70-417 499 Q&S Upgrading Your Skills to MCSA Windows Server 2012

What should you name the XML file?

Your role of Network Administrator at ABC.com includes the management of the Active Directory Domain Services (AD DS) domain named ABC.com. The network includes servers that run Windows Server 2012.
All domain controllers in the network run a custom application that was created by developers at ABC.com.
You want to deploy additional domain controllers using domain controller cloning. You verify that the custom application supports domain controller cloning. You run the Get-ADDCCloningExcludedApplicationList cmdlet and it returns the name of the custom application.
You need to prepare a domain controller for cloning. You plan to create an XML file and add information about the custom application to the file to enable the domain controller to be cloned.
What should you name the XML file?
A. DCCIoneConfig.xml
B. CustomDCCIoneAllowList.xml
C. Sysprep.xml
D. ADDCCloningExcludedApplicationList.xml


Answer Clike
Which context should you use in ntdsutil?

Your role of Network Administrator at ABC.com includes the management of the Active Directory Domain Services (AD DS) domain named ABC.com. The network includes servers that run Windows Server 2012.
You want to move the Active Directory logs to a different folder. You plan to use the “move logs to” statement in ntdsutil.exe to specify the new location. Which context should you use in ntdsutil?
A. DS Behaviour
B. IFM
C. Roles
D. Configurable Settings
E. Files
F. Partition Management


Answer Clike
Which context should you use in ntdsutil to seize an FSMO role?

Your role of Network Administrator at ABC.com includes the management of the Active Directory Domain Services (AD DS) domain named ABC.com. The network includes servers that run Windows Server 2012.
The domain controller that hosts the PDC emulator FSMO role suffers a complete hardware failure.
You need to seize the PDC emulator role on another domain controller. You log in to the domain controller and open ntdsutil.exe. Which context should you use in ntdsutil to seize an FSMO role?
A. Partition Management
B. Roles
C. DS Behaviour
D. Local Roles
E. Metadata Cleanup
F. Configurable Settings


Answer Clike
What should you do next?

Your role of Network Administrator at ABC.com includes the management of the Active Directory Domain Services (AD DS) domain named ABC.com. The network includes servers that run Windows Server 2012. All client computers run Windows 7 Professional.The network includes a server named ABC-NPS1. ABC-NPS1 is configured as a Network Policy Server (NPS) and a Health Registration Authority (HRA). A server named ABC-CA1 runs Certificate Services and is configured as an Enterprise Certification Authority (CA) for the ABC.com domain. The CA has been associated with the HRA on ABC-NPS1. The HRA has been configured with an SSL certificate and the appropriate DNS Service Locator (SRV) records have been configured.
You want to configure HRA automatic discovery onthe client computers. You configure a Group Policy Object (GPO) to clear all trusted group configurations from the client computers.
What should you do next?
A. You should configure the EnableDiscovery registry key on ABC-CA1.
B. You should configure theEnableDiscovery registry key on ABC-NPS1.
C. You should configure the EnableDiscovery registry key on the client computers.
D. You should configure the EnableDiscovery registry key on a domain controller.


Answer Clike
How can you ensure that external users cannot connect to www.ABC.com using a DirectAccess connection?

Your role of Network Administrator at ABC.com includes the management of the Active Directory Domain Services (AD DS) domain named ABC.com. All servers on the network run Windows Server 2012.
The corporate Web site www.ABC.com is hosted on a Windows Server 2012 Web Server hosted on the corporate network. A public IP address is mapped to the private IP address of the Web Server to provide Internet access to the corporate Web site. DirectAccess is enabled on the network using the default configuration to enable external users to access resources on the corporate network when they are away from the office. Company security policy states that all connections from outside the office to www.ABC.com must come through the corporate firewall using the external IP address of the Web site.
How can you ensure that external users cannot connect to www.ABC.com using a DirectAccess connection?
A. By running the Set-DAClientExperienceConfiguration cmdlet.
B. By modifying the Name Resolution Policy.
C. By modifying the external IP address assigned to the Web server.
D. By running the Remove-DAEntryPointTableItem cmdlet.


Answer Clike
How can you ensure that the ManagersGPO applies only to the ABC-Managers group?

Your role of Network Administrator at ABC.com includes the management of the Active Directory Domain Services (AD DS) domain named ABC.com. The network includes servers that run Windows Server 2008 R2 Service Pack 1 (SP1) and Windows Server 2012. The Organizational Unit (OU) structure includes top-level OUs for each office location. Each toplevel OU contains OUs for each company department. Each departmental OU contains the user accounts of the users working in that department in the relevant location. Many Group Policy Objects (GPOs) are applied at the site level, domain level and OU level. A group named ABC-Managers contains the user accounts of company managers from each department.
You configure a Group Policy Object (GPO) named ManagersGPO and link it to the domain. You need to apply the ManagersGPO to the ABC- Managers group.
How can you ensure that the ManagersGPO applies only to the ABC-Managers group?
A. By running the Gpupdate command.
B. By running the Set-GPLink cmdlet.
C. By running GPEdit.msc.
D. By running the Set-GPPermission cmdlet.
E. By running the Set-GPInheritance cmdlet.


Answer Clike
How can you quickly achieve this goal?

Your role of Network Administrator at ABC.com includes the management of the Active Directory Domain Services (AD DS) domain named ABC.com. The network includes servers that run Windows Server 2008 R2 Service Pack 1 (SP1) and Windows Server 2012. The Organizational Unit (OU) structure includes top-level OUs for each office location. Each toplevel OU contains OUs for each company department. Each departmental OU contains the user accounts of the users working in that department in the relevant location. Many Group Policy Objects (GPOs) are applied at the site level, domain level and OU level. You create an OU named TestOU inside one of the departmental OUs. You want to ensure that no GPOs from the site level, domain level, location OU level or department OU level are applied to objects within TestOU.
How can you quickly achieve this goal?
A. By running the Set-GPInheritance cmdlet.
B. By running the Set-GPPermission cmdlet.
C. By running the New-GPStarterGPO cmdlet.
D. By running the Remove-GPLink cmdlet.
E. By running the Set-GPLink cmdlet.


Answer Clike
How can you configure the order of precedence of the GPOs?

Your role of Network Administrator at ABC.com includes the management of the Active Directory Domain Services (AD DS) domain named ABC.com. The network includes servers that run Windows Server 2008 R2 Service Pack 1 (SP1) and Windows Server 2012. The Organizational Unit (OU) structure includes top-level OUs for each office location. Each toplevel OU contains OUs for each company department. Each departmental OU contains the user accounts of the users working in that department in the relevant location. Many Group Policy Objects (GPOs) are applied at the site level, domain level and OU level. You discover that two GPOs applied at the domain level do not have the desired effect. You need to change the order in which the GPOs are applied.
How can you configure the order of precedence of the GPOs?
A. By running the Set-GPPermission cmdlet
B. By running the New-GPLink cmdlet.
C. By running the Set-GPLink cmdlet.
D. By running the Set-GPInheritance cmdlet.
E. By running the Get-GPResultantSetOfPolicy cmdlet.


Answer Clike
Which tool should you use to recover the deleted user account?

Your role of Network Administrator at ABC.com includes the management of the Active Directory Domain Services (AD DS) domain named ABC.com. The domain has domain controllers that run Windows Server 2008 R2 Service Pack 1 (SP1) and Windows Server 2012. The functional level of the forest is Windows Server 2008 R2.
You have enabled the Active Directory Recycle Bin in the ABC.com domain. You discover that a user account was deleted yesterday. You need to recover the deleted user account as quickly as possible.
Which tool should you use to recover the deleted user account?
A. Active Directory Users and Computers.
B. NTDSutil.
C. Active Directory Administrative Center.
D. LDP


Answer Clike
What should you do?

You work for a company named ABC.com. The ABC.com network consists of a single Active Directory forest named ABC.com. The forest contains a single Active Directory Domain Services (AD DS) domain named ABC.com. All servers in the ABC.com domain run Windows Server 2012. ABC.com works with a partner company named Redbridge Logistics. The Redbridge Logistics network consists of a single Active Directory forest named RedbridgeLogistics.com. The forest contains a single Active Directory Domain Services (AD DS) domain named RedbridgeLogistics.com. All servers in the RedbridgeLogistics.com domain run Windows Server 2012.
A forest trust exists between the two forests. The two networks are connected by a WAN link. A server named ABC-DNS1 hosts an Active Directory- integrated zone for ABC.com. A server named RL-DNS1 hosts an Active Directory-integrated zone for RedbridgeLogistics.com. RedbridgeLogistics.com plans to install additional DNS servers for the RedbridgeLogistics.com domain.
Users in the ABC.com domain need to be able to resolve names of servers in the RedbridgeLogistics.com domain.
You need to configure a name resolution solution that will ensure that name resolution requests are automatically forwarded to the new RedbridgeLogistics.com DNS servers when they are installed.
What should you do?
A. You should configure a forwarder on ABC-DNS1.
B. You should configure a forwarder on RL-DNS1.
C. You should configure a secondary zone on ABC-DNS1.
D. You should configure a stub zone on RL-DNS1.
E. You should configure a stub zone on ABC-DNS1.
F. You should configure a conditional forwarder on ABC-DNS1.


Answer Clike
Which two of the following steps should you perform first?

Your role of Network Administrator at ABC.com includes the management of the Active Directory Domain Services (AD DS) domain named ABC.com. All servers on the network run Windows Server 2012.
Virtual machines (VMs) are hosted on Windows Server 2012 servers running the Hyper-V role. One VM is named ABC-DC3. ABC-DC3 runs the Active Directory Domain Services role and is configured as a domain controller for the ABC.com domain. You want to clone ABC-DC3 to create another domain controller.
Which two of the following steps should you perform first? (Choose two).
A. Run the Install-ADDSDomainController PowerShell cmdlet.
B. Run the New-ADDCCloneConfigFile PowerShell cmdlet.
C. Run Sysprep.exe.
D. Place a DCCloneConfig.xml file in the %Systemroot%NTDS folder.
E. Place an Unattend.xml file in the %Systemroot%SYSVOL folder.


Answer Clike
How can you recreate the Default Domain Controllers Policy without affecting the Default Domain Policy?

Your role of Network Administrator at ABC.com includes the management of the Active Directory Domain Services (AD DS) domain named ABC.com. All servers on the network run Windows Server 2012.
You create a second domain named Dev.ABC.com. The new domain contains a domain controller named ABC-DevDC1. The Dev.ABC.com domain will be used to test domain configurations before applying them to the corporate domain. You discover that the Default Domain Controllers Policy on ABC- DevDC1 has become corrupted. You do not have a backup of the Default Domain Controllers Policy.
How can you recreate the Default Domain Controllers Policy without affecting the Default Domain Policy?
A. By running the DCDiag /fix command.
B. By running the DCPromo /adv command.
C. By running the DCGPOFix /target:domain command.
D. By running the DCGPOFix /target:dc command.


Answer Clike
How should you configure the DCS?

Your role of Network Administrator at ABC.com includes the management of the Active Directory Domain Services (AD DS) domain named ABC.com. The network includes servers that run Windows Server 2012.
The network includes a Windows Server 2012 server named ABC-AppSrv1. ABC-AppSrv1 runs a custom line-of-business (LOB) application used by all company users. You need to record the value of a registry key related to the LOB application on ABC-AppSrv1 at specific times throughout the day.
You create a custom Data Collector Set (DCS). How should you configure the DCS?
A. You should configure the DCS to monitor Performance Counters.
B. You should configure the DCS to monitor Event Trace Data.
C. You should configure the DCS to monitor WDAC Diagnostics.
D. You should configure the DCS to monitor System Configuration Information.


Answer Clike
Which three of the following steps should you perform to move the Active Directory Database to the new volume?

Your role of Network Administrator at ABC.com includes the management of the Active Directory Domain Services (AD DS) domain named ABC.com.
A server named ABC-DC1 runs Windows Server 2012. ABC-DC1 has the Active Directory Domain Services role installed and is configured as a domain controller in the ABC.com domain. You need to move the Active Directory database to a new volume on ABC-DC1. Your solution must minimize server downtime. You configure a new volume on the server.
Which three of the following steps should you perform to move the Active Directory Database to the new volume? (Choose three).
A. Restart ABC-DC1 into Directory Services Restore Mode
B. Stop the Active Directory Domain Services service.
C. Use Windows Explorer to move the databasefiles.
D. Use NTDSUtil to move the database files.
E. Restart ABC-DC1 into normal mode.
F. Restart the Active Directory Domain Services service.


Answer Clike
Which of the following commands should you run to view the contents of the AD DS database in the snapshot?

Your role of Network Administrator at ABC.com includes the management of the Active Directory Domain Services (AD DS) domain named ABC.com. The network includes servers that run Windows Server 2012.
A domain controller on the network is named ABC-DC1. You want to view the contents of the Active Directory Domain Services database in a snapshot of ABC-DC1. You run the ntdsutil > snapshot > list mounted command. The mounted snapshot is named C:$SNAP_201307121113_VOLUMEC$.
Which of the following commands should you run to view the contents of the AD DS database in the snapshot?
A. dsamain /dbpath C:$SNAP_201307121113_VOLUMEC$WINDOWSNTDSntds.dit /ldapport 51389
B. dsamain /dbpath C:$SNAP_201307121113_VOLUMEC$WINDOWSNTDSntds.dit /ldapport
C. Unmount C:$SNAP_201307121113_VOLUMEC$WINDOWSNTDSntds.dit
D. Mount -R C:$SNAP_201307121113_VOLUMEC$WINDOWSNTDSntds.dit


Answer Clike
How can you automate the promotion of the server using the settings in the ABC-RODC1.txt file?

Your role of Network Administrator at ABC.com includes the management of the Active Directory Domain Services (AD DS) domain named ABC.com. The network includes servers that run Windows Server 2008 R2 Service Pack 1 (SP1) and Windows Server 2012. You plan to create a Windows Server 2012 Read Only Domain Controller in the ABC.com domain. You open Active Directory Users and Computers and select the Pre-create a read-only domain controller account option. You go through the Welcome to the Active Directory Domain Services Installation Wizard and specify the settings to create an account named ABC-RODC1. You use the Export Settings option to export the settings to a file named ABC-RODC1.txt. You plan to use this text file to automate the installation of the Read Only Domain Controller.
You install a Window Server 2012 Server.
How can you automate the promotion of the server using the settings in the ABC-RODC1.txt file?
A. By running the Install-ADDSDomainController PowerShell cmdlet.
B. By running the Install-WindowsFeature PowerShell cmdlet.
C. By running the DCPromo command.
D. By using the Add Roles Wizard in Server Manager.


Answer Clike
How can you view the settings in the PSO?

Your role of Network Administrator at ABC.com includes the management of the Active Directory Domain Services (AD DS) domain named ABC.com. The network includes servers that run Windows Server 2008 R2 Service Pack 1 (SP1) and Windows Server 2012. The domain is configured to use different password policies. You want to view the settings in a PSO (Password Settings Object).
How can you view the settings in the PSO?
A. Byrunning the Get-ADFineGrainedPasswordPolicy PowerShell cmdlet.
B. By running the Get-ADDefaultDomainPasswordPolicy PowerShell cmdlet.
C. By running the Get-ADDomainControllerPasswordReplicationPolicyUsage PowerShell cmdlet.
D. By running the Get-ADAccountResultantPasswordReplicationPolicy PowerShell cmdlet.
E. By running the Get-ADUserResultantPasswordPolicy PowerShell cmdlet.


Answer Clike
How should you configure the failover cluster?

Your role of Network Administrator at ABC.com includes the management of the Active Directory Domain Services (AD DS) domain named ABC.com. The network includes servers that run Windows Server 2008 R2 Service Pack 1 (SP1) and Windows Server 2012. You are planning to deploy a custom CRM application named CorpApp1. All company users will use CorpApp1.
You have installed two Windows Server 2012 servers named ABC-CL1 and ABC-CL2. The two servers will run the Failover Clustering feature and be configured as nodes in a single failover cluster.
You plan to configure a shared folder on the failover cluster to host the application data for CorpApp1.
To increase file server performance, you want both nodes in the failover cluster to respond to connection requests to the shared folder. How should you configure the failover cluster?
A. You should configure “File Server for general use”.
B. You should configure “Scale-Out File Server”.
C. You should configure both clusternodes as the preferred owner.
D. You should configure both cluster nodes as the possible owner.
E. You should set the Affinity setting to None.


Answer Clike
How should you configure the failover cluster?

Your role of Network Administrator at ABC.com includes the management of the Active Directory Domain Services (AD DS) domain named ABC.com. The network includes servers that run Windows Server 2008 R2 Service Pack 1 (SP1) and Windows Server 2012. You are planning to deploy a custom Sales application named SalesApp. All users in the Sales department will use SalesApp.
You have installed two Windows Server 2012 servers named ABC-CL1 and ABC-CL2. The two servers will run the Failover Clustering feature and be configured as nodes in a single failover cluster.
You plan to install SalesApp onto the failover cluster. You need to configure the failover cluster so that ABC-CL1 responds to client requests for the SalesApp application. ABC-CL2 must respond to client requests for the SalesApp application only if ABC-CL1 is offline.
How should you configure the failover cluster?
A. You should configure ABC-CL1 as the preferred owner.
B. You should configure ABC-CL2 as the preferred owner.
C. You should configure both cluster nodes as the preferred owner.
D. You should set the Affinity setting to None.
E. You should set the Affinity setting to Single.


Answer Clike
How can you configure the NLB cluster to ensure that user session state is maintained?

You work as a Network Administrator at ABC.com. The company network consists of a single Active Directory Domain Services (AD DS) domain named ABC.com. All servers on the network run Windows Server 2012.
Company developers are developing a custom line-of-business application named CorpApp. The application will be a secure web based application and will run in Internet Information Services (IIS) 8.0.
You need to configure a server solution to host the CorpApp application. You plan to install two Windows Server 2012 servers and configure Network Load Balancing between the servers. You install the two servers and install the Network Load Balancing (NLB) feature. You learn that the CorpApp application will save user state information locally on the NLB cluster node.
How can you configure the NLB cluster to ensure that user session state is maintained?
A. By configuring the client affinity to Single.
B. By configuring the preferred owner setting.
C. By configuring the client affinity to None.
D. By configuring the client affinity to Class C.
E. By configuring the possible owner setting.


Answer Clike
How can you configure the ABC-AppCL1 to meet the requirements?

You work as a Network Administrator at ABC.com. The company network consists of a single Active Directory Domain Services (AD DS) domain named ABC.com. All servers on the network run Windows Server 2012.
Company developers are developing a custom line-of-business application named CorpApp. The CorpApp application will be a client/server application. All client computers in the network will have the CorpApp client software installed. The CorpApp server software will run on a Windows Server 2012 server.
You need to configure a highly-available server solution to host the CorpApp application. You plan to install two Windows Server 2012 servers and configure them as a failover cluster. You install two servers named ABC-App1 and ABC-App2 and configure a failover cluster named ABC-App-CL1. You want to configure the cluster so that CorpApp runs on ABC-App1. You also want to ensure that if CorpApp fails over to ABC-App2 in the event of a problem with ABC-App1, it fails back to ABC-App1 when possible.
How can you configure the ABC-AppCL1 to meet the requirements?
A. Byconfiguring the possible owner setting.
B. By configuring the client affinity to Single.
C. By configuring the preferred owner setting.
D. By configuring the client affinity to None.
E. By configuring the host priority setting.


Answer Clike
What should you do?

Your role of Network Administrator at ABC.com includes the management of the Active Directory Domain Services (AD DS) domain named ABC.com. The network includes servers that run Windows Server 2008 R2 Service Pack 1 (SP1) and Windows Server 2012. A server named ABC-Win12Admin runs Windows Server 2012. You use ABC-Win12Admin to administer the Windows Server 2012 servers in the domain. You configure several custom Data Collector Sets on ABC-Win12Admin to collect performance log data from network servers.
To preserve disk space on ABC-Win12Admin, you need to automate the deletion of performance log data that is more than one week old.
What should you do?
A. You should modify the Folder Action settings in the properties of the Data Collector Sets.
B. You should configure a quota on the folder containing the performance log data using File Server Resource Manager.
C. You should configure a disk quota on the volume that contains the folder containing the performance log data.
D. You should modify the properties of the %Systemdrive%PerfLogs folder.


Answer Clike
Which two of the following steps should you perform?

You work as a Network Administrator at ABC.com. The network contains a single Active Directory Domain Services (AD DS) domain named ABC.com which spans two sites. The company has a main office and a branch office. The two offices are connected by a slow Wide Area Network (WAN) link.
Both offices have servers running Windows Server 2008 R2 Service Pack 1 (SP1) and Windows Server 2012.
A Windows Server 2012 server named ABC-MainHV1 in the main office runs the Hyper-V Server role. ABC-MainHV1 hosts Virtual Machines (VMs) primarily used by users in the main office. You install a Windows Server 2012 server named ABC-BranchHV1 in the branch office and configure it to run the Hyper-V Server role. You configure a VM named BranchVM1 on ABCBranchHV1.
You need to configure the virtual environment to ensure that if ABC-BranchHV1 fails, you can run BranchVM1 on ABC-MainHV1.
Which two of the following steps should you perform? (Choose two).
A. You should select the “Enable this computer as a replica server” in the Replication Configuration settings on ABC-MainHV1.
B. You should select the “Enable this computer as a replica server” in the Replication Configuration settings on ABC- BranchHV1.
C. Enable replication on BranchVM1.
D. Change the storage location of the VHD file for BranchVM1.
E. Export BranchVM1.


Answer Clike
Which two of the following actions should you perform next?

Your role of Network Administrator at ABC.com includes the management of the Active Directory Domain Services (AD DS) domain named ABC.com. The network includes servers that run Windows Server 2008 R2 Service Pack 1 (SP1) and Windows Server 2012. You need to commission a new file server in the domain. You install a Windows Server 2012 server named ABC-W12File1 and install the File Server role. You want to use an online backup service in Windows Server Backup to back up the shared folders on ABC-W12File1. You install the Windows Server Backup feature on ABC- W12File1.
You then register for Windows Azure Online Backup.
Which two of the following actions should you perform next? (Choose two).
A. Install the Windows Server Migration Tools feature.
B. Download and install the Microsoft Online Backup Service Agent.
C. Run the wbadmin.exe utility.
D. Register the server in Windows Server Backup.
E. Register the server in the Windows Azure Online Backup dashboard.


Answer Clike
Which of the following scenarios is the Hyper-V Replica Broker role required?

Your role of Network Administrator at ABC.com includes the management of the Active Directory Domain Services (AD DS) domain named ABC.com. The network includes servers that run Windows Server 2012.
The network includes virtual machines (VMs) running on Windows Server 2012 Hyper-V host servers.
You plan to configure Hyper-V replication on some of the VMs. You need to install the Hyper-V Replica Broker role on some host servers to enable Hyper-V replication.
In which of the following scenarios is the Hyper-V Replica Broker role required? (Choose all that apply)
A. When both the primary and replica VMs are hosted on single Hyper-V host servers.
B. When the primary VM is hosted on a single Hyper-V host server and the replica VM is hosted on a Hyper-V host server that is a member of a failover cluster.
C. When the primary VM is hosted on a Hyper-V host server that is a member of a failover cluster and the replica VM is hosted on a single Hyper-V host server.
D. When both the primary and replica VMs are hosted on Hyper-V host servers that are members of failover clusters.


Answer Clike
Which two of the following actions should you perform to enable the VM replication?

Your role of Network Administrator at ABC.com includes the management of the Active Directory Domain Services (AD DS) domain named ABC.com. The network includes servers that run Windows Server 2012.
The network includes a primary data center and a secondary data center. The primary data center includes virtual machines (VMs) running on Windows Server 2012 Hyper-V host servers. A failover cluster in the primary data center named ABC-CL01 contains three Hyper-V host servers named HVHost1, HVHost2 and HVHost3. ABC-CL01 hosts several highly available virtual machines (VMs).
You need to configure a disaster recovery solution in the event of the data center going offline. You install a Hyper-V host server named HVHostBak. You plan to enable virtual machine replication between ABC-CL01 and HVHostBak. You need to ensure that you can failover VMs from ABC-CL01 to
HVHostBak and failover VMs from HVHostBak back to ABC-CL01. You open the Hyper-V Manager console on HVHostBak and configure it as a replica server. You need to configure the replication of the VMs.
Which two of the following actions should you perform to enable the VM replication?
A. Install the Hyper-V Replica Broker role on ABC-CL01.
B. Install the Hyper-V Replica Broker role on HVHostBak.
C. Open the Hyper-V Manager console on one of the cluster nodes and configure the VMs for replication.
D. Open the Failover Cluster Manager console on ABC-CL01 and configure the VMs for replication.


Answer Clike
How should you recover the server?

Your role of Network Administrator at ABC.com includes the management of the Active Directory Domain Services (AD DS) domain named ABC.com. The network includes servers that run
Windows Server 2008 R2 Service Pack 1 (SP1) and Windows Server 2012. A Windows Server 2012 server named ABC-File1 runs the File Server role. You discover that the server is continually restarting. As soon as Windows starts to load, the server restarts again. A junior administrator reports that he modified a system driver on the server and attempted to restart the server.
You need to recover the ABC-File1 as quickly as possible while minimizing data loss. How should you recover the server?
A. Press F8 during startup and select the Disable automatic restart on system failure Advanced Boot Option.
B. Press F8 during startup and select the Last Known Good Configuration (advanced) Advanced Boot Option.
C. Press F11 during startup and select the Network Boot option.
D. Press F8 during startup and select the Disable Driver Signature Enforcement Advanced Boot Option.
E. Press F8 during startup and select the System Image Recovery Advanced Boot Option.


Answer Clike
Which tool would you use to ensure that users can recover files using the Previous Versions function?

Your role of Network Administrator at ABC.com includes the management of the Active Directory Domain Services (AD DS) domain named ABC.com. The network includes servers that run Windows Server 2008 R2 Service Pack 1 (SP1) and Windows Server 2012. A server named ABC-File1 runs Windows Server 2012 Server Core edition with the File Services server role installed. ABC-File1 hosts shared folders on the D: drive. Users access the shared folders from their Windows 7 client computers.
A user attempts to recover a previous version of a file in a shared folder on ABC-File1 but discovers that there is no previous versions option. Which tool would you use to ensure that users can recover files using the Previous Versions function?
A. DISM
B. Vssadmin
C. Disk Management
D. Wbadmin
E. Windows ServerBackup


Answer Clike
How should you move the VMs?

You work for a company named ABC.com. Your role of Network Administrator includes the management of the company’s physical and virtual infrastructure.
The network includes servers running Windows Server 2008 R2 Service Pack 1 (SP1) and Windows Server 2012.
Virtual machines (VMs) are hosted on Windows Server 2012 servers running the Hyper-V role. You are in the process of upgrading server hardware. A Hyper-V server named ABC-HVHost1 has two quad-core Intel processors, 16GB RAM and four 300GB 10,000 RPM hard disks.
You install a new Hyper-V server named ABC-HVHost2. The new server has four hex-core AMD processors, 64GB RAM and six 1Terabyte 15,000 RPM hard disks. You need to move four VMs from ABC-HVHost1 to ABC-HVHost2. VM downtime must be minimized during the move.
How should you move the VMs?
A. By using the storage migration method.
B. By using the storage migration method.
C. By using the Move method.
D. By using the Live Migrate method.
E. By using the Quick Migrate methods.


Answer Clike
How can you achieve this goal while minimizing permissions assigned to Mia?

Your role of Network Administrator at ABC.com includes the management of the Active Directory Domain Services (AD DS) domain named ABC.com.
The network includes servers that run Windows Server 2008 R2 Service Pack 1 (SP1) and Windows Server 2012. You need to enable a user named Mia to manage servers running the IP Address Management (IPAM) feature. You add Mia to the IPAM Administrators group on all IPAM servers. Mia logs into one IPAM server but is unable to remotely manage other IPAM servers.
You need to enable Mia to manage all IPAM servers from a single IPAM server.
How can you achieve this goal while minimizing permissions assigned to Mia?
A. By adding Mia to the IPAM MSM Administrators group on all IPAM servers.
B. By adding Mia to the IPAM ASM Administrators group on all IPAM servers.
C. By adding Mia to the Network Configuration Operators group on all IPAM servers.
D. By adding Mia to the Administrators group on all IPAM servers.
E. By adding Mia to the Remote Management Users group on all IPAM servers.


Answer Clike
How can you change the provisioning method?

Your role of Network Administrator at ABC.com includes the management of the Active Directory Domain Services (AD DS) domain named ABC.com. The network includes servers that run Windows Server 2008 R2 Service Pack 1 (SP1) and Windows Server 2012.
The network includes four Windows Server 2012 servers running the IP Address Management (IPAM) feature. All four IPAM servers are configured for Group Policy-based provisioning. You need to change the provisioning method of one IPAM server to Manual.
How can you change the provisioning method?
A. By reinstalling IPAM on the server.
B. By running theSet-IPAMConfiguration cmdlet.
C. By running the Add-IpamCustomField cmdlet.
D. By running the Invoke-IpamGpoProvisioning cmdlet.


Answer Clike
How can you locate a text file containing the required information?

Your role of Network Administrator at ABC.com includes the management of the Active Directory Domain Services (AD DS) domain named ABC.com. The network includes servers that run Windows Server 2012.
The network contains a server named ABC-Fed1. ABC-Fed1 runs Active Directory Federation Services (AD FS). You need to configure a federated trust between ABC.com and a partner company named Weyland Industries.
You need to provide the ABC.com federation metadata to a network administrator at Weyland Industries to enable him to configure their end. How can you locate a text file containing the required information?
A. By opening the ServiceEndpoints node in the AD FS console.
B. By opening the ServiceCertificates node in the AD FS console.
C. By opening the Trust RelationshipsClaims Provider Trusts node in the AD FS console.
D. By opening the Trust RelationshipsAttribute Stores node in the AD FS console.


Answer Clike
Which certificate template should you select in the Certificate Enrollment wizard?

You work as a Network Administrator at ABC.com. The network contains a single Active Directory Domain Services (AD DS) domain named ABC.com. The network includes servers that run Windows Server 2008 R2 Service Pack 1 (SP1) and Windows Server 2012. The network includes a Windows Server 2012 server named ABC-CA1. ABC-CA1 runs the Certificate Services role and is configured as an Enterprise Certification Authority for the domain. You need to configure an Active Directory Federation Services (AD FS) server. You install a Windows Server 2012 domain member server named ABC-ADFS1 and install the Active Directory Federation Services (AD FS) role on the server.
You plan to use ABCadfs.ABC.com as the Federation Service Name. You need to request a certificate from ABC-CA1 for the AD FS configuration.
Which certificate template should you select in the Certificate Enrollment wizard?
A. You should select the Kerberos Authentication certificate template.
B. You should select the CEP Encryption certificate template.
C. You should select the Web Server certificate template.
D. You should select the Authenticated Session certificate template.
E. You should select the IPSEC certificate template.


Answer Clike
Which server role should be installed on the CRL distribution point server?

You work as a Network Administrator at ABC.com. The network contains a single Active Directory Domain Services (AD DS) domain named ABC.com and a workgroup named DMZ. The network includes servers that run Windows Server 2008 R2 Service Pack 1 (SP1) and Windows Server 2012.
The network consists of a corporate LAN (local area network) and a perimeter network. A firewall separates the LAN from the perimeter network. All servers in the perimeter network are members of the DMZ workgroup.
You install a Windows Server 2012 server named ABC-CA1. ABC-CA1 will be configured as an Enterprise Certification Authority and will issue computer certificates to the ABC.com domain computers and the DMZ workgroup computers.
You need to configure a server to function as a distribution point for the Certificate Revocation List (CRL).
Which server role should be installed on the CRL distribution point server?
A. Web Server (IIS).
B. DNS Server.
C. Active Directory Domain Services (AD DS).
D. Active Directory Federation Services (AD FS).
E. Active Directory Lightweight Directory Services (AD LDS).


Answer Clike
How should you configure the AD RMS environment?

You work as a Network Administrator at ABC.com. The company network spans four Active Directory Forests. Each forest contains a single Active Directory Domain Services (AD DS) domain. All servers in each domain run either Windows Server 2008 R2 Service Pack 1 (SP1) or Windows Server 2012.
Active Directory Rights Management Services (AD RMS) is deployed throughout the company. An Active Directory Rights Management Services (AD RMS) root cluster is configured in each of the four forests.
Users may need to access protected content from any of the forests. You need to ensure that an AD RMS cluster in any forest can process a licensing request that includes a rights account certificate (RAC) issued by an AD RMS cluster in any other forest.
How should you configure the AD RMS environment?
A. You should configure 12 AD RMS Trusted User Domains (TUDs).
B. You should configure 4AD RMS Trusted User Domains (TUDs).
C. You should configure 1 AD RMS Trusted User Domains (TUDs).
D. You should configure 8 AD RMS Trusted User Domains (TUDs).


Answer Clike
Which two of the following steps should you perform before you can create the volume on ABCMicrosoft 70-417 Exam File1?

Your role of Network Administrator at ABC.com includes the management of the Active Directory Domain Services (AD DS) domain named ABC.com. The network includes servers that run Windows Server 2012.
A Windows Server 2012 server named ABC-SAN1 has a locally attached disk storage array. You are configuring a Windows Server 2012 named ABC- File1 server as a file server. You need to configure ABC-File1 to store files on the disk storage array attached to ABC-SAN1. The disk storage must be available as a drive letter in Windows Explorer on ABC-File1. You log in to ABCSAN1 and create an iSCSI target named TG1.
Which two of the following steps should you perform before you can create the volume on ABCMicrosoft 70-417 Exam File1? (Choose two)
A. Assign an iSCSI initiator ID to TG1 on ABC-SAN1.
B. Assign an iSCSI initiator ID toTG1 on ABC-File1.
C. On ABC-SAN1, open the iSCSI initiator and configure it to connect to TG1.
D. On ABC-File1, open the iSCSI initiator and configure it to connect to TG1.


Answer Clike
What should you do?

You work for a company named ABC.com. Your role of Network Administrator includes the management of the company’s physical and virtual infrastructure. The network includes servers running Windows Server 2008 R2 Service Pack 1 (SP1) and Windows Server 2012.
Virtual machines (VMs) are hosted on Windows Server 2012 servers running the Hyper-V role. One Windows Server 2012 Hyper-V host server is named ABC-AppHost1. ABC-AppHost1 has four quad-core processors, 48GB RAM and six physical network adapters configured as three network adapter teams. ABC-AppHost1 also has two Host Bus Adapters (HBAs) and connects to a Fiber Channel SAN.
ABC-AppHost1 hosts virtual machines (VMs) that run applications used by various company departments. A VM named SalesAppVM runs an application used by users in the Sales department. SalesAppVM runs Windows Server 2008 R2.
You plan to configure Windows Server Backup on ABC-AppHost1 to take full backups of ABCAppHost1. You need to ensure that SalesAppVM can be restored from the ABC-AppHost1 full backup.
What should you do?
A. You should configure Integration Services.
B. You should configure Automatic Start Action.
C. You should configure Storage Migration.
D. You should configure Port Mirroring.
E. You should configure Resource Metering.
F. You should configure Resource Control.


Answer Clike
How can you manage ABC-IPAM1 from ABC-Win12Admin?

