+ All Categories

MCSE 70

Date post: 07-Oct-2015
Category:
Upload: mahabhashyam
View: 215 times
Download: 0 times
Share this document with a friend
Description:
MCSE 70.docx

of 46

Transcript

MCSE 70-410 R2

How does an administrator repair or change permissions on a file in which the administrator hasbeen denied permissions?The administrator should take ownership of the file

Which file on a domain controller contains all resource records for the Active Directory domain controller, including its SRV records?Netlogon.dns in the %systemroot%\System32\Config folder

Which generation(s) of virtual machines allows the VM to boot using IPv4?both Generation 1 and Generation 2 virtual machines

How do you hide a share so that it is not visible in the network, but allows users that have the appropriate permissions to access the folder?Create a hidden share by putting a dollar sign ($) after the share name

How can you perform an in-place upgrade from a Windows Server 2008 server with a 32-bit processor to Windows Server 2012 R2?In-place upgrades from 32-bit to 64-bit architectures are not supported. You must perform a cleaninstallation.

Which DHCP option number specifies the DNS domain name that the client should use for DNScomputer name resolution?015

What prevents a range of IP addresses within a DHCP scope from being leased to any computer?scope exclusion

How does the load balancing and failover of networktraffic differ between Windows Server 2012 andWindows Server 2012 R2?

Answer:Unlike Windows Server 2012, Windows Server 2012R2 provides a balanced load distribution betweenNICs in a NIC team.

Item: 9Why does Microsoft recommend that you create a newGroup Policy Object (GPO) for AppLocker inenvironments where both Software Restriction Policiesand AppLocker are in place?

Answer:If you upgrade a computer that uses SoftwareRestriction Policies to Windows Server 2012 R2 orWindows 8.1, and then implement AppLocker rules,only the AppLocker rules will be enforced.

Item: 10When editing a Group Policy, which Flexible SingleMaster Operations (FSMO) role contains the versionof the Group Policy that is being edited?

PDC emulator

Item: 11What command adds a remote server to the localcomputer's TrustedHosts list in a Windows PowerShellsession?

Answer:Set-Item wsman:\localhost\Client\TrustedHosts -Concatenate -Force

Item: 12Which PowerShell cmdlet is used to create portmirroring?

Answer:Set-VMNetworkAdapter

Item: 13Which PowerShell cmdlet creates a new NIC teamthat consists of one or more network adapters?

Answer:New-NetLbfoTeam

Item: 14Which command is used to configure one or manyservers with an SCW-generated policy?

Answer:Scwcmd

Item: 15Which type of zone resolves an IP address to a name?

Answer:A reverse lookup zone

Item: 16In Active Directory Users and Computers, how do youdisplay the Security and Object tab in the propertiesof an OU?

Answer:You need to click View and then Advanced Featuresin Active Directory Users and Computers beforeclicking on the properties of the OU

Item: 17Which command would you run on a Windows Server2012 R2 server to force a group policy to apply toanother Windows Server 2012 R2 computer, namedSRV2?

Answer:winrs -r:SRV2 gpupdate /force

Item: 18Which command can be used to redirect newlycreated users from the default container namedCN=Users to a specified container?

Answer:the redirusr command

Item: 19What does the Block setting on a Firewall profileblock?

Answer:Blocks all connections that do not have firewall rulesthat explicitly allow the connection

Item: 20What allows a virtual machine to connect to a virtualSAN attached to a Windows Server 2012 server withthe Hyper-V role installed?

virtual Fibre Channel Adapter

Item: 21What would be the reason to setup a virtual machinewith a pass-through disk?

Answer:Pass through disks provide noticeably betterperformance

Item: 22Which new feature of Windows Server 2012 R2protects against simultaneous physical disk failures bystoring two copies of parity information in the parityspace?

Answer:Dual parity

Item: 23What is the term for the folder that is created in theSYSVOL folder of an Active Directory domaincontroller and is used to provide a centralized storagelocation for ADMX and ADML files for the domain?

