Q1. Your network contains an Active Directory domain named contoso.com. The domain contains a read-only domain controller (RODC) named RODC1.
You create a global group named RODC_Admins.
You need to provide the members of RODC_Admins with the ability to manage the hardware and the software on RODC1.
The solution must not provide RODC_Admins with the ability to manage Active Directory objects.
What should you do?
A. From a command prompt, run the dsadd computer command.
B. From Active Directory Users and Computers, run the Delegation of Control Wizard.
C. From Active Directory Users and Computers, configure the Member Of settings of the RODC1 account.
D. From a command prompt, run the dsmgmt local roles command.
Answer: D
Explanation:
http://technet.microsoft.com/en-us/library/cc731885.aspx http://technet.microsoft.com/en-us/library/cc732473.aspx Manages Administrator Role Separation for a read-only domain controller (RODC). Administrator role separation provides a nonadministrative user with the permissions to install and administer an RODC, without granting that user permissions to do any other type of domain administration.
Q2. You create a new virtual disk in a storage pool by using the New Virtual Disk Wizard.
You discover that the new virtual disk has a write-back cache of 1 GB.
You need to ensure that the virtual disk has a write-back cache of 5 GB.
What should you do?
A. Detach the virtual disk, and then run the Resize-VirtualDisk cmdlet
B. Detach the virtual disk, and then run the Set-VirtualDisk cmdlet
C. Delete the virtual disk, and then run the New-StorageSubSystemVirtualDisk cmdlet
D. Delete the virtual disk, and then run the New-VirtualDisk cmdlet
Answer: D
Q3. You have a file server named Server1 that runs a Server Core Installation of Windows
Server 2012 R2.
Server1 has a volume named D that contains user data. Server1 has a volume named E
that is empty.
Server1 is configured to create a shadow copy of volume D every hour.
You need to configure the shadow copies of volume D to be stored on volume E.
What should you run?
A. The Set-Volume cmdlet with the -driveletter parameter
B. The Set-Volume cmdlet with the -path parameter
C. The vssadmin.exe add shadowstorage command
D. The vssadmin.exe create shadow command
Answer: C
Explanation: http://technet.microsoft.com/en-us/library/cc754968(v=ws.10).aspx http://technet.microsoft.com/en-us/library/hh848673(v=wps.620).aspx
Q4. Your network contains two DNS servers named DNS1 and DNS2 that run Windows Server 2012 R2. DNS1 has a primary zone named contoso.com. DNS2 has a secondary copy of the contoso.com zone.
You need to log the zone transfer packets sent between DNS1 and DNS2.
What should you configure?
A. debug logging from DNS Manager
B. logging from Windows Firewall with Advanced Security
C. monitoring from DNS Manager
D. a Data Collector Set (DCS) from Performance Monitor
Answer: C
Explanation: Monitoring DNS with the DNS Console The DNS management console includes functionality that enables you to use the console to monitor DNS activity:
*
Event Logging tab: You can access the Event Logging tab located within the Properties dialog box of the DNS server to specify the DNS events that you want to monitor. Through the Event Logging tab, you can limit the events which are written to the DNS Events log.
*
Monitoring tab: The Monitoring tab is also located within the Properties dialog box of the DNS server. This tab allows you to test querying of the DNS server.
Reference: Monitoring and Troubleshooting DNS
Q5. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Active Directory Rights Management Services server role installed.
Your company works with a partner organization that does not have its own Active Directory Rights Management Services (AD RMS) implementation.
You need to create a trust policy for the partner organization.
The solution must meet the following requirements:
. Grant users in the partner organization access to protected content . Provide users in the partner organization with the ability to create protected content.
Which type of trust policy should you create?
A. A federated trust
B. Windows Live ID
C. A trusted publishing domain
D. A trusted user domain
Answer: A
Q6. Your network contains two Active Directory forests named contoso.com and adatum.com.
Each forest contains one domain. Contoso.com has a two-way forest trust to adatum.com.
Selective authentication is enabled on the forest trust.
Contoso contains 10 servers that have the File Server role service installed.
Users successfully access shared folders on the file servers by using permissions granted
to the Authenticated Users group.
You migrate the file servers to adatum.com.
Contoso users report that after the migration, they are unable to access shared folders on
the file servers.
You need to ensure that the Contoso users can access the shared folders on the file
servers.
What should you do?
A. Disable selective authentication on the existing forest trust
B. Disable SID filtering on the existing forest trust
C. Run netdom and specify the /quarantine attribute
D. Replace the existing forest trust with an external trust.
Answer: B
Q7. Your network contains two servers named Server1 and Server2. Both servers run Windows Server 2012 R2. On Server1, you create a Data Collector Set (DCS) named Data1.
You need to export Data1 to Server2.
What should you do first?
A. Right-click Data1 and click Save template...
B. Right-click Data1 and click Export list...
C. Right-click Data1 and click Data Manager...
D. Right-click Data1 and click Properties.
Answer: A
Explanation: Exporting Templates To export a Data Collector Set you create as a template for use on other computers, open Windows Performance Monitor, expand Data Collector Sets, right-click the Data Collector Set you want to export, and click Save Template . Select a directory in which to store the XML file and click Save .
Reference: Create a Data Collector Set from a Template
Q8. You have a server named Server1 that runs Windows Server 2012 R2. Server1 has 2 dual-
core processors and 16 GB of RAM.
You install the Hyper-V server role in Server1.
You plan to create two virtual machines on Server1. You need to ensure that both virtual
machines can use up to 8 GB of memory. The solution must ensure that both virtual machines can be started simultaneously. What should you configure on each virtual machine?
A. Dynamic Memory
B. NUMA topology
C. Memory weight
D. Ressource Control
Answer: A
Q9. Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. The domain contains two organizational units (OUs) named OU1 and OU2 in the root of the domain. Two Group Policy objects (GPOs) named GPO1 and GP02 are created. GPO1 is linked to OU1.
GPO2 is linked to OU2. OU1 contains a client computer named Computer1. OU2 contains a user named User1. You need to ensure that the GPOs Applied to Computer1areApplied to User1 when User1 logs on.
What should you configure?
A. The GPO Status
B. WMI Filtering
C. GPO links
D. Item-level targeting
Answer: D
Explanation:
Explanation/Reference:
Selecting D Item-Level targeting until further notice.
===
Old explanation before answer choice changed was C, GPO Links
A GPO can be associated (linked) to one or more Active Directory containers, such as a
site, domain, or organizational unit. Multiple containers can be linked to the same GPO,
and a single container can have more than one GPO linked to it. If multiple GPOs are
linked to one container, you can prioritize the order in which GPOs are applied.
Linking GPOs to Active Directory containers enables an administrator to implement Group
Policy settings for a broad or narrow portion of the organization, as required.
Q10. RAG DROP
Your network contains an Active Directory domain named adatum.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 is configured as a Network Policy Server (NPS) server and as a DHCP server.
You need to log all DHCP clients that have windows Firewall disabled.
Which three actions should you perform in sequence? To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Answer:
Q11. You have a server named Server1 that runs Windows Server 2012 R2. You download and install the Microsoft Online Backup Service Agent on Server1.
You need to ensure that you can configure an online backup from Windows Server Backup.
What should you do first?
A. From a command prompt, run wbadmin.exe enable backup.
B. From Windows Server Backup, run the Register Server Wizard.
C. From the Services console, modify the Log On settings of the Microsoft Online Backup Service Agent.
D. From Computer Management, add the Server1 computer account to the Backup Operators group.
Answer: B
Explanation:
Download and install the Windows Azure Online Backup Agent After you create an account on the Windows Azure Online Backup website, you can download the Windows Azure Online Backup Agent and install it locally.
An Online Backup node then appears in the navigation pane of the Windows Server Backup console, as shown in Figure 12-If you prefer, you can also configure online backups from the Windows Azure Online Backup console, which becomes available after you install the agent. The Windows Azure Online Backup console provides exactly the same set of options as the Online Backup node in the Windows Server Backup console.
Register server The next step is to register your server. Registering a server enables you to perform backups from that same server only. (Remember this point for the exam.) To register the server, from the Actions menu, select Register Server. The Register Server Wizard includes two configuration steps. First, you are given an opportunity to specify a proxy server if desired. Second, you are asked to provide a passphrase that will be used to encrypt your backup data and a location to save this passphrase in a file. You need to provide this passphrase when you perform a restore operation, so it's essential that you don't lose it. (Microsoft doesn't maintain a copy of your passphrase.) A Generate Passphrase option creates the passphrase for you automatically. After you register a server, new options for Online Backup appear in the Actions pane, including Schedule Backup, Recover Data, Change Properties, and Unregister Server.
Q12. RAG DROP
Your network contains an Active Directory domain named contoso.com. The domain contains a file server named File1. All servers in the domain run Windows Server 2012 R2.
You need to create a new volume on File1.
The new volume must have the following configurations:
Have the drive letter T
Have the FAT32 file system
Be stored on a new virtual hard disk
In which order should you run the Diskpart commands?
To answer, move all the Diskpart commands from the list of commands to the answer area and arrange them in the correct order.
...
Answer:
Q13. OTSPOT
You have a server named DHCP1 that runs Windows Server 2012 R2. DHCP1 does not
have access to the Internet.
All roles are removed completely from DHCP
You mount a Windows Server 2012 R2 installation image to the C:\Mount folder.
You need to install the DHCP Server server role on DHCP1 by using Server Manager.
Which folder should you specify as the alternate path for the source files?
To answer, select the appropriate folder in the answer area.
Answer:
386. RAG DROP
Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2.Server1 and Server2 run a Server with a GUI installation of Windows Server 2012 R2.
You remove the Graphical Management Tools and Infrastructure feature on Server2.
You need to restart Server2.
What should you do? (To answer, drag the appropriate tools to the correct statements. Each tool may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
Q14. Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named dcl.contoso.com.
You discover that the Default Domain Policy Group Policy objects (GPOs) and the Default Domain Controllers Policy GPOs were deleted.
You need to recover the Default Domain Policy and the Default Domain Controllers Policy GPOs.
What should you run?
A. dcgpofix.exe /target:domain
B. dcgpofix.exe /target:both
C. gpfixup.exe /oldnb:contoso/newnb:dc1
D. gpfixup.exe /dc:dc1.contoso.com
Answer: B
Explanation:
http://technet.microsoft.com/en-us/library/cc739095(v=ws.10).aspx
Q15. Your network contains an Active Directory domain named contoso.com. The domain contains two domain controllers. The domain controllers are configured as shown in the following table.
In the perimeter network, you install a new server named Server1 that runs Windows Server 2012 R2. Server1 is in a workgroup.
You need to perform an offline domain join of Server1 to the contoso.com domain.
What should you do first?
A. Run the djoin.exe command.
B. Run the dsadd.exe command.
C. Transfer the PDC emulator role to DC1.
D. Transfer the infrastructure master role to DC1.
Answer: A
Explanation:
There do not appear to be any requirements on operations master roles for this specific requirement.
Moreover, ODJ is available on both 2008R2 and 2012 and if there was to deal with a FSMO, RID would be concerned as it's needed to create an AD object (in this case, creating the computer account)