Your role of Network Administrator at ABC.com includes the management of the Active Directory Domain Services (AD DS) domain named ABC.com. The network includes servers that run Windows Server 2008 R2 Service Pack 1 (SP1) and Windows Server 2012. A server named ABC-Win12Admin runs Windows Server 2012. You use ABC-Win12Admin to administer the Windows Server 2012 servers in the domain. A server named ABC-IPAM1 is configured as an IP Address Management (IPAM) Server. You want to manage ABC-IPAM1 from ABC-Win12Admin. You install the IP Address Management (IPAM) client on ABC-Win12Admin. You open Server Manager on ABCWin12Admin but ABC-IPAM1 is not listed.
How can you manage ABC-IPAM1 from ABC-Win12Admin?
A. By selecting the Connect to Server option in Computer Management on ABC-Win12Admin.
B. By enabling Windows Remote Management (WinRM) on ABC-IPAM1.
C. By adding the computer account of ABC-Win12Admin to the IPAM Multi-Server Management (MSM) administrators group on ABC-IPAM1.
D. By selecting the Add Server to Manage option in Server Manager on ABC-Win12Admin.


Answer Clike
What should you do?

You work for a company named ABC.com. Your role of Network Administrator includes the management of the company’s physical and virtual infrastructure. The network includes servers running Windows Server 2008 R2 Service Pack 1 (SP1) and Windows Server 2012.
Virtual machines (VMs) are hosted on Windows Server 2012 servers running the Hyper-V role. One Windows Server 2012 Hyper-V host server is named ABC-HVDev1. ABC-HVDev1 has four quad-core processors, 48GB RAM and six physical network adapters configured as three network adapter teams. ABC-HVDev1 also has two Host Bus Adapters (HBAs) and connects to a Fiber Channel SAN.
You have installed five VMs named DevVM1 through DevVM5 on ABC-HVDev1. Company developers use the VMs to test applications during the development of the applications. The developers regularly take snapshots of the VMs and often restore the VMs back to earlier snapshots.
You need to ensure successful time synchronization in the event that significant time has passed since a VM last synched time.
What should you do?
A. You should configure Automatic Start Action.
B. You should configureStartup Order.
C. You should configure NUMA topology.
D. You should configure Resource Control
E. You should configure SR-IOV.
F. You should configure Integration Services.


Answer Clike
How many reservations should you configure?

Your role of Network Administrator at ABC.com includes the management of the Active Directory Domain Services (AD DS) domain named ABC.com. The network includes servers that run Windows Server 2008 R2 Service Pack 1 (SP1) and Windows Server 2012. A Windows Server 2008 R2 SP1 server named ABC-DHCP1 runs the DHCP Server role. All client computers on the network are assigned dynamic IP configurations from ABC-DHCP1. All domain member servers receive their IP configurations from ABC-DHCP1 using IP Address Reservations. All domain controllers have static IP addresses.
You install a new Windows Server 2012 server named ABC-Host1. ABC-Host1 has six physical network adapters. Each network adapter is connected to the network. You configure two network adapter teams each containing two of the network adapters.
You need to configure IP Reservations on ABC-DHCP1 for ABC-Host1. How many reservations should you configure?
A. 1
B. 2
C. 4
D. 6


Answer Clike
How should you configure the disks?

Your role of Network Administrator at ABC.com includes the management of the Active Directory Domain Services (AD DS) domain named ABC.com. The network includes servers that run Windows Server 2008 R2 Service Pack 1 (SP1) and Windows Server 2012. The network includes a Windows Server 2012 server named ABC-File1. ABC-File1 runs the File and Storage Services server role.
You need to increase the file storage space on ABC-File1. You attach four new physical hard disks to ABC-File1.
You need to configure the disks to ensure that no data is lost in the event of a single disk failure while maximizing the storage space that can be used on the disks.
How should you configure the disks?
A. You should create a RAID 0 volume.
B. You should create a RAID 1 volume.
C. You should create a storage space using the spanned option.
D. You should create a storage space using the mirror option.
E. You should create a storage space using the parity option.


Answer Clike
Which two of the following actions could you perform to achieve this goal in the minimum amount of time?

You work as a Network Administrator at ABC.com. The network contains a single Active Directory Domain Services (AD DS) domain named ABC.com.
You install a new Windows Server 2012 server named ABC-SRV10. During the installation, you select the Server with a GUI option. You then join the server to the domain and configure several server roles.
You later decide that you want to change the installation of Windows Server 2012 on ABC-SRV10 by removing the graphical user interface (GUI). ABC- SRV10 will continue to perform it’s current roles.
Which two of the following actions could you perform to achieve this goal in the minimum amount of time? (Choose two)
A. Remove the Desktop Experience feature using Server Manager.
B. Run the Uninstall-WindowsFeature Server-Gui-Mgmt-Infra cmdlet.
C. Reinstall Windows Server 2012 and select the Server Core Installation option.
D. Remove the User Interfaces and Infrastructure feature using Server Manager.
E. Run the Uninstall-WindowsFeature * cmdlet.


Answer Clike
Which of the following you perform first?

Your role of Network Administrator at ABC.com includes the management of the Active Directory Domain Services (AD DS) domain named ABC.com. The network includes servers that run Windows Server 2008 R2 Service Pack 1 (SP1) and Windows Server 2012. The network consists of a corporate LAN (local area network) and a perimeter network. A firewall separates the LAN from the perimeter network.
All domain controllers are located in the corporate LAN and run Windows Server 2012. You plan to deploy three new Windows Server 2012 servers to the perimeter network. You need to join the three new servers to the domain using the offline domain join function.
Which of the following you perform first?
A. You should run the DSAdd command with the /computer option.
B. You should run the DSAdd command with the /OU option.
C. You should run the DSJoin command with the /provision option.
D. You should run the DSJoin command with the /requestodj option.


Answer Clike
What should you do before attempting to promote ABC-2012DC-1?

You work as a Network Administrator at ABC.com. The network contains a single Active Directory Domain Services (AD DS) domain named ABC.com. All servers on the network run Windows Server 2008 R2 Service Pack 1 (SP1).
You plan to migrate all servers to Windows Server 2012. One Windows Server 2008 R2 server is named ABC-2008DC-1 and is configured as a domain controller for the ABC.com domain. You install Windows Server 2012 on a server, name it ABC-2012DC-1 and join it to the domain. You want to configure ABC-2012DC-1 as a domain controller using the install from media (IFM) promotion method.
What should you do before attempting to promote ABC-2012DC-1?
A. You should create a computer account for ABC-2012DC-1 in the domain.
B. You should upgrade ABC-2008DC-1 to Windows Server 2012.
C. You should back up the System State of ABC-2008DC-1.
D. You should install the Active Directory Lightweight Directory Services role on ABC-2008DC-1.


Answer Clike
Which two of the following tools could you use to promote the server to a domain controller?

Your role of Network Administrator at ABC.com includes the management of the Active Directory Domain Services (AD DS) domain named ABC.com. The network includes servers that run Windows Server 2008 R2 Service Pack 1 (SP1) and Windows Server 2012. You are in the process of installing a new Windows Server 2012 domain controller. You install Windows Server 2012 on a server and join it to the domain. You then install the Active Directory Domain Services role on the server.
You now need to configure the server as a domain controller in the ABC.com domain. Which two of the following tools could you use to promote the server to a domain controller? (Choose two)
A. Server Manager
B. DCPromo.exe
C. PowerShell
D. Active Directory Users and Computers
E. Active Directory Federation Services


Answer Clike
Which of the following configurations can be performed during the Active Directory Installation Wizard?

Your role of Network Administrator at ABC.com includes the management of the Active Directory Domain Services (AD DS) domain named ABC.com. The network includes servers that run Windows Server 2008 R2 Service Pack 1 (SP1) and Windows Server 2012. You are in the process of installing a new Windows Server 2012 domain controller.
You install Windows Server 2012 on a server and join it to the domain.
You then install the Active Directory Domain Services role on the server and run the Active Directory Installation Wizard.
Which of the following configurations can be performed during the Active Directory Installation Wizard? (Choose all that apply).
A. Configure the server as a Read Only Domain Controller (RODC)
B. Install the DNS Server role.
C. Install the Active Directory Lightweight Domain Services (AD LDS) role.
D. Configure the server as a Global Catalog server.
E. Configure the Directory Services Restore Mode (DSRM) password.
F. Transfer a FSMO (Flexible Single Master Operation) role.


Answer Clike
Which of the existing domain controllers must be online in order to create the planned additional domain controller?

Your role of Network Administrator at ABC.com includes the management of the Active Directory forest. The network includes servers that run Windows Server 2008 R2 and Windows Server 2012.
The forest contains three domains: a root domain named ABC.com, a child domain named US.ABC.com and another child domain named Research.US.ABC.com. The ABC.com root domain contains two Windows Server 2012 domain controllers named ABCMicrosoft 70-417 Exam DC1 and ABC-DC2. ABC-DC1 contains the forest FSMO roles. ABC-DC2 contains the domain FSMO roles for the ABC.com domain.
The US.ABC.com domain contains two Windows Server 2008 R2 domain controllers named USABC- DC1 and US-ABC-DC2. US-ABC-DC1 contains the domain FSMO roles for the US.ABC.com domain. US-ABC-DC2 is configured as a Global Catalog Server. The Research.US.ABC.com domain contains two Windows Server 2012 domain controllers named Res-US-ABC-DC1 and Res-US-ABC-DC2. Res-US-ABC-DC1 contains the domain FSMO roles for the Res.US.ABC.com domain. Res-US-ABC-DC2 is configured as a Global Catalog Server.
All domain controllers in the forest are configured as DNS Servers. You plan to install a Windows Server 2008 R2 domain controller in the Research.US.ABC.com domain.
Which of the existing domain controllers must be online in order to create the planned additional domain controller?
A. ABC-DC1
B. US-ABC-DC1
C. US-ABC-DC1 and US-ABC-DC2
D. Res-US-ABC-DC1
E. Res-US-ABC-DC1 and Res-US-ABC-DC2
F. US-ABC-DC1 and Res-US-ABC-DC1


Answer Clike
What should you do?

You work for a company named ABC.com. Your role of Network Administrator includes the management of the company’s physical and virtual infrastructure. The network includes servers running Windows Server 2008 R2 Service Pack 1 (SP1) and Windows Server 2012.
Virtual machines (VMs) are hosted on Windows Server 2012 servers running the Hyper-V role. One Windows Server 2012 Hyper-V host server is named ABC-HVHost10. ABC-HVHost10 has four quad-core processors, 48GB RAM and six physical network adapters configured as three network adapter teams. ABC-HVHost10 also has two Host Bus Adapters (HBAs) and connects to a Fiber Channel SAN.
You plan to configure a VM named ABC-Data1. Large amounts of data will be transferred to and from ABC-Data1 over the network.
You need to maximize the network performance of ABC-Data1 by assigning a physical network adapter directly to the VM.
What should you do?
A. You should configure Virtual Machine Chimney.
B. You should configure NUMA topology.
C. You should configure Single-root I/O virtualization.
D. You should configure Multipath I/O.
E. You should configure Resource metering.
F. You should configure Virtual Fiber Channel.


Answer Clike
How can you ensure that users can recover files using the Previous Versions function?

Your role of Network Administrator at ABC.com includes the management of the Active Directory Domain Services (AD DS) domain named ABC.com. The network includes servers that run Windows Server 2008 R2 Service Pack 1 (SP1) and Windows Server 2012. A server named ABC-File1 runs the File and Storage Services server role. ABC-File1 hosts shared folders on the D: drive. Users access the shared folders from their Windows 7 client computers.
A user attempts to recover a previous version of a file in a shared folder on ABC-File1 but discovers that there is no previous versions option. How can you ensure that users can recover files using the Previous Versions function?
A. By modifying the Share Properties of each shared folder.
B. By enabling Shadow Copies on the D: drive of ABC-File1.
C. By adding a condition to the shared folders on ABC-File1.
D. By modifying the settings of the Recycle Binon ABC-File1.


Answer Clike
How should you configure ABC-HVHost12?

You work for a company named ABC.com. Your role of Network Administrator includes the management of the company’s physical and virtual infrastructure. The network includes servers running Windows Server 2008 R2 Service Pack 1 (SP1) and Windows Server 2012.
Virtual machines (VMs) are hosted on Windows Server 2012 servers running the Hyper-V role. You install a new Windows Server 2012 Hyper-V host server named ABC-HVHost12. ABCHVHost12 has four Fiber Channel host bus adapters (HBAs) and connects to two Fiber Channel SANs using two HBAs per SAN.
You plan to create VMs on ABC-HVHost12 that will need to access one of the SANs.
How should you configure ABC-HVHost12?
A. By creating a Virtual Switch in Hyper-V.
B. By installing an additional host bus adapter (HBA).
C. By creating a virtual Fiber Channel SAN in Hyper-V.
D. By creating a virtual iSCSI SAN in Hyper-V.


Answer Clike
Which of the following steps should you perform first?

You work for a company named ABC.com. Your role of Network Administrator includes the management of the company’s physical and virtual infrastructure. The network includes servers running Windows Server 2008 R2 Service Pack 1 (SP1) and Windows Server 2012.
Virtual machines (VMs) are hosted on Windows Server 2012 servers running the Hyper-V role. You install a new Windows Server 2012 Hyper-V host server named ABC-HVHost13. ABC-HVHost13 has eight physical network adapters configured as four network adapter teams. You plan to create five external Hyper-V virtual switches on ABC-HVHost13.
Which of the following steps should you perform first? (Choose two possible answers).
A. You should run the Remove-NetLbfoTeam PowerShell cmdlet.
B. You should run the Add-NetLbfoTeam PowerShell cmdlet.
C. You should run the Remove- NetLbfoTeamMemberPowerShell cmdlet.
D. You should run the Add-NetLbfoTeamNic PowerShell cmdlet.
E. You should run the Add-NetLbfoTeamMember PowerShell cmdlet.


Answer Clike
Which of the servers can be upgraded directly to Windows Server 2012 without the need to purchase new hardware or install additional service packs?

You work as a Network Administrator at ABC.com. The network contains a single Active Directory Domain Services (AD DS) domain named ABC.com. The network includes servers running various versions of Windows Server 2008. You plan to upgrade all servers in the network to Windows Server 2012. Some servers run the 32-bit version of Windows Server 2008 Service Pack 2 (SP2) on hardware with x86 CPUs.
Some servers run the 64-bit version of Windows Server 2008 Service Pack 2 (SP2) on hardware with x64 CPUs.
Some servers run Windows Server 2008 R2 on hardware with x64 CPUs. Some servers run Windows Server 2008 R2 Service Pack 1 (SP1) on hardware with x64 CPUs.
Which of the servers can be upgraded directly to Windows Server 2012 without the need to purchase new hardware or install additional service packs? (Choose all that apply)
A. The servers running the 32-bit version of Windows Server 2008 Service Pack 2 (SP2) on hardware with x86 CPUs.
B. The servers running the 64-bit version of Windows Server 2008 Service Pack 2 (SP2) on hardware with x64 CPUs.
C. The servers running Windows Server 2008R2 on hardware with x64 CPUs.
D. The servers running Windows Server 2008 R2 SP1 on hardware with x64 CPUs.


Answer Clike
How can you achieve this goal in the minimum amount of time?

You work as a Network Administrator at ABC.com. The network contains a single Active Directory Domain Services (AD DS) domain named ABC.com. You install a new Windows Server 2012 server named ABC-SRV08. During the installation, you select the Server Core Installation option. You then join the server to the domain and configure several server roles.
You later decide that you want to change the installation of Windows Server 2012 on ABC-SRV08 to include the full graphical user interface (GUI). ABC- SRV08 will continue to perform it’s current roles.
How can you achieve this goal in the minimum amount of time?
A. Byreinstalling Windows Server 2012 and reconfiguring the server roles.
B. By running the Receive-SmigServerData PowerShell cmdlet.
C. By running the Install-WindowsFeature PowerShell cmdlet.
D. By running the Set-WindowsEdition cmdlet in DISM (Deployment Image Servicing and Management).


Answer Clike
What Windows PowerShell cmdlet should you run?

HOTSPOT
Your network contains an Active Directory domain named contoso.com. The domain contains two DHCP servers named Server1 and Server2. Both servers have multiple IPv4 scopes.
Server1 and Server2 are used to assign IP addresses for the network IDs of 172.20.0.0/16 and 131.107.0.0/16.
You install the IP Address Management (IPAM) Server feature on a server named IPAM1 and configure IPAM1 to manage Server1 and Server2.
Some users from the 172.20.0.0 network report that they occasionally receive an IP address conflict error message.
You need to identify whether any scopes in the 172.20.0.0 network ID conflict with one another.
What Windows PowerShell cmdlet should you run?
To answer, select the appropriate options in the answer area.
Hot Area:



Answer Clike
Which command or commands should you use?

You work as a Network Administrator at ABC.com. The network contains a single Active Directory Domain Services (AD DS) domain named ABC.com.
The network includes servers that run Windows Server 2008 R2 Service Pack 1 (SP1) and Windows Server 2012. All servers in the network have Windows Remote Management (WinRM) enabled. You use a Windows 7 Enterprise client computer named ABC-Admin1. You are currently logged in to ABC-Admin1. From your client computer, you want to obtain the IP address of a Windows Server 2012 member server named ABC-File1.
Which command or commands should you use?
A. Telnet ABC-File1 ipconfig.
B. NSLookup > Server ABC-File1 > ipconfig
C. WinRM -r:ABC-File1 ipconfig
D. WinRS -r:ABC-File1 ipconfig


Answer Clike
How should you configure ABC-SRV06?

Your role of Network Administrator at ABC.com includes the management of the Active Directory Domain Services (AD DS) domain named ABC.com. The network includes servers that run Windows Server 2008 R2 Service Pack 1 (SP1) and Windows Server 2012. A server named ABC-Win12Admin runs Windows Server 2012. You use ABC-Win12Admin to administer the Windows Server 2012 servers in the domain. A newly installed domain member server named ABC-SRV06 runs a Server Core Installation of Windows Server 2012.
You need to configure ABC-SRV06 to enable you to use the Server Manager console on ABCWin12Admin to manage ABC-Win12Admin.
How should you configure ABC-SRV06?
A. You should install the Remote Server Administration Tools on ABC-SRV06.
B. You should install the Server Manager console on ABC-SRV06.
C. You should enable Windows Remote Management (WinRM) on ABC-SRV06.
D. You should use the Enable-NetFirewallRule cmdlet to configure the firewall on ABC-SRV06.


Answer Clike
What should you do next to ensure that you can manage ABC-SRV12 from ABC-Admin1?

Your role of Network Administrator at ABC.com includes the management of the Active Directory Domain Services (AD DS) domain named ABC.com.
The network includes servers that run Windows Server 2008 R2 Service Pack 1 (SP1) and Windows Server 2012. You use a Windows Server 2008 R2 (SP1) domain member server named ABC-Admin1 to manage other servers in the network.
You install a new Windows Server 2008 R2 (SP1) server named ABC-SRV12. You join ABCSRV12 to the ABC.com domain as a member server and install the necessary software on ABCSRV12 to ensure that you can manage the server from other computers. You configure the Windows PowerShell Script Execution Policy on ABC-SRV12 to Unrestricted.
What should you do next to ensure that you can manage ABC-SRV12 from ABC-Admin1?
A. You should run the Enable-PSRemoting PowerShellcmdlet.
B. You should run the Configure-SMRemoting.ps1 script.
C. You should run the Convert-Path PowerShell cmdlet.
D. You should run the Connect-PSSession PowerShell cmdlet.


Answer Clike
What should you do?

Your role of Network Administrator at ABC.com includes the management of the Active Directory Domain Services (AD DS) domain named ABC.com. The network includes servers that run Windows Server 2008 R2 Service Pack 1 (SP1) and Windows Server 2012. A server named ABC-Win12Admin runs Windows Server 2012. You use ABC-Win12Admin to administer the Windows Server 2012 servers in the domain. You want to use Server Manager on ABC-Win12Admin to manage the Window Server 2008 R2 SP1 servers in the domain.
What should you do?
A. Run the Configure-SMRemoting.exe -Enable cmdlet on the Windows Server 2008 R2 SP1 servers.
B. Add the computer account for ABC-Win12Admin to the RAS and IAS Servers group in Active Directory.
C. Install the Microsoft .NET Framework 4.0 and Windows Management Framework 3.0 on the Windows Server2008 R2 SP1 servers.
D. Install the Remote Server Administration Tools on ABC-Win12Admin.


Answer Clike
Which cmdlet should you run?

Your network contains an Active Directory domain named contoso.com. The domain contains an IP Address Management (IPAM) server that uses a Windows Internal Database.
You install a Microsoft SQL Server 2012 instance on a new server.
You need to migrate the IPAM database to the SQL Server instance.
Which cmdlet should you run?
A. Disable-IpamCapability
B. Update-IpamServer
C. Move-IpamDatabase
D. Set-IpamConfiguration


Answer Clike
What should you identify?

Your network contains a perimeter network and an internal network. The internal network contains an Active Directory Federation Services (AD FS) infrastructure. The infrastructure uses Active Directory as the attribute store. All servers run Windows Server 2012 R2.
You plan to deploy a Web Application Proxy to a server named Server2 in the perimeter network. You need to identify which value must be included in the certificate that is deployed to Server2.
What should you identify?
A. The name of the Federation Service
B. The name of the Active Directory domain
C. The FQDN of the AD FS server
D. The public IP address of Server2


Answer Clike
Which cmdlet should you run?

You have a server named Server1 that runs Windows Server 2012 R2.
A Microsoft Azure Backup of Server1 is created automatically every day.
You need to view the items that are included in the backup.
Which cmdlet should you run?
A. Get-WBSummary
B. Get-OBPolicy
C. Get-OBJob
D. Get-WBJob


Answer Clike
What should you do?

You have a server named Server1.
A Microsoft Azure Backup of Server1 is created automatically every day.
You rename Server1 to Server2.
You discover that backups are no longer created in Azure.
You need to back up the server to Azure.
What should you do?
A. From the Azure Management Portal, modify the configuration of the backup vault.
B. On Server2, run the Start-OBRegistration cmdlet.
C. On Server2, run the Add-WBBackupTarget cmdlet.
D. From the Azure Management Portal, upload the Server2 certificate as a management certificate.


Answer Clike
Which Group Policy option should you configure?

HOTSPOT
Your network contains an Active Directory domain named adatum.com. The domain contains a server named Server1. Your company implements DirectAccess.
A user named User1 works at a customer’s office. The customer’s office contains a server named Server1. When User1 attempts to connect to Server1, User1 connects to Server1 in adatum.com.
You need to provide User1 with the ability to connect to Server1 in the customer’s office.
Which Group Policy option should you configure?
To answer, select the appropriate option in the answer area.
Hot Area:



Answer Clike
What should you do?

Your network contains one Active Directory domain named contoso.com. You pilot DirectAccess on the network.
During the pilot deployment, you enable DirectAccess only for a group named ContosoTest Computers.
Once the pilot is complete, you need to enable DirectAccess for all of the client computers in the domain.
What should you do?
A. From Active Directory Users and Computers, modify the membership of the Windows Authorization Access Group.
B. From Windows PowerShell, run the Add-DAClient cmdlet.
C. From Windows PowerShell, run the Set-DAServer cmdlet.
D. From the Remote Access Management Console, run the Remote Access Server Setup wizard.


Answer Clike
What cmdlet should you use?

Your network contains one Active Directory domain named contoso.com. The domain contains 10 domain controllers and a read-only domain controller (RODC) named RODC01.
You need to ensure that when administrators create users in contoso.com, the default user principal name (UPN) suffix is litwareinc.com.
What cmdlet should you use?
A. the ntdsutil command
B. theSet-ADDomain cmdlet
C. the Install-ADDSDomain cmdlet
D. the dsadd command
E. the dsamain command
F. the dsmgmt command
G. the net user command
H. theSet-ADForest cmdlet


Answer Clike
What command should you use to create the media?

Your network contains one Active Directory domain named contoso.com. The domain contains 10 domain controllers and a read-only domain controller (RODC) named RODC01.
You need to add an RODC to the domain by using the Install From Media (IFM) option.
What command should you use to create the media?
A. the ntdsutil command
B. theSet-ADDomain cmdlet
C. the Install-ADDSDomain cmdlet
D. the dsadd command
E. the dsamain command
F. the dsmgmt command
G. the net user command
H. theSet-ADForest cmdlet


Answer Clike
What should you identify?

You have a server named Server1 that runs Windows Server 2012 R2.
You discover that the performance of Server1 is poor.

The results of a performance report generated on Server1 are shown in the following table.
What should you identify?
A. NUMA fragmentation
B. insufficient RAM
C. excessive paging
D. driver malfunction


Answer Clike
Which two settings should you configure in GPO1?

HOTSPOT
Your network contains an active Directory domain named contoso.com. All client computers are configured as DHCP clients.
You link a Group Policy object (GPO) named GPO1 to an organization unit (OU) that contains all of the client computer accounts.
You need to ensure that Network Access Protection (NAP) compliance is evaluated on all of the client computers.
Which two settings should you configure in GPO1?
To answer, select the appropriate two settings in the answer area.
Hot Area:



Answer Clike
Which three GPOs should you identify in sequence?

DRAG DROP
Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2.
The domain contains an organizational unit (OU) named OU1. OU1 contains an OU named OU2. OU2 contains a user named User1.
User1 is the member of a group named Group1. Group1 is in the Users container.
You create five Group Policy objects (GPO). The GPOs are configured as shown in the following table.

The Authenticated Users group is assigned the default permissions to all of the GPOs. There are no site-level GPOs.
You need to identify which three GPOs will be applied to User1 and in which order the GPOs will be applied to User1. Which three GPOs should you identify in sequence?
To answer, move the appropriate three GPOs from the list of GPOs to the answer area and arrange them in the correct order.
Select and Place:



Answer Clike
Which Windows PowerShell cmdlet should you run?

Your network contains one Active Directory Domain Services domain named contoso.com. The forest functional level is Windows Server 2012. All servers run Windows Server 2012 R2. All client computers run Windows 8.1.
The domain contains 10 domain controllers and a read-only domain controller (RODC) named RODC01. All domain controllers and RODCs are hosted on a Hyper-V host that runs Windows Server 2012 R2.
You need to identify which user accounts were authenticated by RODC01. Which Windows PowerShell cmdlet should you run?
A. Get-AdGroupMember
B. Get-ADDomainControllerPasswordReplicationPolicy
C. Get-ADDomainControllerPasswordReplicationPolicyUsage
D. Get-ADDomain
E. Get-ADOptionalFeature
F. Get-ADAccountAuthorizationGroup
G. Get-ADAuthenticationPolicySilo
H. Get-ADAuthenticationPolicy


Answer Clike
Which cmdlet should you use?

Your network contains one Active Directory domain named contoso.com. The forest functional level is Windows Server 2012. All servers run Windows Server 2012 R2. All client computers run Windows 8.1.
The domain contains 10 domain controllers and a read-only domain controller (RODC) named RODC01. All domain controllers and RODCs are hosted on a Hyper-V host that runs Windows Server 2012 R2.
You need to identify which domain controller must be online when cloning a domain controller. Which cmdlet should you use?
A. Get-AdGroupMember
B. Get-ADDomainControllerPasswordReplicationPolicy
C. Get-ADDomainControllerPasswordReplicationPolicyUsage
D. Get-ADDomain
E. Get-ADOptionalFeature
F. Get-ADAccountAuthorizationGroup
G. Get-ADAuthenticationPolicySilo
H. Get-ADAuthenticationPolicy


Answer Clike
Which cmdlet should you use?

Your network contains one Active Directory domain named contoso.com. The forest functional level is Windows Server 2012. All servers run Windows Server 2012 R2. All client computers run Windows 8.1.
The domain contains 10 domain controllers and a read-only domain controller (RODC) named RODC01. All domain controllers and RODCs are hosted on a Hyper-V host that runs Windows Server 2012 R2.
You need to identify whether deleted objects can be removed from the Active Directory Recycle Bin. Which cmdlet should you use?
A. Get-AdGroupMember
B. Get-ADDomainControllerPasswordReplicationPolicy
C. Get-ADDomainControllerPasswordReplicationPolicyUsage
D. Get-ADDomain
E. Get-ADOptionalFeature
F. Get-ADAccountAuthorizationGroup
G. Get-ADAuthenticationPolicySilo
H. Get-ADAuthenticationPolicy


Answer Clike
Which tool should you use?

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server 1. Server1 runs Windows Server 2012 R2.
You need to create a 3-TB virtual hard disk (VHD) on Server1.
Which tool should you use?
A. Computer Management
B. File Server Resource Manager (FSRM)
C. New-StorageSubsytemVirtualDisk
D. Server Manager


Answer Clike
What should you do?

You have a server named Server1 that has a Server Core installation of Windows Server 2008 R2 Service Pack 1.
Server1 has the DHCP Server server role and the File Server server role installed.
You need to upgrade Server1 to Windows Server 2012 R2 with the graphical user interface (GUI). The solution must meet the following requirements:
Preserve the server roles and their configurations.
Minimize administrative effort.
What should you do?
A. Start Server1 from the Windows Server 2012 R2 installation media and select Server Core Installation. When the installation is complete, add the Server Graphical Shell feature.
B. On Server1, runsetup.exefrom the Windows Server 2012 R2 installation media and select Server Core Installation. When the installation is complete, add the Server Graphical Shell feature.
C. On Server1, runsetup.exefrom the Windows Server 2012 R2 installation media and select Server with a GUI.
D. Start Server1 from the Windows Server 2012 R2 installation media and select Server with a GUI.


Answer Clike
What should you use?

Your network contains one Active Directory domain named contoso.com. The domain contains 10 domain controllers and a read-only domain controller (RODC) named RODC01.
You plan to replace a domain controller named DC1. DC1 has the schema operations master role.
You need to transfer the schema master role to another domain controller named DC10 before you remove Active Directory from DC1.
What should you use?
A. the ntdsutil command
B. theSet-ADDomainWindows PowerShell cmdlet
C. the Install-ADDSDomain Windows PowerShell cmdlet
D. the dsadd command
E. the dsamain command
F. the dsmgmt command
G. the net user command
H. theSet-ADForestWindows PowerShell cmdlet


Answer Clike
What should you do?

Your network contains one Active Directory domain named contoso.com.
You deploy a new virtual machine in Microsoft Azure, and then you run the Active Directory Domain Configuration Wizard as shown in the exhibit. (Click the Exhibit button.)

You need to ensure that all of the users in contoso.com are replicated to the new domain controller in Azure.
What should you do?
A. Set up directory integration.
B. Select theDomain Name System (DNS) servercheck box.
C. Modify the Deployment Configuration option.
D. Configure Azure Active Directory Connect.


Answer Clike
Which two tasks should you perform?

Your network contains one Active Directory domain named contoso.com. The domain contains 10 domain controllers that run Windows Server 2012 R2. Eight domain controllers are writable domain controllers.
You need to deploy several read-only domain controllers (RODCs) in contoso.com by using pre-staged computer accounts.
Which two tasks should you perform? Each correct answer presents part of the solution.
A. Join the servers to contoso.com.
B. Run theInstall-AddsDomainControllercmdlet.
C. Run theAdd-AddsReadOnlyDomainControllerAccountcmdlet.
D. Create an authentication policy silo.
E. Create an authentication policy.
F. Run theadprep /rodcprepcommand.


Answer Clike
What should you instruct User1 to do?

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed.
On Server1, an administrator creates a virtual machine named VM1.
A user named User1 is the member of the local Administrators group on Server1.
User1 attempts to modify the settings of VM1 as shown in the following exhibit. (Click the Exhibit button.) You need to ensure that User1 can modify the settings of VM1 by running the Set- Vmcmdlet.
What should you instruct User1 to do?
Exhibit:

A. Run Windows PowerShell with elevated privileges
B. Install the Integration Services on VM1
C. Modify the membership of the local Hyper-V Administrators group
D. Import the Hyper-V module.


Answer Clike
Which two actions should you perform?

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2.
You install the DHCP Server server role on Server1 and Server2. You install the IP Address Management (IPAM) Server feature on Server1.
You notice that you cannot discover Server1 or Server2 in IPAM. You need to ensure that you can use IPAM to discover the DHCP infrastructure. Which two actions should you perform? (Each correct answer presents part of the solution. (Choose two.)
A. On Server2, create an IPv4 scope
B. On Server1, run the Add-IpamServerInventory cmdlet
C. On Server2, run the Add-DhcpServerInDc cmdlet
D. On both Server1 and Server2, run the Add-DhcpServerv4Policy cmdlet
E. On Server1, uninstall the DHCP Server server role.


Answer Clike
What should you do on Server1?

Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 and Server2 are configured as shown in the following table.

You need to ensure that when new targets are added to Server1, the targets are registered on Server2 automatically.
What should you do on Server1?
A. Configure the Discovery settings of the iSCSI initiator
B. Configure the security settings of the iSCSI target
C. Run the Set-Wmilnstance cmdlet
D. Run the Set-IscsiServerTarget cmdlet


Answer Clike
What should you do first?

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed.
You have a virtual machine named VM1. VM1 has a checkpoint.You need to modify the Checkpoint File Location of VM1.
What should you do first?
A. Copy the checkpoint file
B. Delete the checkpoint
C. Shut down VM1
D. Pause VM1


Answer Clike
Which actions should you perform on the servers?

DRAG DROP
You have a print server named Server1. Server1 runs Windows Server 2008 R2 Service pack 1 (SP1). You have a file server named Server2. Server 2 runs Window Server 2012 R2.
You need to migrate all of the printers on Server1 to Server2. Which actions should you perform on the servers?
To answer, drag the appropriate action to the correct servers in the answer area. Each action may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
Select and Place:



Answer Clike
What should you do?

You have a server named Server1 that runs Windows Server 2012 R2.
Server1 has three physical network adapters named NIC1, NIC2, and NIC3.
On Server1, you create a NIC team named Team1 by using NIC1 and NIC2. You configure Team1 to accept network traffic on VLAN 10.
You need to ensure that Server1 can accept network traffic on VLAN 10 and VLAN 11. The solution must ensure that the network traffic can be received on both VLANs if a network adapter fails.
What should you do?
A. Run theSet-NetLbfoTeamWindows PowerShell cmdlet.
B. Run theAdd-NetLbfoTeamMemberWindows PowerShell cmdlet.
C. Run theAdd-NetLbfoTeamNicWindows PowerShell cmdlet.
D. From Server Manager, add NIC3 to TEAM1.


Answer Clike
Which connection properties should you view?

HOTSPOT
Your network contains an Active Directory domain named fabrikam.com. You implement DirectAccess and an IKEv2 VPN. You need to view the properties of the VPN connection. Which connection properties should you view? To answer, select the appropriate connection properties in the answer area.
Hot Area:



Answer Clike
Which store should you import the certificate?

HOTSPOT
You have a server named Server1 that has the Web Server (IIS) server role installed. You obtain a Web Server certificate.
You need to configure a website on Server1 to use Secure Sockets Layer (SSL). To which store should you import the certificate?
To answer, select the appropriate store in the answer area.
Hot Area:



Answer Clike
What should you identify?

DRAG DROP
You have a file server named Server1 that runs Windows Server 2012 R2. The folders on Server1 are configured as shown in the following table.

A new corporate policy states that backups must use Microsoft Online Backup whenever possible. You need to identify which technology you must use to back up Server1. The solution must use Microsoft Online Backup whenever possible.
What should you identify? To answer, drag the appropriate backup type to the correct location or locations. Each backup type may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
Select and Place:



Answer Clike
What should you do first?