Answer:central store

Item: 24Which Hyper-V feature drops DHCP server messagescoming from a VM?

Answer:DHCPGuard

Item: 25When can single-root I/O virtualization (SR-IOV) beconfigured in Virtual Switch manager?

Answer:only when a virtual switch is created

Item: 26What comprises the membership list of a local group?

Answer: Users and computers from any trusted domain Global groups from any trusted domain Universal groups from any trusted domain

Item: 27Which ports and protocols should you enable on theWindows Firewall for a Windows Server 2012 R2acting as a VPN server to allow inbound PPTPconnections?

Answer:TCP port 1723 and IP Protocol ID 47

Item: 28Which feature of the Hyper-V role allows you tospecify whether a VM is allowed to change its sourceMAC address for outgoing packets?

Answer:MAC address spoofing

Item: 29What are two ways to remove Windows Explorer, Windows Internet Explorer, and all relatedcomponents and files from a full installation ofWindows Server 2012 R2?

run Uninstall-WindowsFeature or use Server Manager to remove the Server Graphical Shell

Item: 30Which PowerShell cmdlet deletes user accounts?

Answer:Remove-ADUser

Item: 31What utility can you use to enable remotemanagement on a Server Core installation of WindowsServer?

Answer:sconfig

Item: 32What subnet mask would you use to further divide the192.168.0.0/24 network to a subnet that supports upto 110 hosts?

Answer:/25 or 255.255.255.128

Item: 33How would you grant a group of users the authority toreset user's passwords for the OUs located in thedomain?

Answer:On the OU, use the Delegation of Control Wizard todelegate the Reset user passwords and forcepassword change at next logon task to the group.

Item: 34If a DNS server has both a conditional forwarderdefined for a given domain and a server levelforwarder, which forwarder will be used to resolve aquery in the given domain?

Answer:The conditional forwarder

Item: 35Which feature of the Hyper-V role allows traffic sent toor from a Hyper-V Virtual Switch port to be copied andsent to a mirror port?

Answer:Port mirroring

Item: 36Which PowerShell cmdlet can be used to find a list ofstale computers that have not been logged into byanyone in four weeks?

Answer:get-adcomputer

Item: 37Which type of zone will prevent the use of forwardersor the use of root DNS servers listed in the Root Hintstab of the DNS server?

Answer:A root zone

Item: 38What does the term "Same Sign-On" mean withrespect to the Windows Azure Active Directory SyncTool?

Answer:Users that have their passwords synchronized toWindows Azure AD will be able to use the sameusername and password to log into their Azure ADservices as well as their on-premises resources.

Item: 39Is it possible to use Server Manager on a WindowsServer 2008 R2 server to install roles on a ServerCore installation of Windows Server 2012 R2?

Answer:No, you must use the version of Server Manageravailable in Windows Server 2012 R2 or the RemoteServer Administration Tools for Windows 8 orWindows 8.1

Item: 40Which Hyper-V feature offloads the perpacketencryption operations from the VM tothe NIC, resulting in substantial CPUsavings?

Answer:IPsec Task Offload (IpsecTO)

Item: 41Which edition of a Windows Server 2012 basedoperating system should be the source of the mediathat you use to create additional domain controllersrunning Windows Server 2012 R2 Datacenter editionwith the install from media (IFM) method?

Answer:Windows Server 2012 R2 Datacenter edition

Item: 42What parameter of the Import-GPO cmdlet will createthe destination GPO if the GPO does not exist?

Answer:-CreateIfNeeded

Item: 43What is the difference between a fixed size virtual harddisk and a dynamically expanding virtual hard disk?

Answer: A fixed size disk uses the size of the virtualhard disk and does not change when data isdeleted or added A dynamically expanding disk is created small,and changes as data is added

Item: 44What action must you perform before attaching aVHDX from a Generation 2 virtual machine to aGeneration 1 virtual machine?

Answer:None. VHDXs created on Generation 2 virtualmachines will work on Generation 1 virtual machines.

