Q1. HOTSPOT - (Topic 2)
You have a file server named Server1 that runs Windows Server 2012 R2. Server1 contains a folder named Folder1.
A user named User1 is a member of Group1 and Group2. A user named User2 is a
member of Group2 and Group3.
You need to identify which actions the users can perform when they access the files in
Share1.
What should you identify?
To answer, select the appropriate actions for each user in the answer area.
Answer:
Q2. HOTSPOT - (Topic 2)
You have a Hyper-V host named Server1 that runs Windows Server 2012 R2.Server1 hosts 50 virtual machines.
You need to create a script to list all of the virtual machines that have checkpoints and support Secure Boot.
What should you do? To answer, select the appropriate options in the answer area.
Answer:
Q3. HOTSPOT - (Topic 1)
You have a Hyper-V host named Server1 that runs Windows Server 2008 R2. All of the virtual machines on Server1 use VHDs.
You install the Hyper-V server role on a server named Server2 that runs Windows Server 2012 R2. Server2 has the same hardware configurations as Server1.
You plan to migrate the Hyper-V host from Server1 to Server2 by using the Windows Server Migration Tools.
In the table below, identify what can be migrated by using the Windows Server Migration Tools. Make only one selection in each row. Each correct selection is worth one point.
Answer:
Q4. - (Topic 3)
Your network contains an Active Directory domain named contoso.com. The domain contains an application server named Server1. Server1 runs Windows Server 2012 R2. You have a client application named App1 that communicates to Server1 by using dynamic TCP ports.
On Server1, a technician runs the following command: New-NetFirewallRule -DisplayName AllowDynamic - Direction Outbound -LocalPort 1024- 65535 -Protocol TCP.
Users report that they can no longer connect to Server1 by using App1.
You need to ensure that App1 can connect to Server1.
What should you run on Server1?
A. Set-NetFirewallRule -DisplayName AllowDynamic -Action Allow
B. netsh advfirewall firewall set rule name=allowdynamic new action = allow
C. Set-NetFirewallRule -DisplayName AllowDynamic -Direction Inbound
D. netsh advfirewall firewall add rule name=allowdynamic action=allow
Answer: C
Q5. - (Topic 1)
Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2012 R2.
Server1 has the Group Policy Management feature installed. Server2 has the Print and Document Services server role installed.
On Server2, you open Print Management and you deploy a printer named Printer1 by using a Group Policy object (GPO) named GPO1.When you open GPO1 on Server1, you discover that the Deployed Printers node does not appear.
You need to view the Deployed Printers node in GPO1.
What should you do?
A. On Server1, modify the Group Policy filtering options of GPO1.
B. On a domain controller, create a Group Policy central store.
C. On Server2, install the Group Policy Management feature.
D. On Server1, configure the security filtering of GPO1.
Answer: C
Explanation:
Pre-Requisites To use Group Policy for printer deployment you will need to have a Windows Active Directory domain, and this article assumes that your Domain Controller is a Windows 2008 R2 Server. You will also need the Print Services role installed on a server (can be on your DC), and you will be using the Print Management and Group Policy Management consoles to configure the various settings. It’s assumed that you have already followed Part One and have one or more printers shared on your server with the necessary drivers, ready to deploy to your client computers.
Q6. - (Topic 3)
Your network contains one Active Directory forest named contoso.com. The forest contains a single domain. All domain controllers run Windows Server 2012 R2.
You need to modify the membership of a group named Group1 to include two users named User1 and User2.
What command should you run? To answer, select the appropriate options in the answer area.
Select three.
A. Use command Add-GroupMember
B. Use command Add-ADGroupMember
C. As first parameter use Group1
D. As first parameter use User1, User2
E. As first parameter use {User1, User2}
F. As second parameter use Group1
G. As second parameter use User1, User2
H. As second parameter use {User1, User2}
Answer: B,C,G
Q7. - (Topic 3)
You have a server named Server1 that runs Windows Server 2012 R2.
You apply a security policy to server1 by using the Security Configuration Wizard (CWM). You plan to roll back the security policy.
You need to identify the settings that are prevented from rolling back running the CWM Witch settings should you identify.