You have a server named Server1 that runs Windows Server 2012 R2.
Server1 has the Hyper-V server role installed. On Server1, you create a virtual machine named VM1. VM1 has a legacy network adapter. You need to assign a specific amount of available network bandwidth to VM1.
What should you do first?
A. Add a second legacy network adapter, and then run the Set-VMNetworkAdaptercmdlet
B. Add a second legacy network adapter, and then configure network adapter teaming.
C. Remove the legacy network adapter, and then run the Set-VMNetworkAdaptercmdlet.
D. Remove the legacy network adapter, and then add a network adapter.


Answer Clike
Which tool should you use?

You have a file server named Server1 that runs a Server Core Installation of Windows Server 2012 R2. You need to ensure that users can access previous versions of files that are shared on Server1 by using the Previous Versions tab. Which tool should you use?
A. wbadmin
B. Diskpart
C. Storrept
D. Vssadmin


Answer Clike
Which tool should you use?

Your network contains an Active Directory domain named contoso.com. Domain controllers run either Windows Server 2008, Windows Server 2008 R2, or Windows Server 2012 R2. You have a Password Settings object (PSOs) named PSO1. You need to view the settings of PSO1. Which tool should you use?
A. Get-ADDomainControllerPasswordReplicationPolicy
B. Get-ADDefaultDomainPasswordPolicy
C. Server Manager
D. Get-ADFineGrainedPasswordPolicy


Answer Clike
Where the system events from all of the servers in the domain will be collected.

HOTSPOT
Your network contains an Active Directory domain named corp.contoso.com. The domain contains two member servers named Server1 and Edge1. Both servers run Windows Server 2012 R2. Your company wants to implement a central location where the system events from all of the servers in the domain will be collected.
From Server1, a network technician creates a collector-initiated subscription for Edge1. You discover that
Server1 does not contain any events from Edge1. You view the runtime status of the subscription as shown in the exhibit. (Click the Exhibit button.) Exhibit:

Hot Area:



Answer Clike
Which two should you configure in DCS1?

You have a server named Server1 that runs Windows Server 2012 R2. You create a custom Data Collector Set (DCS) named DCS1. You need to configure DCS1 to meet the following requirements:
Automatically run a program when the amount of total free disk space on Server1 drops below 10 percent of capacity.
Log the current values of several registry settings.
Which two should you configure in DCS1? (Each correct answer presents part of the solution. Choose two.)
A. System configuration information
B. A Performance Counter Alert
C. Event trace data
D. A performance counter


Answer Clike
Which group should you add User1?

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 has the IP Address Management (IPAM) Server feature installed. Server2 has the DHCP Server server role installed. A user named User1 is a member of the IPAM Users group on Server1. You need to ensure that User1 can use IPAM to modify the DHCP scopes on Server2. The solution must minimize the number of permissions assigned to User1.
To which group should you add User1?
A. IPAM ASM Administrators on Server1
B. IPAMUG in Active Directory
C. DHCP Administrators on Server2
D. IPAM MSM Administrators on Server1


Answer Clike
What should you do first?

You have a server named Server1 that runs Windows Server 2012 R2. You download and install the Microsoft Online Backup Service Agent on Server1.
You need to ensure that you can configure an online backup from Windows Server Backup.
What should you do first?
A. From a command prompt, run wbadmin.exe enable backup.
B. From Windows Server Backup, run the Register Server Wizard.
C. From the Services console, modify the Log On settings of the Microsoft Online Backup Service Agent.
D. From Computer Management, add the Server1 computer account to the Backup Operators group.


Answer Clike
How should you configure service1?

Your network contains an active directory domain named Contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2.
You create a group Managed Service Account named gservice1.
You need to configure a service named service1 to run as the gservice1 account.
How should you configure service1?
A. From Services Console configure the recovery settings
B. From a command prompt ,run sc.exe and specify the config parameter
C. From Windows PowerShell,run Set-Service and specify the -PassThrough parameter
D. From a command prompt ,run sc.exe and specify the sdset parameter


Answer Clike
How many reservations should you identify?

You have a server named Served that runs Windows Server 2012 R2. Server1 has five network adapters.
Three of the network adapters are connected to a network named LAN1. The two other network adapters are connected to a network named LAN2. You create a network adapter team named Team1 from two of the adapters connected to LAN1. You create a network adapter team named Team2 from the two adapters connected to LAN2. A company policy states that all server IP addresses must be assigned by using a reserved address in DHCP. You need to identify how many DHCP reservations you must create for Server1.
How many reservations should you identify?
A. 2
B. 3
C. 5
D. 7


Answer Clike
Which two actions should you perform?

You have a server named Server1. Server1 runs Windows Server 2012 R2.
Server1 has a thin provisioned disk named Disk1.
You need to expand Disk1.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. From File and Storage Services, extend Disk1.
B. From Disk Management, delete the volume, create a new volume, and then format the volume.
C. From File and Storage Services, add a physical disk to the storage pool.
D. From File and Storage Services, detach Disk1.
E. From Disk Management, extend the volume.


Answer Clike
What should you do first?

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2008 R2. One of the domain controllers is named DC1.
The network contains a member server named Server1 that runs Windows Server 8.
You need to promote Server1 to a domain controller by using install from media (IFM).
What should you do first?
A. Run the Active Directory Domain Services Installation Wizard on DC1.
B. Upgrade DC1 to Windows Server 2012 R2.
C. Run the Active Directory Domain Services Configuration Wizard on Server1.
D. Create a system state backup of DC1.
E. Create IFM media on DC1.


Answer Clike
What should you configure?

You have a server named Server1 that runs Windows Server 2012 R2. On Server1, you configure a custom Data Collector Set (DCS) named DCS1. You need to ensure that all performance log data that is older than 30 days is deleted automatically.
What should you configure?
A. A File Server Resource Manager (FSRM) file screen on the %Systemdrive%PerfLogs folder
B. The Data Manager settings of DCS1
C. A schedule for DCS1
D. A File Server Resource Manager (FSRM) quota on the %Systemdrive%PerfLogs folder


Answer Clike
What should you do?

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2.
On all of the domain controllers, Windows is installed in C:Windows and the Active Directory database is located in D:WindowsNTDS.
All of the domain controllers have a third-party application installed.
The operating system fails to recognize that the application is compatible with domain controller cloning.
You verify with the application vendor that the application supports domain controller cloning.
You need to prepare a domain controller for cloning.
What should you do?
A. In C:WindowsSystem32SysprepActionfiles, add the Application information to an XML file namedRespecialize.xml.
B. In D:WindowsNTDS, create an XML file named DCCloneConfig.xml and addthe Application information tothe file.
C. In D:WindowsNTDS, create an XML file named CustomDCCloneAllowList.xml and add the Applicationinformation to the file.
D. In C:Windows, create an XML file named DCCloneConfig.xml and add the Application information to the file.


Answer Clike
What should you do first?

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2. Server1 runs Windows Server 2012 R2. Server2 runs Windows Server 2008 R2 Service Pack 1 (SP1) and has the DHCP Server server role installed. You need to manage DHCP on Server2 by using the DHCP console on Server1.
What should you do first?
A. From a command prompt on Server2/ run winrm.exe.
B. From Internet Explorer on Server2, download and install Windows Management Framework3.0.
C. From Server Manager on Server2, enable Windows Remote Management.
D. From Windows PowerShell on Server1, run Install-WindowsFeature.


Answer Clike
Which tool should you use?

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2.
You need to create 3-TB virtual hard disk (VHD) on Server1.
Which tool should you use?
A. Share and Storage Management
B. Server Manager
C. New-VirtualDisk
D. Computer Management


Answer Clike
Which cmdlet should you run first?

You have a file server named Server1 that runs Windows Server 2012 R2. Server1 has following hardware configurations: 16 GB of RAM
A single quad-core CPU
Three network teams that have two network adapters each
You add additional CPUs and RAM to Server1. You repurpose Server1 as a virtualization host. You install the Hyper-V server role on Server1. You need to create four external virtual switches in Hyper-V.
Which cmdlet should you run first?
A. Add-NetLbfoTeamNic
B. Set-NetAdapter
C. Remove- NetLbfoTeam
D. Add-VMNetworkAdapter


Answer Clike
Which tool should you use?

You perform a Server Core Installation of Windows Server 2012 R2 on a server named Server1.
You need to add a graphical user interface (GUI) to Server1.
Which tool should you use?
A. The setup.exe command
B. The imagex.exe command
C. The Install-RoleServicecmdlet
D. The Add-WindowsFeaturecmdlet


Answer Clike
What should you do?

Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. All domain controllers run Windows Server 2012 R2. The domain contains two domain controllers. The domain controllers are configured as shown in the following table.

Active Directory Recycle Bin is enabled. You discover that a support technician accidentally removed 100 users from an Active Directory group named Group1 an hour ago. You need to restore the membership of Group1.
What should you do?
A. Export and import data by using Dsamain.
B. Apply a virtual machine snapshot to VM1.
C. Recover the items by using Active Directory Recycle Bin.
D. Modify the isRecycled attribute of Group1.


Answer Clike
What should you do first from Failover Cluster Manager?

Your network contains two servers named Server1 and Server2 that run Windows Server 2008 R2. Server1 and Server2 are nodes in a failover cluster named Cluster1. The network contains two servers named Server3 and Server4 that run Windows Server 2012 R2. Server3 and Server4 are nodes in a failover cluster named Cluster2.
You need to move all of the applications and the services from Cluster1 to Cluster2.
What should you do first from Failover Cluster Manager?
A. On a server in Cluster1, configure Cluster-Aware Updating.
B. On a server in Cluster2, configure Cluster-Aware Updating.
C. On a server in Cluster1, click Migrate Roles.
D. On a server in Cluster1, click Move Core Cluster Resources, and then click Select Node…


Answer Clike
Which tool should you use?

You perform a Server Core Installation of Windows Server 2012 R2 on a server named Server1.
You need to add a graphical user interface (GUI) to Server1.
Which tool should you use?
A. the dism.exe command
B. the ocsetup.exe command
C. the setup.exe command
D. the Install-Module cmdlet


Answer Clike
What should you do?

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2.
In a remote site, a support technician installs a server named DC10 that runs Windows Server 2012 R2. DC10 is currently a member of a workgroup.
You plan to promote DC10 to a read-only domain controller (RODC).
You need to ensure that a user named ContosoUser1 can promote DC10 to a RODC in the contoso.com domain.
The solution must minimize the number of permissions assigned to User1.
What should you do?
A. From Active Directory Administrative Center, modify the security settings of the Domain Controllers organizational unit (OU).
B. From Active Directory Users and Computers, pre-create an RODC computer account.
C. FromDsmgmt, run the local roles command.
D. Join DC10 to the domain. Modify the properties of the DC10 computer account.


Answer Clike
What should you do?

Your network contains an Active Directory domain named contoso.com. The domain contains a read-only domain controller (RODC) named RODC1.
You create a global group named RODC_Admins.
You need to provide the members of RODC_Admins with the ability to manage the hardware and the software on RODC1.
The solution must not provide RODC_Admins with the ability to manage Active Directory objects.
What should you do?
A. From a command prompt, run the dsadd computer command.
B. From Active Directory Users and Computers, run the Delegation of Control Wizard.
C. From Active Directory Users and Computers, configure the Member Of settings of the RODC1 account.
D. From a command prompt, run the dsmgmt local roles command.


Answer Clike
What should you do before you create the checkpoint?

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed.
On Server1, you create and start a virtual machine named VM1. VM1 is configured as shown in the following table.

You plan to create a snapshot of VM1.
You need to recommend a solution to minimize the amount of disk space used for the snapshot of VM1.
What should you do before you create the checkpoint?
A. Run the Stop-VM cmdlet.
B. Convert diskl.vhd to a dynamically expanding disk.
C. Configure VM1 to have a smaller virtual disk.
D. Decrease the Minimum RAM.


Answer Clike
What should you do?

Your network contains an Active Directory domain named adatum.com. The domain contains a member server named Server1 and a domain controller named DC2. All servers run Windows Server 2012 R2.
On DC2, you open Server Manager and you add Server1 as another server to manage.
From Server Manager on DC2, you right-click Server1 as shown in the exhibit. (Click the Exhibit button.)

You need to ensure that when you right-click Server1, you see the option to run the DHCP console.
What should you do?
A. On Server1, install the Feature Administration Tools.
B. On DC2 and Server1, run winrmquickconfig.
C. On DC2, install the Role Administration Tools.
D. In the domain, add DC1 to the DHCP Administrators group.


Answer Clike
Which tool should you use?

Your network contains an Active Directory forest named contoso.com. All servers run Windows Server 2012 R2. You need to create a custom Active Directory Application partition.
Which tool should you use?
A. Netdom
B. Ntdsutil
C. Dsmod
D. Dsamain


Answer Clike
Which tool should you use?

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2.
An organizational unit (OU) named OU1 contains 200 client computers that run Windows 8 Enterprise. A Group Policy object (GPO) named GPO1 is linked to OU1.
You make a change to GPO1.
You need to force all of the computers in OU1 to refresh their Group Policy settings immediately. The solution must minimize administrative effort. Which tool should you use?
A. The Set-AdComputercmdlet
B. Group Policy Object Editor
C. Active Directory Users and Computers
D. Group Policy Management Console (GPMC)


Answer Clike
What should you do?

Your network contains a single Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2.
The domain contains 400 desktop computers that run Windows 8 and 200 desktop computers that run Windows XP Service Pack 3 (SP3).
All new desktop computers that are added to the domain run Windows 8. All of the desktop computers are located in an organizational unit (OU) named OU1.
You create a Group Policy object (GPO) named GPO1. GPO1 contains startup script settings. You link GPO1to OU1. You need to ensure that GPO1 is Applied only to computers that run Windows XP SP3.
What should you do?
A. Modify the Security settings of OU1.
B. Run the Set-GPInheritancecmdlet and specify the -target parameter.
C. Create and link a WMI filter to GPO1.
D. Run the Set-GPLinkcmdlet and specify the -target parameter.


Answer Clike
What should you configure?

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. The domain contains two organizational units (OUs) named OU1 and OU2 in the root of the domain. Two Group Policy objects (GPOs) named GPO1 and GP02 are created.
GPO1 is linked to OU1.
GPO1 is linked to OU1. GPO2 is linked to OU2.
OU1 contains a client computer named Computer1.
OU2 contains a user named User1.
What should you configure?
A. The GPO Status
B. WMI Filtering
C. GPO links
D. Item-level targeting


Answer Clike
What should you do?

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2.
In a remote site, a support technician installs a server named DC10 that runs Windows Server 2012 R2. DC10 is currently a member of a workgroup.
You plan to promote DC10 to a read-only domain controller (RODC).
You need to ensure that a user named ContosoUser1 can promote DC10 to a RODC in the contoso.com domain.
The solution must minimize the number of permissions assigned to User1.
What should you do?
A. From Active Directory Administrative Center, pre-create an RODC computer account.
B. FromNtdsutil, run the local roles command.
C. FromDsmgmt, run the local roles command.
D. Join DC10 to the domain. Run dsmod and specify the /server switch.


Answer Clike
What should you identify?

You have a server named Server1 that runs Windows Server 2012 R2.
You discover that the performance of Server1 is poor.
The results of a performance report generated on Server1 are shown in the following table.

You need to identify the cause of the performance issue.
What should you identify?
A. Insufficient RAM
B. Driver malfunction
C. Excessive paging
D. NUMA fragmentation


Answer Clike
What should you do?

Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. All domain controllers run Windows Server 2012 R2.
The domain contains two domain controllers. The domain controllers are configured as shown in the following table.

Active Directory Recycle Bin is enabled.
You discover that a support technician accidentally removed 100 users from an Active Directory group named Group1 an hour ago. You need to restore the membership of Group1.
What should you do?
A. Perform an authoritative restore.
B. Perform a non-authoritative restore.
C. Recover the items by using Active Directory Recycle Bin.
D. Apply a virtual machine snapshot to VM1.


Answer Clike
Which domain controller should you identify?

Your network contains an Active Directory forest. The forest contains a single domain named contoso.com and corp.contoso.com. The forest contains four domain controllers.
The domain controllers are configured as shown in the following table.

All domain controllers are DNS servers.
In the corp.contoso.com domain, you plan to deploy a new domain controller named DC5.
You need to identify which domain controller must be online to ensure that DC5 can be promoted successfully to a domain controller.
Which domain controller identify which domain controller must be online to ensure that DC5 can be promoted successfully to a domain controller. Which domain controller should you identify?
A. DC1
B. DC2
C. DC3
D. DC4


Answer Clike
What should you do?

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 and a member server named Server1.
Server1 has the IP Address Management (IPAM) Server feature installed.
On DC1, you configure Windows Firewall to allow all of the necessary inbound ports for IPAM.
On Server1, you open Server Manager as shown in the exhibit. (Click the Exhibit button.)

You need to ensure that you can use IPAM on Server1 to manage DNS on DC1.
What should you do?
A. Add Server1 to the Remote Management Users group.
B. Modify the outbound firewall rules on Server1.
C. Add Server1 to the Event Log Readers group.
D. Modify the inbound firewall rules on Server1.


Answer Clike
Which tool should you use before you start the DFS Replication service on DC10?

Your company deploys a new Active Directory forest named contoso.com. The first domain controller in the forest runs Windows Server 2012 R2. The forest contains a domain controller named DC10.
On DC10, the disk that contains the SYSVOL folder fails.
You replace the failed disk. You stop the Distributed File System (DFS) Replication service.
You restore the SYSVOL folder. You need to perform a non-authoritative synchronization of SYSVOL on DC10.
Which tool should you use before you start the DFS Replication service on DC10?
A. Dfsgui.msc
B. Ultrasound
C. Ldp
D. Replmon


Answer Clike
What should you do?

Your network contains an Active Directory domain named contoso.com. The domain contains six domain controllers. The domain controllers are configured as shown in the following table.

The network contains a server named Server1 that has the Hyper-V server role installed. DC6 is a virtual machine that is hosted on Server1.
You need to ensure that you can clone DC6.
What should you do?
A. Transfer the PDC emulator to DC5
B. Transfer the schema master to DC4
C. Transfer the PDC emulator to DC2
D. Transfer the schema master to DC6


Answer Clike
Which group should you add User1?

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 contains a virtual machine named VM1 that runs Windows Server 2012 R2.
You need to ensure that a user named User1 can install Windows features on VM1. The solution must minimize the number of permissions assigned to User1.
To which group should you add User1?
A. Server Operators on Server1
B. Power Users on VM1
C. Administrators on VM1
D. Hyper-V Administrators on Server1


Answer Clike
What should you configure?

Your network contains two DNS servers named DNS1 and DNS2 that run Windows Server 2012 R2. DNS1 has a primary zone named contoso.com. DNS2 has a secondary copy of the contoso.com zone.
You need to log the zone transfer packets sent between DNS1 and DNS2.
What should you configure?
A. debug logging from DNS Manager
B. logging from Windows Firewall with Advanced Security
C. monitoring from DNS Manager
D. a Data Collector Set (DCS) from Performance Monitor


Answer Clike
Which Group Policy preference should you configure?

Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2.
Client computers run either Windows 7 or Windows 8. All of the client computers have an application named App1 installed.
The domain contains a Group Policy object (GPO) named GPO1 that is applied to all of the client computers.
You need to add a system variable named App1Data to all of the client computers.
Which Group Policy preference should you configure?
A. Ini Files
B. Data Sources
C. Services
D. Environment


Answer Clike
What should you do first?

Your network contains an Active Directory domain named contoso.com. The domain contains six domain controllers named DO, DC2, DC3, DC4, DC5 and DC6. Each domain controller has the DNS Server server role installed and hosts an Active Directory-integrated zone for contoso.com.
You plan to create a new Active Directory-integrated zone named litwareinc.com that will be used for testing.
You need to ensure that the new zone will be available only on DC5 and DC6.
What should you do first?
A. Create an Active Directory connection object.
B. Create an Active Directory site link.
C. Create an application directory partition
D. Change the zone replication scope.


Answer Clike
How should you configure the static route on LON-SRV1?

HOTSPOT
You have a server named LON-SRV1 that runs Windows Server 2012 R2. LON-SVR1 has the Remote server role installed. LON-SVR1 is located in the perimeter network.
The IPv4 routing table on LON-SVR1 is configured as shown in the following exhibit. (Click the Exhibit Button)

Your company purchases an additional router named router named Router1. Router1 has an interface that connects to perimeter network and an interface that connects to the Internet. The IP address of interface that connects to the perimeter network is 172.16.0.2.
You need to ensure that LON-SRV1 will route traffic to the internet by using Router1 if the current detail gateway is unavailable.
How should you configure the static route on LON-SRV1?
To answer, select the appropriate static route in the answer area.
Hot Area:



Answer Clike
What should you do?

Your network contains a server named Server1 that has the Network Policy and Access Services server role installed.
AH of the network access servers forward connection requests to Server1.
You create a new network policy on Server1.
You need to ensure that the new policy applies only to connection requests from the 192.168.0.0/24 subnet.
What should you do?
A. Set the Client IP4 Address condition to 192.168.0.0/24.
B. Set the Client IP4 Address condition to 192.168.0.
C. Set the Called Station ID constraint to 192.168.0_0/24.
D. Set the Called Station ID constraint to 192_168.0


Answer Clike
What should you identify?

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named CONT1 and CONT2. Both servers run Windows Server 2012 R2.
CONT1 has a shared printer named Printer1. CONT2 connects to Printer1 on CONT1.
When you attempt to remove Printer1 from CONT2, you receive the error message shown in the exhibit. (Click the Exhibit button.)

You successfully delete the other printers installed on CONT2.
You need to identify what prevents you from deleting Printer1 on CONT2.
What should you identify?
A. Printer1 is deployed as part of a mandatory profile
B. Printer1 is deployed by using a Group Policy object (GPO)
C. Your user account is not a member of the Print Operators group on CONT2
D. Your user account is not a member of the Print Operators group on CONT1


Answer Clike
What should you do on Server1?

Your network contains three servers named Server1, Server2, and Server3. All servers run Windows Server 2012 R2.
You need to ensure that Server1 can provide iSCSI storage for Server2 and Server3. What should you do on Server1?
A. Install the iSCSI Target Server role service and configure iSCSI targets
B. Start the Microsoft iSCSI Initiator Service and configure the iSCSI Initiator Properties
C. Install the iSNS Server service feature and create a Discovery Domain
D. Install the Multipath I/O (MPIO) feature and configure the MPIO Properties


Answer Clike
Which tool should you use?

Your network contains an Active Directory domain named contoso.com.
A previous administrator implemented a Proof of Concept installation of Active Directory Rights Management Services (AD RMS).
After the proof of concept was complete, the Active Directory Rights Management Services server role was removed.
You attempt to deploy AD RMS.
During the configuration of AD RMS, you receive an error message indicating that an existing AD RMS Service Connection Point (SCP) was found.
You need to remove the existing AD RMS SCP.
Which tool should you use?
A. Active Directory Users and Computers
B. Active Directory Sites and Services
C. Authorization Manager
D. Active Directory Domains and Trusts


Answer Clike
What should you do?

Your network contains an Active Directory forest named contoso.com.
Users frequently access the website of an external partner company.
The URL of the website is http://partners.adatum.com.
The partner company informs you that it will perform maintenance on its Web server and that the IP addresses of the Web server will change.
After the change is complete, the users on your internal network report that they fail to access the website.
However, some users who work from home report that they can access the website.
You need to ensure that your DNS servers can resolve partners.adatum.com to the correct IP address immediately.
What should you do?
A. Run dnscmd and specify the CacheLockingPercent parameter
B. Run Set-DnsServerGlobalQueryBlockList
C. Run ipconfig and specify the Renew parameter
D. Run Set-DnsServerCache


Answer Clike
Which IPV6 scope prefix should you use?

Your network contains an Active Directory domain named contoso.com.
The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the DHCP Server server role installed.
You need to create an IPv6 scope on Server1. The scope must use an address space that is reserved for private networks. The addresses must be routable.
Which IPV6 scope prefix should you use?
A. 2001:123:4567:890A::
B. FE80:123:4567::
C. FF00:123:4567:890A::
D. FD00:123:4567::


Answer Clike
What should you do?

You have a server named Server1 that runs Windows Server 2012 R2. From Server Manager, you install the Active Directory Certificate Services server role on Server1.
A domain administrator named Admin1 logs on to Server1. When Admin1 runs the Certification Authority console, Admin1 receive the following error message.

You need to ensure that when Admin1 opens the Certification Authority console on Server1, the error message does not appear.
What should you do?
A. Install the Active Directory Certificate Services (AD CS) tools
B. Configure the Active Directory Certificate Services server role from Server Manager
C. Run the regsvr32.exe command
D. Modify the PATH system variable


Answer Clike
Which tool should you use?

Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2.
The domain contains a domain controller named DC1 that is configured as an enterprise root certification authority (CA).
All users in the domain are issued a smart card and are required to log on to their domain- joined client computer by using their smart card.
A user named User1 resigned and started to work for a competing company. You need to prevent User1 immediately from logging on to any computer in the domain.
The solution must not prevent other users from logging on to the domain.
Which tool should you use?
A. Active Directory Users and Computers
B. Certificate Templates
C. The Security Configuration Wizard
D. The Certificates snap-in


Answer Clike
What should you do?

You create a new virtual disk in a storage pool by using the New Virtual Disk Wizard.
You discover that the new virtual disk has a write-back cache of 1 GB.
You need to ensure that the virtual disk has a write-back cache of 5 GB.
What should you do?
A. Detach the virtual disk, and then run the Resize-VirtualDisk cmdlet
B. Detach the virtual disk, and then run the Set-VirtualDisk cmdlet
C. Delete the virtual disk, and then run the New-StorageSubSystemVirtualDisk cmdlet
D. Delete the virtual disk, and then run the New-VirtualDisk cmdlet


Answer Clike
What should you do?

You have a server named Server1 that runs Windows Server 2012 R2. Each day, Server1 is backed up fully to an external disk. On Server1, the disk that contains the operating system fails.
You replace the failed disk.
You need to perform a bare-metal recovery of Server1 by using the Windows Recovery Environment (WindowsRE).
What should you do?
A. Run the Start-WBVolumeRecovery cmdlet and specify the -backupset parameter
B. Run the Get-WBBareMetalRecovery cmdlet and specify the -policy parameter
C. Run the wbadmin.exe start recovery command and specify the -recoverytarget parameter
D. Run the wbadmin.exe start sysrecovery command and specify the -backuptarget parameter


Answer Clike
What should you do?

You have a server named LON-DC1 that runs Windows Server 2012 R2. An iSCSI virtual disk named VirtualiSCSI1.vhd exists on LON-DC1 as shown in the exhibit. (Click the Exhibit button.)

You create a new iSCSI virtual disk named VirtualiSCSI2.vhd by using the existing itgt iSCSI target. VirtualiSCSIl.vhd is removed from LON-DC1.
You need to assign VirtualiSCSI2.vhd a logical unit value of 0.
What should you do?
A. Modify the properties of the itgt ISCSI target.
B. Modify the properties of the VirtualiSCSI2.vhd iSCSI virtual disk
C. Run the Set-VirtualDisk cmdlet and specify the -Uniqueld parameter
D. Run the iscsicli command and specify the reportluns parameter


Answer Clike
What should you do?

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named Server1 that runs Windows Server 2012 R2.
On Server1, you create a work folder named Work1. A user named User1 connects to Work1 from a computer named Computer1.
You need to identify the last time the documents in Work1 were synchronized successfully from Computer1.
What should you do?
A. From Windows PowerShell, run the Get-SyncShare cmdlet
B. From Windows PowerShell, run the Get-SyncUserSettings cmdlet
C. From Server Manager, review the properties of Computer1
D. From Server Manager, review the properties of User1


Answer Clike
What should you do first?

Your network contains multiple subnets. On one of the subnets, you deploy a server named Server1 that runs Windows Server 2012 R2.
You install the DNS Server server role on Server1, and then you create a standard primary zone named contoso.com. You need to ensure that client computers can resolve IP addresses to host names.
What should you do first?
A. Create a GlobalNames zone
B. Convert the contoso.com zone to an Active Directory-integrated zone
C. Configure dynamic updates for contoso.com
D. Create a reverse lookup zone


Answer Clike
What should you do?

You have a server named Server1 that runs Windows Server 2012 R2.
You try to install the Microsoft .NET Framework 3.5 Features feature on Server1, but the installation fails repeatedly.
You need to ensure that the feature can be installed on Server1.
What should you do?
A. Run the Add-WindowsPackagecmdlet
B. Disable User Account Control (UAC)
C. Specify an alternate source path
D. Install the Web Server (IIS) server role


Answer Clike
What should you do?

You have a server named Print1 that runs Windows Server 2012 R2.On Print1, you share a printer named Printer1.
You need to ensure that only the members of the Server Operators group, the Administrators group, and the Print Operators group can send print jobs to Printer1.
What should you do?
A. Remove the permissions for the Creator Owner group
B. Assign the Print permission to the Server Operators group
C. Remove the permissions for the Everyone group
D. Assign the Print permission to the Administrators group


Answer Clike
What should you modify?

You have a print server named Print1 that runs Windows Server 2012 R2. Print1 has 10 shared printers.
You need to change the location of the spool folder.
What should you modify?
A. The properties of the Print Spooler service
B. The Print Server Properties
C. The user environment variables
D. The PrintQueue.inf file


Answer Clike
Which cmdlet should you use to achieve each requirement?

DRAG DROP
You have a server that runs Windows Server 2012 R2.
You create a new work folder named Share1.
You need to configure Share1 to meet the following requirements:
1. Ensure that all synchronized copies of Share1 are encrypted.
2. Ensure that clients synchronize to Share1 every 30 minutes.
3. Ensure that Share1 inherits the NTFS permissions of the parent folder.
Which cmdlet should you use to achieve each requirement?
To answer, drag the appropriate cmdlets to the correct requirements. Each cmdlet may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
Select and Place:



Answer Clike
What should you do?

Your network contains an Active Directory domain named contoso.com.All user accounts in the marketing department reside in an organizational unit
(OU) named OU1.
You have a Group Policy object (GPO) named GPO1. GPO1 contains Folder Redirection settings. GPO1 has default permissions.
You discover that the Folder Redirection settings are not applied to the users in the marketing department.
You open Group Policy Management as shown in the exhibit. (Click the Exhibit button.)

You need to ensure that the Folder Redirection settings in GPO1 apply to the marketing users.
What should you do?
A. Modify the Delegation settings of GPO1
B. Enable the link of GPO1
C. Enforce GPO1
D. Modify the link order of GPO1


Answer Clike
What should you do first?

Your network contains two Active Directory forests named contoso.com and corp.contoso.com

User1 is a member of the DnsAdmins domain local group in contoso.com.
User1 attempts to create a conditional forwarder to corp.contoso.com but receive an error message shown in the exhibit. (Click the Exhibit button.)

You need to configure bi-directional name resolution between the two forests.
What should you do first?
A. Add User1 to the DnsUpdateProxy group.
B. Configure the zone to be Active Directory-integrated
C. Enable the Advanced view from DNS Manager
D. Run the New Delegation Wizard


Answer Clike
HOTSPOT

HOTSPOT
You have a server that runs Windows Server 2012 R2 and has the iSCSI Target Server role service installed.
You run the New-IscsiVirtualDisk cmdlet as shown in the New-IscsiVirtualDisk exhibit. (Click the Exhibit button.)

To answer, complete each statement according to the information presented in the exhibits. Each correct selection is worth one point.
Hot Area:



Answer Clike
Which settings should you configure?

HOTSPOT
You have a server named Server1 that runs Windows Server 2012 R2. You are configuring a storage space on Server1.
You need to ensure that the storage space supports tiered storage.
Which settings should you configure?
To answer, select the appropriate options in the answer area.
Hot Area:



Answer Clike
What should you do first?

Your network contains an Active Directory domain named adatum.com. You have a standard primary zone named adatum.com.
You need to provide a user named User1 the ability to modify records in the zone. Other users must be prevented from modifying records in the zone.
What should you do first?
A. Run the Zone Signing Wizard for the zone
B. From the properties of the zone, change the zone type
C. Run the new Delegation Wizard for the zone
D. From the properties of the zone, modify the Start Of Authority (SOA) record


Answer Clike
What should you do?

Your network contains two Active Directory forests named contoso.com and adatum.com.
Each forest contains one domain. Contoso.com has a two-way forest trust to adatum.com. Selective authentication is enabled on the forest trust.
Contoso contains 10 servers that have the File Server role service installed.
Users successfully access shared folders on the file servers by using permissions granted to the Authenticated Users group.
You migrate the file servers to adatum.com.
Contoso users report that after the migration, they are unable to access shared folders on the file servers.
You need to ensure that the Contoso users can access the shared folders on the file servers.
What should you do?
A. Disable selective authentication on the existing forest trust
B. Disable SID filtering on the existing forest trust
C. Run netdom and specify the /quarantine attribute
D. Replace the existing forest trust with an external trust.


Answer Clike
What should you do?

Your network contains an Active Directory domain named contoso.com. All user accounts reside in an organizational unit (OU) named OU1.
You create a Group Policy object (GPO) named GPO1.
You link GPO1 to OU1.
You configure the Group Policy preference of GPO1 to add a shortcut named Link1 to the desktop of each user.
You discover that when a user deletes Link1, the shortcut is removed permanently from the desktop.
You need to ensure that if a user deletes Link1, the shortcut is added to the desktop again.
What should you do?
A. Modify the Link1 shortcut preference of GPO1
B. Enable loopback processing in GPO1
C. Enforce GPO1
D. Modify the Security Filtering settings of GPO1


Answer Clike
What should you do?

Your network contains an Active Directory forest named contoso.com. The forest contains two sites named Main and Branch. The Main site contains 400 desktop computers and the Branch site contains 150 desktop computers. All of the desktop computers run Windows 8.
In Main, the network contains a member server named Server1 that runs Windows Server 2012.
You install the Windows Server Update Services server role on Server1.
You need to ensure that Windows updates obtained from Windows Server Update Services (WSUS) are the same for the computers in each site.
You want to achieve this goal by using the minimum amount of administrative effort.
What should you do?
A. From the Update Services console, create computer groups
B. From the Update Services console, configure the Computers options
C. From the Group Policy Management console, configure the Windows Update settings
D. From the Group Policy Management console, configure the Windows Anytime Upgrade settings
E. From the Update Services console, configure the Synchronization Schedule options


Answer Clike
What should you run?

Your network contains two Web servers named Server1 and Server2. Both servers run Windows Server 2012 R2.
Server1 and Server2 are nodes in a Network Load Balancing (NLB) cluster. The NLB cluster contains an application named App1 that is accessed by using the URL http://app1.contoso.com.
You plan to perform maintenance on Server1. You need to ensure that all new connections to App1 are directed to Server2. The solution must not disconnect the existing connections to Server1.
What should you run?
A. The Set-NlbCluster cmdlet
B. The Set-NlbClusterNode cmdlet
C. The Stop-NlbCluster cmdlet
D. The Stop-NlbClusterNode cmdlet


Answer Clike
Which tool should you use?

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012. Server1 is the enterprise root certification authority (CA) for contoso.com. You need to enable CA role separation on Server1.
Which tool should you use?
A. The Certutil command
B. The Authorization Manager console
C. The Certsrv command
D. The Certificates snap-in


Answer Clike
What should you do?

