Q1. You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the HyperV server role installed. Server1 is connected to two Fibre Channel SANs and is configured as shown in the following table.
You have a virtual machine named VM1. You need to configure VM1 to connect to SAN1. What should you do first?
A. Create a virtual Fibre Channel SAN.
B. Configure network adapter teaming.
C. Add one HBA.
D. Create a Hyper-V virtual switch.
Answer: A
Q2. OTSPOT
You have a server that runs Windows Server 2012 R2 and has the iSCSI Target Server role service installed.
You run the New-IscsiVirtualDisk cmdlet as shown in the New-IscsiVirtualDisk exhibit. (Click the Exhibit button.)
To answer, complete each statement according to the information presented in the exhibits. Each correct selection is worth one point.
Answer:
Q3. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2.
Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1.
You configure File Services and DHCP as clustered resources for Cluster1. Server1 is the active node for both clustered resources.
You need to ensure that if two consecutive heartbeat messages are missed between Server1 and Server2, Server2 will begin responding to DHCP requests. The solution must ensure that Server1 remains the active node for the File Services clustered resource for up to five missed heartbeat messages.
What should you configure?
A. Affinity - None
B. Affinity - Single
C. The cluster quorum settings
D. The failover settings
E. A file server for general use
F. The Handling priority
G. The host priority
H. Live migration
I. The possible owner
J. The preferred owner
K. Quick migration
L. The Scale-Out File Server
Answer: D
Explanation:
http://social.technet.microsoft.com/Forums/en/operationsmanagergeneral/thread/6b6acdf3 e921-4c9f-b496-cd81f556d246
Q4. You have a Hyper-V host named Server1 that runs Windows Server 2012 R2. Server1 has the virtual switches listed in the following table.
You create a virtual machine named VM1. VM1 has two network adapters. One network adapter connects to vSwitch1. The other network adapter connects to vSwitch2. You configure NIC teaming on VM1.
You need to ensure that if a physical NIC fails on Server1, VM1 remains connected to the network.
What should you do on Server1?
A. Run the Set-VmNetworkAdaptercmdlet.
B. Add a new network adapter to VM1.
C. Create a new virtual switch on Server 1.
D. Modify the properties of vSwitch1 and vSwitch2.
Answer: A
Q5. Your IT manager is concerned that someone is trying to gain access to your company's computers by logging on with valid domain user names and various password attempts.
Which audit policy should you monitor for these activities?
A. Policy Change
B. Account Logon
C. Privilege Use
D. Directory Service Access
Answer: B
Explanation:
Old (removed questions as came out before the exam release =>unvalid but can be The Account Logon audit category in Windows Server 2008 generates events for credential
validation. These events occur on the computer that is authoritative for the credentials
Q6. You have a server named SCI that runs a Server Core Installation of Windows Server 2012
R2.
Shadow copies are enabled on all volumes.
You need to delete a specific shadow copy. The solution must minimize server downtime.
Which tool should you use?
A. Shadow
B. Diskshadow
C. Wbadmin
D. Diskpart
Answer: B
Explanation: DiskShadow.exe is a tool that exposes the functionality offered by the
Volume Shadow Copy Service (VSS).
The diskshadow command delete shadows deletes shadow copies.
Q7. Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. The domain contains two servers. The servers are configured as shown in the following table.
All client computers run Windows 8 Enterprise.
You plan to deploy Network Access Protection (NAP) by using IPSec enforcement.
A Group Policy object (GPO) named GPO1 is configured to deploy a trusted server group to all of the client computers.
You need to ensure that the client computers can discover HRA servers automatically.
Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.)
A. On Server2, configure the EnableDiscovery registry key.
B. On DC1, create an alias (CNAME) record.
C. On DC1, create a service location (SRV) record.
D. In a GPO, modify the Request Policy setting for the NAP Client Configuration.
E. On all of the client computers, configure the EnableDiscovery registry key.
Answer: C,D,E
Explanation:
http://technet.microsoft.com/en-us/library/dd296901(v=ws.10).aspx
Q8. Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1 that runs Windows Server 2012 R2.
You enable and configure Routing and Remote Access (RRAS) on Server1.
You create a user account named User1.
You need to ensure that User1 can establish VPN connections to Server1.
What should you do?
A. Modify the members of the Remote Management Users group
B. Add a RADIUS client
C. Modify the Dial-in setting of User1
D. Create a connection request policy
Answer: C
Q9. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2.
On a server named Server2, you perform a Server Core Installation of Windows Server 2012 R2. You join Server2 to the contoso.com domain.
You need to ensure that you can manage Server2 by using the Computer Management console on Server1.
What should you do on Server2?
A. Run sconfig.exe and configure remote management.
B. Run sconfig.exe and configure Remote Server Administration Tools (RSAT).
C. Install Windows Management Framework.
D. Install Remote Server Administration Tools (RSAT).
Answer: A
Explanation:
In Windows Server 2012, you can use the Server Configuration tool (Sconfig.cmd) to configure and manage several common aspects of Server Core installations. You must be a member of the Administrators group to use the tool. Sconfig.cmd is available in the Minimal Server Interface and in Server with a GUI mode.