A. The secure startup order
B. The outbound authentication methods
C. The network security rules
D. The system access control list
Answer: D
Q8. - (Topic 3)
Your network contains a Hyper-V host named Server1 that runs Windows Server 2012 R2.
Server1 hosts a virtual machine named VM1 that runs Windows Server 2012 R2.
You take a snapshot of VM1, and then you install an application on VM1.
You verify that the application runs properly.
You need to ensure that the current state of VM1 is contained in a single virtual hard disk file. The solution must minimize the amount of downtime on VM1.
What should you do?
A. From Hyper-V Manager, delete the snapshot.
B. From a command prompt, run dism.exe and specify the /commit-image parameter.
C. From a command prompt, run dism.exe and specify the /delete-image parameter.
D. From Hyper-V Manager, inspect the virtual hard disk.
Answer: A
Explanation:
Virtual machine snapshots are file-based snapshots of the state, disk data, and configuration of a virtualmachine at a specific point in time. You can take multiple snapshots of a virtual machine, even while it is running. You can then revert the virtual machine to any of the previous states by App1ying a snapshot to the virtualmachine. Taking a snapshot of a VM is to in essence freeze the current state and make it a parent disk based on currentstate, and at the same time create a child disk to capture all subsequent changes. – See more at: Snapshots require adequate storage space. Snapshots are stored as .avhd files in the same location at thevirtual hard disk. Taking multiple snapshots can quickly consume a large amount of storage space. When you use Hyper-V Manager to delete a snapshot, the snapshot is removed from the snapshot treebut the .avhd file is not deleted until you turn off the virtual machine.
Q9. - (Topic 3)
Your network contains a domain controller that is configured as a DNS server. The server hosts an Active Directory-integrated zone for the domain.
You need to reduce how long it takes until stale records are deleted from the zone. What should you do?
A. From the configuration directory partition of the forest, modify the tombstone lifetime.
B. From the configuration directory partition of the forest, modify the garbage collection interval.
C. From the aging properties of the zone, modify the no-refresh interval and the refresh interval.
D. From the start of authority (SOA) record of the zone, modify the refresh interval and the expire interval.
Answer: C
Explanation:
Scavenging automates the deletion of old records. When scavenging is enabled, then you should also change the no-refresh and refresh intervals of the aging properties of the zone else it may take too long for stale records to be deleted and the size of the DNS database can become large and have an adverse effect on performance.
Q10. - (Topic 3)
Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2008 R2. One of the domain controllers is named DC1.
The network contains a member server named Server1 that runs Windows Server 2012 R2.
You need to promote Server1 to a domain controller by using install from media (IFM).
What should you do first?
A. Create a system state backup of DC1.
B. Create IFM media on DC1.
C. Upgrade DC1 to Windows Server 2012 R2.
D. Run the Active Directory Domain Services Configuration Wizard on Server1.
E. Run the Active Directory Domain Services Installation Wizard on DC1.
Answer: C
Explanation:
A. Backs up system state data to be restored
C. Only valid option. You could install ADDS role on Server 1 and run ADDS configuration wizard and add DC to existing domain
D. Need to add ADDS role first
E. Wrong server Installation from media does not work across different operating system versions. In other words, you must use a Windows Server 2012 R2 domain controller to generate installation media to use for another Windows Server 2012 R2 domain controller installation. We can use the Install from media (IFM) option to install an Additional Domain Controller in an existing domain is the best option such as a branch office scenario where network is slow, unreliable and costly. IFM will minimize replication traffic during the installation because it uses restored backup files to populate the AD DS database. This will significantly reduce the amount of traffic copied over the WAN link. Things to remember: If you are deploying your first Domain Controller in the domain, you cannot use IFM. The OS will need to match the IFM media. (If you create a 2008 R2 IFM, promote a 2008 R2 DC) If you are creating a DC that will be a Global Catalog Server, create your IFM on a Global Catalog Server.
If you are creating a DC that will be a DNS Server, create your IFM on a DNS Server. If you want to copy the SYSVOL, the DC on which you generate the installation media and the new DC must be at least running Windows Server 2008 with Service Pack 2 or Windows Server 2008 R2. Membership of the Domain Admins group is the minimum required to complete IFM.