HOTSPOT
Your network contains an Active Directory domain named contoso.com.
You have a failover cluster named Cluster1 that contains two nodes named Server1 and Server2. Both servers run Windows Server 2012 R2 and have the Hyper-V server role installed.
You plan to create two virtual machines that will run an application named App1. App1 will store data on a virtual hard drive named App1data.vhdx. App1data.vhdx will be shared by both virtual machines.
The network contains the following shared folders:
An SMB file share named Share1 that is hosted on a Scale-Out File Server.
An SMB file share named Share2 that is hosted on a standalone file server.
An NFS share named Share3 that is hosted on a standalone file server.
You need to ensure that both virtual machines can use App1data.vhdx simultaneously.
What should you do?
To answer, select the appropriate configurations in the answer area.
Hot Area:



Answer Clike
What should you do?

Your network contains an Active directory forest named contoso.com. The forest contains two child domains named east.contoso.com and west.contoso.com.
You install an Active Directory Rights Management Services (AD RMS) cluster in each child domain.
You discover that all of the users in the contoso.com forest are directed to the AD RMS cluster in east.contoso.com.
You need to ensure that the users in west.contoso.com are directed to the AD RMS cluster in west.contoso.com and that the users in east.contoso.com are directed to the AD RMS cluster in east.contoso.com.
What should you do?
A. Modify the Service Connection Point (SCP)
B. Configure the Group Policy object (GPO) settings of the users in the west.contoso.com domain
C. Configure the Group Policy object (GPO) settings of the users in the east.contoso.com domain
D. Modify the properties of the AD RMS cluster in west.contoso.com


Answer Clike
What should you do?

Your network contains an Active Directory forest named contoso.com. The forest contains four domains. All servers run Windows Server 2012 R2.
Each domain has a user named User1.
You have a file server named Server1 that is used to synchronize user folders by using the Work Folders role service.
Server1 has a work folder named Sync1.
You need to ensure that each user has a separate folder in Sync1.
What should you do?
A. From Windows Explorer, modify the Sharing properties of Sync1
B. Run the Set-SyncServerSetting cmdlet
C. From File and Storage Services in Server Manager, modify the properties of Sync1
D. Run the Set-SyncShare cmdlet


Answer Clike
Which two actions should you perform?

Your network contains an Active Directory forest named contoso.com.
The forest contains two domains named contoso.com and childl.contoso.com. The domains contain three domain controllers.
The domain controllers are configured as shown in the following table.
You need to ensure that the KDC support for claims, compound authentication, and Kerberos armoring setting is enforced in both domains.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Raise the domain functional level of contoso.com.
B. Raise the domain functional level ofchildl.contoso.com
C. Raise the forest functional level of contoso.com
D. Upgrade DC11 to Windows Server 2012 R2
E. Upgrade DC1 to Windows Server 2012 R2


Answer Clike
Which two possible sources can you use to achieve this goal?

You have a server named Server1 that runs a Server Core Installation of Windows Server 2012 R2 Datacenter.
You have a WIM file that contains the four images of Windows Server 2012 R2 as shown in the Images exhibit. (Click the Exhibit button.)

You review the installed features on Server1 as shown in the Features exhibit. (Click the Exhibit button.)

You need to install the Server Graphical Shell feature on Server1.
Which two possible sources can you use to achieve this goal? (Each correct answer presents a complete solution. Choose two.)
A. Index 1
B. Index 2
C. Index 3
D. Index 4


Answer Clike
What should you configure?

Your network contains an Active Directory domain named contoso.com.
All user accounts reside in an organizational unit (OU) named OU1.
All of the users in the marketing department are members of a group named Marketing. All of the users in the human resources department are members of a group named HR. You create a Group Policy object (GPO) named GPO1.
You link GPO1 to OU1.
You configure the Group Policy preferences of GPO1 to add two shortcuts named Link1 and Link2 to the desktop of each user.
You need to ensure that Link1 only appears on the desktop of the users in Marketing and that Link2 only appears on the desktop of the users in HR.
What should you configure?
A. Security Filtering
B. WMI Filtering
C. Group Policy Inheritance
D. Item-level targeting


Answer Clike
What should you do?

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2.
You enable and configure Routing and Remote Access (RRAS) on Server1. You create a user account named User1.
You need to ensure that User1 can establish VPN connections to Server1.
What should you do?
A. Modify the members of the Remote Management Users group
B. Add a RADIUS client
C. Modify the Dial-in setting of User1
D. Create a connection request policy


Answer Clike
What should you do?

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the DNS Server server role installed. Server1 is configured to delete automatically the DNS records of client computers that are no longer on the network. A technician confirms that the DNS records are deleted automatically from the contoso.com zone. You discover that the contoso.com zone has many DNS records for servers that were on the network in the past, but have not connected to the network for a long time.
You need to set the time stamp for all of the DNS records in the contoso.com zone.
What should you do?
A. From DNS Manager, modify the Advanced settings from the properties of Server1
B. From Windows PowerShell, run the Set-DnsServerResourceRecordAging cmdlet
C. From DNS Manager, modify the Zone Aging/Scavenging Properties
D. From Windows PowerShell, run the Set-DnsServerZoneAging cmdlet


Answer Clike
Which of the following is (or are) feature(s) of RODC?

RODC comes with a number of features that focus on heightened security with limited functionality to remote office users.
Which of the following is (or are) feature(s) of RODC?
A. All of these
B. Filtered Attribute Sets
C. Unidirectional Replication
D. Read-only DNS


Answer Clike
Which setting should you configure?

Your network contains an Active Directory domain named contoso.com.
You have several Windows PowerShell scripts that execute when client computers start.
When a client computer starts, you discover that it takes a long time before users are prompted to log on.
You need to reduce the amount of time it takes for the client computers to start. The solution must not prevent scripts from completing successfully.
Which setting should you configure?
To answer, select the appropriate setting in the answer area.
Hot Area:



Answer Clike
Which store should you import the certificate?

HOTSPOT
You have a server named Server1 that has the Network Policy and Access Services server role installed.
You plan to configure Network Policy Server (NPS) on Server1 to use certificate-based authentication for VPN connections.
You obtain a certificate for NPS.
You need to ensure that NPS can perform certificate-based authentication.
To which store should you import the certificate?
To answer, select the appropriate store in the answer area.
Hot Area:



Answer Clike
What should you run?

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named dcl.contoso.com. You discover that the Default Domain Policy Group Policy objects (GPOs) and the Default Domain Controllers Policy GPOs were deleted. You need to recover the Default Domain Policy and the Default Domain Controllers Policy GPOs.
What should you run?
A. dcgpofix.exe /target:domain
B. dcgpofix.exe /target:both
C. gpfixup.exe /oldnb:contoso/newnb:dc1
D. gpfixup.exe /dc:dc1.contoso.com


Answer Clike
Which cmdlet should you run on Server1?

Your network contains a server named Server1 and 10 Web servers. All servers run Windows Server 2012 R2.
You create a Windows PowerShell Desired State Configuration (DSC) to push the settings from Server1 to all of the Web servers.
On Server1, you modify the file set for the Web servers.You need to ensure that all of the Web servers have the latest configurations.
Which cmdlet should you run on Server1?
A. Restore-DcsConfiguration
B. Set DcsLocalConfigurationManager
C. Start-DcsConfiguration
D. Get-DcsConfiguration


Answer Clike
Which three cmdlets should you run?

You have a server named DNS1 that runs Windows Server 2012 R2.
You discover that the DNS resolution is slow when users try to access the company intranet home page by using the URL http://companyhome.
You need to provide single-label name resolution for CompanyHome that is not dependent on the suffix search order.
Which three cmdlets should you run? (Each correct answer presents part of the solution. Choose three.)
A. Add-DnsServerPrimaryZone
B. Add-DnsServerResourceRecordCName
C. Set-DnsServerDsSetting
D. Set-DnsServerGlobalNameZone
E. Set-DnsServerEDns
F. Add-DnsServerDirectory Partition


Answer Clike
What should you do?

Your network contains an Active Directory domain named contoso.com. The domain contains a file server named Server1 that runs Windows Server 2012 R2. You create a user account named User1 in the domain.
You need to ensure that User1 can use Windows Server Backup to back up Server1. The solution must minimize the number of administrative rights assigned to User1.
What should you do?
A. Assign User1 the Back up files and directories user right.
B. Add User1 to the Backup Operators group.
C. Add User1 to the Power Users group.
D. Assign User1 the Back up files and directories user right and the Restore files and directories user right.


Answer Clike
Which feature should you deploy?

You manage an environment that has many servers. The servers run Windows Server 2012 R2 and use iSCSI storage. Administrators report that it is difficult to locate available iSCSI resources on the network. You need to ensure that the administrators can locate iSCSI resources on the network by using a central repository. Which feature should you deploy?
A. The iSNS Server service feature
B. The iSCSI Target Storage Provider feature
C. The Windows Standards-Based Storage Management feature
D. The iSCSI Target Server role service


Answer Clike
Which two actions should you perform?

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Active Directory Certificate Services server role installed and is configured as an enterprise certification authority (CA).
You need to ensure that all of the users in the domain are issued a certificate that can be used for the following purposes:
Email security
Client authentication
Encrypting File System (EFS)
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Modify the properties of the User certificate template, and then publish the template.
B. From a Group Policy, configure the Certificate Services Client Certificate Enrollment Policy settings.
C. From a Group Policy, configure the Automatic Certificate Request Settings settings.
D. Duplicate the User certificate template, and then publish the template.
E. From a Group Policy, configure the Certificate Services Client Auto-Enrollment settings.


Answer Clike
Which configuration should you use?

Your network contains an Active Directory domain named contoso.com. The domain contains a main office and a branch office. An Active Directory site exists for each office. The domain contains two servers named Server1 and Server2 that run Windows Server 2012 R2.
Both servers have the DHCP Server server role installed. Server1 is located in the main office site.
Server2 is located in the branch office site. Server1 provides IPv4 addresses to the client computers in the main office site. Server2 provides IPv4 addresses to the client computers in the branch office site.
You need to ensure that if either Server1 or Server2 are offline, the client computers can still obtain IPv4 addresses. The solution must meet the following requirements:
The storage location of the DHCP databases must not be a single point of failure.
Server1 must provide IPv4 addresses to the client computers in the branch office site only if Server2 is offline.
Server2 must provide IPv4addresses to the client computers in the main office site only if Server1 is offline.
Which configuration should you use?
A. Load sharing mode failover partners
B. Hot standby mode failover partners
C. A Network Load Balancing (NLB) cluster
D. A failover cluster


Answer Clike
Which DISM option should you use?

You have a VHD that contains an image of Windows Server 2012 R2. You plan to Apply updates to the image.
You need to ensure that only updates that can install without requiring a restart are installed.
Which DISM option should you use?
A. /Apply-Unattend
B. /Add-ProvisionedAppxPackage
C. /PreventPending
D. /Cleanup-Image


Answer Clike
What should you use?

Your network contains an Active Directory domain named contoso.com. The domain contains more than 100 Group Policy objects (GPOs). Currently, there are no enforced GPOs. You have two GPOs linked to an organizational unit (OU) named OU1. You need to change the precedence order of the GPOs. What should you use?
A. Dcgpofix
B. Get-GPOReport
C. Gpfixup
D. Gpresult
E. Gptedit.msc
F. Import-GPO
G. Restore-GPO
H. Set-GPInheritance
I. Set-GPLink
J. Set-GPPermission
K. Gpupdate
L. Add-ADGroupMember


Answer Clike
What should you configure?

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2.
Server1 and Server2 have the Network Load Balancing (NLB) feature installed. The servers are configured as nodes in an NLB cluster named Cluster1. Cluster1 hosts a secure web Application named WebApp1. WebApp1 saves user state information locally on each node.
You need to ensure that when users connect to WebApp1, their session state is maintained.
What should you configure?
A. Affinity None
B. Affinity Single
C. The cluster quorum settings
D. The failover settings
E. A file server for general use
F. The Handling priority
G. The host priority
H. Live migration
I. The possible owner
J. The preferred owner
K. Quick migration
L. The Scale-Out File Server


Answer Clike
What should you use?

Your network contains an Active Directory domain named contoso.com. The domain contains more than 100 Group Policy objects (GPOs). Currently, there are no enforced GPOs.
You need to prevent all of the GPOs at the site level and at the domain level from being Applied to users and computers in an organizational unit (OU) named OU1.
You want to achieve this goal by using the minimum amount of administrative effort.
What should you use?
A. Dcgpofix
B. Get-GPOReport
C. Gpfixup
D. Gpresult
E. Gptedit.msc
F. Import-GPO
G. Restore-GPO
H. Set-GPInheritance
I. Set-GPLink
J. Set-GPPermission
K. Gpupdate
L. Add-ADGroupMember


Answer Clike
What should you use?

Your network contains an Active Directory domain named contoso.com. The domain contains more than 100 Group Policy objects (GPOs).
Currently, there are no enforced GPOs. The domain contains a top-level organizational unit (OU) for each department. A group named Group1 contains members from each department.
You have a GPO named GPO1 that is linked to the domain. You need to configure GPO1 to Apply settings to Group1 only.
What should you use?
A. Dcgpofix
B. Get-GPOReport
C. Gpfixup
D. Gpresult
E. Gptedit.msc
F. Import-GPO
G. Restore-GPO
H. Set-GPInheritance
I. Set-GPLink
J. Set-GPPermission
K. Gpupdate
L. Add-ADGroupMember


Answer Clike
What should you do on Server1?

Your network contains an Active Directory forest. The forest contains two domains named contoso.com and fabrikam.com. All of the DNS servers in both of the domains run Windows Server 2012 R2.
The network contains two servers named Server1 and Server2. Server1 hosts an Active Directory-integrated zone for contoso.com. Server2 hosts an Active Directory-integrated zone for fabrikam.com.
Server1 and Server2 connect to each other by using a WAN link. Client computers that connect to Server1 for name resolution cannot resolve names in fabrikam.com.
You need to configure Server1 to support the resolution of names in fabrikam.com. The solution must ensure that users in contoso.com can resolve names in fabrikam.com if the WAN link fails.
What should you do on Server1?
A. Create a stub zone.
B. Create a secondary zone.
C. Add a forwarder.
D. Create a conditional forwarder.


Answer Clike
What should you modify?

Your network contains an Active Directory domain named contoso.com. All client computers run Windows 8.
Your company has users who work from home. Some of the home users have desktop computers. Other home users have laptop computers. All of the computers are joined to the domain.
All of the computer accounts are members of a group named Group1. Currently, the home users access the corporate network by using a PPTP VPN. You implement DirectAccess by using the default configuration and you specify Group1 as the DirectAccess client group.
The home users who have desktop computers report that they cannot use DirectAccess to access the corporate network.
The home users who have laptop computers report that they can use DirectAccess to access the corporate network.
You need to ensure that the home users who have desktop computers can access the network by using DirectAccess.
What should you modify?
A. The WMI filter for Direct Access Client Settings GPO
B. The conditions of the Connections to Microsoft Routing and Remote Access server policy
C. The membership of the RAS and IAS Servers group
D. The security settings of the computer accounts for the desktop computers


Answer Clike
Where should you place DCCIoneConfig.xml on DC4?

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC4 that runs Windows Server 2012 R2.
You create a DCCIoneConfig.xml file. You need to clone DC4.
Where should you place DCCIoneConfig.xml on DC4?
A. %Systemroot%SYSVOL
B. %Systemdrive%
C. %Systemroot%NTDS
D. %Programdata%Microsoft


Answer Clike
Which tool should you use?

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2.
You pre-create a read- only domain controller (RODC) account named RODC1. You export the settings of RODC1 to a file named File1.txt. You need to promote RODC1 by using File1.txt.
Which tool should you use?
A. The Install-WindowsFeaturecmdlet
B. The Add-WindowsFeaturecmdlet
C. TheDism command
D. TheDcpromo command
E. The Install-ADDSDomainControllercmdlet


Answer Clike
Which Ntdsutil context should you use?

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1. On DC1, you add a new volume and you stop the Active Directory Domain Services (AD DS) service.
You run ntdsutil.exe and you set NTDS as the active instance.
You need to move the Active Directory database to the new volume. Which Ntdsutil context should you use?
A. Files
B. IFM
C. Configurable Settings
D. Partition management


Answer Clike
What should you do from the Update Services console?

Your network contains a single Active Directory domain named contoso.com. The domain contains a member server named Server1 that runs Windows Server 2012 R2.
Server1 has the Windows Server Updates Services server role installed and is configured to download updates from the Microsoft Update servers.
You need to ensure that Server1 downloads express installation files from the Microsoft Update servers.
What should you do from the Update Services console?
A. From the Products and Classifications options, configure the Products settings.
B. From the Products and Classifications options, configure the Classifications settings.
C. From the Update Files and Languages options, configure the Update Files settings.
D. From the Automatic Approvals options, configure the Update Rules settings.


Answer Clike
What should you do first?

Your network contains an Active Directory domain named contoso.com. The domain contains two domain controllers. The domain controllers are configured as shown in the following table.

In the perimeter network, you install a new server named Server1 that runs Windows Server 2012 R2.
Server1 is in a workgroup. You need to perform an offline domain join of Server1 to the contoso.com domain.
What should you do first?
A. Run the djoin.exe command.
B. Run the dsadd.exe command.
C. Transfer the PDC emulator role to DC1.
D. Transfer the infrastructure master role to DC1.


Answer Clike
Which upgrade path should you recommend for each server?

DRAG DROP
Your network contains three servers. The servers are configured as shown in the following table.

Your company plans to standardize all of the servers on Windows Server 2012 R2.
You need to recommend an upgrade path for each server.
The solution must meet the following requirements:
Upgrade the existing operating system whenever possible.
Minimize hardware purchases.
Which upgrade path should you recommend for each server?
To answer, drag the appropriate upgrade path to each server in the answer area.Each upgrade path may be used once, more than once, or not at all.
Select and Place:



Answer Clike
Which four actions should you perform in sequence?

DRAG DROP
You have a server named Server1 that runs Windows Server 2012 R2. You are asked to test Windows Azure Online Backup to back up Server1. You need to back up Server1 by using Windows Azure Online Backup.
Which four actions should you perform in sequence? To answer, move the appropriate four actions from the list of actions to the answer area and arrange them in the correct order.
Select and Place:



Answer Clike
What should you create?

You have a server named Served that runs Windows Server 2012 R2. You connect three new hard disks to Server 1.
You need to create a storage space that contains the three disks.
The solution must meet the following requirements:
Provide fault tolerance if a single disk fails.
Maximize the amount of useable storage space.
What should you create?
A. A spanned volume
B. A simple space
C. A parity space
D. A mirrored space


Answer Clike
Which four actions should you perform in sequence?

DRAG DROP
Your network contains an Active Directory domain named contoso.com.
You need to ensure that third-party devices can use Workplace Join to access domain resources on the Internet. Which four actions should you perform in sequence?
To answer, move the appropriate four actions from the list of actions to the answer area and arrange them in the correct order.
Select and Place:



Answer Clike
What should you do on Server2?

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2.
On a server named Server2, you perform a Server Core Installation of Windows Server 2012 R2. You join Server2 to the contoso.com domain. You need to ensure that you can manage Server2 by using the Computer Management console on Server1.
What should you do on Server2?
A. Run the Disable-NetFirewallRulecmdlet.
B. Run the Enable-NetFirewallRulecmdlet.
C. Run sconfig.exe and configure the network settings.
D. Run sconfig.exe and configure remote management.


Answer Clike
What should you configure on Server1?

Your network contains an Active Directory domain named contoso.com. All servers run either Windows Server 2008 R2 or Windows Server 2012 R2. All client computers run either Windows 7 or Windows 8. The domain contains a member server named Server1 that runs Windows Server 2012 R2.
Server1 has the File and Storage Services server role installed. On Server1, you create a share named Share1. You need to ensure that users can use Previous Versions to restore the files in Share1.
What should you configure on Server1?
A. A data recovery agent
B. The Shadow Copies settings
C. The Recycle Bin properties
D. A Windows Server Backup schedule


Answer Clike
Which two tasks should you perform?

Your network contains an Active Directory domain named contoso.com. The network contains a server named Server1 that runs Windows Server 2012 R2 and a server named Server2 that runs Windows Server 2008 R2 Service Pack 1 (SP1). Server1 and Server2 are member servers. You need to ensure that you can manage Server2 from Server1 by using Server Manager. Which two tasks should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Install Windows Management Framework 3.0 on Server2.
B. Install Remote Server Administration Tools on Server1.
C. Install the Windows PowerShell 2.0 engine on Server1.
D. Install Microsoft .NET Framework 4 on Server2.
E. Install Remote Server Administration Tools on Server2.


Answer Clike
What should you do first?

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the HyperV server role installed. Server1 is connected to two Fibre Channel SANs and is configured as shown in the following table.

You have a virtual machine named VM1. You need to configure VM1 to connect to SAN1. What should you do first?
A. Create a virtual Fibre Channel SAN.
B. Configure network adapter teaming.
C. Add one HBA.
D. Create a Hyper-V virtual switch.


Answer Clike
What should you configure on each virtual machine?

You have a server named Server1 that runs Windows Server 2012 R2.
Server1 has 2 dual-core processors and 16 GB of RAM. You install the Hyper-V server role in Server1.
You plan to create two virtual machines on Server1. You need to ensure that both virtual machines can use up to 8 GB of memory. The solution must ensure that both virtual machines can be started simultaneously.
What should you configure on each virtual machine?
A. Dynamic Memory
B. NUMA topology
C. Memory weight
D. Ressource Control


Answer Clike
Which tool should you use?

HOTSPOT
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2.
Server1 has the Active Directory Federation Services server role installed.
You need to make configuration changes to the Windows Token-based Agent role service.
Which tool should you use?
To answer, select the appropriate tool in the answer area.
Hot Area:



Answer Clike
What should you do on Server2?

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2 that run Windows Server 2012 R2.
Server1 has Microsoft SQL Server 2012 installed. You install the Active Directory Federation Services server role on Server2. You need to configure Server2 as the first Active Directory Federation Services (AD FS) server in the domain. The solution must ensure that the AD FS database is stored in a SQL Server database on Server1. What should you do on Server2?
A. From Windows PowerShell, run Install-ADFSFarm.
B. From Windows PowerShell, run Install-ADFSStandAlone.
C. From the AD FS console, run the AD FS Federation Server Configuration Wizard and select the Stand-alone federation server option.
D. From Server Manager, install the AD FS Web Agents.


Answer Clike
What should you configure?

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. The domain contains two organizational units (OUs) named OU1 and OU2 in the root of the domain. Two Group Policy objects (GPOs) named GPO1 and GP02 are created. GPO1 is linked to OU1.
GPO2 is linked to OU2. OU1 contains a client computer named Computer1. OU2 contains a user named User1. You need to ensure that the GPOs Applied to Computer1areApplied to User1 when User1 logs on.
What should you configure?
A. The GPO Status
B. WMI Filtering
C. GPO links
D. Item-level targeting


Answer Clike
Which tool should you use?

Your network contains an Active Directory domain named contoso.com. Domain controllers run either Windows Server 2008, Windows Server 2008 R2, or Windows Server 2012 R2. You have a Password Settings object (PSOs) named PSO1. You need to view the settings of PSO1. Which tool should you use?
A. Get-ADDomainControllerPasswordReplicationPolicy
B. Get-ADDefaultDomainPasswordPolicy
C. Active Directory Administrator Centre
D. Local Security Policies


Answer Clike
Which is included in the Windows XP and Windows Server 2003 operating systems.

OCSetup is available as part of the Windows Vista and Windows Server 2008 operating system. This tool replaces Sysocmgr.exe, which is included in the Windows XP and Windows Server 2003 operating systems.
This new tool can be used to perform which one of the following operations?
A. All of these
B. Microsoft System Installer (MSI) files that are passed to the Windows Installer service (MSIExec.exe)
C. Component-Based Servicing (CBS) components that are passed to Package Manager
D. CBS or MSI packages that have an associated custom installer .exe file


Answer Clike
Which terminology is being described below?

Which terminology is being described below?
These trusts are sometimes necessary when users need access to resources that are located in a Windows NT 4.0 domain or in a domain that is in a separate Active Directory Domain Services (AD DS) forest that is not joined by a forest trust.
A. Shortcut Trusts
B. Realm Trusts
C. Forest Trusts
D. External Trust


Answer Clike
Which type of virtual network is isolated from all external network traffic on the virtualization server, as well any network traffic between the management operating system and the external network.

Virtual Network Manager (available from the Hyper-V Manager snap-in) offers three types of virtual networks that you can use to define various networking topologies for virtual machines and the virtualization server.
Which type of virtual network is isolated from all external network traffic on the virtualization server, as well any network traffic between the management operating system and the external network.
A. Internal virtual network
B. Private virtual network
C. External virtual network
D. None of these


Answer Clike
Which terminology is being described below?

Which terminology is being described below?
A ________ trust allows resources in your domain (the domain that you are logged on to at the time that you run the New Trust Wizard) to be accessed more quickly by users in another domain (which is nested within another domain tree) in your forest.
A. one-way, outgoing, shortcut
B. two-way, incoming, shortcut
C. one-way, outgoing, forest
D. two-way, incoming, forest


Answer Clike
Which of the following Windows Server 2012 R2 features could you use to save time when creating GPO’s with similar settings?

Managing Group Policy objects is a tiresome task. Which of the following Windows Server 2012 R2 features could you use to save time when creating GPO’s with similar settings?
A. UAC
B. PXE boot
C. IFM
D. Starter GPO


Answer Clike
Which tool should you use?

You perform a Server Core Installation of Windows Server 2012 R2 on a server named Server1.
You need to add a graphical user interface (GUI) to Server1.
Which tool should you use?
A. the Add-WindowsPackagecmdlet
B. the Add-WindowsFeaturecmdlet
C. the Install-Module cmdlet
D. the Install-RoleServicecmdlet


Answer Clike
Which terminology is being described below?

Which terminology is being described below?
Time synchronization is critical for the proper operation of many Windows services and line-of- business Applications.
The uses the Network Time Protocol (NTP) to synchronize computer clocks on the network so that an accurate clock value, or time stamp, can be assigned to network validation requests and resource access requests
A. Network Services Shell (Netsh)
B. Listsvc
C. Fixmbr
D. Windows Time service (W32time)


Answer Clike
Which of the following features is available when Windows Server 2012 R2 is installed using the GUI option but without the desktop experience feature installed?

Which of the following features is available when Windows Server 2012 R2 is installed using the GUI option but without the desktop experience feature installed?
A. Metro-style Start screen
B. Built-in help system
C. All of these
D. Windows Media Player


Answer Clike
Which feature is described below?

Which feature is described below?
You can use the to reduce the number of duplicate blocks of data in storage, you can store much more data in a given amount of storage capacity than was possible in previous releases that used Single Instance
Storage (SIS) or NTFS file system compression.
A. iSCSI Target Server
B. iSCSI Target Boot
C. Multiterabyte Volumes
D. Data Deduplication role service


Answer Clike
Which of the following reasons justifies why you should audit failed events?

Which of the following reasons justifies why you should audit failed events?
A. To log resource access for reporting and billing
B. To monitor for malicious attempts to access a resource which has been denied
C. None of these
D. To monitor access that would suggest users are performing actions greater than you had planned


Answer Clike
Which one of the following Server manager Features is used for management of Public Key Infrastructure?

Server manager is a great tool for managing most of your server settings and configuration all in one central place. Which one of the following Server manager Features is used for management of Public Key Infrastructure?
A. Dynamic Host Configuration Server
B. WINS Server
C. Domain Name Service
D. Active Directory Certificate Services


Answer Clike
Which terminology is being described below?

Which terminology is being described below?
This trust is a manually created trust that shortens the trust path to improve the speed at which authentications, which occur between domain trees, are processed
A. Shortcut Trust
B. Quick Trust
C. Easy Trust
D. Simple Trust


Answer Clike
Which of the following features is not installed in this scenario?

In Windows Server 2012 R2, you can remove the Server Graphical Shell, resulting in the “Minimal Server Interface.” This is similar to a Server with a GUI installation except that some features are not installed.
Which of the following features is not installed in this scenario?
A. MMC
B. Windows Explorer
C. Control Panel (subset)
D. Server Manager


Answer Clike
Which audit policy should you monitor for these activities?

Your IT manager is concerned that someone is trying to gain access to your company’s computers by logging on with valid domain user names and various password attempts.
Which audit policy should you monitor for these activities?
A. Policy Change
B. Account Logon
C. Privilege Use
D. Directory Service Access


Answer Clike
Which remain with the information, no matter where it is moved.

Complete the missing word from the sentence below that is describing one of the new roles in Server 2008:
By using , you can augment an organization’s security strategy by protecting information through persistent usage policies, which remain with the information, no matter where it is moved.
A. AD FS
B. AD RMS
C. RODC
D. AD LDS


Answer Clike
Is the following statement about Hyper-V true or false? Hyper-V does not support wireless networks.

Is the following statement about Hyper-V true or false? Hyper-V does not support wireless networks.
A. True
B. False


Answer Clike
Which one of the following groups has permission to shut down a domain controller?

Which one of the following groups has permission to shut down a domain controller?
A. Backup Operators
B. All of these
C. Print Operators
D. Server Operators


Answer Clike
Which of the following situations would you use AD LDS?

Which of the following situations would you use AD LDS?
A. A DMZ
B. Standard private network
C. You require the use of Group Policy
D. You require the use of Organizational Units


Answer Clike
What must you do to add Active Directory Certificate Services (AD CS) to this server?

A server named Server01 is running Server Core at your companies IT house. It is already configured with the AD DS role but you also want to add AD CS to the server. What must you do to add Active Directory Certificate Services (AD CS) to this server?
A. Reinstall the server with the full version of Windows Server 2008
B. Install the AD CS role
C. Install the RODC role
D. Install the AD FS role


Answer Clike
What tool would you use?

You have decided to install Windows Server 2012 R2 by choosing the Service Core Installation option.
If you want to install, configure or uninstall server roles remotely, what tool would you use?
A. Windows PowerShell
B. Any of these
C. Server Manager
D. Remote Server Administration Tools (RSAT)


Answer Clike
Which command should you use to accomplish this?

Your manager has asked you to configure the company Windows Server 2008 domain controller. He wants all new computer accounts to be placed in the General OU, when computers join the domain.
Which command should you use to accomplish this?
A. Netdom
B. Dsmove
C. None of these
D. Redircmp


Answer Clike
Which of the following command line tools can be used to Activate Windows Server?

You have just finished installing Windows Server 2008 on a new server.
Your colleague has informed you that its essential that you must activate Windows Server.
Which of the following command line tools can be used to Activate Windows Server?
A. Cscript C:windowssystem32slmgr.vbs ato
B. Netdom C:windowssystem32slmgr.vbs ato
C. Ocsetup C:windowssystem32slmgr.vbs ato
D. Netsh C:windowssystem32slmgr.vbs ato


Answer Clike
Select the missing tool name from the sentence below:

Select the missing tool name from the sentence below:
You can use the .exe tool to create installation media for additional domain controllers that you are creating in a domain. By using the Install from Media (IFM) option, you can minimize the replication of directory data over the network. This helps you install additional domain controllers in remote sites more efficiently.
A. Dsutil
B. Ntfrsutl
C. Mqtgsvc
D. Ntdsutil


Answer Clike
Is the following statement true or false?

Is the following statement true or false?
When a printer is installed on a network, default printer permissions are assigned that allow all users to print and change the status of documents sent to it.
A. True
B. False


Answer Clike
Which record type is being described below?

DNS record types come in many forms, but which record type is being described below? Maps a domain name such as www.google.com to an IP address
A. A
B. CNAME
C. MX
D. PTR


Answer Clike
How would you identify the memory a virtual machine consumes when Dynamic Memory is not enabled?

Dynamic memory is a great feature that allows you to manage the amount of memory that Hyper-V virtual machines consume. How would you identify the memory a virtual machine consumes when Dynamic Memory is not enabled?
A. View the amount of RAM listed under Startup in the Memory page of the virtual machine
B. View the amount of RAM listed under Static in the Memory page of the virtual machine
C. None of these
D. View the amount of RAM listed under Maximum in the Memory page of the virtual machine


Answer Clike
What is this rule?

Sometimes it’s important to remove an RODC from your forest or domain.
However, it’s important that you follow a simple rule whilst removing RODC’s. What is this rule?
A. All RODC’s must be detached before removing a final writable domain controller
B. All writable domain controllers must be removed before RODC’s can be detached
C. Your forest must only consist of RODC’s if you want to remove them
D. There are no rules for removing RODC’s


Answer Clike
Which one of the following Server manager Features is used for Storage management, replication and searching?

Server manager is a great tool for managing most of your server settings and configuration all in one central place. Which one of the following Server manager Features is used for Storage management, replication and searching?
A. Dynamic Host Configuration Server
B. Terminal Services
C. Domain Name Service
D. File Services


Answer Clike
Which three actions should you perform in sequence?

DRAG DROP
You have a server named Server2 that runs Windows Server 2012 R2. You have storage provisioned on Server2 as shown in the exhibit. (Click the Exhibit button.)

You need to configure the storage so that it appears in Windows Explorer as a drive letter on Server1.
Which three actions should you perform in sequence? To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Select and Place:



Answer Clike
Which one of the following authentication types is being described below?

You create trusts in Windows Server 2008 with the New Trust Wizard. Which one of the following authentication types is being described below?
An authentication setting that permits unrestricted access by any users in the specified forest to all available shared resources that are located in any of the domains in the local forest.
A. Domain-wide authentication
B. None of these
C. Selective authentication
D. Forest-wide authentication


Answer Clike
Which certificate template should you identify?

HOTSPOT
Your network contains an Active Directory domain named contoso.com. The domain contains an enterprise certification authority (CA).
The domain contains a server named Server1 that runs Windows Server 2012 R2. You install the Active Directory Federation Services server role on Server1.
You plan to configure Server1 as an Active Directory Federation Services (AD FS) server. The Federation Service name will be set to adfs1.contoso.com.
You need to identify which type of certificate template you must use to request a certificate for AD FS.
Which certificate template should you identify? To answer, select the appropriate template in the answer area.
Hot Area:



Answer Clike
Which node in the AD FS console should you select?

HOTSPOT
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2.
Server1 has the Active Directory Federation Services (AD FS) server role installed.
Adatum.com is a partner organization.
You are helping the administrator of adatum.com set up a federated trust between adatum.com and contoso.com. The administrator of adatum.com asks you to provide a file containing the federation metadata of contoso.com.
You need to identify the location of the federation metadata file. Which node in the AD FS console should you select? To answer, select the appropriate node in the answer area.
Hot Area:



Answer Clike
What should you do to enable them to log on to their computer?

A user from your organisation has reported to the IT helpdesk that they are receiving the following message: “Your account is configured to prevent you from using the computer. Please try another computer.”
What should you do to enable them to log on to their computer?
A. Use the Dsmove command
B. Click the Log On To button on the Account tab of her user account
C. None of these
D. Click the Allowed To Join Domain button in the New Computer dialog box


Answer Clike
Which order do the following events need to occur before the catalog server is ready?

A global catalog server is available to directory clients when Domain Name System (DNS) servers can locate it as a global catalog server. In which order do the following events need to occur before the catalog server is ready?
A) The Net Logon service on the domain controller has updated DNS with global-catalogspecific service (SRV) resource records.
B) The isGlobalCatalogReadyrootDSE attribute is set to TRUE.
C) The global catalog receives replication of read-only replicas to the required occupancy level.
A. C then A, then B
B. then C, then A
C. A then C, then B
D. C then B, then A


Answer Clike
Which of the following is a possible way to unlock a User Account?