Item: 45Can you upgrade from a Windows Server 2008 R2Server Core installation to the Server with a GUI modeof Windows Server 2012 R2 in one step?

Answer:No. You must first upgrade your Server Coreinstallation to Windows Server 2012 R2 Server Core,then switch to the GUI mode of Windows Server 2012R2.

Item: 46If a virtual machine has a legacy network adapter, howcan you specify the minimum and maximum bandwidth that the adapter can use? Item:

You must replace the legacy network adapter with anon-legacy network adapter

Item: 47What type of storage layout from a storage pool bestsuited for temporary data, such as video renderingfiles, image editor scratch files, and intermediarycompiler object files?

Answer:simple spaces

Item: 48What two commands allow you to view installedupdates on a Server Core installation of WindowsServer 2012 R2?

Answer:either the systeminfo command or the wmic qfe listcommand

Item: 49What cmdlet will remove a specified NIC team from aWindows Server 2012 R2 Server Core installation?

Answer:Remove-NetLbfoTeam

Item: 50Why does a striped volume offer better writeperformance than a RAID-5 volume?

Answer:A RAID-5 volume writes both parity blocks and datablocks, so it does not offer the write performance of astriped volume, which only writes data blocks.

Item: 51Why would you get the error *** Can't findserver name for address w.x.y.z: Timedout when starting the nslookup utility?

Answer:The name server does not exist or the name serverdoes not have a PTR record in a reverse lookup zone

Item: 52What Windows Server 2012 R2 functionality allowscommunication between IPV6 and IPV4 networks thatare behind NAT servers when you cannot use ISATAPor 6to4?

Answer:Teredo

Item: 53When you want to set up a pass-through disk for avirtual machine, what state must you configure for thephysical disk in the Disk Management snap-in?

Answer:offline

Item: 54What feature of Hyper-V in Windows Server 2012 R2is used to bridge the memory gap between minimummemory and startup memory, and allow virtualmachines to restart reliably?

Answer:Smart Paging

Item: 55What does the Block all connections setting on aFirewall profile block?

Answer:Blocks all connections, regardless of any firewall rulesthat explicitly allow the connection

Item: 56Which command would you run to add a domain useraccount to the local Administrators group on aWindows Server 2012 R2 Server Core server?

Answer:net localgroup administrators /add\

Item: 57What is the minimum number of dynamic drivesrequired to create a mirrored volume?

Answer:2

Item: 58Which service should you restart to re-register all SRVrecords for a domain controller?

Answer:the NetLogon service

Item: 59To specify the Accounts:Rename Administratoraccount policy to rename the local Administratoraccount on a computer to a different name, what pathin a GPO must you search for the policy?

Answer:Computer Configuration\Policies\WindowsSettings\Security Settings\Local Policies\SecurityOptions

Item: 60If you upgrade a computer that is using SoftwareRestriction Policies to Windows Server 2012 R2 orWindows 8.1, and then implement AppLocker rules,which set of policies is enforced?

Answer:only the AppLocker rules are enforced

Item: 61How can you deny specific computers from obtainingan IP address from a DHCP server?

Answer:Create a deny filter based on MAC address of thecomputer

Item: 62Which version of the Windows operating systemallows you to create parity spaces on failover clusters?

Answer:Windows Server 2012 R2

Item: 63Which feature introduced in Windows Server 2012 letsremote users run PowerShell commands from anyweb-enabled device?

Answer:Windows PowerShell Web Access

Item: 64Which tool do you use to edit a local Group Policy on acomputer?

Answer:you can open and edit a GPO by using the GroupPolicy Editor

Item: 65Which firewall profile is applied when a computer isconnected to a domain through a public network?

Answer:Public profile

Item: 66What PowerShell cmdlet would you use to display thesettings that have been enabled in a particular GPO?

Answer:the Get-GPOReport cmdlet

Item: 67Which Hyper-V feature drops router advertisementand redirection messages from unauthorized VMs?

Answer:RouterGuard

Item: 68What setting of a virtual machine in Hyper-V managerspecifies the behavior of the VM when the physicalcomputer starts?

