Q1. - (Topic 3)
Your network contains an Active Directory domain named contoso.com.
You discover that when you join client computers to the domain manually, the computer accounts are created in the Computers container.
You need to ensure that new computer accounts are created automatically in an organizational unit (OU) named Corp.
Which tool should you use?
A. net.exe
B. redircmp.exe
C. regedit.exe
D. dsadd.exe
Answer: B
Explanation:
A. Used to stop/start protocols
B. Redirects the default container for newly created computers to a specified, target
organizational unit
C. Modify local registry entries
D. Adds specific types of objects to the directory
Redirects the default container for newly created computers to a specified, target
organizational unit (OU) so that newly created computer objects are created in the specific
target OU instead of in CN=Computers.
You must run the redircmp command from an elevated command prompt.
Redircmp.exe is located in the C:\Windows\System32 folder.
You must be a member of the Domain Admins group or the Enterprise Admins group to
use this tool.
Q2. - (Topic 3)
RODC comes with a number of features that focus on heightened security with limited functionality to remote office users. Which of the following are features of RODC?
A. Filtered Attribute Sets
B. Read-Only DNS
C. Unidirectional Replication
D. All of these
Answer: A
Q3. - (Topic 3)
Your network contains an Active Directory domain named contoso.com.
You have a Group Policy object (GPO) named GPO1 that contains several user settings.
GPO1 is linked to an organizational unit (OU) named OU1.
The help desk reports that GPO1 applies to only some of the users in OU1.
You open Group Policy Management as shown in the exhibit. (Click the Exhibit button.)
You need to configure GPO1 to apply to all of the users in OU1.
What should you do?
A. Modify the Security settings of GPO1.
B. Disable Block Inheritance on OU1.
C. Modify the GPO status of GPO1.
D. Enforce GPO1.
Answer: A
Explanation:
Inheritance is blocked, but that would only affect policies applied ABOVE the given OU, not
the one applied directly to it (as is the case with GPO1). Also Enforcing a policy is only going to cause it to be applied even when inheritance is blocked (which, as mentioned, does not make a difference on policies which are directly linked to the OU as a child). That means that there must be something in the security settings (such as a Security Group which does not have the “read” or “Apply group policy” permission) preventing ALL of the users in OU1 from having the policy applied. (GPO status is the status of its replication within the forest, so it is not relevant here.)
Q4. - (Topic 3)
You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed.
Contoso.com has a server, named ENSUREPASS-SR13, which is configured as the primary DNS server in the Contoso.com domain. Contoso.com has another server, named ENSUREPASS-SR14, which makes use of ENSUREPASSSR13 for DNS queries.
You want to make sure that running nslookup.exe from ENSUREPASS-SR14 produces a result that shows the proper name of the default server.
Which of the following actions should you take?
A. You should consider creating a reverse lookup zone on ENSUREPASS-SR14.
B. You should consider creating a forward lookup zone on ENSUREPASS-SR14.
C. You should consider creating a reverse lookup zone on ENSUREPASS-SR13.
D. You should consider creating a forward lookup zone on ENSUREPASS-SR13.
Answer: C
Explanation:
When you start Nslookup from a command line, the following error message may be displayed: DNS request timed out timeout was x seconds Can’t find server name for address xxx.xxx.xxx.xxx: Timed out Default servers are not available Default Server: UnKnown Address: xxx.xxx.xxx.xxx where xxx.xxx.xxx.xxx is the Internet Protocol (IP) address of the host on which you are attempting to start Nslookup. CAUSE When Nslookup starts, it attempts to resolve the IP address of its host’s DNS server to its fully qualified domain name (FQDN). If the DNS server does not respond or if the DNS server’s reverse lookup zones do not contain a PTR record for the DNS server’s IP address, the error message is displayed.
Q5. - (Topic 3)
On Server1, you plan to create an inbound firewall rule that contains the following settings:
Allows inbound connections to an application named App1.exe
Applies to the domain profile
Overrides any block rules
You need to identify the minimum information required to create the rule.
Which two pieces of information should you identify? Each correct answer presents part of the solution.