A user has locked his account (again!) and you need to unlock it so they can continue working normally.
Which of the following is a possible way to unlock a User Account? (Choose three)
A. Command Line
B. None of these
C. Windows PowerShell
D. VBScript


Answer Clike
Which command can be used to delete user accounts?

Your IT company is constantly changing, with new users coming and going throughout the year. One of your common tasks requires the deletion of user accounts for employees who have left the company. Which command can be used to delete user accounts?
A. LDIFDE
B. Dsmod
C. Dspromo
D. Netsh


Answer Clike
Which tool should you use to correct the changes to all of the OU’s at once?

After setting up several Active Directory users for different OU’s, you discover that the IT technician has miss spelt the Office property as Londn instead of London.
Which tool should you use to correct the changes to all of the OU’s at once?
A. Use Dsget and Dsmod
B. Use Dsquery and Dsmod
C. Use MoveTo or MoveHere
D. Multi select the users using the Ctrl key and opening Properties


Answer Clike
Is the above statement true or false?

You can create a printing pool to automatically distribute print jobs to the next available printer. A printing pool is one logical printer connected to multiple printers through multiple ports of the print server.
The printer that is idle receives the next document sent to the logical printer.
All printers in a pool must use the same driver. Is the above statement true or false?
A. True
B. False


Answer Clike
Which of the following tools should you use to accomplish this?

Your IT company has a large helpdesk department that deals with various types of calls from printer errors through to Application deployment. To give the help desk more responsibility you want to let them reset user passwords and unlock user accounts. This will speed up their response times for common support calls. Which of the following tools should you use to accomplish this?
A. The Delegation of Control Wizard
B. The Advanced Security Settings dialog box
C. DSUTIL
D. DSACLS


Answer Clike
What should you create?

You have 3 servers that runs Windows Server 2012 R2. The server contains the disks configured as shown in the following table.

You need to create a volume that can store up to 3 TB of user files.
The solution must ensure that the user files are available if one of the disks in the volume fails.
What should you create?
A. A storage pool on Disk 2 and Disk 3
B. A mirrored volume on Disk 2 and Disk 3
C. A storage pool on Disk 1 and Disk 3
D. A mirrored volume on Disk l and Disk 4
E. Raid 5 Volume out of Disks 1, 2 and 3


Answer Clike
Which tool should you use?

You have a server named Server1 that runs Windows Server 2012 R2.
Server1 has five network adapters. Three of the network adapters are connected to a network named LAN1.
The two other network adapters are connected to a network named LAN2.
You need to create a network adapter team from the three network adapters connected to LAN1. Which tool should you use?
A. Routing and Remote Access
B. Network Load Balancing Manager
C. Network and Sharing Center
D. Server Manager


Answer Clike
What should you do?

Your company’s security policy states that all of the servers deployed to a branch office must not have the graphical user interface (GUI) installed. In a branch office, a support technician installs a server with a GUI installation of Windows Server 2012 R2 on a new server, and then configures the server as a DHCP server.
You need to ensure that the new server meets the security policy. You want to achieve this goal by using the minimum amount of administrative effort.
What should you do?
A. From Server Manager, uninstall the User Interfaces and Infrastructure feature.
B. Reinstall Windows Server 2012 R2on the server.
C. From Windows PowerShell, run Uninstall-WindowsFeature Desktop-Experience.
D. From Windows PowerShell, run Uninstall-WindowsFeature PowerShell-ISE.


Answer Clike
Which of the following must you do to accomplish this?

Your manager has asked you to create various user objects using Windows PowerShell.
Which of the following must you do to accomplish this?
A. Use the Create-User createUsert
B. Use the objUser = new OUUser statement
C. Use the AddUser method of ADSL
D. Invoke the Create method of OU


Answer Clike
What should you do?

Your network contains an Active Directory domain named adatum.com. The domain contains several thousand member servers that run Windows Server 2012 R2. All of the computer accounts for the member servers are in an organizational unit (OU) named ServersAccounts. Servers are restarted only occasionally.
You need to identify which servers were restarted during the last two days.
What should you do?
A. Run dsquery computer and specify the -sra /epwc parameter.
B. Run Get-ADComputer and specify the SearchScope parameter.
C. Run dsquery server and specify the -o parameter.
D. Run Get-ADComputer and specify the lastLogon property


Answer Clike
What should you do on Server1?

Your network contains a server named Server1 that runs Windows Server 2012 R2.
Server1 has the Print and Document Services server role installed. You connect a new print device to the network. The marketing department and the sales department will use the print device.
You need to provide users from both departments with the ability to print to the network print device.
The solution must ensure that if there are multiple documents queued to print, the documents from the sales users print before the documents from the marketing users.
What should you do on Server1?
A. Add one printer. Modify the printer priority and the security settings.
B. Add two printers. Modify the priorities of each printer and the security settings of each printer.
C. Add two printers and configure printer pooling.
D. Add one printer and configure printer pooling.


Answer Clike
What should you configure?

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1.
You add two additional nodes to Cluster1. You need to ensure that Cluster1 stops running if three nodes fail.
What should you configure?
A. Affinity None
B. Affinity Single
C. The cluster quorum settings
D. The failover settings
E. A file server for general use
F. The Handling priority
G. The host priority
H. Live migration
I. The possible owner
J. The preferred owner
K. Quick migration
L. The Scale-Out File Server


Answer Clike
What should you do from Server1?

Your network contains two servers named Server1 and Server2. Both servers run Windows Server 2012 R2 and have the DNS Server server role installed. On Server1, you create a standard primary zone named contoso.com. You need to ensure that Server2 can host a secondary zone for contoso.com.
What should you do from Server1?
A. Create a zone delegation that points to Server2.
B. Create a trust anchor named Server2.
C. Convert contoso.com to an Active Directory-integrated zone.
D. Add Server2 as a name server.


Answer Clike
What should you do for each virtual machine?

Your network contains a server named Server1 that runs Windows Server 2012 R2.
Server1 has the Hyper-V server role installed. Server1 hosts 10 virtual machines that run Windows Server 2012 R2. You add a new server named Server2.
Server2 has faster hard disk drives, more RAM, and a different processor manufacturer than Server1.
You need to move all of the virtual machines from Server1 to Server2. The solution must minimize downtime.
What should you do for each virtual machine?
A. Perform a quick migration.
B. Perform a storage migration.
C. Export the virtual machines from Server1 and import the virtual machines to Server2.
D. Perform a live migration.


Answer Clike
Which Advanced Boot Option should you select?

You have a server named Server1 that runs Windows Server 2012 R2. You modify the properties of a system driver and you restart Server1. You discover that Server1 continuously restarts without starting Windows Server 2012 R2.
You need to start Windows Server 2012 R2 on Server1 in the least amount of time. The solution must minimize the amount of data loss.
Which Advanced Boot Option should you select?
A. Repair Your Computer
B. Disable Driver Signature Enforcement
C. Last Know Good Configuration (advanced)
D. Disable automatic restart on system failure


Answer Clike
What should you do?

You have a server named File1 that runs Windows Server 2012 R2. File1 has the File Server role service installed. You plan to back up all shared folders by using Microsoft Online Backup.
You download and install the Microsoft Online Backup Service Agent on File1.
You need to ensure that you use Windows Server Backup to back up data to Microsoft Online Backup.
What should you do?
A. From Computer Management, add the File1 computer account to the Backup Operators group.
B. From the Services console, modify the Log On settings of the Microsoft Online Backup Service Agent.
C. From Windows Server Backup, run the Register Server Wizard.
D. From a command prompt, run wbadmin.exe enable backup.


Answer Clike
Which two actions should you perform?

Your network contains an Active Directory domain named contoso.com. The network contains a file server named Server1 that runs Windows Server 2012 R2. You create a folder named Folder1. You share Folder1 as Share1.
The NTFS permissions on Folder1 are shown in the Folder1 exhibit. (Click the Exhibit button.)

The Everyone group has the Full control Share permission to Folder1.
You configure a central access policy as shown in the Central Access Policy exhibit. (Click the Exhibit button.)

Members of the IT group report that they cannot modify the files in Folder1. You need to ensure that the IT group members can modify the files in Folder1. The solution must use central access policies to control the permissions. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. On the Security tab of Folder1, remove the permission entry for the IT group.
B. On the Classification tab of Folder1, set the classification to “Information Technology”.
C. On the Security tab of Folder1, assign the Modify permission to the Authenticated Users group.
D. On Share1, assign the Change Share permission to the IT group.
E. On the Security tab of Folder1, add a conditional expression to the existing permission entry for the IT group.


Answer Clike
How many trusts should you identify?

Your network contains three Active Directory forests. Each forest contains an Active Directory Rights Management Services (AD RMS) root cluster.
All of the users in all of the forests must be able to access protected content from any of the forests.
You need to identify the minimum number of AD RMS trusts required.
How many trusts should you identify?
A. 2
B. 3
C. 4
D. 6


Answer Clike
Which server should you identify?

Your network contains an Active Directory domain named contoso.com. The domain contains four servers. The servers are configured as shown in the following table.

You plan to deploy an enterprise certification authority (CA) on a server named Servers. Server5 will be used to issue certificates to domain-joined computers and workgroup computers.
You need to identify which server you must use as the certificate revocation list (CRL) distribution point for Server5.
Which server should you identify?
A. Server1
B. Server3
C. Server4
D. Server2


Answer Clike
What should you do?

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2.
Server1 has the IP Address Management (IPAM) Server feature installed. IPAM is configured currently for Group Policy-based provisioning. You need to change the IPAM provisioning method on Server1.
What should you do?
A. Run the ipamgc.exe command.
B. Run the ipamgc.exe command.
C. Run the Set-IPAMConfigurationcmdlet.
D. Reinstall the IP Address Management (IPAM) Server feature.
E. Delete IPAM Group Policy objects (GPOs) from the domain.


Answer Clike
What should you do first?

Your network contains an Active Directory domain named contoso.com. The domain contains servers named Server1 and Server2 that run Windows Server 2012 R2.
Server1 has the IP Address Management (IPAM) Server feature installed. You install the IPAM client on Server2.
You open Server Manager on Server2 as shown in the exhibit. (Click the Exhibit button.) You need to manage IPAM from Server2.
What should you do first?

A. On Server2, open Computer Management and connect to Server1.
B. On Server1, add the Server2 computer account to the IPAM ASM Administrators group.
C. On Server2, add Server1 to Server Manager.
D. On Server1, add the Server2 computer account to the IPAM MSM Administrators group.


Answer Clike
Which tool should you use?

Your network contain an active directory domain named Contoso.com. The domain contains two servers named server1 and server2 that run Windows Server 2012 R2. You create a security template named template1 by using the security template snap-in. You need to apply template1 to server2.
Which tool should you use?
A. Security Configuration and Analysis
B. Server Manager
C. Security Template
D. Computer management


Answer Clike
Which tool should you use?

Your network contains an Active Directory domain named contoso.com. The domain contains two domain controllers named DC1 and DC2.
You install Windows Server 2012 R2 on a new computer named DC3.
You need to manually configure DC3 as a domain controller. Which tool should you use?
A. winrm.exe
B. Server Manager
C. dcpromo.exe
D. Active Directory Domains and Trusts


Answer Clike
What should you configure?

Your network contains an Active Directory domain named contoso.com. The domain contains an organizational unit (OU) named AHServers.OU.
You create and link a Group Policy object (GPO) named GP01 to AllServer.OU. GPO1 is configured as shown in the exhibit. (Click the Exhibit button.)

You need to ensure that GPO1 only applies to servers that have Remote Desktop Services (RDS) installed.
What should you configure?
A. Item-level targeting
B. WMI Filtering
C. Security Filtering
D. Block Inheritance


Answer Clike
What should you do?

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. The domain contains 200 Group Policy objects (GPOs) and 100 WMI filters.
An administrator named Admin1 must be able to create new WMI filters and edit all of the existing WMI filters from the Group Policy Management Console (GPMC).
You need to delegate the required permissions to Admin1. The solution must minimize the number of permissions assigned to Admin1.
What should you do?
A. From Active Directory Users and Computers, add Admin1 to the WinRMRemoteWMIUsers group.
B. From Group Policy Management, assign Creator Owner to Admin1 for the WMI Filters container.
C. From Active Directory Users and Computers, add Admin1 to the Domain Admins group.
D. From Group Policy Management, assign Full control to Admin1 for the WMI Filters container.


Answer Clike
Which two should you configure in DCS1?

You have a server named Server1 that runs Windows Server 2012 R2. You create a custom Data Collector Set (DCS) named DCS1.
You need to configure DCS1 to meet the following requirements:
Automatically run a program when the amount of total free disk space on Server1 drops below 10 percent of capacity.
Log the current values of several registry settings.
Which two should you configure in DCS1? (Each correct answer presents part of the solution. Choose two.)
A. Event trace data
B. A Performance Counter Alert
C. System configuration information
D. A performance counter


Answer Clike
Which two intended purposes should the certificate for Server1 contain?

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2. Both servers have the Hyper-V server role installed.
You plan to replicate virtual machines between Server1 and Server2. The replication will be encrypted by using Secure Sockets Layer (SSL). You need to request a certificate on Server1 to ensure that the virtual machine replication is encrypted.
Which two intended purposes should the certificate for Server1 contain? (Each correct answer presents part of the solution. Choose two.)
A. Client Authentication
B. Kernel Mode Code Signing
C. Server Authentication
D. IP Security end system
E. KDC Authentication


Answer Clike
What should you do before you run the tool?

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2.
Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1. Cluster1 contains a file server role named FS1 and a generic service role named SVC1. Server1 is the preferred node for FS1. Server2 is the preferred node for SVC1.
You plan to run a disk maintenance tool on the physical disk used by FS1.
You need to ensure that running the disk maintenance tool does not cause a failover to occur.
What should you do before you run the tool?
A. Run Suspend-ClusterNode.
B. Run cluster.exe and specify the offline parameter.
C. Run Suspcnd-ClusterResource.
D. Run cluster.exe and specify the pause parameter.


Answer Clike
What should you do?

Your network contains three servers named HV1, HV2, and Server1 that run Windows Server 2012 R2. HV1 and HV2 have the Hyper-V server role installed. Server1 is a file server that contains 3 TB of free disk space.
HV1 hosts a virtual machine named VM1. The virtual machine configuration file for VM1 is stored in D:VM and the virtual hard disk file is stored in E:
VHD.
You plan to replace drive E with a larger volume.
You need to ensure that VM1 remains available from HV1 while drive E is being replaced. You want to achieve this goal by using the minimum amount of administrative effort.
What should you do?
A. Perform a live migration to HV2.
B. Add HV1 and HV2 as nodes in a failover cluster. Perform a storage migration to HV2.
C. Add HV1 and HV2 as nodes in a failover cluster. Perform a live migration to HV2.
D. Perform a storage migration to Server1.


Answer Clike
Which tool should you use?

You have a failover cluster named Cluster1 that contains four nodes. All of the nodes run Windows Server 2012 R2.
You need to schedule the installation of Windows updates on the cluster nodes.
Which tool should you use?
A. The Add-CauClusterRolecmdlet
B. TheWuauclt command
C. TheWusa command
D. The Invoke-CauScancmdlet


Answer Clike
Which server and by which method should you move VM1?

You have a datacenter that contains six servers. Each server has the Hyper-V server role installed and runs Windows Server 2012 R2. The servers are configured as shown in the following table.

Host4 and Host5 are part of a cluster named Cluster1. Cluster1 hosts a virtual machine named VM1. You need to move VM1 to another Hyper-V host. The solution must minimize the downtime of VM1. To which server and by which method should you move VM1?
A. To Host3 by using a storage migration
B. To Host6 by using a storage migration
C. To Host2 by using a live migration
D. To Host1 by using a quick migration


Answer Clike
What should you do?

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2. DC1 has the DHCP Server server role installed.
DHCP is configured as shown in the exhibit. (Click the Exhibit button.)

You discover that client computers cannot obtain IPv4 addresses from DC1.
You need to ensure that the client computers can obtain IPv4 addresses from DC1.
What should you do?
A. Disable the Deny filters.
B. Authorize DC1.
C. Activate the scope.
D. Disable the Allow filters.


Answer Clike
Which additional configuration settings should you configure?

HOTSPOT
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server2 that runs Windows Server 2012 R2.
You are a member of the local Administrators group on Server2. You install an Active Directory Rights Management Services (AD RMS) root cluster on Server2.
You need to ensure that the AD RMS cluster is discoverable automatically by the AD RMS client computers and the users in contoso.com. Which additional configuration settings should you configure? To answer, select the appropriate tab in the answer area.
Hot Area:



Answer Clike
Which setting should you configure?

HOTSPOT
Your network contains an Active Directory domain named contoso.com.
You have several Windows PowerShell scripts that execute when users log on to their client computer.
You need to ensure that all of the scripts execute completely before the users can access their desktop.
Which setting should you configure? To answer, select the appropriate setting in the answer area.
Hot Area:



Answer Clike
What should you do first on DC2?

Your network contains two Active Directory forests named contoso.com and dev.contoso.com. The contoso.com forest contains a domain controller named DO. The dev.contoso.com forest contains a domain controller named DC2. Each domain contains an organizational unit (OU) named OU1.
Dev.contoso.com has a Group Policy object (GPO) named GP01. GP01 contains 200 settings, including several settings that have network paths. GP01 is linked to OU1.
You need to copy GP01 from dev.contoso.com to contoso.com.
What should you do first on DC2?
A. From the Group Policy Management console, right-click GPO1 and select Copy.
B. Run the mtedit.exe command and specify the /Domaintcontoso.com /DC: DC 1 parameter.
C. Run the Save-NetGpocmdlet.
D. Run the Backup-Gpocmdlet.


Answer Clike
What should you modify in the SOA record for the adatum.com zone?

HOTSPOT
Your network contains an Active Directory domain named contoso.com.
All DNS servers host a DNS zone named adatum.com. The adatum.com zone is not Active Directory-integrated.
An administrator modifies the start of authority (SOA) record for the adatum.com zone.
After the modification, you discover that when you add or modify DNS records in the adatum.com zone, the changes are not transferred to the DNS servers that host secondary copies of the adatum.com zone.
You need to ensure that the records are transferred to all the copies of the adatum.com zone.
What should you modify in the SOA record for the adatum.com zone?
To answer, select the appropriate setting in the answer area.
Hot Area:



Answer Clike
Which FSMO role should you transfer to DC2?

Your network contains an Active Directory domain named contoso.com. The domain contains six domain controllers. The domain controllers are configured as shown in the following table.

The network contains a server named Server1 that has the Hyper-V server role installed. DC6 is a virtual machine that is hosted on Server1.
You need to ensure that you can clone DC6.
Which FSMO role should you transfer to DC2?
A. Rid master
B. Domain naming master
C. PDC emulator
D. Infrastructure master


Answer Clike
What should you do first?

Your network contains an Active Directory domain named contoso.com. The domain contains domain controllers that run Windows Server 2008, Windows Server 2008 R2 Windows Server 2012, and Windows Server 2012 R2.
A domain controller named DC1 runs Windows Server 2012 R2. DC1 is backed up daily. During routine maintenance, you delete a group named Group1.
You need to recover Group1 and identify the names of the users who were members of Group1 prior to its deletion. You want to achieve this goal by using the minimum amount of administrative effort.
What should you do first?
A. Perform an authoritative restore of Group1.
B. Mount the most recent Active Directory backup.
C. Use the Recycle Bin to restore Group1.
D. Reactivate the tombstone of Group1.


Answer Clike
Which tool should you use?

Your network contains an Active Directory domain named contoso.com. Domain controllers run either Windows Server 2008 R2 Service Pack 1 (SP1) or Windows Server 2012 R2.
A support technician accidentally deletes a user account named User1. You need to use tombstone reanimation to restore the User1 account. Which tool should you use?
A. Active Directory Administrative Center
B. Ntdsutil
C. Ldp
D. Esentutl


Answer Clike
Which naming context should you use?

HOTSPOT
Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. All domain controllers run Windows Server 2012 R2 and are configured as DNS servers. All DNS zones are Active Directory-integrated. Active Directory Recycle Bin is enabled.
You need to modify the amount of time deleted objects are retained in the Active Directory Recycle Bin. Which naming context should you use?
To answer, select the appropriate naming context in the answer area.
Hot Area:



Answer Clike
Which two should you configure in DCS1?

Your network contains a domain controller named DC1 that runs Windows Server 2012 R2. You create a custom Data Collector Set (DCS) named DCS1.
You need to configure DCS1 to collect the following information:
The amount of Active Directory data replicated between DC1 and the other domain controllers The current values of several registry settings
Which two should you configure in DCS1? (Each correct answer presents part of the solution. Choose two.)
A. Event trace data
B. A Performance Counter Alert
C. System configuration information
D. A performance counter


Answer Clike
Which two nodes should you configure from the Network Policy Server console?

HOTSPOT
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that has the Network Policy Server server role installed. The domain contains a server named Server2 that is configured for RADIUS accounting.
Server1 is configured as a VPN server and is configured to forward authentication requests to Server2.
You need to ensure that only Server2 contains event information about authentication requests from connections to Server1. Which two nodes should you configure from the Network Policy Server console?
To answer, select the appropriate two nodes in the answer area.
Hot Area:



Answer Clike
Which four commands should you run?

DRAG DROP
Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1. You need to create an Active Directory snapshot on DC1.
Which four commands should you run?
To answer, move the four appropriate commands from the list of commands to the answer area and arrange them in the correct order.
Select and Place:



Answer Clike
Which value should you modify in the Start of Authority (SOA) record?

HOTSPOT
Your network contains a DNS server named Server1 that runs Windows Server 2012 R2.
Server1 has a zone namedcontoso.com. The network contains a server named Server2 that runs Windows Server 2008 R2. Server1 and Server2 are members of an Active Directory domain named contoso.com.
You change the IP address of Server2.
Several hours later, some users report that they cannot connect to Server2.
On the affected users’ client computers, you flush the DNS client resolver cache, and the users successfully connect to Server2.
You need to reduce the amount of time that the client computers cache DNS records from contoso.com.
Which value should you modify in the Start of Authority (SOA) record?To answer, select the appropriate setting in the answer area.
Hot Area:



Answer Clike
Which setting should you modify in the start of authority (SOA) record?

Your company has a main office and a branch office.
The network contains an Active Directory domain named contoso.com.
The main office contains a domain controller named DC1 that runs Windows Server 2012 R2.
DC1 is a DNS server and hosts a primary zone for contoso.com. The branch office contains a member server named Server1 that runs Windows Server 2012 R2. Server1 is a DNS server and hosts a secondary zone for contoso.com.
The main office connects to the branch office by using an unreliable WAN link.
You need to ensure that Server1 can resolve names in contoso.com if the WAN link in unavailable for three days.
Which setting should you modify in the start of authority (SOA) record?
A. Retry interval
B. Refresh interval
C. Expires after
D. Minimum (default) TTL


Answer Clike
What should you do?

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2.
Administrators use client computers that run Windows 8 to perform all management tasks. A central store is configured on a domain controller named DC1.
You have a custom administrative template file named AppLadmx. App1.admx contains application settings for an application named App1. From a client computer named Computer1, you create a new Group Policy object (GPO) named GPO1.
You discover that the application settings for App1 fail to appear in GPO1.
You need to ensure that the App1 settings appear in all of the new GPOs that you create.
What should you do?
A. From the Default Domain Controllers Policy, add App1.admx to the Administrative Templates.
B. Copy App1.admx to Contoso.comSYSVOLContoso.comPoliciesPolicyDefinitions.
C. From the Default Domain Policy, add App1.admx to the Administrative Templates.
D. Copy App1.admx to Contoso.comSYSVOLContoso.comStarterGPOs.


Answer Clike
What should you do?

Your network contains an Active Directory domain named contoso.com. The domain contains Server 2012 R2 and has the Hyper-V server role installed. You need to log the amount of system resources used by each virtual machine.
What should you do?
A. From Windows PowerShell, run the Enable-VMResourceMeteringcmdlet.
B. From Windows System Resource Manager, enable Accounting.
C. From Windows System Resource Manager, add a resource allocation policy.
D. From Windows PowerShell, run the Measure-VM cmdlet.


Answer Clike
What should you do?

You have a server named Server1 that runs Windows Server 2012 R2.
Server1 has the Hyper-V server role installed. You have fixed-size VHD named Files.vhd.
You need to make the contents in Files.vhd available to several virtual machines. The solution must meet the following requirements:
- Ensure that if the contents are changed on any virtual machine, the changes are not reflected on the other virtual machines.
- Minimize the amount of disk space used.
What should you do?
A. Create differencing VHD5 that use Files.vhd as the parent disk.
B. Create a fixed-size VHDX. Transfer the information from Files.vhd to the new VHDX file.
C. Convert Files.vhd to a dynamically expanding VHD.
D. Create a dynamically expanding VHDX. Transfer the information from Files.vhd to the new VHDX file.


Answer Clike
Which Windows PowerShell cmdlet should you run?

You have a server named Server1 that runs Windows Server 2012 R2.
You plan to enable Hyper-V Network Virtualization on Server1.
You need to install the Windows Network Virtualization Filter Driver on Server1.
Which Windows PowerShell cmdlet should you run?
A. Set-NetVirtualizationGlobal
B. Enable-NetAdapterBinding
C. Add – WindowsFeature
D. Set-NetAdapterVmq


Answer Clike
What should you do?

Your network contains an Active Directory domain named contoso.com. The domain contains a member server named HVServer1. HVServer1 runs Windows Server 2012 R2 and has the Hyper-V server role installed.
HVServer1 hosts 10 generation 1 virtual machines. All of the virtual machines connect to a virtual switch named Switch1. Switch1 is configured as a private network. All of the virtual machines have the DHCP guard and the router guard settings enabled.
You install the DHCP server role on a virtual machine named Server1. You authorize Server1 as a DHCP server in contoso.com. You create an IP scope.
You discover that the virtual machines connected to Switch1 do not receive IP settings from Server1. You need to ensure that the virtual machines can use Server1 as a DHCP server.
What should you do?
A. Enable MAC address spoofing on Server1.
B. Enable single-root I/O visualization (SR-IOV) on Server1.
C. Disable the DHCP guard on Server1.
D. Disable the DHCP guard on all of the virtual machines that are DHCP clients.


Answer Clike
Which settings should you configure on VM1?

HOTSPOT
Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2.
Server1 has the Hyper-V server role installed. Server2 has the Windows Deployment Services server role installed.
On Server1, you have a virtual machine named VM1.
You plan to deploy an image to VM1 by using Windows Deployment Services (WDS). You need to ensure that VM1 can connect to Server1 by using PXE.
Which settings should you configure on VM1?To answer, select the appropriate settings in the answer area.
Hot Area:



Answer Clike
What should you do?

Your network contains an Active Directory domain named contoso.com.
You install Windows Server 2012 R2 on a new server named Server1 and you join Server1 to the domain. You need to ensure that you can view processor usage and memory usage information in Server Manager.
What should you do?
A. From Server Manager, click Configure Performance Alerts.
B. From Performance Monitor, create a Data Collector Set (DCS).
C. From Performance Monitor, start the System Performance Data Collector Set (DCS).
D. From Server Manager, click Start Performance Counters.


Answer Clike
Which three actions should you perform in sequence?

DRAG DROP
You have a server that runs Windows Server 2012 R2.
You need to create a volume that will remain online if two disks in the volume fail. The solution must minimize the number of disks used to create the volume.
Which three actions should you perform in sequence? (To answer, move the appropriate three actions from the list of actions to the answer area and arrange them in the correct order.)
Select and Place:



Answer Clike
What should you do?

You have a server named Server1 that runs Windows Server 2012 R2.
Server1 has three physical network adapters named NIC1, NIC2, and NIC3.
On Server1, you create a NIC team named Team1 by using NIC1 and NIC2. You configure Team1 to accept network traffic on VLAN 10.
You need to ensure that Server1 can accept network traffic on VLAN 10 and VLAN 11. The solution must ensure that the network traffic can be received on both VLANs if a network adapter fails.
What should you do?
A. From Server Manager, change the load balancing mode of Team1.
B. Run the New-NetLbfoTeamcmdlet.
C. From Server Manager, add an interface to Team1.
D. Run the Add-NetLbfoTeamMembercmdlet.


Answer Clike
Which virtual machine setting should you configure?

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2.
Server1 has the Hyper-V server role installed. The domain contains a virtual machine named VM1.
A developer wants to attach a debugger to VM1.
You need to ensure that the developer can connect to VM1 by using a named pipe.
Which virtual machine setting should you configure?
A. BIOS
B. Network Adapter
C. COM 1
D. Processor


Answer Clike
What should you do?

Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server 1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed.
You create an external virtual switch named Switch1. Switch1 has the following configurations:
- Connection type: External network
- Single-root I/O virtualization (SR-IOV): Enabled Ten virtual machines connect to Switch1.
You need to ensure that all of the virtual machines that connect to Switch1 are isolated from the external network and can connect to each other only. The solution must minimize network downtime for the virtual machines.
What should you do?
A. Remove Switch1 and recreate Switch1 as an internal network.
B. Change the Connection type of Switch1 to Private network.
C. Change the Connection type of Switch1 to Internal network.
D. Remove Switch1 and recreate Switch1 as a private network.


Answer Clike
Which settings should you modify?

You have a server named Server1 that runs Windows Server 2012 R2.
Server1 has the Hyper-V server role installed. Server1 has 8 GB of RAM. Server1 hosts five virtual machines that run Windows Server 2012 R2.
The settings of a virtual machine named Server3 are configured as shown in the exhibit. (Click the Exhibit button.)

You need to ensure that when Server1 restarts, Server3 automatically resumes without intervention. The solution must prevent data loss. Which settings should you modify?
A. BIOS
B. Automatic Stop Action
C. Automatic Start Action
D. Integration Services


Answer Clike
Which virtual machine settings should you configure on VM1 and VM2?

Your network contains two Hyper-V hosts named Host1 and Host2. Host1 contains a virtual machine named VM1. Host2 contains a virtual machine named VM2. VM1 and VM2 run Windows Server 2012 R2.
You install the Network Load Balancing feature on VM1 and VM2.
You need to ensure that the virtual machines are configured to support Network Load Balancing (NLB).
Which virtual machine settings should you configure on VM1 and VM2?
A. DHCP guard
B. MAC address
C. Router guard
D. Port mirroring


Answer Clike
Which two commands should you run from Windows PowerShell?

Your network contains an Active Directory domain named contoso.com. The domain contains a member server named HVServer1. HVServer1 runs Windows Server 2012 R2 and has the Hyper-V server role installed.
HVServer1 hosts two virtual machines named Server1 and Server2. Both virtual machines connect to a virtual switch named Switch1. On Server2, you install a network monitoring application named App1.
You need to capture all of the inbound and outbound traffic to Server1 by using App1.
Which two commands should you run from Windows PowerShell? (Each correct answer presents part of the solution. Choose two.)
A. Get-VM “Server2” | Set-VMNetworkAdapter -IovWeight 1
B. Get-VM “Server1” | Set-VMNetworkAdapter -Allow/Teaming On
C. Get-VM “Server1” | Set-VMNetworkAdapter -PortMirroring Source
D. Get-VM “Server2” | Set-VMNetworkAdapter -PortMirroring Destination
E. Get-VM “Server1” | Set-VMNetworkAdapter -IovWeight 0
F. Get-VM “Server2” | Set-VMNetworkAdapter-AllowTeaming On


Answer Clike
What should you instruct User1 to do?

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed.
On Server1, an administrator creates a virtual machine named VM1.
A user named User1 is the member of the local Administrators group on Server1.
User1 attempts to modify the settings of VM1 as shown in the following exhibit. (Click the Exhibit button.)

You need to ensure that User1 can modify the settings of VM1 by running the Set-Vmcmdlet.
What should you instruct User1 to do?
A. Run Windows PowerShell with elevated privileges.
B. Install the Integration Services on VM1.
C. Modify the membership of the local Hyper-V Administrators group.
D. Import the Hyper-V module.


Answer Clike
Which cmdlet should you run first?

You have a file server named Server1 that runs Windows Server 2012 R2.
Server1 has following hardware configurations: You add additional CPUs and RAM to Server1.
You repurpose Server1 as a visualization host. You install the Hyper-V server role on Server1.
You need to create four external virtual switches in Hyper-V.
Which cmdlet should you run first?
A. Set-NetAdapter
B. Add-NetLbfoTeamNic
C. Add-VMNetworkAdapter
D. Remove-NetLbfoTeam


Answer Clike
What should you do first?

You have a server that runs Windows Server 2012 R2.
The disks on the server are configured as shown in the exhibit. (Click the Exhibit button.)

You need to create a storage pool that contains Disk 1 and Disk 2.
What should you do first?
A. Convert Disk 1 and Disk 2 to GPT disks
B. Create a volume on Disk 2
C. Convert Disk 1 and Disk 2 to dynamic disks
D. Delete volume E


Answer Clike
What should you do?

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. The domain contains a standalone server named Server2 that is located in a perimeter network. Both servers run the default installation of Windows Server 2012 R2.
You need to manage Server2 remotely from Server1.
What should you do?
A. From Server1, run the Enable-PsRemotingcmdlet.
B. FromServer2, run the winrm command.
C. From Server2,run the Enable-PsRemotingcmdlet.
D. FromServer1, run the winrm command.


Answer Clike
What should you configure on VM1?

HOTSPOT
Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 and Server2 have the Hyper-V server role installed.
Server1 and Server2 have different processor models from the same manufacturer.
On Server1, you plan to create a virtual machine named VM1. Eventually, VM1 will be exported to Server2. You need to ensure that when you import VM1 to Server2, you can start VM1 from saved snapshots.
What should you configure on VM1?
To answer, select the appropriate node in the answer area.
Hot Area:



Answer Clike
Which two actions should you perform?

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2.
Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1. Cluster1 has access to four physical disks. The disks are configured as shown in the following table.

You need to ensure that all of the disks can be added to a Cluster Shared Volume (CSV).
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Enable BitLocker on Disk4
B. Disable BitLocker on Disk1
C. Format Disk2 to use NTFS
D. Format Disk3 to use NTFS


Answer Clike
Which two tools should you use?

Your network contains an Active Directory domain named contoso.com. The domain contains three servers named Server1, Server2, and Server3 that run Windows Server 2012 R2. All three servers have the Hyper-V server role installed and the Failover Clustering feature installed.
Server1 and Server2 are nodes in a failover cluster named Cluster1. Several highly available virtual machines run on Cluster1. Cluster1 has that Hyper- V Replica Broker role installed. The Hyper-V Replica Broker currently runs on Server1.
Server3 currently has no virtual machines.
You need to configure Cluster1 to be a replica server for Server3 and Server3 to be a replica server for Cluster1. Which two tools should you use? {Each correct answer presents part of the solution. Choose two.)
A. The Hyper-V Manager console connected to Server3
B. The Failover Cluster Manager console connected to Server3
C. The Hyper-V Manager console connected to Server1.
D. The Failover Cluster Manager console connected to Cluster1
E. The Hyper-V Manager console connected to Server2


Answer Clike
What command should you run?