Answer:Automatic Start Action

Item: 69What happens when you run dcpromo.exe with noparameters from a Windows Server 2012 R2command prompt?

Answer:It will not work. You will get a message pointing you toServer Manager.

Item: 70What is the scope of the Restore-GPO cmdlet whenrestoring GPO backups?

Answer:It only restores GPO backups to the original domainwhere the GPO was saved

Item: 71When printer priorities are configured for print devices,what printer is allowed to print first?

Answer:The one with the highest priority, which is the one withthe highest number assigned to it

Item: 72What Hyper-V feature introduced in Windows Server2008 R2 defines the startup memory as the minimumamount of memory that a virtual machine can have?

Answer:Dynamic Memory

Item: 73What utility can you use to apply a quota to a specificpath on an NTFS volume?

Answer:File Server Resource Manager.

Item: 74Which command enables Server Manager remotemanagement and enables all required firewall ruleexceptions?

Answer:Configure-SMRemoting.exe -enable

Item: 75What PowerShell cmdlet would you use to change astatic IP address on a Windows Server 2012 R2Server Core server?

Answer:New-NetIPAddress

Item: 76Which feature of the Hyper-V role allows you tospecify limits on the physical hardware, such assetting the relative weight and the percentage of totalsystem resources on a processor?

Resource Control

Item: 77Which services under Integration Services in Hyper-VManager can you make available to a virtual machine?

Answer: Operating system shutdown Time synchronization Data Exchange Heartbeat Backup (volume snapshot)

Item: 78If a client has a DHCP reservation, there is a DHCPallow list enabled, and the client is not on the DHCPallow list, will the client receive an IP address from theDHCP server?

Answer:No. You'll need to add the client's MAC address to thelist.

Item: 79Software based keyboards are found in whichgeneration(s) of virtual machines?

Answer:Generation 2 only

Item: 80How can domain administrators disable the processingof local GPOs on clients that are running Windowsclient and Windows Server operating systems?

Answer:by enabling the Turn Off Local Group PolicyObjects Processing policy setting in a domain GPO

Item: 81What IPv6 transition technology defines a method forgenerating a link-local IPv6 address from an IPv4address, and a mechanism to perform NeighborDiscovery on top of IPv4?

Answer:ISATAP

Item: 82What permissions are assigned to the parent OU andchild OU when you create a child OU that hasthe Protect object from accidental deletion settingenabled?

Answer: an explicit Deny ACEs for the Delete andDelete Subtree advanced permissions for theEveryone group is applied to the child OU an explicit Deny ACE for the Delete All ChildObjects permission for the Everyone group isapplied to the parent container OU

Item: 83 AnswerWhich DHCP option number specifies a list of IPaddresses for DNS name servers available to theclient?

Answer:006

Item: 84Which domain controller should be the source of themedia that you use to create additional domaincontrollers with the install from media (IFM) method?

Answer:a domain controller in the same domain as the newdomain controller

Item: 85What technology is similar to 6to4 in that it allows youto tunnel IPv6 packets over the IPv4 Internet?

Answer:Teredo

Item: 86What type of AppLocker rule would you use to controlan application from the Windows store?

Answer:a packaged app rule

Item: 87What does the Allow setting on a Firewall profileallow?

Answer:Allows the connection, unless there is a firewall rulethat explicitly blocks the connection

Item: 88What subnet mask would you use to further divide the10.10.0.0/16 network to a subnet that supports up to525 hosts?

Answer:/22 or 255.255.252.0 which supports 2^10-2, or 1024,hosts per subnet

Item: 89To perform an offline domain join during anunattended operating system installation of a ServerCore version of Windows Server 2012 R2, whatcommand should you run first?

Answer:djoin /provision

Item: 90What is the term when one logical printer is connectedto multiple printer devices through multiple ports of theprint server?

Answer:A printer pool

Item: 91Why can you not use distribution groups to assignpermissions explicitly or implicitly through membershipin other groups for resources?