A. the list of computers that are authorized to use the application
B. the list of Active Directory users who are authorized to use the application
C. the hash of the application
D. the name of the IPSec policies that apply to Server1
E. the local path of the application
Answer: A,E
Q6. HOTSPOT - (Topic 3)
You have a server named Server1 that runs Windows Server 2012 R2. Server1 does not
have Internet connectivity.
All roles are removed completely from Server1.
You mount a Windows Server 2012 R2 installation image to the C:\Source folder.
You need to install the DNS Server server role on Server1.
Which folder should you use as the source? To answer, select the appropriate folder in the
answer area.
Answer:
Q7. - (Topic 3)
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2.
When a domain user named User3 attempts to log on to a client computer named Client10, User3 receives the message shown in the following exhibit. (Click the Exhibit button.)
You need to ensure that User3 can log on to Client10.
What should you do?
A. From Active Directory Users and Computers, configure the Logon Workstations setting of User3.
B. On Client10, modify the Allow log on locally User Rights Assignment.
C. From Active Directory Users and Computers, configure the Personal Virtual Desktop property of User3.
D. On Client10, modify the Deny log on locally User Rights Assignment.
Answer: A
Q8. - (Topic 2)
Your network contains an Active Directory domain named adatum.com. The domain contains a member server named L0N-DC1. L0N-DC1 runs Windows Server 2012 R2 and has the DHCP Server server role installed.
The network contains 100 client computers and 50 IP phones. The computers and the phones are from the same vendor.
You create an IPv4 scope that contains addresses from 172.16.0.1 to 172.16.1.254.
You need to ensure that the IP phones receive IP addresses in the range of 172.16.1.100 to 172.16.1.200. The solution must minimize administrative effort.
What should you create?
A. Server level policies
B. Reservations
C. Filters
D. Scope level policies
Answer: D
Explanation:
The scope is already in place.
Scope level policies are typically settings that only apply to that scope. They can also
overwrite a setting that was set at the server level.
When a client matches the conditions of a policy, the DHCP server responds to the clients
based on the settings of a policy.
Settings associated to a policy can be an IP address range and/or options.
An administrator could configure the policy to provide an IP address from a specified sub-range within the overall IP address range of the scope.
You can also provide different option values for clients satisfying this policy.
Policies can be defined server wide or for a specific scope.
A server wide policy – on the same lines as server wide option values – is applicable to all
scopes on the DHCP server.
A server wide policy however cannot have an IP address range associated with it.
There a couple of ways to segregate clients based on the type of device. One way to do
this is by using vendor class/identifier.
This string sent in option 60 by most DHCP clients identify the vendor and thereby the type
of the device.
Another way to segregate clients based on device type is by using the MAC address prefix.
The first three bytes of a MAC address is called OUI and identify the vendor or
manufacturer of the device.
By creating DHCP policies with conditions based on Vendor Class or MAC address prefix,
you can now segregate the clients in your subnet in such a way, that devices of a specific
type get an IP address only from a specified IP address range within the scope. You can
also give different set of options to these clients.
In conclusion, DHCP policies in Windows Server 2012 R2 enables grouping of
clients/devices using the different criteria and delivering targeted network configuration to
them.
Policy based assignment in Windows Server 2012 R2 DHCP allows you to create simple
yet powerful rules to administer DHCP on your network.
References: Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 6: Network Administration, p.253
Q9. HOTSPOT - (Topic 3)
Your network contains an Active Directory domain named contoso.com. The network contains two subnets. The subnets are configured as shown in the following table.
The network contains a member server named Server1 that runs Windows Server 2012 R2. Server1 has the DHCP Server server role installed. Server1 is configured to lease IP addresses to the two subnets.
You add three new printers to the MainOffice subnet. The printers have static IP addresses. The IP addresses are consecutive.
You need to create an exclusion range that contains the IP addresses of the printers.
From which node should you configure the exclusion range? To answer, select the appropriate node in the answer area.
Answer:
Q10. - (Topic 3)
You have a DNS server named DNS1 that runs windows server 2012 R2.
DNS1 is used to resolve the names of internet resources by using several DNS forwarders.