HOTSPOT
Your network contains an Active Directory domain named contoso.com. You have a Dynamic Access Control policy named Policy1.
You create a new Central Access Rule named Rule1. You need to add Rule1 to Policy1.
What command should you run?
To answer, select the appropriate options in the answer area.
Hot Area:



Answer Clike
What should you do?

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server3 that runs Windows Server 2012 R2 and has the DHCP Server server role installed.
DHCP is configured as shown in the exhibit. (Click the Exhibit button.)

You need to ensure that only Scope1, Scope3, and Scope5 assign the same DNS servers to DHCP clients. The solution must minimize administrative effort.
What should you do?
A. Create a superscope and a filter.
B. Create a superscope and scope-level policies.
C. Configure the Server Options.
D. Configure the Scope Options.


Answer Clike
What should you do first?

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012
R2 and has the DNS Server server role installed.
Server1 has a zone named contoso.com. The zone is configured as shown in the exhibit. (Click the Exhibit button.)

You need to assign a user named User1 permission to add and delete records from the contoso.com zone only.
What should you do first?
A. Enable the Advanced view from DNS Manager.
B. Add User1 to the DnsUpdateProxy group.
C. Run the New Delegation Wizard.
D. Configure the zone to be Active Directory-integrated.


Answer Clike
Which three actions should you perform in sequence?

DRAG DROP
Your network contains an Active Directory domain named adatum.com. The domain contains three servers. The servers are configured as shown in the following table.

Server1 is configured as shown in the exhibit. (Click the Exhibit button.)

Template1 contains custom cryptography settings that are required by the corporate security team. On Server2, an administrator successfully installs a certificate based on Template1.
The administrator reports that Template1 is not listed in the Certificate Enrollment wizard on Server3, even after selecting the Show all templates check box.
You need to ensure that you can install a server authentication certificate on Server3. The certificate must comply with the cryptography requirements.
Which three actions should you perform in sequence?
To answer, move the appropriate three actions from the list of actions to the answer area and arrange them in the correct order.
Select and Place:



Answer Clike
What should you run on Server1?

Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Active Directory Certificate Services server role installed and is configured as a standalone certification authority (CA).
You install a second server named Server2. You install the Online Responder role service on Server2.
You need to ensure that Server1 can issue an Online Certificate Status Protocol (OCSP) Response Signing certificate to Server2.
What should you run on Server1?
A. The certreq.exe command and specify the -policy parameter
B. The certutil.exe command and specify the -getkey parameter
C. The certutil.exe command and specify the -setreg parameter
D. The certreq.exe command and specify the -retrieve parameter


Answer Clike
Which command should you run?

Your network contains an Active Directory domain named contoso.com. The domain contains a file server named File1 that runs a Server Core Installation of Windows Server 2012 R2.
File1 has a volume named D that contains home folders. File1 creates a shadow copy of volume D twice a day. You discover that volume D is almost full.
You add a new volume named H to File1.
You need to ensure that the shadow copies of volume D are stored on volume H. Which command should you run?
A. The Set-Volume cmdlet with the -driveletter parameter
B. The vssadmin.exe create shadow command
C. The Set-Volume cmdlet with the -path parameter
D. The vssadmin.exe add shadowstorage command


Answer Clike
What should you do?

You have a virtual machine named VM1 that runs on a host named Host1.
You configure VM1 to replicate to another host named Host2. Host2 is located in the same physical location as Host1.
You need to add an additional replica of VM1. The replica will be located in a different physical site.
What should you do?
A. From VM1 on Host2, click Extend Replication.
B. On Host1, configure the Hyper-V settings.
C. From VM1 on Host1, click Extend Replication.
D. On Host2, configure the Hyper-V settings.


Answer Clike
What should you do from Hyper-V Manager?

Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 and Server2 have the Hyper-V server role installed. Server1 and Server2 are configured as Hyper-V replicas of each other.
Server2 hosts a virtual machine named VM5. VM5 is replicated to Server1.
You need to verily whether the replica of VMS on Server1 is functional. The solution must ensure that VMS remains accessible to clients.
What should you do from Hyper-V Manager?
A. On Server1, execute a Planned Failover.
B. On Server1, execute a Test Failover.
C. On Server2, execute a Planned Failover.
D. On Server2, execute a Test Failover.


Answer Clike
Which type of trust policy should you create?

Your network contains an Active Directory forest named adatum.com. The forest contains an Active Directory Rights Management Services (AD RMS) cluster.
A partner company has an Active Directory forest named litwareinc.com. The partner company does not have AD RMS deployed. You need to ensure that users in litwareinc.com can consume rights-protected content from adatum.com.
Which type of trust policy should you create?
A. At federated trust
B. A trusted user domain
C. A trusted publishing domain
D. Windows Live ID


Answer Clike
What should you do?

Your network contains an Active Directory domain named adatum.com. The domain contains a server named CA1 that runs Windows Server 2012 R2. CA1 has the Active Directory Certificate Services server role installed and is configured to support key archival and recovery.
You need to ensure that a user named User1 can decrypt private keys archived in the Active Directory Certificate Services (AD CS) database. The solution must prevent User1 from retrieving the private keys from the AD CS database.
What should you do?
A. Assign User1 the Issue and Manage Certificates permission to CA1.
B. Assign User1 the Read permission and the Write permission to all certificate templates.
C. Provide User1 with access to a Key Recovery Agent certificate and a private key.
D. Assign User1 the Manage CA permission to CA1.


Answer Clike
What should you do?

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 is an enterprise root certification authority (CA) for contoso.com.
Your user account is assigned the certificate manager role and the auditor role on the contoso.com CA. Your account is a member of the local Administrators group on Server1.
You enable CA role separation on Server1.
You need to ensure that you can manage the certificates on the CA.
What should you do?
A. Remove your user account from the local Administrators group.
B. Assign the CA administrator role to your user account.
C. Assign your user account the Bypass traverse checking user right.
D. Remove your user account from the Manage auditing and security log user right.


Answer Clike
Which cmdlet should you run on each server?

HOTSPOT
Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 and a server named Server1. Both servers run Windows Server 2012 R2.
You configure the classification of a share on Server1 as shown in the Share1 Properties exhibit. (Click the Exhibit button.)

You configure the resource properties in Active Directory as shown in the Resource Properties exhibit. (Click the Exhibit button.)

You need to ensure that the Impact classification can be assigned to Share1 immediately.
Which cmdlet should you run on each server?
To answer, select the appropriate cmdlet for each server in the answer area.

Hot Area:


Answer Clike
What command should you run?

HOTSPOT
Your network contains an Active Directory domain named contoso.com. The domain contains a DNS server named Server1. Server1 is configured to resolve single-label names for DNS clients.
You need to view the number of queries for single-label names that are resolved by Server1.
What command should you run?
To answer, select the appropriate options in the answer area.
Hot Area:



Answer Clike
What can be migrated by using the Windows Server Migration Tools.

HOTSPOT
You have a Hyper-V host named Server1 that runs Windows Server 2008 R2.All of the virtual machines on Server1 use VHDs.
You install the Hyper-V server role on a server named Server2 that runs Windows Server 2012 R2.Server2 has the same hardware configurations as Server1.
You plan to migrate the Hyper-V host from Server1 to Server2 by using the Windows Server Migration Tools.
In the table below, identify what can be migrated by using the Windows Server Migration Tools. Make only one selection in each row. Each correct selection is worth one point.
Hot Area:



Answer Clike
What should you do?

You have a laptop named Computer 1. Computer1 runs Windows 8 Enterprise.
Computer1 has a wired network adapter and a wireless network adapter. Computer1 connects to a wireless network named Network1.
For testing purposes, you install Windows Server 2012 R2 on Computer1 as a second operating system. You install the drivers for the wireless network adapter.
You need to ensure that you can connect to Network1 from Windows Server 2012 R2.
What should you do?
A. From a local Group Policy object (GPO), configure the Wireless Network (IEEE 802.11) Policies settings.
B. From Server Manager, install the Wireless LAN Service feature.
C. Restart the WLAN AutoConfig service.
D. From a local Group Policy object (GPO), configure the settings of Windows Connection Manager.


Answer Clike
Which file system should you use?

You plan to deploy a file server to a temporary location.
The temporary location experiences intermittent power failures. The file server will contain a dedicated volume for shared folders.
You need to create a volume for the shared folders. The solution must minimize the likelihood of file corruption if a power failure occurs.
Which file system should you use?
A. NFS
B. FAT32
C. ReFS
D. NTFS


Answer Clike
HOTSPOT

HOTSPOT
The settings for a virtual machine named VM2 are configured as shown in the VM2 exhibit. (Click the Exhibit button.)

The settings for Disk1.vhdx are configured as shown in the Disk1.vhdx exhibit. (Click the Exhibit button.)

The settings for Disk2.vhdx are configured as shown in the Disk2.vhdx exhibit.(Click the Exhibit button.)

Select Yes if the statement can be shown to be true based on the available information; otherwise select No.Each correct selection is worth one point.
Hot Area:



Answer Clike
Which virtual machine settings should you configure?

Your network contains two Hyper-V hosts that run Windows Server 2012 R2. The Hyper-V hosts contains several virtual machines that run Windows Server 2012 R2.
You install the Network Load Balancing feature on the virtual machines.
You need to configure the virtual machines to support Network Load Balancing (NLB). Which virtual machine settings should you configure?
A. DHCP guard
B. Port mirroring
C. Router guard
D. MAC address


Answer Clike
What should you do on Server1?

You have a Hyper-V host named Server1 that runs Windows Server 2012 R2. Server1 has the virtual switches listed in the following table.

You create a virtual machine named VM1. VM1 has two network adapters. One network adapter connects to vSwitch1. The other network adapter connects to vSwitch2. You configure NIC teaming on VM1.
You need to ensure that if a physical NIC fails on Server1, VM1 remains connected to the network.
What should you do on Server1?
A. Run the Set-VmNetworkAdaptercmdlet.
B. Add a new network adapter to VM1.
C. Create a new virtual switch on Server 1.
D. Modify the properties of vSwitch1 and vSwitch2.


Answer Clike
Which three actions should you perform in sequence?

DRAG DROP
You have a Hyper-V host named Server1.
Server1 hosts a virtual machine named VM1.
You view the properties of VM1 as shown in the following exhibit. (Click the Exhibit button.)

You need to configure bandwidth management for VM1.
Which three actions should you perform in sequence? (To answer, move the appropriate three actions from the list of actions to the answer area and arrange them in the correct order.)
Select and Place:



Answer Clike
What should you do?

You have a Hyper-V host named Server1 that runs Windows Server 2012 R2 Datacenter. Server1 is located in an isolated network that cannot access the Internet.
On Server1, you install a new virtual machine named VM1. VM1 runs Windows Server 2012 R2 Essentials and connects to a private virtual network.
After 30 days, you discover that VM1 shuts down every 60 minutes.
You need to resolve the issue that causes VM1 to shut down every 60 minutes.
What should you do?
A. OnVM1, run slmgr.exe and specify the /ipk parameter.
B. OnServer1, run slmgr.exe and specify the /rearm-sku parameter.
C. Create a new internal virtual network and attach VM1 to the new virtual network.
D. On Server1, run Add-WindowsFeatureVolumeActivation.


Answer Clike
Which tool should you use?

You have a failover cluster named Cluster1 that contains four nodes. All of the nodes run Windows Server 2012 R2.
You need to force every node in Cluster1 to contact immediately the Windows Server Update Services (WSUS) server on your network for updates.
Which tool should you use?
A. The Add-CauClusterRolecmdlet
B. TheWuauclt command
C. TheWusa command
D. The Invoke-CauScancmdlet


Answer Clike
How should you configure the witness disk?

DRAG DROP
Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2 that run Windows Server 2012 R2.
You configure a new failover cluster named Cluster1. Server1 and Server2 are nodes in Cluster1. You need to configure the disk that will be used as a witness disk for Cluster1.
How should you configure the witness disk?
To answer, drag the appropriate configurations to the correct location or locations. Each configuration may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
Select and Place:



Answer Clike
What should you configure on VM1?

HOTSPOT
Your network contains two Hyper-V hosts that are configured as shown in the following table.

You create a virtual machine on Server1 named VM1.
You plan to export VM1 from Server1 and import VM1 to Server2.
You need to ensure that you can start the imported copy of VM1 from snapshots.
What should you configure on VM1?
To answer, select the appropriate node in the answer area.
Hot Area:



Answer Clike
Which tool should you use?

You have a server named SCI that runs a Server Core Installation of Windows Server 2012 R2. Shadow copies are enabled on all volumes.
You need to delete a specific shadow copy. The solution must minimize server downtime. Which tool should you use?
A. Shadow
B. Diskshadow
C. Wbadmin
D. Diskpart


Answer Clike
Which three actions should you perform?

Your network contains an Active Directory domain named contoso.com. The domain contains four servers named Server1, Server2, Server3, and Server4 that run Windows Server 2012 R2.
All servers have the Hyper-V server role and the Failover Clustering feature installed.
The servers are configured as shown in the following table.

You need to replicate virtual machines from Cluster1 to Cluster2.
Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.)
A. From Hyper-V Manager on a node in Cluster2, create three virtual machines.
B. From Cluster2, add and configure the Hyper-V Replica Broker role.
C. From Failover Cluster Manager on Cluster1, configure each virtual machine for replication.
D. From Cluster1, add and configure the Hyper-V Replica Broker role.
E. From Hyper-V Manager on a node in Cluster2/ modify the Hyper-V settings.


Answer Clike
What should you run?

You have a file server named Server1 that runs a Server Core Installation of Windows Server 2012 R2.
Server1 has a volume named D that contains user data.
Server1 has a volume named E that is empty. Server1 is configured to create a shadow copy of volume D every hour.
You need to configure the shadow copies of volume D to be stored on volume E.
What should you run?
A. The Set-Volume cmdlet with the -driveletter parameter
B. The Set-Volume cmdlet with the -path parameter
C. The vssadmin.exe add shadowstorage command
D. The vssadmin.exe create shadow command


Answer Clike
Which servers must be upgraded to support the requirements of Share1.

HOTSPOT
Your network contains an Active Directory domain named contoso.com. The relevant servers in the domain are configured as shown in the following table.

You plan to create a shared folder on Server1 named Share1. Share1 must only be accessed by users who are using computers that are joined to the domain.
You need to identify which servers must be upgraded to support the requirements of Share1.
In the table below, identify which computers require an upgrade and which computers do not require an upgrade. Make only one selection in each row. Each correct selection is worth one point.
Hot Area:



Answer Clike
Which tab should you use to configure the required CDP entry?

HOTSPOT
Your company has a primary data center and a disaster recovery data center.
The network contains an Active Directory domain named contoso.com. The domain contains a server named that runs Windows Server 2012 R2. Server1 is located in the primary data center.
Server1 has an enterprise root certification authority (CA) for contoso.com.
You deploy another server named Server2 to the disaster recovery data center.
You plan to configure Server2 as a secondary certificate revocation list (CRL) distribution point. You need to configure Server2 as a CRL distribution point (CDP).
Which tab should you use to configure the required CDP entry? To answer, select the appropriate tab in the answer area.
Hot Area:



Answer Clike
Which setting should you modify?

HOTSPOT
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Active Directory Certificate Services server role installed and configured.
For all users, you are deploying smart cards for logon. You are using an enrollment agent to enroll the smart card certificates for the users. You need to configure the Contoso Smartcard Logon certificate template to support the use of the enrollment agent.
Which setting should you modify? To answer, select the appropriate setting in the answer area.
Hot Area:



Answer Clike
Which type of trust policy should you create?

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2.
Server1 has the Active Directory Rights Management Services server role installed.
Your company works with a partner organization that does not have its own Active Directory Rights Management Services (AD RMS) implementation. You need to create a trust policy for the partner organization.
The solution must meet the following requirements:
- Grant users in the partner organization access to protected content
- Provide users in the partner organization with the ability to create protected content Which type of trust policy should you create?
A. A federated trust
B. Windows Live ID
C. A trusted publishing domain
D. A trusted user domain


Answer Clike
What should you do?

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2. DC1 has the DNS Server server role installed.
The network contains client computers that run either Linux, Windows 7, or Windows 8. You have a zone named adatum.com as shown in the exhibit. (Click the Exhibit button.)

You plan to configure Name Protection on all of the DHCP servers.
You need to configure the adatum.com zone to support Name Protection.
What should you do?
A. Change the zone type.
B. Sign the zone.
C. Add a DNSKEY record.
D. Configure Dynamic updates.


Answer Clike
What should you do?

You have a server named Server1 that runs Windows Server 2012 R2. Server1 is located in the perimeter network and has the DNS Server server role installed.
Server1 has a zone named contoso.com.
You apply a security template to Server1.
After you apply the template, users report that they can no longer resolve names from contoso.com.
On Server1, you open Windows Firewall with Advanced Security as shown in the Firewall exhibit. (Click the Exhibit button.)

On Server1, you open Windows Firewall with Advanced Security as shown in the Firewall exhibit. (Click the Exhibit button.)

You need to ensure that users can resolve contoso.com names.
What should you do?
A. From Windows Firewall with Advanced Security, disable the DNS (TCP, Incoming) rule and the DNS (UDP, Incoming) rule.
B. From DNS Manager, modify the Zone Transfers settings of the contoso.com zone.
C. From DNS Manager, unsign the contoso.com zone.
D. From DNS Manager, modify the Start of Authority (SOA) of the contoso.com zone.
E. From Windows Firewall with Advanced Security, modify the profiles of the DNS (TCP, Incoming) rule and the DNS (UDP, Incoming) rule.


Answer Clike
Which service should you start?

Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server 1.
Server1 has the IP Address Management (IPAM) Server feature installed.
A technician performs maintenance on Server1.
After the maintenance is complete, you discover that you cannot connect to the IPAM server on Server1.
You open the Services console as shown in the exhibit. (Click the Exhibit button.)
Exhibit:

You need to ensure that you can connect to the IPAM server.
Which service should you start?
A. Windows Process Activation Service
B. Windows Event Collector
C. Windows Internal Database
D. Windows Store Service (WSService)


Answer Clike
Which type of DNS record should you modify?

You have a DNS server named DNS1 that runs Windows Server 2012 R2.
On DNS1, you create a standard primary DNS zone named adatum.com.
You need to change the frequency that secondary name servers will replicate the zone from DNS1.
Which type of DNS record should you modify?
A. Name server (NS)
B. Start of authority (SOA)
C. Host information (HINFO)
D. Service location (SRV)


Answer Clike
Which two actions should you perform?

Your network contains an Active Directory domain named contoso.com. The domain contains three servers. The servers are configured as shown in the following table.

You need to ensure that end-to-end encryption is used between clients and Server2 when the clients connect to the network by using DirectAccess. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. From the Remote Access Management Console, reload the configuration.
B. Add Server2 to a security group in Active Directory.
C. Restart the IPSec Policy Agent service on Server2.
D. From the Remote Access Management Console, modify the Infrastructure Servers settings.
E. From the Remote Access Management Console, modify the Application Servers settings.


Answer Clike
What should you modify?

HOTSPOT
You have a server named Server1 that runs Windows Server 2012 R2.
Server1 has the Remote Access server role installed.
You need to configure the ports on Server1 to ensure that client computers can establish VPN connections to Server1 by using TCP port 443.
What should you modify? To answer, select the appropriate object in the answer area.
Hot Area:



Answer Clike
What should you do?

Your network contains an Active Directory domain named adatum.com.
A network administrator creates a Group Policy central store.
After the central store is created, you discover that when you create new Group Policy objects (GPOs), the GPOs do not contain any Administrative Templates.
You need to ensure that the Administrative Templates appear in new GPOs.
What should you do?
A. Add your user account to the Group Policy Creator Owners group.
B. Configure all domain controllers as global catalog servers.
C. Copy files from %Windir%Policydefinitions to the central store.
D. Modify the Delegation settings of the new GPOs.


Answer Clike
What should you configure next on Server2?

HOTSPOT
Your network contains a RADIUS server named Admin1.
You install a new server named Server2 that runs Windows Server 2012 R2 and has Network Policy Server (NPS) installed.
You need to ensure that all accounting requests for Server2 are forwarded to Admin1.
On Server2, you create a new remote RADIUS server group named Group1 that contains Admin1.
What should you configure next on Server2?
To answer, select the appropriate node in the answer area.
Hot Area:



Answer Clike
Which two actions should you perform?

Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server 1. All servers run Windows Server 2012 R2.
You need to collect the error events from all of the servers on Server1. The solution must ensure that when new servers are added to the domain, their error events are collected automatically on Server1.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. On Server1, create a collector initiated subscription.
B. On Server1, create a source computer initiated subscription.
C. From a Group Policy object (GPO), configure the Configure target Subscription Manager setting.
D. From a Group Policy object (GPO), configure the Configure forwarder resource usage setting.


Answer Clike
Which tab should you perform the configuration?

HOTSPOT
Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server1. Server1 runs Windows Server 2012 R2.
You enable the EventLog-Application event trace session.
You need to set the maximum size of the log file used by the trace session to 10 MB.
From which tab should you perform the configuration? To answer, select the appropriate tab in the answer area.
Hot Area:



Answer Clike
What should you configure?

You have a server named Server1 that runs Windows Server 2012 R2.
On Server1, you configure a custom Data Collector Set (DCS) named DCS1. DCS1 is configured to store performance log data in C:Logs. You need to ensure that the contents of C:Logs are deleted automatically when the folder reaches 100 MB in size.
What should you configure?
A. A File Server Resource Manager (FSRM) file screen on the C:Logs folder
B. The Data Manager settings of DCS1
C. A schedule for DCS1
D. A File Server Resource Manager (FSRM) quota on the C:Logs folder


Answer Clike
Which two actions should you perform?

Your network contains an Active Directory domain named adatum.com. All domain controllers run Windows Server 2012 R2. The domain contains a virtual machine named DC2.
On DC2, you run Get-ADDCCloningExcludcdApplicationList and receive the output shown in the following table.

You need to ensure that you can clone DC2.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

A. Option A
B. Option B
C. Option C
D. Option D
E. Option E


Answer Clike
Which tool should you use?

Your network contains an Active Directory domain named contoso.com. The Active Directory Recycle bin is enabled for contoso.com. A support technician accidentally deletes a user account named User1.
You need to restore the User1 account.
Which tool should you use?
A. Ldp
B. Esentutl
C. Active Directory Administrative Center
D. Ntdsutil


Answer Clike
What should you do first?

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2008 R2. One of the domain controllers is named DC1.
The network contains a member server named Server1 that runs Windows Server 2012 R2. You need to promote Server1 to a domain controller by using install from media (IFM).
What should you do first?
A. Run the Active Directory Domain Services Installation Wizard on DC1.
B. Upgrade DC1 to Windows Server 2012 R2.
C. Run the Active Directory Domain Services Configuration Wizard on Server1.
D. Create a system state backup of DC1.
E. Create IFM media on DC1.


Answer Clike
Which two actions should you perform?

Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. All servers runs Windows Server 2012 R2.The domain contains two domain controllers named DC1 and DC2. Both domain controllers are virtual machines on a Hyper-V host.
You plan to create a cloned domain controller named DC3 from an image of DC1. You need to ensure that you can clone DC1.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Add the computer account of DC1 to the Cloneable Domain Controllers group.
B. Create a DCCIoneConfig.xml file on DC1.
C. Add the computer account of DC3 to the Cloneable Domain Controllers group.
D. Run the Enable-AdOptionalFeaturecmdlet.
E. Modify the contents of the DefaultDCCIoneAllowList.xml file on DC1.


Answer Clike
Which actions must be performed on Server1 and Server2.

HOTSPOT
You have two servers that run Windows Server 2012 R2. The servers are configured as shown in the following table.

You need to ensure that Server2 can be managed by using Server Manager from Server1.
In the table below, identify which actions must be performed on Server1 and Server2. Make only one selection in each row. Each correct selection is worth one point.
Hot Area:



Answer Clike
What should you identify?

You have a server named Server1 that runs a Server Core installation of Windows Server 2012 R2 Standard. You establish a Remote Desktop session to Server1.
You need to identify which task can be performed on Server1 from within the Remote Desktop session.
What should you identify?
A. Install a feature by using Server Manager.
B. Modify the network settings by using Sconfig.
C. Disable services by using Msconfig.
D. Join a domain by using the System Properties.


Answer Clike
Which tools are available on Server1 and which tools are unavailable on Server1.

HOTSPOT
You deploy a Server with a GUI installation of Windows Server 2012 R2 Datacenter. From Windows PowerShell, you run the following command:
Remove-WindowsFeature Server-Gui-Shell.
In the table below, identify which tools are available on Server1 and which tools are unavailable on Server1. Make only one selection in each row. Each correct selection is worth one point.
Hot Area:



Answer Clike
What should you use?

You have a server named Core1 that has a Server Core Installation of Windows Server 2012 R2. Core1 has the Hyper-V server role installed. Core1 has two network adapters from different third-party hardware vendors.
You need to configure network traffic failover to prevent connectivity loss if a network adapter fails.
What should you use?
A. New-NetSwitchTeam
B. Install-Feature
C. Add-NetSwitchTeamMember
D. netsh.exe


Answer Clike
What should you do?

DRAG DROP
Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2.Server1 and Server2 run a Server with a GUI installation of Windows Server 2012 R2.
You remove the Graphical Management Tools and Infrastructure feature on Server2.
You need to restart Server2.
What should you do? (To answer, drag the appropriate tools to the correct statements. Each tool may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
Select and Place:



Answer Clike
Which order should you run the Diskpart commands?

DRAG DROP
Your network contains an Active Directory domain named contoso.com. The domain contains a file server named File1. All servers in the domain run Windows Server 2012 R2.
You need to create a new volume on File1.
The new volume must have the following configurations:
Have the drive letter T
Have the FAT32 file system
Be stored on a new virtual hard disk
In which order should you run the Diskpart commands?
To answer, move all the Diskpart commands from the list of commands to the answer area and arrange them in the correct order.
Select and Place:



Answer Clike
What should you do?

You have a server named Server1 that runs Windows Server 2012 R2. You add a 4-TB disk named Disk 5 to Server1. You need to ensure that you can create a 3-TB volume on Disk 5.
What should you do?
A. Create a storage pool.
B. Convert the disk to a GPT disk.
C. Convert the disk to a dynamic disk.
D. Create a VHD, and then attach the VHD.


Answer Clike
What should you do?

You have a Hyper-V host named Server1 that runs Windows Server 2012 R2.
Server1 hosts a virtual machine named VM1 that runs Windows Server 2012 R2. VM1 has several snapshots.
You need to modify the snapshot file location of VM1.
What should you do?
A. Right-click VM1, and then click Export…
B. Shut down VM1, and then modify the settings of VM1.
C. Delete the existing snapshots, and then modify the settings of VM1.
D. Pause VM1, and then modify the settings of VM1.


Answer Clike
What should you configure?

HOTSPOT
You have a Hyper-V host named HYPERV1. HYPERV1 hosts a virtual machine named DC1.
You need to prevent the clock on DC1 from synchronizing from the clock on HYPERV1.
What should you configure? To answer, select the appropriate object in the answer area.
Hot Area:



Answer Clike
What should you do?

Your network contains a Hyper-V host named Server1 that runs Windows Server 2012 R2. Server1 hosts a virtual machine named VM1 that runs Windows Server 2012 R2.
You create a checkpoint of VM1, and then you install an application on VM1. You verify that the application runs properly. You need to ensure that the current state of VM1 is contained in a single virtual hard disk file.
The solution must minimize the amount of downtime on VM1.
What should you do?
A. From a command prompt run dism.exe and specify the /commit-image parameter.
B. From a command prompt, run dism.exe and specify the /delete-image parameter.
C. From Hyper-V Manager, delete the checkpoint.
D. From Hyper-V Manager, inspect the virtual hard disk.


Answer Clike
Which settings should you configure?

HOTSPOT
Your network contains an Active Directory domain named contoso.com.
Technicians use Windows Deployment Services {WDS) to deploy Windows Server 2012 R2.
The network contains a server named Server1 that runs Windows Server 2012 R2.
Server1 has the Hyper-V server role installed. You need to ensure that you can use WDS to deploy Windows Server 2012 R2 to a virtual machine named VM1.
Which settings should you configure?
To answer, select the appropriate settings in the answer area.
Hot Area:



Answer Clike
Which two commands should you run from Windows PowerShell?

Your network contains an Active Directory domain named adatum.com. The domain contains a member server named Host1. Host1 runs Windows Server 2012 R2 and has the Hyper-V server role installed.
Host1 hosts two virtual machines named VM5 and VM6. Both virtual machines connect to a virtual switch named Virtual1. On VM5, you install a network monitoring application named Monitor1.
You need to capture all of the inbound and outbound traffic to VM6 by using Monitor1.
Which two commands should you run from Windows PowerShell? (Each correct answer presents part of the solution. Choose two.)
A. Get-VM “VM6” | Set-VMNetworkAdapter-IovWeight 1
B. Get-VM “VM5” | Set-VMNetworkAdapter -IovWeight 0
C. Get-VM “VM6” | Set-VMNetworkAdapter -PortMirroring Source
D. Get-VM “VM6” | Set-VMNetworkAdapter -AllowTeaming On
E. Get-VM “VM5” | Set-VMNetworkAdapter -PortMirroring Destination
F. Get-VM “VM5” | Set-VMNetworkAdapter -AllowTeaming On


Answer Clike
What should you do first?

You have a server named Server1 that runs Windows Server 2012 R2.
Server1 has the Hyper-V server role installed. On Server1, you create a virtual machine named VM1.
VM1 has a legacy network adapter.
You need to assign a specific amount of available network bandwidth to VM1.
What should you do first?
A. Add a second legacy network adapter, and then run the Set-VMNetworkAdaptercmdlet.
B. Add a second legacy network adapter, and then configure network adapter teaming.
C. Remove the legacy network adapter, and then run the Set-VMNetworkAdaptercmdlet.
D. Remove the legacy network adapter, and then add a network adapter.


Answer Clike
What should you do?

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed.
The disks on Server1 are configured as shown in the exhibit. (Click the Exhibit button.)

You create a virtual machine on Server1.
You need to ensure that you can configure a pass-through disk for the virtual machine.
What should you do?
A. Convert Disk 1 to a GPT disk.
B. Convert Disk 1 to a dynamic disk.
C. Delete partition E.
D. Take Disk 1 offline.


Answer Clike
Which tool should you use?

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server 1. Server1 runs Windows Server 2012 R2.
You need to create a 3-TB virtual hard disk (VHD) on Server1. Which tool should you use?
A. New-StoragePool
B. Diskpart
C. File Server Resource Manager (FSRM)
D. New-StorageSubsytemVirtualDisk


Answer Clike
Which tool should you use before you start the DFS Replication service on DC10?

Your company deploys a new Active Directory forest named contoso.com. The first domain controller in the forest runs Windows Server 2012 R2. The forest contains a domain controller named DC10.
On DC10, the disk that contains the SYSVOL folder fails.
You replace the failed disk. You stop the Distributed File System (DFS) Replication service. You restore the SYSVOL folder. You need to perform a non-authoritative synchronization of SYSVOL on DC10.
Which tool should you use before you start the DFS Replication service on DC10?
A. Active Directory Sites and Services
B. Ultrasound
C. Adsiedit.msc
D. Frsutil


Answer Clike
How should you configure Service1?

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012.
You create a group Managed Service Account named gservice1.
You need to configure a service named Service1 to run as the gservice1 account. How should you configure Service1?
A. From the Services console, configure the General settings.
B. From a command prompt, run sc.exe and specify the config parameter.
C. From the Services console, configure the Log On settings.
D. From a command prompt, run sc.exe and specify the privs parameter.


Answer Clike
What should you do?

Your network contains two servers named Server 1 and Server 2 that run Windows Server 2012 R2. Both servers have the Hyper-V server role installed. Server1 and Server2 are located in different offices. The offices connect to each other by using a high-latency WAN link.
Server 1 hosts a virtual machine named VM1.
You need to ensure that you can start VM1 on Server2 if Server1 fails. The solution must minimize hardware costs.
What should you do?
A. From the Hyper-V Settings of Server2, modify the Replication Configuration settings. Enable replication for VM1.
B. on Server 1, install the Multipath I/O (MPIO) feature. Modify the storage location of the VHDs for VM1.
C. on Server2, install the Multipath I/O (MPIO) feature. Modify the storage location of the VHDs for VM1.
D. From the Hyper-V Settings of Server1, modify the Replication Configuration settings. Enable replication for Vml.


Answer Clike
Which two actions should you perform on Server1?

Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server1 that has the Active Directory Federation Services server role installed. All servers run Windows Server 2012.
You complete the Active Directory Federation Services Configuration Wizard on Server1. You need to ensure that client devices on the internal network can use Workplace Join.
Which two actions should you perform on Server1? (Each correct answer presents part of the solution. Choose two.)
A. Run Enable AdfsDeviceRegistration -PrepareActiveDirectory.
B. Edit the multi-factor authentication global authentication policy settings.
C. Edit the primary authentication global authentication policy settings.
D. Run Set-AdfsProxyPropertiesHttpPort 80.
E. Run Enable-AdfsDeviceRegistration.


Answer Clike
Which Group Policy setting should you configure?

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2.
DirectAccess is deployed to the network.
Remote users connect to the DirectAccess server by using a variety of network speeds.
The remote users report that sometimes their connection is very slow.
You need to minimize Group Policy processing across all wireless wide area network (WWAN) connections.
Which Group Policy setting should you configure?
A. Configure Direct Access connections as a fast network connection.
B. Change Group Policy processing to run asynchronously when a slow network connection is detected.
C. Configure Group Policy slow link detection.
D. Configure wireless policy processing.


Answer Clike
Which three actions should you perform on DC10?

DRAG DROP
Your network contains an Active Directory forest named contoso.com.
Recently, all of the domain controllers that ran Windows Server 2003 were replaced by domain controllers that run Windows Server 2012 R2. From Event Viewer, you discover SYSVOL journal wrap errors on a domain controller named dc10.contoso.com.
You need to perform a non-authoritative synchronization of SYSVOL on DC10.
Which three actions should you perform on DC10?
To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Select and Place:



Answer Clike
What should you do?

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2.
In a remote site, a support technician installs a server named DC10 that runs Windows Server 2012 R2. DC10 is currently a member of a workgroup. You plan to promote DC10 to a read-only domain controller (RODC).
You need to ensure that a user named ContosoUser1 can promote DC10 to a RODC in the contoso.com domain. The solution must minimize the number of permissions assigned to User1.
What should you do?
A. From Active Directory Administrative Center, pre-create an RODC computer account.
B. FromDsmgmt, run the local roles command.
C. Join DC10 to the domain. Modify the properties of the DC10 computer account.
D. Join DC10 to the domain. Run dsmod and specify the /server switch.


Answer Clike
What should you do?

Your network contains an Active Directory domain named contoso.com. The domain contains a read-only domain controller (RODC) named RODC1. You create a global group named RODC_Admins.
You need to provide the members of RODC_Admins with the ability to manage the hardware and the software on RODC1. The solution must not provide RODC_Admins with the ability to manage Active Directory objects.
What should you do?
A. From Active Directory Users and Computers, configure the Managed By settings of the RODC1 account.
B. From Windows PowerShell, run the Set-ADAccountControlcmdlet.
C. From a command prompt, run the dsadd computer command.
D. From Active Directory Sites and Services, run the Delegation of Control Wizard.


Answer Clike
What should you do?

Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. All domain controllers run Windows Server 2012 R2.
The domain contains two domain controllers. The domain controllers are configured as shown in the following table.