References: http://technet.microsoft.com/en-us/library/jj647766.aspx Training Guide: Installing and Configuring Windows Server 2012, Chapter 2: Deploying servers, p. 80
Q10. Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. All domain controllers run Windows Server 2012 R2. The domain contains two domain controllers. The domain controllers are configured as shown in the following table.
Active Directory Recycle Bin is enabled. You discover that a support technician accidentally removed 100 users from an Active Directory group named Group1 an hour ago. You need to restore the membership of Group1.
What should you do?
A. Export and import data by using Dsamain.
B. Apply a virtual machine snapshot to VM1.
C. Recover the items by using Active Directory Recycle Bin.
D. Modify the isRecycled attribute of Group1.
Answer: A
Explanation:
As far as the benefits of the Windows 2012 Recycle Bin, they are the same as the Windows 2008 R2 recycle bin with the exception of the new user interface which makes it more user-friendly. These additional benefits include: All deleted AD object information including attributes, passwords and group membership can be selected in mass then undeleted from the user interface instantly or via Powershell User-friendly and intuitive interface to filter on AD objects and a time period • Can undelete containers with all child objects https://www.simple-talk.com/sysadmin/exchange/the-active-directory-recycle-bin-in-windows-server-2008-r2/ http://communities.quest.com/community/quest-itexpert/blog/2012/09/24/the-windows-server-2012-recycle-bin-and-recovery-manager-for-active- directory
Q11. OTSPOT
Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2012 R2.
From Server2, you attempt to connect to Server1 by using Computer Management and you receive the following error message: "Computer \\Server1 cannot be found. The network path was not found. "
From Server1, you successfully connect to Server2 by using Server Manager.
You need to ensure that you can manage Server1 remotely from Server2 by using Computer Management.
What should you configure?
To answer, select the appropriate option in the answer area.
Answer:
Q12. You have a server named Served that runs Windows Server 2012 R2. Server1 has five network adapters.
Three of the network adapters are connected to a network named LAN1. The two other network adapters are connected to a network named LAN2. You create a network adapter team named Team1 from two of the adapters connected to LAN1. You create a network adapter team named Team2 from the two adapters connected to LAN2. A company policy states that all server IP addresses must be assigned by using a reserved address in DHCP. You need to identify how many DHCP reservations you must create for Server1.
How many reservations should you identify?
A. 2
B. 3
C. 5
D. 7
Answer: B
Explanation: 1 reservation for the NIC team on LAN1 1 reservation for the stand-alone NIC on LAN1 1 reservation for the NIC team on LAN2 => 3 reservations.
Q13. You have a server named Served that runs Windows Server 2012 R2. You connect three new hard disks to Server 1.
You need to create a storage space that contains the three disks.
The solution must meet the following requirements:
. Provide fault tolerance if a single disk fails.
. Maximize the amount of useable storage space.
What should you create?
A. A spanned volume
B. A simple space
C. A parity space
D. A mirrored space
Answer: C
Explanation:
Simple space does not provide fault tolerance, neither does spanned volumes, whereas parity & mirrored spaces do. So the question is parity space or mirrored space to maximize the amount of useable storage space? http://en.wikipedia.org/wiki/Spanned_volume Unlike RAID, spanned volumes have no fault- tolerance, so if any disk fails, the data on the whole volume could be lost. http://arstechnica.com/information-technology/2012/10/storage-spaces-explained-a-greatfeaturewhen-itworks/ Storage Spaces explained: a great feature, when it works Three-way mirroring gives you less usable space than two-way mirroring, but can tolerate the failure of up to two disks at once.
Parity mirroring gives more usable space than either mirroring mode (a 20GB storage space configured with two-way mirroring will require about 40GB of physical disk space, but a 20GB parity storage space requires only about 30GB) but comes with the aforementioned performance hit. http://technet.microsoft.com/en-us/library/jj822938.aspx
Q14. OTSPOT
Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server1. Server1 runs Windows Server 2012 R2. You enable the EventLog-Application event trace session.
You need to set the maximum size of the log file used by the trace session to 10 MB. From which tab should you perform the configuration? To answer, select the appropriate tab in the answer area.
Answer:
29. RAG DROP
Your network contains an Active Directory domain named contoso.com. The domain
contains two DHCP servers named DHCP1 and DHCP2 that run Windows Server 2012. You install the IP Address Management (IPAM) Server feature on a member server named Server1 and you run the Run Invoke-IpamGpoProvisioningcmdlet.
You need to manage the DHCP servers by using IPAM on Server1. Which three actions should you perform?
To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Q15. Your network contains an Active Directory domain named contoso.com. The domain contains a file server named Server1 that runs Windows Server 2012 R2. You create a user account named User1 in the domain.
You need to ensure that User1 can use Windows Server Backup to back up Server1.
The solution must minimize the number of administrative rights assigned to User1.
What should you do?
A. Assign User1 the Back up files and directories user right.
B. Add User1 to the Backup Operators group.
C. Add User1 to the Power Users group.
D. Assign User1 the Back up files and directories user right and the Restore files and directories user right.
Answer: A
Explanation:
Backup Operators have these permissions by default:
However the question explicitly says we need to minimize administrative rights. Since the
requirement is for backing up the data onlyno requirement to restore or shutdownthen assigning the "Back up files and directories user right" would be the correct.