Server server role and the
Network Policy Server role service installed.
Server1 contains three non-overlapping scopes named Scope1, Scope2, and Scope3.
Server1 currently provides the same Network Access Protection (NAP) settings to the three
scopes.
You modify the settings of Scope1 as shown in the exhibit. (Click the Exhibit button.)
You need to configure Server1 to provide unique NAP enforcement settings to the NAP
non-compliant DHCP clients from Scope1.
What should you create?
Answer
-
A connection request policy that has the Service Type condition
-
A connection request policy that has the Identity Type condition
-
A network policy that has the Identity Type condition
-
A network policy that has the MS-Service Class condition
Question 41
Question
Your network contains an Active Director domain named contoso.com. The domain
contains a file server named Server1. All servers run Windows Server 2012 R2.
You have two user accounts named User1 and User2. User1 and User2 are the members
of a group named Group1. User1 has the Department value set to Accounting, user2 has
the Department value set to Marketing. Both users have the Employee Type value set to
Contract Employee.
You create the auditing entry as shown in the exhibit. (Click the Exhibit button.)
To answer, complete each statement according to the information presented in the exhibit.
Each correct selection is worth one point.
Answer
-
Modify the principal setting
-
Modify the permission settings
-
Modify the employee type setting
-
Modify the condition for the department
-
add a condition
-
Modify the principal settings
-
Modify the permissions settings
Question 42
Question
You have a DNS server named Server1.
Server1 has a primary zone named contoso.com.
Zone Aging/Scavenging is configured for the contoso.com zone.
One month ago, an administrator removed a server named Server2 from the network.
You discover that a static resource record for Server2 is present in contoso.com. Resource
records for decommissioned client computers are removed automatically from
contoso.com.
You need to ensure that the static resource records for all of the servers are removed
automatically from contoso.com.
What should you modify?
Answer
-
The Expires after value of contoso.com
-
The Record time stamp value of the static resource records
-
The time-to-live (TTL) value of the static resource records
-
The Security settings of the static resource records
Question 43
Question
Your network contains multiple Active Directory sites.
You have a Distributed File System (DFS) namespace that has a folder target in each site.
You discover that some client computers connect to DFS targets in other sites.
You need to ensure that the client computers only connect to a DFS target in their
respective site.
What should you modify?
Answer
-
The properties of the Active Directory sites
-
The properties of the Active Directory site links
-
The delegation settings of the namespace
-
The referral settings of the namespace
Question 44
Question
You have a server that runs Windows Server 2012 R2.
You have an offline image named Windows2012.vhd that contains an installation of
Windows Server 2012 R2.
You plan to apply several updates to Windows2012.vhd.
You need to mount Wmdows2012.vhd to D:\Mount.
Which tool should you use?
Answer
-
Server Manager
-
Device Manager
-
Mountvol
-
Dism
Question 45
Question
You have a file server named Server1 that runs Windows Server 2012 R2. Server1 has the
File Server Resource Manager role service installed.
Files created by users in the human resources department are assigned the Department
classification property automatically.
You are configuring a file management task named Task1 to remove user files that have
not been accessed for 60 days or more.
You need to ensure that Task1 only removes files that have a Department classification
property of human resources. The solution must minimize administrative effort.
What should you configure on Task1?
Question 46
Question
Your network contains an Active Directory domain named contoso.com. The domain
contains 30 user accounts that are used for network administration. The user accounts are
members of a domain global group named Group1.
You identify the security requirements for the 30 user accounts as shown in the following
table.
You need to identify which settings must be implemented by using a Password Settings
object (PSO) and which settings must be implemented by modifying the properties of the
user accounts.
What should you identify? To answer, configure the appropriate settings in the dialog box in
the answer area.
Question 47
Question
You have a server named Server1 that runs Windows Server 2012 R2.
You need to configure Server1 to create an entry in an event log when the processor usage
exceeds 60 percent.
Which type of data collector should you create?
Answer
-
An event trace data collector
-
A performance counter alert
-
A performance counter data collector
-
A configuration data collector