Active Directory Recycle Bin is enabled.
You discover that a support technician accidentally removed 100 users from an Active Directory group named Group1 an hour ago. You need to restore the membership of Group1.
What should you do?
A. Perform tombstone reanimation.
B. Export and import data by using Dsamain.
C. Perform a non-authoritative restore.
D. Recover the items by using Active Directory Recycle Bin.


Answer Clike
Which tool should you use on Server1?

Your network contains a Hyper-V host named Server1 that hosts 20 virtual machines.
You need to view the amount of memory resources and processor resources each virtual machine uses currently. Which tool should you use on Server1?
A. Resource Monitor
B. Task Manager
C. Hyper-V Manager
D. Windows System Resource Manager (WSRM)


Answer Clike
Which criteria should you specify when you create the DHCP policy?

You are a network administrator of an Active Directory domain named contoso.com.
You have a server named Server1 that runs Windows Server 2012 R2.
Server1 has the DHCP Server server role and the Network Policy Server role service installed.
You enable Network Access Protection (NAP) on all of the DHCP scopes on Server1.
You need to create a DHCP policy that will apply to all of the NAP non-compliant DHCP clients. Which criteria should you specify when you create the DHCP policy?
A. The user class
B. The vendor class
C. The client identifier
D. The relay agent information


Answer Clike
What should you run?

Your network contains an Active Directory domain named contoso.com. Network Access Protection (NAP) is deployed to the domain. You need to create NAP event trace log files on a client computer.
What should you run?
A. Register-EngineEvent
B. Tracert
C. Register-ObjectEvent
D. Logman


Answer Clike
Which command should you run first?

Your network contains a Windows Server 2012 R2 image named Server12.wim. Server12.wim contains the images shown in the following table.

Server12.wim is located in C:.
You need to enable the Windows Server Migration Tools feature in the Windows Server 2012 R2 Datacenter image. You want to achieve this goal by using the minimum amount of administrative effort.
Which command should you run first?
A. imagex.exe /apply c:server12.wim 4 c:
B. dism.exe /image:c:server12.wim /enable-feature /featurename:servermigration
C. imagex.exe /capture c: c:Server12.wim “windows server 2012 r2 datacenter”
D. dism.exe /mount-wim /wimfile:c:Server12.wim /index:4 /mountdir:c:mount


Answer Clike
What should you do?

DRAG DROP
Your network contains an Active Directory domain named contoso.com. All client computers run Windows 7. Group Policy objects (GPOs) are linked to the domain as shown in the exhibit. (Click the Exhibit button.)

GPO2 contains user configurations only and GPO3 contains computer configurations only.
You need to configure the GPOs to meet the following requirements:
* Ensure that GPO2 only applies to the user accounts in OU2 that are members of a global group named Group2.
* Ensure that GPO3 only applies to the computer accounts in OU3 that have more than 100 GB of free disk space.
What should you do?
To answer, drag the appropriate setting to the correct GPO. Each setting may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
Select and Place:



Answer Clike
Which folder should you specify as the alternate path for the source files?

HOTSPOT
You have a server named DHCP1 that runs Windows Server 2012 R2. DHCP1 does not have access to the Internet. All roles are removed completely from DHCP
You mount a Windows Server 2012 R2 installation image to the C:Mount folder.
You need to install the DHCP Server server role on DHCP1 by using Server Manager. Which folder should you specify as the alternate path for the source files?
To answer, select the appropriate folder in the answer area.
Hot Area:



Answer Clike
Which Diskpart command should you use?

You have a server named Server1 that runs a Server Core Installation of Windows Server 2012 R2. You attach a 4-TB disk to Server1. The disk is configured as an MBR disk. You need to ensure that you can create a 4-TB volume on the disk.
Which Diskpart command should you use?
A. Automount
B. Convert
C. Expand
D. Attach


Answer Clike
Which part of the Active Directory partition should you view?

HOTSPOT
Your network contains an Active Directory domain named contoso.com.
You need to identify whether the Company attribute replicates to the global catalog.
Which part of the Active Directory partition should you view?
To answer, select the appropriate Active Directory object in the answer area.
Hot Area:



Answer Clike
What should you do?

Your network contains an Active Directory forest. The forest contains two domains named contoso.com and corp.contoso.com. All domain controllers run Windows Server 2012 R2 and are configured as global catalog servers.
The corp.contoso.com domain contains a domain controller named DC1. You need to disable the global catalog on DC1.
What should you do?
A. From Active Directory Users and Computers, modify the properties of the DC1 computer account.
B. From Active Directory Administrative Center, modify the properties of the DC1 computer account.
C. From Active Directory Domains and Trusts, modify the properties of the corp.contoso.com domain.
D. From Active Directory Sites and Services, modify the NTDS Settings of the DC1 server object.


Answer Clike
Which virtual machine setting should you configure for VM2?

Your network contains a server named Server1 that runs Windows Server 2012.
Server1 has the Hyper-V server role installed. Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. Server1 is configured as shown in the following table.

You install Windows Server 2012 on VM2 by using Windows Deployment Services (WDS).
You need to ensure that the next time VM2 restarts, you can connect to the WDS server by using PXE. Which virtual machine setting should you configure for VM2?
A. NUMA topology
B. Resource control
C. Resource metering
D. Virtual Machine Chimney
E. The VLAN ID
F. Processor Compatibility
G. The startup order
H. Automatic Start Action
I. Integration Services
J. Port mirroring
K. Single-root I/O virtualization


Answer Clike
What should you do first?

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2. Server1 runs Windows Server 2012 R2. 5erver2 runs Windows Server 2008 R2 Service Pack 1 (SP1) and has the DHCP Server server role installed.
You need to manage DHCP on Server2 by using the DHCP console on Server1.
What should you do first?
A. From the Microsoft Management Console on Server1, add a snap-in.
B. From Server Manager on Server2, enable Windows Remote Management.
C. From Windows PowerShell on Server2, run Enable-PSRemoting.
D. From Server Manager on Server1, install a feature.


Answer Clike
What should you do on Server2?

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2.
On a server named Server2, you perform a Server Core Installation of Windows Server 2012 R2. You join Server2 to the contoso.com domain. You need to ensure that you can manage Server2 by using the Computer Management console on Server1.
What should you do on Server2?
A. Run sconfig.exe and configure remote management.
B. Run sconfig.exe and configure Remote Server Administration Tools (RSAT).
C. Install Windows Management Framework.
D. Install Remote Server Administration Tools (RSAT).


Answer Clike
What should you configure on Server2?

Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 and Server2 are part of a workgroup.
On Server1 and Server2, you create a local user account named Admin1. You add the account to the local Administrators group. On both servers, Admin1 has the same password.
You log on to Server1 as Admin1. You open Computer Management and you connect to Server2.
When you attempt to create a scheduled task, view the event logs, and manage the shared folders, you receive Access Denied messages.
You need to ensure that you can administer Server2 remotely from Server1 by using Computer Management.
What should you configure on Server2?
A. From Local Users and Groups, modify the membership of the Remote Management Users group.
B. From Server Manager, modify the Remote Management setting.
C. From Windows Firewall, modify the Windows Management Instrumentation (WMI) firewall rule.
D. From Registry Editor, configure the LocalAccountTokenFilterPolicyresgistry value


Answer Clike
Which tool should you use?

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2.
You need to create 3-TB virtual hard disk (VHD) on Server1. Which tool should you use?
A. New-StorageSubsytemVirtualDisk
B. New-VirtualDisk
C. Server Manager
D. Computer Management


Answer Clike
What should you do?

Your network contains an Active Directory domain named adatum.com. The domain contains three domain controllers. The domain controllers are configured as shown in the following table.

DC3 loses network connectivity due to a hardware failure. You plan to remove DC3 from the domain.
You log on to DC3.
You need to identify which service location (SRV) records are registered by DC3.
What should you do?
A. Open the %windir%system32dnsbackupadatum.com.dns file.
B. Open the %windir%system32confignetlogon.dns file.
C. Run ipconfig /displaydns.
D. Run dcdiag /test:dns.


Answer Clike
Which tool should you use?

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC5. DC5 has a Server Core Installation of Windows Server 2012 R2.
You need to uninstall Active Directory from DC5 manually. Which tool should you use?
A. The Remove-ADComputercmdlet
B. The ntdsutil.exe command
C. The dsamain.exe command
D. The Remove-WindowsFeaturecmdlet


Answer Clike
Which cmdlet should you run?

In an isolated test environment, you deploy a server named Server1 that runs a Server Core Installation of Windows Server 2012 R2. The test environment does not have Active Directory Domain Services (AD DS) installed.
You install the Active Directory Domain Services server role on Server1. You need to configure Server1 as a domain controller.
Which cmdlet should you run?
A. Install-ADDSDomain
B. Install-ADDSForest
C. Install-ADDSDomainController
D. Install-WindowsFeature


Answer Clike
Which file extension should you use to save the script?

Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012. The domain contains a server named Server1.
You open Review Options in the Active Directory Domain Services Configuration Wizard, and then you click View script. You need to ensure that you can use the script to promote Server1 to a domain controller.
Which file extension should you use to save the script?
A. .bat
B. .ps1
C. .xml
D. .cmd


Answer Clike
What should you do on Core1?

Your network contains an Active Directory domain named adatum.com. The domain contains a server named Server1 that runs Windows Server 2012 R2.
On a server named Corel, you perform a Server Core Installation of Windows Server 2012 R2. You join Corel to the adatum.com domain. You need to ensure that you can use Event Viewer on Server1 to view the event logs on Core1.
What should you do on Core1?
A. Run the Enable-NetFirewallRulecmdlet.
B. Run the Disable-NetFirewallRulecmdlet.
C. Install Remote Server Administration Tools (RSAT).
D. Install Windows Management Framework.


Answer Clike
Which command should you run from Server1?

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2 that run Windows Server 2012 R2.
You log on to Server1.
You need to retrieve a list of the active TCP connections on Server2. Which command should you run from Server1?
A. netstat> server2
B. winrm get server2
C. winrs -r:server2netstat
D. dsquery * -scope base -attrip,server2


Answer Clike
Which two tasks should you perform?

Your network contains an Active Directory domain named adatum.com. The domain contains the servers shown in the following table.

You need to ensure that you can use Server Manager on DC1 to manage DC2.
Which two tasks should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Install the Windows PowerShell 2.0 engine on DC1.
B. Install Microsoft .NET Framework 4 on DC2.
C. Install Windows Management Framework 3.0 on DC2.
D. Install Remote Server Administration Tools on DC1.
E. Install Remote Server Administration Tools on DC2.


Answer Clike
What should you configure?

HOTSPOT
Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2012 R2.
From Server2, you attempt to connect to Server1 by using Computer Management and you receive the following error message: “Computer Server1 cannot be found. The network path was not found. ”
From Server1, you successfully connect to Server2 by using Server Manager.
You need to ensure that you can manage Server1 remotely from Server2 by using Computer Management.
What should you configure?
To answer, select the appropriate option in the answer area.
Hot Area:



Answer Clike
What should you configure?

Your network contains a server named Server1 that runs Windows Server 2012.
Server1 has the Hyper-V server role installed.Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.
Server1 is configured as shown in the following table.

You install Windows Server 2012 on VM2 by using Windows Deployment Services (WDS).
You need to ensure that the next time. VM2 restarts, you can connect to the WDS server by using PXE.
What should you configure?
A. NUMA topology
B. Resource control
C. Resource metering
D. Virtual Machine Chimney
E. The VLAN ID
F. Processor Compatibility
G. The startup order
H. Automatic Start Action
I. Integration Services
J. Port mirroring
K. Single-root I/O virtualization


Answer Clike
What should you configure?

Your network contains a server named Server1 that runs Windows Server 2012 R2.
Server1 has the Hyper-V server role installed. Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.
Server1 is configured as shown in the following table.

You need to ensure that VM1 can use more CPU time than the other virtual machines when the CPUs on Server1 are under a heavy load.
What should you configure?
A. NUMA topology
B. Resource control
C. Resource metering
D. Virtual Machine Chimney
E. The VLAN ID
F. Processor Compatibility
G. The startup order
H. Automatic Start Action
I. Integration Services
J. Port mirroring
K. Single-root I/O virtualization


Answer Clike
What should you configure?

Your network contains a server named Server1 that runs Windows Server 2012.
Server1 has the Hyper-V server role installed.Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.
Server1 is configured as shown in the following table.

You need to configure VM4 to track the CPU, memory, and network usage.
What should you configure?
A. NUMA topology
B. Resource control
C. Resource metering
D. Virtual Machine Chimney
E. The VLAN ID
F. Processor Compatibility
G. The startup order
H. Automatic Start Action
I. Integration Services
J. Port mirroring
K. Single-root I/O virtualization


Answer Clike
What should you create?

You have a server named Server1 that runs Windows Server 2012 R2. You connect two new hard disks to Server1.
You need to create a storage space that contains the two disks.
The solution must meet the following requirements: Provide fault tolerance if a single disk fails.
Maximize the amount of files that can be stored in the storage space.
What should you create?
A. a parity space
B. a simple space
C. a spanned volume
D. a mirrored space


Answer Clike
How many reservations should you identify?

You have a server named Server1 that runs Windows Server 2012 R2.
Server1 has six network adapters. Two of the network adapters are connected to a network named LAN1, two of the network adapters are connected to a network named LAN2, and two of the network adapters are connected to a network named LAN3.
You create a network adapter team named Team1 from the two adapters connected to LAN1. You create a network adapter team named Team2 from the two adapters connected to LAN2.
A company policy states that all server IP addresses must be assigned by using a reserved address in DHCP. You need to identify how many DHCP reservations you must create for Server1.
How many reservations should you identify?
A. 3
B. 4
C. 6
D. 8


Answer Clike
What should you do?

You have a server named Server1 that has a Server Core installation of Windows Server 2008 R2.
Server1 has the DHCP Server server role and the File Server server role installed.
You need to upgrade Server1 to Windows Server 2012 R2 with the graphical user interface (GUI). The solution must meet the following requirements:
Preserve the server roles and their configurations. Minimize administrative effort.
What should you do?
A. On Server1, run setup.exe from the Windows Server 8 installation media and select Server with a GUI.
B. Start Server1 from the Windows Server 8 installation media and select Server Core Installation.When the installation is complete, add the Server Grapical Shell feature.
C. Start Server1 from the Windows Server 8 installation media and select Server with a GUI.
D. On Server1, run setup.exe from the Windows Server 8 installation media and select Server Core Installation.When the installation is complete, add the Server Graphical Shell feature.


Answer Clike
Which folder should you use as the source?

HOTSPOT
You have a server named Server1 that runs Windows Server 2012 R2. Server1 does not have Internet connectivity. All roles are removed completely from Server1.
You mount a Windows Server 2012 R2 installation image to the C:Source folder. You need to install the DNS Server server role on Server1.
Which folder should you use as the source?
To answer, select the appropriate folder in the answer area.
Hot Area:



Answer Clike
Which backup type should you identify for each volume?

HOTSPOT
You have a server named Server1 that runs Windows Server 2012 R2. The volumes on Server1 are configured as shown in the following table.

A new corporate policy states that backups must use Windows Azure Backup whenever possible.
You need to identify which backup methods you must use to back up Server1. The solution must use Windows Azure Backup whenever possible. Which backup type should you identify for each volume?
To answer, select the appropriate backup type for each volume in the answer area.
Hot Area:



Answer Clike
What should you identify?

DRAG DROP
You have a file server named Server1 that runs Windows Server 2012 R2. The folders on Server1 are configured as shown in the following table.

A new corporate policy states that backups must use Windows Azure Online Backup whenever possible.
You need to identify which technology you must use to back up Server1. The solution must use Windows Azure Online Backup whenever possible.
What should you identify?
To answer, drag the appropriate backup type to the correct location or locations. Each backup type may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
Select and Place:



Answer Clike
What should you do?

Your network contains two servers that run Windows Server 2012 R2 named Server1 and Server2. Both servers have the File Server role service installed.
On Server2, you create a share named Backups.
From Windows Server Backup on Server1, you schedule a full backup to run every night. You set the backup destination to Server2 Backups. After several weeks, you discover that Server2Backups only contains the last backup that completed on Server1.
You need to ensure that multiple backups of Server1 are maintained.
What should you do?
A. Modify the properties of the Windows Store Service (WSService) service.
B. Change the backup destination.
C. Modify the Volume Shadow Copy Service (VSS) settings.
D. Configure the permission of the Backups share.


Answer Clike
What should you do from Hyper-V Manager?

Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 and Server2 have the Hyper-V server role installed.Server1 and Server2 are configured as Hyper-V replicas of each other.
Server2 hosts a virtual machine named VM5. VM5 is replicated to Server1.
You need to verify whether the replica of VMS on Server1 is functional. The solution must ensure that VM5 remains accessible to clients.
What should you do from Hyper-V Manager?
A. On Server1, execute a Planned Failover.
B. On Server1, execute a Test Failover.
C. On Server2, execute a Planned Failover.
D. On Server2,execute a Test Failover.


Answer Clike
Which two actions should you perform?

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2 that run Windows Server 2012 R2. Both servers have the Hyper-V server role installed.
The network contains an enterprise certification authority (CA). All servers are enrolled automatically for a certificate-based on the Computer certificate template.
On Server1, you have a virtual machine named VM1. VM1 is replicated to Server2. You need to encrypt the replication of VM1.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. On Server2, modify the Hyper-V Settings.
B. On Server1, modify the settings of VM1.
C. On Server2, modify the settings of VM1.
D. On Server1, modify the settings of the virtual switch to which VM1 is connected.
E. On Server1, modify the Hyper-V Settings.
F. On Server2, modify the settings of the virtual switch to which VM1 is connected.


Answer Clike
What should you configure?

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2.
Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1. Cluster1 hosts an application named App1.
You need to ensure that Server2 handles all of the client requests to the cluster for App1. The solution must ensure that if Server2 fails, Server1 becomes the active node for App1.
What should you configure?
A. Affinity – None
B. Affinity – Single
C. The cluster quorum settings
D. The failover settings
E. A file server for general u
F. The Handling priority
G. The host priority
H. Live migration
I. The possible owner
J. The preferred owner
K. Quick migration
L. The Scale-Out File Server


Answer Clike
What should you configure?

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2.
Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1. You add two additional nodes to Cluster1.
You have a folder named Folder1 on Server1 that contains application data. You plan to provide continuously available access to Folder1.
You need to ensure that all of the nodes in Cluster1 can actively respond to the client requests for Folder1.
What should you configure?
A. Affinity – None
B. Affinity – Single
C. The cluster quorum settings
D. The failover settings
E. A file server for general u
F. The Handling priority
G. The host priority
H. Live migration
I. The possible owner
J. The preferred owner
K. Quick migration
L. The Scale-Out File Server


Answer Clike
What should you identify?

Your company is testing DirectAccess on Windows Server 2012 R2.
Users report that when they connect to the corporate network by using DirectAccess, access to Internet websites and Internet hosts is slow. The users report that when they disconnect from DirectAccess to the Internet websites and the Internet hosts is much faster.
You need to identify the most likely cause of the performance issues.
What should you identify?
A. Force tunneling is enabled.
B. DirectAccess uses a self-signed certificate.
C. The corporate firewall blocks TCP port 8080.
D. The DNS suffix list is empty.


Answer Clike
Which cmdlet should you run?

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2.
Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1. Cluster1 contains a Clustered Shared Volume (CSV).
A developer creates an application named App1. App1 is NOT a cluster-aware application. App1 stores data in the file system. You need to ensure that App1 runs in Cluster1. The solution must minimize development effort.
Which cmdlet should you run?
A. Add-ClusterServerRole
B. Add ClusterGenericApplicationRole
C. Add-ClusterGenericServiceRole
D. Add ClusterScaleOutFileServerRole


Answer Clike
What should you do?

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Node1and Node2. Node1and Node2 run Windows Server 2012 R2. Node1and Node2 are configured as a two-node failover cluster named Cluster2.
The computer accounts for all of the servers reside in an organizational unit (OU) named Servers. A user named User1 is a member of the local Administrators group on Node1and Node2.
User1 creates a new clustered File Server role named File1 by using the File Server for general use option. A report is generated during the creation of File1 as shown in the exhibit. (Click the Exhibit button.)

File1 fails to start.
You need to ensure that you can start File1.
What should you do?
A. Increase the value of the ms-DS-MachineAccountQuota attribute of the domain.
B. Assign the user account permissions of User1 to the Servers OU.
C. Assign the computer account permissions of Cluster2 to the Servers OU.
D. Recreate the clustered File Server role by using the File Server for scale-out application data option.
E. Log on to the domain by using the built-in Administrator for the domain, and then recreate the clustered File Server role by using the File Server for general use option.


Answer Clike
What should you do?

DRAG DROP
Your network contains four servers that run Windows Server 2012 R2.
Each server has the Failover Clustering feature installed. Each server has three network adapters installed. An iSCSI SAN is available on the network. You create a failover cluster named Cluster1. You add the servers to the cluster.
You plan to configure the network settings of each server node as shown in the following table.

You need to configure the network settings for Cluster1.
What should you do?
To answer, drag the appropriate network communication setting to the correct cluster network or networks. Each network communication setting may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
Select and Place:



Answer Clike
How should you configure the witness disk?

DRAG DROP
You plan to deploy a failover cluster that will contain two nodes that run Windows Server 2012 R2. You need to configure a witness disk for the failover cluster.
How should you configure the witness disk?
To answer, drag the appropriate configurations to the correct location or locations. Each configuration may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
Select and Place:



Answer Clike
What should you do?

You have a server named FS1 that runs Windows Server 2012 R2. You install the File and Storage Services server role on FS1.
From Windows Explorer, you view the properties of a shared folder named Share1 and you discover that the Classification tab is missing. You need to ensure that you can assign classifications to Share1 from Windows Explorer manually.
What should you do?
A. Install the Enhanced Storage feature.
B. From Folder Options, clear Use Sharing Wizard (Recommend).
C. Install the File Server Resource Manager role service.
D. From Folder Options, select Show hidden files, folders, and drives.


Answer Clike
Which three actions should you perform in sequence?

DRAG DROP
Your network contains an Active Directory domain named contoso.com. The domain contains a file server named Server1. All servers run Windows Server 2012 R2.
All domain user accounts have the Division attribute automatically populated as part of the user provisioning process. The Support for Dynamic Access Control and Kerberos armoring policy is enabled for the domain.
You need to control access to the file shares on Server1 based on the values in the Division attribute and the Division resource property. Which three actions should you perform in sequence?
Select and Place:



Answer Clike
Which condition should you use?

Your network contains an Active Directory domain named contoso.com. The network contains a file server named Server1 that runs Windows Server 2012 R2.
You are configuring a central access policy for temporary employees.
You enable the Department resource property and assign the property a suggested value of Temp.
You need to configure a target resource condition for the central access rule that is scoped to resources assigned to Temp only. Which condition should you use?
A. (Department.Value Equals “Temp”)
B. (Resource.Department Equals “Temp”)
C. (Temp.Resource Equals “Department”)
D. (Resource.Temp Equals “Department”)


Answer Clike
Which order should you Perform the five actions?

DRAG DROP
Your network contains an Active Directory domain named contoso.com. All file servers in the domain run Windows Server 2012 R2.
The computer accounts of the file servers are in an organizational unit (OU) named OU1. A Group Policy object (GPO) named GPO1 is linked to OU1. You plan to modify the NTFS permissions for many folders on the file servers by using central access policies.
You need to identify any users who will be denied access to resources that they can currently access once the new permissions are implemented. In which order should you Perform the five actions?
Select and Place:



Answer Clike
What command should you run on Server1 to complete the process?

HOTSPOT
Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 and a member server named Server1. All servers run Windows Server 2012 R2.
You install the IP Address Management (IPAM) Server feature on Server1.
From the Provision IPAM wizard, you select the Group Policy Based provisioning method and enter a GPO name prefix of IPAM1. You need to provision IPAM by using Group Policy.
What command should you run on Server1 to complete the process? To answer, select the appropriate options in the answer area.
Hot Area:



Answer Clike
Which server should you install IPAM?

Your network contains an Active Directory forest named contoso.com. All servers run Windows Server 2012 R2. The domain contains four servers. The servers are configured as shown in the following table.

You need to deploy IP Address Management (IPAM) to manage DNS and DHCP.
On which server should you install IPAM?
A. DC1
B. DC2
C. DC3
D. Server1


Answer Clike
What should you do?

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 and a member server named Server1.
Server1 has the IP Address Management (IPAM) Server feature installed.
On DC1, you configure Windows Firewall to allow all of the necessary inbound ports for IPAM. On Server1, you open Server Manager as shown in the exhibit. (Click the Exhibit button.)

You need to ensure that you can use IPAM on Server1 to manage DNS on DC1.
What should you do?
A. Add Server1 to the Remote Management Users group.
B. Modify the outbound firewall rules on Server1.
C. Add Server1 to the Event Log Readers group.
D. Modify the inbound firewall rules on Server1.


Answer Clike
Which tool should you use?

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2.
You mount an Active Directory snapshot on DC1.
You need to expose the snapshot as an LDAP server. Which tool should you use?
A. Dsamain
B. Ntdsutil
C. Ldp
D. ADSI Edit


Answer Clike
What should you do first?

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2. DC1 is backed up daily.
The domain has the Active Directory Recycle Bin enabled.
During routine maintenance, you delete 500 inactive user accounts and 100 inactive groups. One of the deleted groups is named Group1. Some of the deleted user accounts are members of some of the deleted groups.
For documentation purposes, you must provide a list of the members of Group1 before the group was deleted.
You need to identify the names of the users who were members of Group1 prior to its deletion. You want to achieve this goal by using the minimum amount of administrative effort.
What should you do first?
A. Reactivate the tombstone of Group1.
B. Use the Recycle Bin to restore Group1.
C. Perform an authoritative restore of Group1.
D. Mount the most recent Active Directory backup.


Answer Clike
What should you do?

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2.
On all of the domain controllers, Windows is installed in C:Windows and the Active Directory database is located in D:WindowsNTDS. All of the domain controllers have a third-party application installed.
The operating system fails to recognize that the application is compatible with domain controller cloning. You verify with the application vendor that the application supports domain controller cloning.
You need to prepare a domain controller for cloning.
What should you do?
A. In C:Windows, create an XML file named DCCIoneConfig.xml and add the application information to the file.
B. In the root of a USB flash drive, add the application information to an XML file named DefaultDCCIoneAllowList.xml.
C. In D:WindowsNTDS, create an XML file named DCCIoneConfig.xml and add the application information to the file.
D. In D:WindowsNTDS, create an XML file named CustomDCCIoneAllowList.xml and add the application information to the file.


Answer Clike
Which order should you arrange the listed GPOs?

DRAG DROP
Your network contains a single Active Directory domain named contoso.com. The domain contains an Active Directory site named Site1 and an organizational unit (OU) named OU1.
The domain contains a client computer named Client1 that is located in OU1 and Site1.
You create five Group Policy objects (GPO). The GPOs are configured as shown in the following table.

You need to identify in which order the GPOs will be applied to Client1.
In which order should you arrange the listed GPOs?

To answer, move all GPOs from the list of GPOs to the answer area and arrange them in the correct order.
Select and Place:


Answer Clike
Which tool should you use?

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2.
An organizational unit (OU) named OU1 contains 200 client computers that run Windows 8 Enterprise. A Group Policy object (GPO) named GPO1 is linked to OU1.
You make a change to GPO1.
You need to force all of the computers in OU1 to refresh their Group Policy settings immediately. The solution must minimize administrative effort. Which tool should you use?
A. The Set-AdComputercmdlet
B. Group Policy Management Console (GPMC)
C. Server Manager
D. TheGpupdate command


Answer Clike
Which two settings should you configure?

Your network contains an Active Directory domain named adatum.com. The domain contains a server named Server1 that runs WindowsServer 2012 R2. Server1 is configured as a Network Policy Server (NPS) server and as a DHCP server.
You need to ensure that only computers that send a statement of health are checked for Network Access Protection (NAP) health requirements.
Which two settings should you configure? (Each correct answer presents part of the solution. Choose two.)
A. The NAS Port Type constraints
B. The MS-Service Class conditions
C. The Health Policies conditions
D. The NAP-Capable Computers conditions
E. The Called Station ID constraints


Answer Clike
Which three actions should you perform?

Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. The domain contains two servers. The servers are configured as shown in the following table.

All client computers run Windows 8 Enterprise.
You plan to deploy Network Access Protection (NAP) by using IPSec enforcement.
A Group Policy object (GPO) named GPO1 is configured to deploy a trusted server group to all of the client computers. You need to ensure that the client computers can discover HRA servers automatically.
Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.)
A. On Server2, configure the EnableDiscovery registry key.
B. On DC1, create an alias (CNAME) record.
C. On DC1, create a service location (SRV) record.
D. In a GPO, modify the Request Policy setting for the NAP Client Configuration.
E. On all of the client computers, configure the EnableDiscovery registry key.


Answer Clike
What should you do?

Your network contains an Active Directory domain named contoso.com. Network Policy Server (NPS) is deployed to the domain.
You plan to deploy Network Access Protection (NAP).
You need to configure the requirements that are validated on the NPS client computers.
What should you do?
A. From the Network Policy Server console, configure a health policy.
B. From the Network Policy Server console, configure a network policy.
C. From a Group Policy object (GPO), configure the NAP Client Configuration security setting.
D. From a Group Policy object (GPO), configure the Network Access Protection Administrative Templates setting.
E. From the Network Policy Server console, configure a Windows Security Health Validator (WSHV) policy.


Answer Clike
Which three actions should you perform in sequence?

DRAG DROP
Your network contains an Active Directory domain named adatum.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 is configured as a Network Policy Server (NPS) server and as a DHCP server.
You need to log all DHCP clients that have windows Firewall disabled.
Which three actions should you perform in sequence? To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Select and Place:



Answer Clike
What should you do?

You have a server named Server1 that runs Windows Server 2012 R2. You create a Data Collector Set (DCS) named DCS1.
You need to configure DCS1 to log data to D:logs.
What should you do?
A. Right-click DCS1 and click Properties.
B. Right-click DCS1 and click Save template…
C. Right-click DCS1 and click Export list…
D. Right-click DCS1 and click Data Manager…


Answer Clike
What should you do?

Your network contains an Active Directory domain named adatum.com. The domain contains a member server named Server1 and 10 web servers. All of the web servers are in an organizational unit (OU) named WebServers_OU. All of the servers run Windows Server 2012 R2.
On Server1, you need to collect the error events from all of the web servers. The solution must ensure that when new web servers are added to
WebServers_OU, their error events are collected automatically on Server1.
What should you do?
A. On Server1, create a collector initiated subscription. From a Group Policy object (GPO), configure the Configure target Subscription Manager setting.
B. On Server1, create a collector initiated subscription. From a Group Policy object (GPO), configure the Configure forwarder resource usage setting.
C. On Server1, create a source computer initiated subscription. From a Group Policy object (GPO), configure the Configure forwarder resource usage setting.
D. On Server1, create a source computer initiated subscription. From a Group Policy object (GPO), configure the Configure target Subscription Manager setting.


Answer Clike
Which type of data collector should you create?

You have a server named Server1 that runs Windows Server 2012 R2. You create a custom Data Collector Set (DCS) named DCS1.
You need to configure Server1 to start DCS1 automatically when the network usage exceeds 70 percent.
Which type of data collector should you create?
A. A performance counter alert
B. A performance counter data collector
C. An event trace data collector
D. A configuration data collector


Answer Clike
Which tool should you use on Hyperv1?

Your network contains a Hyper-V host named Hyperv1. Hyperv1 runs Windows Server 2012 R2.
Hyperv1 hosts four virtual machines named VM1, VM2, VM3, and VM4. All of the virtual machines run Windows Server 2008 R2. You need to view the amount of memory resources and processor resources that VM4 currently uses.
Which tool should you use on Hyperv1?
A. Task Manager
B. Windows System Resource Manager (WSRM)
C. Hyper-V Manager
D. Resource Monitor


Answer Clike
Which connection properties should you view?

HOTSPOT
Your network contains an Active Directory domain named fabrikam.com. You implement DirectAccess.
You need to view the properties of the DirectAccess connection.
Which connection properties should you view?
To answer, select the appropriate connection properties in the answer area.
Hot Area:



Answer Clike
Which group should you add User2?

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012.
Server1 has the Remote Access server role installed.
You log on to Server1 by using a user account named User2.
From the Remote Access Management Console, you run the Getting Started Wizard and you receive a warning message as shown in the exhibit. (Click the Exhibit button.)

You need to ensure that you can configure DirectAccess successfully. The solution must minimize the number of permissions assigned to User2. To which group should you add User2?
A. Account Operators
B. Enterprise Admins
C. Domain Admins
D. Server Operators


Answer Clike
What should you do?

Your network contains two servers named HV1 and HV2. Both servers run Windows Server 2012 R2 and have the Hyper-V server role installed. HV1 hosts 25 virtual machines. The virtual machine configuration files and the virtual hard disks are stored in D:VM.
You shut down all of the virtual machines on HV1. You copy D:VM to D:VM on HV2.
You need to start all of the virtual machines on HV2. You want to achieve this goal by using the minimum amount of administrative effort.
What should you do?
A. From HV1, export all virtual machines to D:VM. Copy D:VM to D:VM on HV2 and overwrite the existing files. On HV2, run the New Virtual Machine wizard.
B. From HV1, export all virtual machines to D:VM. Copy D:VM to D:VM on HV2 and overwrite the existing files. On HV2, run the Import Virtual Machine wizard.
C. Run the Import-VM InitialReplicationcmdlet.
D. Run the Import-VM cmdlet.


Answer Clike
Which method should you use to move each virtual machine?

HOTSPOT
Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2.
Server1 and Server2 have the Hyper-V server role installed. The servers are configured as shown in the following table.

You add a third server named Server3 to the network. Server3 has Intel processors.
You need to move VM3 and VM6 to Server3. The solution must minimize downtime on the virtual machines. Which method should you use to move each virtual machine?
To answer, select the appropriate method for each virtual machine in the answer area.
Hot Area:



Answer Clike
What should you do first from Failover Cluster Manager?

Your network contains two servers named Server1 and Server2 that run Windows Server 2008 R2. Server1 and Server2 are nodes in a failover cluster named Cluster1. The network contains two servers named Server3 and Server4 that run Windows Server 2012 R2. Server3 and Server4 are nodes in a failover cluster named Cluster2.
What should you do first from Failover Cluster Manager?
A. On a server in Cluster2, click Migrate Roles.
B. On a server in Cluster2, click Move Core Cluster Resources, and then click Select Node…
C. On a server in Cluster1, configure Cluster-Aware Updating.
D. On a server in Cluster2, click Move Core Cluster Resources, and then click Best Possible Node.


Answer Clike
What should you run from Windows PowerShell?

DRAG DROP
Your network contains an Active Directory domain named contoso.com. The domain contains four member servers named Server 1, Server2, Server3, and Server4. All servers run Windows Server 2012 R2.
Server1 and Server2 are located in a site named Site1. Server3 and Server4 are located in a site named Site2. The servers are configured as nodes in a failover cluster named Cluster1.
Cluster1 is configured to use the Node Majority quorum configuration.
You need to ensure that Server1 is the only server in Site1 that can vote to maintain quorum.
What should you run from Windows PowerShell?
To answer, drag the appropriate commands to the correct location. Each command may be used once, more than once, or not at all. You may need to
Select and Place:



Answer Clike
Which two actions should you perform?

