Q1. - (Topic 1)
You have a print server named Server1 that runs Windows Server 2012 R2.
You discover that when there are many pending print jobs, the system drive occasionally
runs out of free space.
You add a new hard disk to Server1.You create a new NTFS volume.
You need to prevent the print jobs from consuming disk space on the system volume.
What should you modify?
A. The properties on the new volume
B. The properties of the Print Spooler service
C. The Print Server Properties
D. The properties of each shared printer
Answer: C
Explanation:
Windows spools print jobs by default to the following directory as they are processed:
%SystemRoot%\SYSTEM32\SPOOL\PRINTERS.
It is possible for the administrator of a Windows print server to manually instruct Windows
the location for placing the spool files, if for example there is a concern for disk space.
Q2. - (Topic 3)
You work as a senior administrator at Lead2pass.com. The Lead2pass.com network consists of a single domain named Lead2pass.com. All servers on the Lead2pass.com network have Windows Server 2012 R2 installed.
You are running a training exercise for junior administrators. You are currently discussing storage pools.
Which of the following are TRUE with regards to storage pools?
A. It allows you to group physical disks into one or more containers.
B. It prevents you from grouping physical disks into one or more containers.
C. It allows you to easily add storage with minor impact on users.
D. It allows you to easily add storage without impacting users.
Answer: A,D
Q3. - (Topic 3)
Your network contains one Active Directory domain named contoso.com. The domain contains 10 domain controllers and a read-only domain controller (RODC) named RODC01.
You plan to replace a domain controller named DC1. DC1 has the schema operations master role.
You need to transfer the schema master role to another domain controller named DC10 before you remove Active Directory from DC1.
Which tool should you use?
A. the ntdsutil command
B. the Set-ADDomain cmdlet
C. the Install-ADDSDomain cmdlet
D. the dsadd command
E. the dsamain command
F. the dsmgmt command
G. the net user command
H. the Set-ADForest cmdlet
Answer: A
Explanation: To transfer the schema master role using the command line:
Open Command Prompt.
Type:.ntdsutil
At the ntdsutil command prompt, type:.roles
...
.. ..
At the fsmo maintenance command prompt, type:.connection At the server connections command prompt, type:.connect to serverDomainController At the server connections command prompt, type:.quit At the fsmo maintenance command prompt, type:.transfer schema master
Reference: Transfer the schema master role
Q4. - (Topic 3)
Your network contains an Active Directory domain named contoso.com. An organizational unit (OU) named OU1 contains user accounts and computer accounts. A Group Policy object (GPO) named GP1 is linked to the domain. GP1 contains Computer Configuration settings and User Configuration settings.
You need to prevent the User Configuration settings in GP1 from being applied to users. The solution must ensure that the Computer Configuration settings in GP1 are applied to all client computers.
What should you configure?
A. the Group Policy loopback processing mode
B. the Block Inheritance feature
C. the Enforced setting
D. the GPO Status
Answer: D
Explanation:
Q5. - (Topic 3)
You run a Windows Server 2012 R2, what is the PowerShell command to set preferred dns server. Note: Other config such as ip address should not be changed.
A. Register-DnsClient
B. Set-DnsClient
C. Set-DnsPreferredClientServerAddress
D. Set-DnsClientServerAddress
Answer: D
Q6. - (Topic 3)
Your network contains an Active Directory domain named contoso.com. All user accounts in the sales department reside in an organizational unit (OU) named OU1.
You have a Group Policy object (GPO) named GPO1. GPO1 is used to deploy a logon script to all of the users in the sales department.
You discover that the logon script does not run when the sales users log on to their computers. You open Group Policy Management as shown in the exhibit.
You need to ensure that the logon script in GPO1 is applied to the sales users. What should you do?
A. Enforce GPO1.
B. Modify the link order of GPO1.
C. Modify the Delegation settings of GPO1.
D. Enable the link of GPO1.
Answer: D
Q7. HOTSPOT - (Topic 2)
Your network contains an Active Directory domain named contoso.com. The domain contains 25 servers. All servers run Windows Server 2012 R2.
You need to create a Windows Firewall rule to prevent administrators from using Internet Explorer to access the Internet while they are logged on interactively to the servers. The solution must not prevent administrators from accessing websites on the internal network.
How should you configure the rule?
To answer, select the appropriate options in the answer area.
Answer:
Q8. HOTSPOT - (Topic 2)
You have a file server named Server1 that runs Windows Server 2012 R2. Server1 contains a folder named Folder1.
A user named User1 is a member of Group1 and Group2. A user named User2 is a
member of Group2 and Group3.
You need to identify which actions the users can perform when they access the files in
Share1.
What should you identify?
To answer, select the appropriate actions for each user in the answer area.
Answer:
Q9. - (Topic 3)
You have a file server named File1 that runs Windows Server 2012 R2.
File1 contains a shared folder named Share1. Share1 contains an Application named
SalesAppl.exe.
The NTFS permissions for Share1 are shown in the following table.
The members of L_Sales discover that they cannot add files to Share1. Domain users can run SalesAppl.exe successfully.
You need to ensure that the members of L_Sales can add files to Share1.
What should you do?