You need to prevent DNS1 from performing iterative queries if the DNS forwarders are unable to reslove the queries.
Which cmdlet should you use?
A. Remove-DNSServerRootHint
B. Set-DNSServerPrimaryZone
C. Ser-DNSServerGlobalNameZone
D. Unregister-DNSserverDrirectoryPartition
Answer: A
Q11. - (Topic 3)
You have a Hyper-V host named Server1 that runs Windows Server 2012 R2. Server1 hosts 50 virtual machines that run Windows Server 2012 R2.
Your company uses smart cards for authentication.
You need to ensure that you can use smart card authentication when you connect to the virtual machine by using Virtual Machine Connection.
What should you configure?
A. The RemoteFX settings
B. The Enhanced Session Mode Policy
C. The NUMA Spanning settings
D. The Integration Services settings
Answer: B
Q12. - (Topic 2)
Your network contains an Active Directory domain named adatum.com. The domain contains a member server named Server1 and a domain controller named DC2.All servers run Windows Server 2012 R2.
On DC2, you open Server Manager and you add Server1 as another server to manage.
From Server Manager on DC2, you right-click Server1 as shown in the exhibit. (Click the Exhibit button.)
You need to ensure that when you right-click Server1, you see the option to run the DHCP console.
What should you do?
A. In the domain, add DC2 to the DHCP Administrators group.
B. On Server1, install the Feature Administration Tools
C. On DC2 and Server1, run winrmquickconfig.
D. On DC2, install the Role Administration Tools.
Answer: D
Reference: http://technet.microsoft.com/en-us/library/ee441255(v=ws.10).aspx
Q13. - (Topic 1)
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has three physical network adapters named NIC1, NIC2, and NIC3.
On Server1, you create a NIC team named Team1 by using NIC1 and NIC2. You configure Team1 to accept network traffic on VLAN 10.
You need to ensure that Server1 can accept network traffic on VLAN 10 and VLAN 11. The solution must ensure that the network traffic can be received on both VLANs if a network adapter fails.
What should you do?
A. From Server Manager, change the load balancing mode of Team1.
B. Run the New-NetLbfoTeam cmdlet.
C. From Server Manager, add an interface to Team1.
D. Run the Add-NetLbfoTeamMember cmdlet.
Answer: C
Q14. - (Topic 3)
You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain have Windows Server 2012 R2 installed.
You have logged on to a server, named ENSUREPASS-SR07, and would like to obtain the IP configurations of a server, named ENSUREPASS-SR13.
Which of the following actions should you take?
A. You should consider making use of the Winrs.exe command.
B. You should consider making use of the Winsat.exe command.
C. You should consider making use of the Winpop.exe command.
D. You should consider making use of the Dsrm.exe command.
Answer: A
Q15. - (Topic 3)
Your network contains an active directory domain named Contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the Hyper-V server role installed. You have a virtual machine named VM1. VM1 has a snapshot. You need to modify the Snapshot File Location of VM1.
What should you do first?
A. Copy the snapshot file
B. Pause VM1
C. Shut down VM1
D. Delete the snapshot
Answer: D
Explanation:
Snapshot data files are stored as .avhd files. Taking multiple snapshots can quickly consume storage space. In the first release version of Hyper-V (KB950050) and in Hyper-V in Windows Server 2008 Service Pack 2, snapshot, snapshot data files usually are located in the same folder as the virtual machine by default. In Hyper-V in Windows Server 2008 R2, the files usually are located in the same folder as the virtual hard disk. The following exceptions affect the location of the snapshot data files: If the virtual machine was imported with snapshots, they are stored in their own folder. If the virtual machine has no snapshots and you configure the virtual machine snapshot setting, all snapshots you take afterwards will be stored in the folder you specify. Caution Do not delete .avhd files directly from the storage location. Instead, use Hyper-V Manager to select the virtual machine, and then delete the snapshots from the snapshot tree. Do not expand a virtual hard disk when it is used in a virtual machine that has snapshots. Doing so will make the snapshots unusable. http://technet.microsoft.com/en-us/library/dd560637(v=ws.10).aspx