Answer:Unlike security groups, distribution groups are notsecurity principals

Item: 92Which cmdlet(s) can you use to create a domaincontroller on a Server Core installation of WindowsServer 2012 R2?

Answer:install-windowsfeature -Name AD-Domain-ServicesORget-windowsfeature AD-Domain-Services | install-windowsfeature ANDInstall-ADDSDomainController

Item: 93Which PowerShell cmdlet would you use to enableWindows PowerShell Remoting on a Windows Server2012 R2 server core server so that commands typedin Windows PowerShell on one computer are able torun on another computer?

Answer:Enable-PSRemoting

Item: 94Which firewall profile is applied when a computer isconnected to a network in which the computer'sdomain account resides?

Answer:Domain profile

Item: 95Which utility synchronizes user passwords from youron-premises Active Directory to Azure ActiveDirectory, letting users access Microsoft CloudServices with the same password that they use toaccess on-premises resources?

Answer:Windows Azure Active Directory Sync Tool

Item: 96Which user feature protects the computer from theunauthorized installation of any software?

Answer:User Account Control (UAC)

Item: 97If you use a Windows Server 2008 R2 DNS server andimplement ISATAP, what must you configure on theDNS server?

Answer:To allow name resolution for the ISATAP name, youmust remove ISATAP from the global query block listof the DNS Server service for each DNS server onyour intranet running Windows Server 2008 R2 orWindows Server 2008.

Item: 98Which service, if stopped, with will prevent AppLockerpolicies from being enforced?

Answer:the Application Identity service

Item: 99What comprises the membership list of a globalgroup?

Answer: Users and computers from the same domain asthe global group Global groups from the same domain

Item: 100Which IPv6 prefix is a unique local unicast allocation?

Answer:FC00::/7

Item: 101How must you configure a Windows Server 2012 R2server in a workgroup with the DNS server role loadedin order to support Active Directory zones?

Answer:Make the server a domain controller

Item: 102What cmdlet removes the routing entry for the defaultgateway before applying a new one?

Answer:Remove-NetRoute -DestinationPrefix ::/0-Confirm

Item: 103What are the differences between firewall rules andconnection security rules?

Answer: Firewall rules allow traffic through, but do notsecure that traffic Connection security rules can secure the traffic,but only if a firewall rule was previouslyconfigured

Item: 104Which cmdlet creates a point-in-time image of a virtualmachine for later use?

Answer:Checkpoint-VM

Item: 105Which type of virtual hard disk is recommended forservers running applications with high levels of diskactivity?

Answer:Fixed size VHD

Item: 106Which local resources can be redirected to a virtualmachine session through Virtual Machine Connectiontool through enhanced session mode?

Answer: Display configuration Audio Printers Clipboard Smart cards USB devices & Drives Supported Plug and Play devices

Item: 107If you had both a Restricted Group setting and aPreference setting in the membership of a group in a Group Policy Object, which setting would apply?

Answer:the Restricted Group setting would apply becauseGPO policy settings take priority over GPO preference settings if there is a conflict

Item: 108To open the Windows Firewall with Advanced Securityfrom the Start screen, what do you type from the Runprompt?

Answer:wf.msc

Item: 109When creating a template user account, why shouldyou set the Account is Disabled property on theaccount?

Answer:So no one can use it to log in.

Item: 110If a client has a DHCP reservation, the DHCP allow listis not enabled, and the client is on the DHCP deny list,will the client receive an IP address from the DHCPserver?

Answer:No. You'll have to remove the MAC address for thatclient from the deny list.

Item: 111Why does Microsoft recommend that you create a newGroup Policy Object (GPO) for AppLocker inenvironments where both Software Restriction Policiesand AppLocker are in place?

Answer:If you upgrade a computer that uses SoftwareRestriction Policies to Windows Server 2012 R2 orWindows 8.1, and then implement AppLocker rules,only the AppLocker rules will be enforced.

Item: 112What should you load on a Windows 7, Windows 8, orWindows 8.1 laptop to remotely manage roles andfeatures in Windows Server 2012 R2?