A. Add the Domain Users group to L_Sales.
B. Add L_Sales to the Domain Users group.
C. Edit the Share permissions.
D. Edit the NTFS permissions.
Answer: C
Explanation:
Based on the NTFS permissions, these users should be able to add files (as they have the “write” permission), so they must have read-only share permissions preventing them from doing so.
Q10. - (Topic 2)
Your network contains a Hyper-V host named Server1 that runs Windows Server 2012 R2.
Server1 hosts a virtual machine named VM1 that runs Windows Server 2012 R2.
You create a checkpoint of VM1, and then you install an application on VM1. You verify
that the application runs properly.
You need to ensure that the current state of VM1 is contained in a single virtual hard disk
file.
The solution must minimize the amount of downtime on VM1.
What should you do?
A. From a command prompt, run dism.exe and specify the /delete-image parameter.
B. From a command prompt, run dism.exe and specify the /commit-image parameter.
C. From Hyper-V Manager, delete the checkpoint.
D. From Hyper-V Manager, inspect the virtual hard disk.
Answer: C
Q11. - (Topic 3)
You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed.
You are running a training exercise for junior administrators. You are currently discussing Group Policy preference.
Which of the following is TRUE with regards to Group Policy preference?
A. It supports applications and operating system features that are not compatible with Group Policy
B. It does not support item-level targeting.
C. It is the same as Group Policy filtering.
D. It does not cause the application or operating system feature to disable the user interface for the settings they configure.
Answer: A,D
Q12. HOTSPOT - (Topic 2)
Your network contains an Active Directory forest. The forest contains two domains named Domain1 and Domain2.
Domain1 contains a file server named Server1. Server1 has a shared folder named Share1.
Domain2 contains 50 users who require access to Share1.
You need to create groups in each domain to meet the following requirements:
. In Domain1, create a group named Group1. Group1 must be granted access to Share1. . In Domain2, create a group named Group2. Group2 must contain the user accounts of the 50 users. . Permission to Share1 must only be assigned directly to Group1.
Which type of groups should you create and which group nesting strategy should you use?
To answer, select the appropriate configuration in the answer area.
Answer:
Q13. - (Topic 3)
Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server1. Server1 runs Windows Server 2012 R2 and has the File and Storage Services server role installed.
On Server1, you create a share named Documents.
You need to ensure that users can recover files that they accidently delete from Documents.
What should you do?
A. Enable shadow copies by using Computer Management.
B. Create a storage pool that contains a two-way mirrored volume by using Server Manager.
C. Modify the Startup type of the Volume Shadow Copy Service (VSS) by using the Services console.
D. Create a recovery partition by using Windows Assessment and Deployment Kit (Windows ADK).
Answer: A
Explanation:
If you enable Shadow Copies of Shared Folders on a volume using the default values, a task will be scheduled to create shadow copies at 7:00 A.M of next business day. The default storage area will be on the same volume, and its size will be 10 percent of the available space. You can only enable Shadow Copies of Shared Folders on a per-volume basis–that is, you cannot select specific shared folders and files on a volume to be copied or not copied.
To enable and configure Shadow Copies of Shared Folders:
1. Click Start, point to Administrative Tools, and then click Computer Management.
2. In the console tree, right-click Shared Folders, click All Tasks, and then click Configure Shadow Copies.
3. In Select a volume, click the volume that you want to enable Shadow Copies of Shared Folders for, and then click Enable.
4. You will see an alert that Windows will create a shadow copy now with the current settings and that the settings might not be appropriate for servers with high I/O loads. Click Yes if you want to continue or No if you want to select a different volume or settings.
5. To make changes to the default schedule and storage area, click Settings.
Shadow copies - a feature that provides point-in-time copies of files stored on file shares on file servers. Shadow Copies of Shared Folders allows users to view and access shadow copies, which are shared files and folders as they existed at different points of time in the past. By accessing previous versions of files and folders, users can compare versions of a file while working and recover files that were accidentally deleted or overwritten.
References: Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter
7: Hyper-V virtualization, Lesson 1: Deploying and configuring Hyper-V- hosts, p. 302
Q14. - (Topic 3)
You have a server named Server1 that has the Print and Document Services server role installed.
You need to provide users with the ability to manage print jobs on Server1 by using a web browser.
What should you do?
A. Start the Printer Extensions and Notifications service and set the service to start automatically.
B. Install the LPD Service role service.
C. Start the Computer Browser service and set the service to start automatically.
D. Install the Internet Printing role service.
Answer: D
Explanation:
References: Internet printing makes it possible for computers running Windows Server 2008 to use printers located anywhere in the world by sending print jobs using Hypertext Transfer Protocol (HTTP). http://technet.microsoft.com/en-us/library/cc731368(v=ws.10).aspx http://technet.microsoft.com/en-us/library/cc731857.aspx
Q15. HOTSPOT - (Topic 3)
Your network contains two Active Directory forests named contoso.com and adatum.com. A two-way forest trust exists between the forests.
You have custom starter Group Policy objects (GPOs) defined in contoso.com.
You need to ensure that the same set of custom starter GPOs are available in adatum.com.
In the table below, identify which action must be performed for the starter GPOs container in each forest. Make only one selection in two of the rows. Each correct selection is worth one point.
Answer: