Q1. OTSPOT
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server2 that runs Windows Server 2012 R2.
You are a member of the local Administrators group on Server2. You install an Active Directory Rights
Management Services (AD RMS) root cluster on Server2.
You need to ensure that the AD RMS cluster is discoverable automatically by the AD RMS client computers and the users in contoso.com.
Which additional configuration settings should you configure? To answer, select the appropriate tab in the answer area.
Answer:
308. OTSPOT
Your network contains an Active Directory domain named contoso.com.
You install the IP Address Management (IPAM) Server feature on a server named Server1
and select Manual as the provisioning method.
The IPAM database is located on a server named SQL1.
You need to configure IPAM to use Group Policy Based provisioning.
What command should you run first?
To answer, select the appropriate options in the answer area.
Q2. Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server 1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed.
You create an external virtual switch named Switch1. Switch1 has the following configurations:
. Connection type: External network
. Single-root I/O virtualization (SR-IOV): Enabled
Ten virtual machines connect to Switch1.
You need to ensure that all of the virtual machines that connect to Switch1 are isolated from the external network and can connect to each other only. The solution must minimize network downtime for the virtual machines.
What should you do?
A. Remove Switch1 and recreate Switch1 as an internal network.
B. Change the Connection type of Switch1 to Private network.
C. Change the Connection type of Switch1 to Internal network.
D. Remove Switch1 and recreate Switch1 as a private network.
Answer: B
Explanation: You can change the connection type of a virtual switch from the virtual switch manager without having to remove it. A private virtual network is isolated from all external network traffic on the virtualization server, as well any network traffic between the management operating system and the external network. This type of network is useful when you need to create an isolated networking environment, such as an isolated test domain.
References: http://technet.microsoft.com/en-us/library/cc816585%28v=WS.10%29.aspx http://blogs.technet.com/b/jhoward/archive/2008/06/17/hyper-v-what-are-the-uses-for-different-types-of-virtual-networks.aspx
Q3. OTSPOT
Your network contains an Active Directory domain named contoso.com. The relevant servers in the domain are configured as shown in the following table.
You plan to create a shared folder on Server1 named Share1. Share1 must only be accessed by users who are using computers that are joined to the domain.
You need to identify which servers must be upgraded to support the requirements of Share1.
In the table below, identify which computers require an upgrade and which computers do not require an upgrade. Make only one selection in each row. Each correct selection is worth one point.
Answer:
Q4. You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed.
The disks on Server1 are configured as shown in the exhibit. (Click the Exhibit button.)
You create a virtual machine on Server1.
You need to ensure that you can configure a pass-through disk for the virtual machine.
What should you do?
A. Convert Disk 1 to a GPT disk.
B. Convert Disk 1 to a dynamic disk.
C. Delete partition E.
D. Take Disk 1 offline.
Answer: D
Explanation:
NB: added the missing exhibit http://blogs.technet.com/b/askcore/archive/2008/10/24/configuring-pass-through-disks-inhyper- v.aspx Passthrough Disk Configuration Hyper-V allows virtual machines to access storage mapped directly to the Hyper-V server without requiring the volume be configured. The storage can either be a physical disk internal to the Hyper-V server or it can be a Storage Area Network (SAN) Logical Unit (LUN) mapped to the Hyper-V server. To ensure the Guest has exclusive access to the storage, it must be placed in an Offline state from the Hyper-V server perspective. Additionally, this raw piece of storage is not limited in size so, hypothetically, it can be a multi terabyte LUN.
After storage is mapped to the Hyper-V server, it will appear as a raw volume and will be in an Offline state (depending on the SAN Policy (Figure 1-1)) as seen in Figure 1.
We stated earlier that a disk must be Offline from the Hyper-V servers' perspective in order for the Guest to have exclusive access. However, a raw volume must first be initialized before it can be used. To accomplish this in the Disk Management interface, the disk must first be brought Online. Once Online, the disk will show as being Not Initialized (Figure 2).
Right-click on the disk and select Initialize Disk (Figure 3)
Select either an MBR or GPT partition type (Figure 4).
Once a disk is initialized, it can once again be placed in an Offline state. If the disk is not in an Offline state, it will not be available for selection when configuring the Guest's storage. In order to configure a Pass-through disk in a Guest, you must select Attach a virtual disk later in the New Virtual Machine Wizard (Figure 5).
If the Pass-through disk will be used to boot the operating system, it must be attached to an
IDE Controller.
Data disks can take advantage of SCSI controllers. In Figure 6, a Passthrough disk is
attached to IDE Controller 0.
Note: If the disk does not appear in the drop down list, ensure the disk is Offline in the Disk Management interface (In Server CORE, use the diskpart.exe CLI). Once the Pass-through disk is configured, the Guest can be started and data can placed on the drive. If an operating system will be installed, the installation process will properly prepare the disk. If the disk will be used for data storage, it must be prepared in the Guest operating system before data can be placed on it. If a Pass- through disk, being used to support an operating system installation, is brought Online before the Guest is started, the Guest will fail to start. When using Pass-through disks to support an operating system installation, provisions must be made for storing the Guest configuration file in an alternate location. This is because the entire Pass-through disk is consumed by the operating system installation. An example would be to locate the configuration file on another internal drive in the Hyper-V server itself. Or, if it is a cluster, the configuration file can be hosted on a separate cluster providing highly available file services. Be aware that Pass-through disks cannot be dynamically expanded. Additionally, when using Pass-through disks, you lose the capability to take snapshots, and finally, you cannot use differencing disks with Pass-through disks.
Q5. Your network contains three Active Directory forests. Each forest contains an Active Directory Rights Management Services (AD RMS) root cluster.
All of the users in all of the forests must be able to access protected content from any of the forests.
You need to identify the minimum number of AD RMS trusts required.
How many trusts should you identify?
A. 2
B. 3
C. 4
D. 6
Answer: D
Explanation:
http://technet.microsoft.com/en-us/library/dd772648%28v=ws.10%29.aspx AD RMS Multi-forest Considerations
Q6. Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 has the IP Address Management (IPAM) Server feature installed. Server2 has the DHCP Server server role installed. A user named User1 is a member of the IPAM Users group on Server1. You need to ensure that User1 can use IPAM to modify the DHCP scopes on Server2. The solution must minimize the number of permissions assigned to User1.
To which group should you add User1?
A. IPAM ASM Administrators on Server1
B. IPAMUG in Active Directory
C. DHCP Administrators on Server2
D. IPAM MSM Administrators on Server1
Answer: C
Explanation:
Sever2 "DHCP Users" group membership is required to modify scopes on Server2 of course DHCP Administrators can proceed these tasks too. From the MSPress book "Upgrading your skills to MCSA Windows Server 2012 R2" IPAM Provisioning IPAM installation sets up various periodic data collection tasks to collect relevant data from managed DNS, DHCP, DC and NPS servers to enable address space management, multiserver management and monitoring and event catalog scenarios. All IPAM tasks launch under the Network Service account, which presents the local computer's credentials to remote servers. To accomplish this, administrators must enable read access and security permissions for the required resources over managed servers for the IPAM server's computer account. Further the relevant firewall ports need to be configured on these managed servers. IPAM Access Settings The following table provides a mapping of the IPAM functionality and managed server role type to access setting and FW rule required by IPAM periodic tasks
IPAM Access Monitoring IPAM access monitoring tracks the provisioning state of the following statuses on the server roles, which are displayed in the details pane of the IPAM server inventory view
Q7. Your network contains an Active Directory domain named adatum.com. The domain contains a member server named Server1 and a domain controller named DC2. All servers run Windows Server 2012 R2.
On DC2, you open Server Manager and you add Server1 as another server to manage.
From Server Manager on DC2, you right-click Server1 as shown in the exhibit. (Click the Exhibit button.)
You need to ensure that when you right-click Server1, you see the option to run the DHCP console.
What should you do?
A. On Server1, install the Feature Administration Tools.
B. On DC2 and Server1, run winrmquickconfig.
C. On DC2, install the Role Administration Tools.
D. In the domain, add DC1 to the DHCP Administrators group.
Answer: C
Explanation:
http://technet.microsoft.com/en-us/library/hh921475.aspx "In Windows Server 2012 R2 Preview and Windows Server 2012 R2, remote management is enabled by default. Before administrators can connect to a computer that is running Windows Server 2012 R2 Preview or Windows Server 2012 R2 remotely by using Server Manager, Server Manager remote management must be enabled on the destination computer if it has been disabled."
Q8. Your network contains an Active Directory domain named contoso.com. The domain contains more than 100 Group Policy objects (GPOs).
Currently, there are no enforced GPOs. The domain contains a top-level organizational unit (OU) for each department. A group named Group1 contains members from each department.
You have a GPO named GPO1 that is linked to the domain.
You need to configure GPO1 to Apply settings to Group1 only.
What should you use?
A. Dcgpofix
B. Get-GPOReport
C. Gpfixup
D. Gpresult
E. Gptedit.msc
F. Import-GPO
G. Restore-GPO
H. Set-GPInheritance
I. Set-GPLink
J. Set-GPPermission
K. Gpupdate
L. Add-ADGroupMember
Answer: J
Explanation:
http://technet.microsoft.com/en-us/library/ee461038.aspx
Q9. You have 3 servers that runs Windows Server 2012 R2. The server contains the disks configured as shown in the following table.
You need to create a volume that can store up to 3 TB of user files.
The solution must ensure that the user files are available if one of the disks in the volume fails.
What should you create?
A. A storage pool on Disk 2 and Disk 3
B. A mirrored volume on Disk 2 and Disk 3
C. A storage pool on Disk 1 and Disk 3
D. A mirrored volume on Disk l and Disk 4
E. Raid 5 Volume out of Disks 1, 2 and 3
Answer: B
Explanation:
A. Storage pool can't use Dynamic disk
B. Mirrored volume will be > 3Tb
C. Storage pool can't use Dynamic disk
D. is impossible, we need 3Tb of disk space
E. Raid5 need to be on dynamic disk
Q10. Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2.
An organizational unit (OU) named OU1 contains 200 client computers that run Windows 8 Enterprise. A Group Policy object (GPO) named GPO1 is linked to OU1.
You make a change to GPO1.
You need to force all of the computers in OU1 to refresh their Group Policy settings immediately. The solution must minimize administrative effort.
Which tool should you use?
A. TheSecedit command
B. The Invoke-GpUpdatecmdlet
C. Group Policy Object Editor
D. Server Manager
Answer: B
Q11. Your network contains an Active Directory forest named contoso.com. The forest contains four domains. All servers run Windows Server 2012 R2.
Each domain has a user named User1.
You have a file server named Server1 that is used to synchronize user folders by using the
Work Folders role service.
Server1 has a work folder named Sync1.
You need to ensure that each user has a separate folder in Sync1.
What should you do?
A. From Windows Explorer, modify the Sharing properties of Sync1
B. Run the Set-SyncServerSetting cmdlet
C. From File and Storage Services in Server Manager, modify the properties of Sync1
D. Run the Set-SyncShare cmdlet
Answer: D
Q12. RAG DROP
You have a server named Server1 that runs Windows Server 2012 R2. You are asked to test Windows Azure Online Backup to back up Server1. You need to back up Server1 by using Windows Azure Online Backup.
Which four actions should you perform in sequence? To answer, move the appropriate four actions from the list of actions to the answer area and arrange them in the correct order.
Answer:
Q13. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2.
Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1.
Cluster1 hosts an application named App1.
You need to ensure that Server2 handles all of the client requests to the cluster for App1. The solution must ensure that if Server2 fails, Server1 becomes the active node for App1.
What should you configure?
A. Affinity - None
B. Affinity - Single
C. The cluster quorum settings
D. The failover settings
E. A file server for general u
F. The Handling priority
G. The host priority
H. Live migration
I. The possible owner
J. The preferred owner
K. Quick migration
L. The Scale-Out File Server
Answer: J
Explanation:
The preferred owner in a 2 server cluster will always be the active node unless it is down. http:// www.sqlservercentral.com/Forums/Topic1174454-146-1.aspx#bm1174835 Difference between possible owners and preferred owners Possible owners are defined at the resource level and dictate which nodes in the Windows cluster are able to service this resource For instance, you have a 3 node cluster with Node A, Node B and Node C. You have a clustered disk resource "MyClusteredDisk", if you remove Node C from the possible owners of the clustered disk resource "MyClusteredDisk" then this disk will never be failed over to Node C. Preferred owners are defined at the resource group level and define the preferred node ownership within the Windows cluster For instance, you have a 3 node cluster with Node A, Node B and Node C. You have a cluster resource group "MyClusteredGroup" which contains various disk, IP, network name and service resources. Nodes A, B and C are all possible owners but Node B is set as the preferred owner and is currently the active node. The resource group fails over to Node C as Node B stops responding on the Public network due to a failed NIC. In the Resource group properties on the failback tab you have this set to immediate. You fix the NIC issue on Node B and bring it back up on the network. The resource group currently active on Node C will without warning immediately attempt to failback to Node B. Not a good idea if this is a Production SQL Server instance, so use caution when configuring preferred owners and failback http://support.microsoft.com/kb/299631/en-us Failover behavior on clusters of three or more nodes This article documents the logic by which groups fail from one node to another when there are 3 or more cluster node members. The movement of a group can be caused by an administrator who manually moves a group or by a node or resource failure. Where the group moves depends on how the move is initiated and whether the Preferred Owner list is set.
Q14. After setting up several Active Directory users for different OU's, you discover that the IT technician has miss spelt the Office property as Londn instead of London.
Which tool should you use to correct the changes to all of the OU's at once?
A. Use Dsget and Dsmod
B. Use Dsquery and Dsmod
C. Use MoveTo or MoveHere
D. Multi select the users using the Ctrl key and opening Properties
Answer: B
Explanation:
You can use Dsquery to query AD users by property values. So in this case we could query on the miss spelt word London.
Q15. You have a server named Server1 that runs Windows Server 2012.
You promote Server1 to a domain controller.
You need to view the service location (SRV) records that Server1 registers in DNS.
What should you do on Server1?
A. Open the Netlogon.dns file.
B. Run ipconfig /displaydns.
C. Run Get-DnsServerDiagnostics.
D. Open the SrC. sys file.
Answer: A
Explanation:
Netlogon.dns - If you are using non-Microsoft DNS servers to support Active Directory, you can verify SRV locator resource records by viewing Netlogon.dns. Netlogon.dns is located in the %systemroot%\System32\Config folder. You can use a text editor, such as Microsoft Notepad, to view this file. The first record in the file is the domain controller's Lightweight Directory Access Protocol (LDAP) SRV record. References:
http://support.microsoft.com/kb/816587/en-us