Your network contains an Active Directory domain named contoso.com. The domain contains servers named Server1 and Server2 that run Windows Server 2012 R2.
Server1 has the Active Directory Federation Services server role installed.Server2 is a file server.
Your company introduces a Bring Your Own Device (BYOD) policy.
You need to ensure that users can use a personal device to access domain resources by using Single Sign-On (SSO) while they are connected to the internal network.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Enable the Device Registration Service in Active Directory.
B. Publish the Device Registration Service by using a Web Application Proxy.
C. Configure Active Directory Federation Services (AD FS) for the Device Registration Service.
D. Install the Work Folders role service on Server2.
E. Create and configure a sync share on Server2.


Answer Clike
What should you identify?

Your network contains a perimeter network and an internal network. The internal network contains an Active Directory Federation Services (AD FS) 2.1 infrastructure. The infrastructure uses Active Directory as the attribute store.
You plan to deploy a federation server proxy to a server named Server2 in the perimeter network. You need to identify which value must be included in the certificate that is deployed to Server2.
What should you identify?
A. The name of the Federation Service
B. The name of the Active Directory domain
C. The FQDN of the AD FS server
D. The public IP address of Server2


Answer Clike
Which Windows PowerShell command should you run?

You deploy an Active Directory Federation Services (AD FS) 2.1 infrastructure. The infrastructure uses Active Directory as the attribute store. Some users report that they fail to authenticate to the AD FS infrastructure.
You discover that only users who run third-party web browsers experience issues.
You need to ensure that all of the users can authenticate to the AD FS infrastructure successfully. Which Windows PowerShell command should you run?
A. Set-ADFSProperties -SSOLifetime 1:00:00
B. Set-ADFSProperties -AddProxyAuthenticationRules None
C. Set-ADFSProperties -ExtendedProtectionTokenCheck None
D. Set-ADFSProperties -ProxyTrustTokenLifetime 1:00:00


Answer Clike
How should you configure the certificate request?

DRAG DROP
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2.
You plan to install the Active Directory Federation Services server role on Server1 to allow for Workplace Join.
You run nslookup enterpriseregistration and you receive the following results:

You need to create a certificate request for Server1 to support the Active Directory Federation Services (AD FS) installation.
How should you configure the certificate request? To answer, drag the appropriate names to the correct locations. Each name may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
Select and Place:



Answer Clike
What should you do?

DRAG DROP
Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server3. The network contains a standalone server named Server2. All servers run Windows Server 2012 R2. The servers are configured as shown in the following table.

Server3 hosts an application named App1. App1 is accessible internally by using the URL https://app1.contoso.com. App1 only supports Integrated Windows authentication.
You need to ensure that all users from the Internet are pre-authenticated before they can access App1.
What should you do? To answer, drag the appropriate servers to the correct actions. Each server may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
Select and Place:



Answer Clike
Which rule types should you configure on each side of the federated trust?

DRAG DROP
Your network contains two Active Directory forests named contoso.com and adatum.com. All domain controllers run Windows Server 2012 R2. A federated trust exists between adatum.com and contoso.com. The trust provides adatum.com users with access to contoso.com resources. You need to configure Active Directory Federation Services (AD FS) claim rules for the federated trust.
The solution must meet the following requirements:
In contoso.com, replace an incoming claim type named Group with an outgoing claim type named Role.
In adatum.com, allow users to receive their tokens for the relying party by using their Active Directory group membership as the claim type.
The AD FS claim rules must use predefined templates.
Which rule types should you configure on each side of the federated trust?
To answer, drag the appropriate rule types to the correct location or locations. Each rule type may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
Select and Place:



Answer Clike
What should you do?

Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2.
You are creating a central access rule named Test Finance that will be used to audit members of the Authenticated users group for access failure to shared folders in the finance department.
You need to ensure that access requests are unaffected when the rule is published.
What should you do?
A. Set the Permissions to Use the following permissions as proposed permissions.
B. Add a Resource condition to the current permissions entry for the Authenticated Users principal.
C. Set the Permissions to Use following permissions as current permissions.
D. Add a User condition to the current permissions entry for the Authenticated Users principal.


Answer Clike
Which two actions should you perform?

Your network contains an Active Directory domain named adatum.com. All domain controllers run Windows Server 2008 R2.
The domain contains a file server named Server6 that runs Windows Server 2012 R2. Server6 contains a folder named Folder1. Folder1 is shared as Share1. The NTFS permissions on Folder1 are shown in the exhibit. (Click the Exhibit button.)

The domain contains two global groups named Group1 and Group2.
You need to ensure that only users who are members of both Group1 and Group2 are denied access to Folder1. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Remove the Deny permission for Group1 from Folder1.
B. Deny Group2 permission to Folder1.
C. Install a domain controller that runs Windows Server 2012 R2.
D. Create a conditional expression.
E. Deny Group2 permission to Share1.
F. Deny Group1 permission to Share1.


Answer Clike
What should you do?

You have a server named Server1 that runs Windows Server 2012 R2. You install the File and Storage Services server role on Server1.
From Windows Explorer, you view the properties of a folder named Folder1 and you discover that the Classification tab is missing. You need to ensure that you can assign classifications to Folder1 from Windows Explorer manually.
What should you do?
A. Install the File Server Resource Manager role service.
B. From Folder Options, clear Hide protected operating system files (Recommended).
C. Install the Share and Storage Management Tools.
D. From Folder Options, select the Always show menus.


Answer Clike
Which two nodes should you configure in File Server Resource Manager?

HOTSPOT
You have a file server named Server1 that runs Windows Server 2012 R2.
Server1 contains a file share that must be accessed by only a limited number of users.
You need to ensure that if an unauthorized user attempts to access the file share, a custom access-denied message appears, which contains a link to request access to the share. The message must not appear when the unauthorized user attempts to access other shares.
Which two nodes should you configure in File Server Resource Manager? To answer, select the appropriate two nodes in the answer area.
Hot Area:



Answer Clike
Which Windows PowerShell cmdlets should you run on each server?

You have 30 servers that run Windows Server 2012 R2.
All of the servers are backed up daily by using Windows Azure Backup.
You need to perform an immediate backup of all the servers to Windows Azure Backup. Which Windows PowerShell cmdlets should you run on each server?
A. Get-OBPolicy | Start-OBBackup
B. Get-WBPolicy | Start-WBBackup
C. Start-OBRegistration | Start-OBBackup
D. Get-WBBackupTarget | Start-WBBackup


Answer Clike
What should you do?

You have five servers that run Windows Server 2012 R2. The servers have the Failover Clustering feature installed. You deploy a new cluster named Cluster1. Cluster1 is configured as shown in the following table.

Server1, Server2/ and Server3 are configured as the preferred owners of the cluster roles. Dynamic quorum management is disabled. You plan to perform hardware maintenance on Server3.
You need to ensure that if the WAN link between Site1 and Site2 fails while you are performing maintenance on Server3, the cluster resource will remain available in Site1.
What should you do?
A. Remove the node vote for Server3.
B. Enable DrainOnShutdown on Cluster1.
C. Add a file share witness in Site1.
D. Remove the node vote for Server4 and Server5.


Answer Clike
Which common name should you use for the certificates on each server?

HOTSPOT
Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2012 R2. The servers have the Hyper-V server role installed.
A certification authority (CA) is available on the network.
A virtual machine named vml.contoso.com is replicated from Server1 to Server2. A virtual machine named vm2.contoso.com is replicated from Server2 to Server1.
You need to configure Hyper-V to encrypt the replication of the virtual machines. Which common name should you use for the certificates on each server?
To answer, configure the appropriate common name for the certificate on each server in the answer area.
Hot Area:



Answer Clike
What should you do?

You have a server named Server1 that runs Windows Server 2012 R2.
Server1 is backed up by using Windows Server Backup. The backup configuration is shown in the exhibit. (Click the Exhibit button.)

You discover that only the last copy of the backup is maintained. You need to ensure that multiple backup copies are maintained.
What should you do?
A. Configure the Optimize Backup Performance settings.
B. Modify the Volume Shadow Copy Service (VSS) settings.
C. Modify the backup times.
D. Modify the backup destination.


Answer Clike
Which two PowerShell cmdlets should you run in the script?

You have 20 servers that run Windows Server 2012 R2.
You need to create a Windows PowerShell script that registers each server in Microsoft Azure Backup and sets an encryption passphrase. Which two PowerShell cmdlets should you run in the script? (Each correct answer presents part of the solution. Choose two.)
A. Set-OBMachineSetting
B. Add-OBFileSpec
C. Start-OBRegistration
D. New OBPolicy
E. New-OBRetentionPolicy


Answer Clike
What should you do?

Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Both servers have the Hyper-V server role installed.Server1 and Server2 are located in different offices. The offices connect to each other by using a high-latency WAN link.
Server2 hosts a virtual machine named VM1.
You need to ensure that you can start VM1 on Server1 if Server2 fails. The solution must minimize hardware costs.
What should you do?
A. From the Hyper-V Settings of Server2, modify the Replication Configuration settings. Enable replication for VM1.
B. On Server1, install the Multipath I/O (MPIO) feature. Modify the storage location of the VHDs for VM1.
C. On Server2, install the Multipath I/O (MPIO) feature. Modify the storage location of the VHDs for VM1.
D. From the Hyper-V Settings of Server1, modify the Replication Configuration settings. Enable replication for VM1.


Answer Clike
What should you configure?

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2.
Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1. You configure File Services and DHCP as clustered resources for Cluster1. Server1 is the active node for both clustered resources.
You need to ensure that if two consecutive heartbeat messages are missed between Server1 and Server2, Server2 will begin responding to DHCP requests. The solution must ensure that Server1 remains the active node for the File Services clustered resource for up to five missed heartbeat messages.
What should you configure?
A. Affinity – None
B. Affinity – Single
C. The cluster quorum settings
D. The failover settings
E. A file server for general use
F. The Handling priority
G. The host priority
H. Live migration
I. The possible owner
J. The preferred owner
K. Quick migration
L. The Scale-Out File Server


Answer Clike
Which group on Server2 should you add Tech1?

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2. Both servers have the IP Address Management (IPAM) Server feature installed.
You have a support technician named Tech1. Tech1 is a member of the IPAM Administrators group on Server1 and Server2. You need to ensure that Tech1 can use Server Manager on Server1 to manage IPAM on Server2.
To which group on Server2 should you add Tech1?
A. WinRMRemoteWMIUsers_
B. IPAM MSM Administrators
C. Remote Management Users
D. IPAM Administrators


Answer Clike
Which server should you install IPAM?

Your network contains an Active Directory forest named adatum.com. All servers run Windows Server 2012 R2. The domain contains four servers. The servers are configured as shown in the following table.

You need to deploy IP Address Management (IPAM) to manage DNS and DHCP. On which server should you install IPAM?
A. Server1
B. Server2
C. Server3
D. Server4


Answer Clike
What should you configure?

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2.
Server1 and Server2 have the Failover Clustering feature installed.The servers are configured as nodes in a failover cluster named Cluster1. You add two additional nodes in Cluster1.
You have a folder named Folder1 on Server1 that hosts application data. Folder1 is a folder target in a Distributed File System (DFS) namespace. You need to provide highly available access to Folder1. The solution must support DFS Replication to Folder1.
What should you configure?
A. Affinity – None
B. Affinity – Single
C. The cluster quorum settings
D. The failover settings
E. A file server for general use
F. The Handling priority
G. The host priority
H. Live migration
I. The possible owner
J. The preferred owner
K. Quick migration
L. The Scale-Out File Server


Answer Clike
Which user role should you assign to User1?

You have a server named Server1.
You install the IP Address Management (IPAM) Server feature on Server1.
You need to provide a user named User1 with the ability to set the access scope of all the DHCP servers that are managed by IPAM. The solution must use the principle of least privilege.
Which user role should you assign to User1?
A. IP Address Record Administrator Role
B. IPAM Administrator Role
C. IPAM MSM Administrator Role
D. IPAM DHCP Scope Administrator Role


Answer Clike
What should you do on Server2?

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the DHCP Server server role installed.
An administrator installs the IP Address Management (IPAM) Server feature on a server named Server2. The administrator configures IPAM by using Group Policy based provisioning and starts server discovery.
You plan to create Group Policies for IPAM provisioning.
You need to identify which Group Policy object (GPO) name prefix must be used for IPAM Group Policies.
What should you do on Server2?
A. From Server Manager, review the IPAM overview.
B. Run the Get-IpamConfigurationcmdlet.
C. From Task Scheduler, review the IPAM tasks.
D. Run the ipamgc.exe tool.


Answer Clike
Which three actions should you perform?

DRAG DROP
Your network contains an Active Directory domain named contoso.com. The domain contains two DHCP servers named DHCP1 and DHCP2 that run Windows Server 2012.
You install the IP Address Management (IPAM) Server feature on a member server named Server1 and you run the Run Invoke-IpamGpoProvisioning cmdlet.
You need to manage the DHCP servers by using IPAM on Server1. Which three actions should you perform?
To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Select and Place:



Answer Clike
Which tab should you use to identify the domain controller?

HOTSPOT
Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The forest contains two Active Directory sites named Site1 and Site2.
You plan to deploy a read-only domain controller (RODC) named DC10 to Site2. You pre-create the DC10 domain controller account by using Active Directory Users and Computers.
You need to identify which domain controller will be used for initial replication during the promotion of the RODC. Which tab should you use to identify the domain controller?
To answer, select the appropriate tab in the answer area.
Hot Area:



Answer Clike
What should you do first?

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2.
You create an Active Directory snapshot of DC1 each day.
You need to view the contents of an Active Directory snapshot from two days ago.
What should you do first?
A. Start the Volume Shadow Copy Service (VSS).
B. Run the dsamain.exe command.
C. Run the ntdsutil.exe command.
D. Stop the Active Directory Domain Services (AD DS) service.


Answer Clike
Which tool should you use before you start the DFS Replication service on DC10?

Your company deploys a new Active Directory forest named contoso.com. The first domain controller in the forest runs Windows Server 2012 R2. The forest contains a domain controller named DC10.
On DC10, the disk that contains the SYSVOL folder fails.
You replace the failed disk. You stop the Distributed File System (DFS) Replication service. You restore the SYSVOL folder. You need to perform a non-authoritative synchronization of SYSVOL on DC10.
Which tool should you use before you start the DFS Replication service on DC10?
A. Active Directory Sites and Services
B. Dfsmgmt.msc
C. Ldp
D. Frsutil


Answer Clike
What should you do?


Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1.
You need to ensure that you can access the contents of the mounted snapshot.
What should you do?
A. From a command prompt, run dsamain.exe -dbpath c:$snap_201204131056_volumec$windowsntdsntds.dit -Idapport 33389.
B. From the snapshot context of ntdsutil, run mount {79f94f82-5926-4f44-8af0-2f56d827a57d>.
C. From the snapshot context of ntdsutil, run activate instance “NTDS”.
D. From a command prompt, run dsamain.exe -dbpath c:$snap_201204131056_volumec$windowsntdsntds.dit -Idapport 389.


Answer Clike
Which type of data collector should you create?

You have a server named Server1 that runs Windows Server 2012 R2.
You need to configure Server1 to create an entry in an event log when the processor usage exceeds 60 percent. Which type of data collector should you create?
A. A performance counter data collector
B. An event trace data collector
C. A performance counter alert
D. A configuration data collector


Answer Clike
What should you configure on the virtual machine?

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2.
Server1 and Server2 are nodes in a Hyper-V cluster named Cluster1. Cluster1 hosts 10 virtual machines. All of the virtual machines run Windows Server 2012 R2 and are members of the domain.
You need to ensure that the first time a service named Service1 fails on a virtual machine, the virtual machine is moved to a different node. You configure Service1 to be monitored from Failover Cluster Manager.
What should you configure on the virtual machine?
A. From the General settings, modify the Startup type.
B. From the Recovery settings of Service1, set the First failure recovery action to Take No Action.
C. From the Recovery settings of Service1, set the First failure recovery action to Restart the Service.
D. From the General settings, modify the Service status.


Answer Clike
Which tool should you use?

Your network contains an Active Directory forest named contoso.com. All servers run Windows Server 2012 R2. You need to create a custom Active Directory application partition.
Which tool should you use?
A. Eseutil
B. Dsadd
C. Dsmod
D. Ntdsutil


Answer Clike
What should you do first?

Your network contains two servers named Server1 and Server2. Both servers run Windows Server 2012 R2. On Server1, you create a Data Collector
Set (DCS) named Data1.
You need to export Data1 to Server2.
What should you do first?
A. Right-click Data1 and click Save template…
B. Right-click Data1 and click Export list…
C. Right-click Data1 and click Data Manager…
D. Right-click Data1 and click Properties.


Answer Clike
What should you identify?

You have a server named Server1 that runs Windows Server 2012 R2. You discover that the performance of Server1 is poor.
The results of a performance report generated on Server1 are shown in the following table.

You need to identify the cause of the performance issue.
What should you identify?
A. Insufficient processors
B. Excessive paging
C. Driver malfunction
D. Insufficient RAM


Answer Clike
Which performance object should you monitor on Server1?

Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed.
Server1 hosts 10 virtual machines. A virtual machine named VM1 runs Windows Server 2012 R2 and hosts a processor-intensive application named App1.
Users report that App1 responds more slowly than expected.
You need to monitor the processor usage on VM1 to identify whether changes must be made to the hardware settings of VM1. Which performance object should you monitor on Server1?
A. Hyper-V Hypervisor Logical Processor
B. Hyper-V Hypervisor Root Virtual Processor
C. Processor
D. Hyper-V Hypervisor Virtual Processor
E. Process


Answer Clike
Which settings should you configure in a Group Policy object (GPO)?

Your network contains an Active Directory domain named contoso.com. The domain contains a Web server named www.contoso.com. The Web server is available on the Internet.
You implement DirectAccess by using the default configuration.
You need to ensure that users never attempt to connect to www.contoso.com by using DirectAccess. The solution must not prevent the users from using DirectAccess to access other resources in contoso.com.
Which settings should you configure in a Group Policy object (GPO)?
A. DirectAccess Client Experience Settings
B. Name Resolution Policy
C. DNS Client
D. Network Connections


Answer Clike
What should you do?

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that has the Remote Access server role installed.
DirectAccess is implemented on Server1 by using the default configuration.
You discover that DirectAccess clients do not use DirectAccess when accessing websites on the Internet.
You need to ensure that DirectAccess clients access all Internet websites by using their DirectAccess connection.
What should you do?
A. Configure a DNS suffix search list on the DirectAccess clients.
B. Enable the Route all traffic through the internal network policy setting in the DirectAccess Server Settings Group Policy object (GPO).
C. Configure DirectAccess to enable force tunneling.
D. Disable the DirectAccess Passive Mode policy setting in the DirectAccess Client Settings Group Policy object (GPO).


Answer Clike
Which additional name suffix entry should you add from the Remote Access Setup wizard?

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012.
The domain contains an Edge Server named Server1. Server1 is configured as a DirectAccess server. Server1 has the following settings:
Internal DNS name: Server1.contoso.com
External DNS name: dal.contoso.com
Internal IPv6 address: 2002:cla8:6a:3333::1
External IPv4 address:65.55.37.62
Your company uses split-brain DNS for the contoso.com zone.
You run the Remote Access Setup wizard as shown in the following exhibit. (Click the Exhibit button.)

You need to ensure that client computers on the Internet can establish DirectAccess connections to Server1. Which additional name suffix entry should you add from the Remote Access Setup wizard?
A. A Name Suffix value of Server1.contoso.com and a blank DNS Server Address value
B. A Name Suffix value of dal.contoso.com and a blank DNS Server Address value
C. A Name Suffix value of Server1.contoso.com and a DNS Server Address value of 65.55.37.62
D. A Name Suffix value of dal.contoso.com and a DNS Server Address value of 65.55.37.62


Answer Clike
Which three GPOs should you identify in sequence?

DRAG DROP
Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012.
The domain contains an organizational unit (OU) named OU1. OU1 contains an OU named OU2. OU2 contains a user named User1. User1 is the member of a group named Group1. Group1 is in the Users container.
You create five Group Policy objects (GPO). The GPOs are configured as shown in the following table.

The Authenticated Users group is assigned the default permissions to all of the GPOs.
There are no site-level GPOs.
You need to identify which three GPOs will be applied to User1 and in which order the GPOs will be applied to User1. Which three GPOs should you identify in sequence?
To answer, move the appropriate three GPOs from the list of GPOs to the answer area and arrange them in the correct order.
Select and Place:



Answer Clike
Which Group Policy option should you configure?

HOTSPOT
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Print1. Your company implements DirectAccess.
A user named User1 frequently works at a customer’s office. The customer’s office contains a print server named Print1.
While working at the customer’s office, User1 attempts to connect to Print1. User1 connects to the Print1 server in contoso.com instead of the Print1 server at the customer’s office.
You need to provide User1 with the ability to connect to the Print1 server in the customer’s office. Which Group Policy option should you configure?
To answer, select the appropriate option in the answer area.
Hot Area:



Answer Clike
Which setting should you configure in each GPO?

DRAG DROP
Your network contains an Active Directory domain named contoso.com. All client computers run Windows 8.
Group Policy objects (GPOs) are linked to the domain as shown in the exhibit. (Click the Exhibit button.)

GPO2 contains computer configurations only and GPO3 contains user configurations only.
You need to configure the GPOs to meet the following requirements:
. Ensure that GPO2 only applies to the computer accounts in OU2 that have more than one processor.
. Ensure that GPO3 only applies to the user accounts in OU3 that are members of a security group named SecureUsers.
Which setting should you configure in each GPO?
To answer, drag the appropriate setting to the correct GPO. Each setting may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
Select and Place:



Answer Clike
Which tool should you use?

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2.
An organizational unit (OU) named OU1 contains 200 client computers that run Windows 8 Enterprise. A Group Policy object (GPO) named GPO1 is linked to OU1.
You make a change to GPO1.
You need to force all of the computers in OU1 to refresh their Group Policy settings immediately. The solution must minimize administrative effort. Which tool should you use?
A. The Secedit command
B. The Invoke-GpUpdatecmdlet
C. Group Policy Object Editor
D. Server Manager


Answer Clike
What should you configure?

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012.
Server1 has the Remote Desktop Session Host role service installed. The computer account of Server1 resides in an organizational unit (OU) named OU1.
You create and link a Group Policy object (GPO) named GPO1 to OU1. GPO1 is configured as shown in the exhibit. (Click the Exhibit button.)

You need to prevent GPO1 from applying to your user account when you log on to Server1. GPO1 must apply to every other user who logs on to Server1.
What should you configure?
A. Item-level targeting
B. Security Filtering
C. Block Inheritance
D. WMI Filtering


Answer Clike
What should you create?

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1.
Server1 has the DHCP Server server role and the Network Policy Server role service installed.
Server1 contains three non-overlapping scopes named Scope1, Scope2, and Scope3. Server1 currently provides the same Network Access Protection (NAP) settings to the three scopes.
You modify the settings of Scope1 as shown in the exhibit. (Click the Exhibit button.)

You need to configure Server1 to provide unique NAP enforcement settings to the NAP non-compliant DHCP clients from Scope1.
What should you create?
A. A network policy that has the MS-Service Class condition
B. A connection request policy that has the Service Type condition
C. A network policy that has the Identity Type condition
D. A connection request policy that has the Identity Type condition


Answer Clike
Which two settings should you configure?

Your network contains an Active Directory domain named adatum.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 is configured as a Network Policy Server (NPS) server and as a DHCP server.
The network contains two subnets named Subnet1 and Subnet2.
Server1 has a DHCP scope for each subnet.
You need to ensure that noncompliant computers on Subnet1 receive different network policies than noncompliant computers on Subnet2.
Which two settings should you configure? (Each correct answer presents part of the solution. Choose two.)
A. The NAS Port Type constraints
B. The Health Policies conditions
C. The Called Station ID constraints
D. The NAP-Capable Computers conditions
E. The MS-Service Class conditions


Answer Clike
Which command should you run from Server1?

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2 that run Windows Server 2012 R2.
You log on to Server1.
You need to retrieve the IP configurations of Server2. Which command should you run from Server1?
A. winrm get server2
B. dsquery . -scope base -attrip/server2
C. winrs -r:server2ipconfig
D. ipconfig> server2.ip


Answer Clike
Which two cmdlets should you run on Server1?

Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. The domain contains a server named Server1.
You install the Windows PowerShell Web Access gateway on Server1.
You need to provide administrators with the ability to manage the servers in the domain by using the Windows PowerShell Web Access gateway.
Which two cmdlets should you run on Server1? (Each correct answer presents part of the solution. Choose two.)
A. Install PswaWebApplication
B. Add PswaAuthorizationRule
C. Set-WSManlnstance
D. Set-WSManQuickConfig
E. Set-BCAuthentication


Answer Clike
Which three policy settings should you identify?

Your network contains an Active Directory domain named contoso.com. The domain contains client computers that run Either Windows XP, Windows 7, or Windows 8.
Network Policy Server (NPS) is deployed to the domain.
You plan to create a system health validator (SHV).
You need to identify which policy settings can be applied to all of the computers.
Which three policy settings should you identify? (Each correct answer presents part of the solution. Choose three.)
A. Automatic updating is enabled.
B. A firewall is enabled for all network connections.
C. An antispyware application is on.
D. Antispyware is up to date.
E. Antivirus is up to date.


Answer Clike
Which two tasks should you perform on Server2?

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 and a server named Server2 that runs Windows Server 2008 R2 Service Pack 1 (SP1). Both servers are member servers.
On Server2, you install all of the software required to ensure that Server2 can be managed remotely from Server Manager.
You need to ensure that you can manage Server2 from Server1 by using Server Manager.
Which two tasks should you perform on Server2? (Each correct answer presents part of the solution. Choose two.)
A. Run the Enable-PSRemotingcmdlet.
B. Run the Configure-SMRemoting.psl script.
C. Run the Enable-PSSessionConfigurationcmdlet.
D. Run the Set-ExecutionPolicycmdlet.
E. Run the systempropertiesremote.exe command.


Answer Clike
What should you install on Server1 before you run the Configure NAP wizard?

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Network Policy Server role service installed.
You plan to configure Server1 as a Network Access Protection (NAP) health policy server for VPN enforcement by using the Configure NAPwizard. You need to ensure that you can configure the VPN enforcement method on Server1 successfully.
What should you install on Server1 before you run the Configure NAP wizard?
A. A computer certificate
B. A system health validator (SHV)
C. The Remote Access server role
D. The Host Credential Authorization Protocol (HCAP)


Answer Clike
What should you do?

Your network contains a single Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2.
The domain contains 400 desktop computers that run Windows 8 and 200 desktop computers that run Windows Vista Service Pack 2 (SP2). All of the desktop computers are located in an organizational unit (OU) named OU1.
You create a Group Policy object (GPO) named GPO1. GPO1 contains startup script settings.
You link GPO1 to OU1.
You need to ensure that GPO1 is applied only to computers that run Windows 8.
What should you do?
A. Modify the Security settings of OU1.
B. Create and link a WMI filter to GPO1.
C. Run the Set-GPInheritancecmdlet and specify the -target parameter.
D. Run the Set-GPLinkcmdlet and specify the -target parameter.


Answer Clike
What should you do?

Your network contains an Active Directory domain named contoso.com. The domain contains three servers named Server1, Server2, and Server3.
You create a server group named ServerGroup1.
You discover the error message shown in the following exhibit. (Click the Exhibit button.)

You need to ensure that Server2 can be managed remotely by using Server Manager.
What should you do?
A. On Server2, run the netdom.exe command.
B. On Server2, run the net stop netlogon command, and then run the net start netlogon command.
C. On DC1, run the Enable-PSSessionConfigurationcmdlet.
D. On Server2, modify the membership of the Remote Management Users group.


Answer Clike
What should you do?

Your network contains an Active Directory domain named adatum.com. The domain contains a member server named Server1 and a domain controller named DC2. All servers run Windows Server 2012 R2.
On DC2, you open Server Manager and you add Server1 as another server to manage.
From Server Manager on DC2, you right-click Server1 as shown in the exhibit. (Click the Exhibit button.)

You need to ensure that when you right-click Server1, you see the option to run the DHCP console.
What should you do?
A. On DC2, install the Role Administration Tools.
B. On DC2 and Server1, run winrmquickconfig.
C. In the domain, add DC2 to the DHCP Administrators group.
D. On Server1, install the Feature Administration Tools.


Answer Clike
What should you do on Server1?

You have a server named Server1 that runs Windows Server 2012. You promote Server1 to a domain controller.
You need to view the service location (SRV) records that Server1 registers in DNS.
What should you do on Server1?
A. Open the Netlogon.dns file.
B. Run ipconfig /displaydns.
C. Run Get-DnsServerDiagnostics.
D. Open the SrC. sys file.


Answer Clike
Which two configurations should you identify?

Your network contains an Active Directory forest named contoso.com. All domain controllers currently run Windows Server 2008 R2.
You plan to install a new domain controller named DC4 that runs Windows Server 2012 R2.
The new domain controller will have the following configurations:
Schema master
Global catalog server
DNS Server role
Active Directory Certificate Services server role
You need to identify which configurations cannot be fulfilled by using the Active Directory Domain Services Configuration Wizard.
Which two configurations should you identify? (Each correct answer presents part of the solution. Choose two.)
A. Enable the global catalog server.
B. Transfer the schema master.
C. Install the Active Directory Certificate Services role.
D. Install the DNS Server role.


Answer Clike
How should you configure Service1?

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012.
You create a group Managed Service Account named gservice1.
You need to configure a service named Service1 to run as the gservice1 account. How should you configure Service1?
A. From a command prompt, run sc.exe and specify the config parameter.
B. From a command prompt, run sc.exe and specify the sdset parameter.
C. From the Services console, configure the General settings.
D. From Windows PowerShell, run Set-Service and specify the -PassThrough parameter.


Answer Clike
Which storage space contains the new disk?

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has following storage spaces:
Data
Users
Backups
Primordial
You add an additional hard disk to Server1.
You need to identify which storage space contains the new hard disk.
Which storage space contains the new disk?
A. Primordial
B. Data
C. Backups
D. Users


Answer Clike
What should you identify?

Your network contains an Active Directory forest named contoso.com.
The forest contains two domains named contoso.com and child.contoso.com and two sites named Site1 and Site2. The domains and the sites are configured as shown in following table.

When the link between Site1 and Site2 fails, users fail to log on to Site2.
You need to identify what prevents the users in Site2 from logging on to the child.contoso.com domain.
What should you identify?
A. The placement of the infrastructure master
B. The placement of the global catalog server
C. The placement of the domain naming master
D. The placement of the PDC emulator


Answer Clike
Which domain controller should you identify?

Your network contains an Active Directory forest. The forest contains a single domain named contoso.com. The domain contains four domain controllers.
The domain controllers are configured as shown in the following table.

All domain controllers are DNS servers.
You plan to deploy a new domain controller named DC5 in the contoso.com domain.
You need to identify which domain controller must be online to ensure that DC5 can be promoted successfully to a domain controller.
Which domain controller should you identify?
A. DC1
B. DC2
C. DC3
D. DC4


Answer Clike
What should you perform?

You have a server named Data1 that runs a Server Core Installation of Windows Server 2012 R2 Standard.
You need to configure Data1 to run a Server Core Installation of Windows Server 2012 R2 Datacenter. You want to achieve this goal by using the minimum amount of administrative effort.
What should you perform?
A. An online servicing by using Dism
B. An offline servicing by using Dism
C. An upgrade installation of Windows Server 2012 R2
D. A clean installation of Windows Server 2012 R2


Answer Clike
Which tool should you use?

You have a server named Server1 that runs Windows Server 2012 R2. You plan to create an image of Server1.
You need to remove the source files for all server roles that are not installed on Server1. Which tool should you use?
A. dism.exe
B. servermanagercmd.exe
C. ocsetup.exe
D. imagex.exe


Answer Clike
Which tool should you use?

Your network contains an Active Directory forest that contains two domains. The forest contains five domain controllers.
The domain controllers are configured as shown in the following table.

You need to configure DC5 as a global catalog server.
Which tool should you use?
A. Active Directory Administrative Center
B. Active Directory Users and Computers
C. Active Directory Sites and Services
D. Active Directory Domains and Trusts


Answer Clike
What should you configure?

Your network contains a server named Server1 that runs Windows Server 2012 R2.
Server1 has the Hyper-V server role installed. Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.
Server1 is configured as shown in the following table.

VM3 is used to test applications.
You need to prevent VM3 from synchronizing its clock to Server1.
What should you configure?
A. NUMA topology
B. Resource control
C. Resource metering
D. Virtual Machine Chimney
E. The VLAN ID
F. Processor Compatibility
G. The startup order
H. Automatic Start Action
I. Integration Services
J. Port mirroring
K. Single-root I/O virtualization


Answer Clike
What should you configure?

Your network contains a server named Server1 that runs Windows Server 2012.
Server1 has the Hyper-V server role installed.
Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.
Server1 is configured as shown in the following table.

You install a network monitoring application on VM2.
You need to ensure that all of the traffic sent to VM3 can be captured on VM2.
What should you configure?
A. NUMA topology
B. Resource control
C. Resource metering
D. Virtual Machine Chimney
E. The VLAN ID
F. Processor Compatibility
G. The startup order
H. Automatic Start Action
I. Integration Services
J. Port mirroring
K. Single-root I/O virtualization


Answer Clike
Which tool should you use?

You perform a Server Core Installation of Windows Server 2012 R2 on a server named Server1.
You need to add a graphical user interface (GUI) to Server1.
Which tool should you use?
A. The imagex.exe command
B. The ocsetup.exe command
C. The setup.exe command
D. The dism.exe command


Answer Clike
What should you configure?

Your network contains a server named Server1 that runs Windows Server 2012.
Server1 has the Hyper-V server role installed. Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.
Server1 is configured as shown in the following table.

VM2 sends and receives large amounts of data over the network.
You need to ensure that the network traffic of VM2 bypasses the virtual switches of the parent partition.
What should you configure?
B. Resource control
C. Resource metering
D. Virtual Machine Chimney
E. The VLAN ID
F. Processor Compatibility
G. The startup order
H. Automatic Start Action
I. Integration Services
J. Port mirroring
K. Single-root I/O virtualization


Answer Clike
What should you do before you create the checkpoint?

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed.
On Server1, you create and start a virtual machine named VM1. VM1 is configured as shown in the following table.

You plan to create a checkpoint of VM1.
You need to recommend a solution to minimize the amount of disk space used for the checkpoint of VM1.
What should you do before you create the checkpoint?
A. Decrease the Maximum RAM.
B. Convert Disk1.vhd to a dynamically expanding disk.
C. Run the Stop-VM cmdlet.
D. Run the Resize-VHD cmdlet.


Answer Clike
What should you configure?

Your network contains a server named Server1 that runs Windows Server 2012.
Server1 has the Hyper-V server role installed. Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.
Server1 is configured as shown in the following table.

You plan to schedule a complete backup of Server1 by using Windows Server Backup.
You need to ensure that the state of VM1 is saved before the backup starts.
What should you configure?
A. NUMA topology
B. Resource control
C. Resource metering
D. Virtual Machine Chimney
E. The VLAN ID
F. Processor Compatibility
G. The startup order
H. Automatic Start Action
I. Integration Services
J. Port mirroring
K. Single-root I/O virtualization


Answer Clike