Answer:Remote Server Administration Tools (RSAT)

Item: 113Which type of GPO allows you to create a baselinefrom which you can build GPOs?

Answer:A Starter GPO

Item: 114To configure Windows PowerShell Web Access, whatthree things must you do?

Answer:1. Install Windows PowerShell Web Access2. Configure the gateway3. Configure authorization rules that allow usersaccess to the Web-based Windows PowerShellconsole

Item: 115Which utility do you use to create a domain controlleron a server running the full GUI installation ofWindows Server 2012 R2?

Answer:Server Manager

Item: 116What parameter must you use with the Dismcommand to mount an offline Windows image?

Answer:/Mount-Image

Item: 117When a virtual machine snapshot is deleted, why isthe deleted snapshot's storage space available withoutrequiring a VM restart?

Answer:In Windows Server 2012, operations that keep thevirtual machine and any remaining snapshotssynchronized after deleting a snapshot occur while theVM remains running.

Item: 118Which feature of the Hyper-V role allows you to chargedepartments based on how much resources the virtualmachines assigned to a particular department use?

Answer:resource metering

Item: 119What Group Policy setting provides faster access tocached files and redirected folders by providing lowerbandwidth usage because users are always workingoffline, even when they are connected through a highspeednetwork connection?

Answer:Enable the Always Offline mode by using Group Policyto enable the Configure slow-link mode policysetting

Item: 120What type of storage layout from a storage pool is notsupported in a failover cluster?

Answer:Parity spaces

Item: 121How do you upgrade from a Windows Server 2008Server Core installation to the Server with a GUI modeof Windows Server 2012 R2?

Answer:One-step upgrades are not supported. You must firstupgrade your Server Core installation to WindowsServer 2012 Server Core, then switch to the GUImode of Windows Server 2012 R2.

Item: 122Which PowerShell cmdlet would you use to install aDHCP server and a DNS server on a Server Coreinstallation of Windows Server 2012 R2?

Answer:Install-WindowsFeature DHCP, DNS

Item: 123Which firewall profile is applied when a computer isconnected to a network in which the computer'sdomain account does not reside, such as a homenetwork?

Answer:Private profile

Item: 124Which command can be used to join a computer to adomain without contacting a domain controller?

Answer:djoin.exe

Item: 125Which feature of the Hyper-V role allows you to makeservices such as Volume Shadow Copy Services, timesynchronization, and operating system shutdownavailable to a virtual machine?

Answer:Integration services

Item: 126Which zone is designed to resolve single-labelnames?

Answer:The GlobalNames zone

Item: 127Which ports and protocols should you enable on theWindows Firewall for a Windows Server 2012 R2acting as a VPN server to allow inbound SSTPconnections?

Answer:TCP Port 443

Item: 128Which cmdlet compares the current DSC configurationand the actual DSC configuration?

Answer:Test-DscConfiguration

Item: 129What is the default generation of a new virtualmachine on a Windows Server 2012 R2 serverrunning Hyper-V?

Answer:Generation 1

Item: 130What are the first valid subnets that you can use if youneed to subdivide the 192.168.0.0/24 into threesubnets with 57 computers on each subnet?

Answer:192.168.0.0/26192.168.0.64/26192.168.0.128/26

Item: 131What are the server requirements for implementing theWork Folders role service?

Answer: A server running Windows Server 2012 R2 forhosting sync shares with user files A volume formatted with the NTFS file systemfor storing user files

Item: 132Which IPv6 prefix is a multicast allocation?

Answer:FF00::/8

Item: 133What is the default number of pooled MAC addressesavailable to a server running Hyper-V?

Answer:255

Item: 134Which component relays DHCP messages betweenDHCP clients and DHCP servers on different IPnetworks separated by a router that is not RFC 1542compliant?

Answer:the DHCP Relay AgentItem: 135What path on a domain controller contains the GroupPolicy files?Answer:

Item: 135What path on a domain controller contains the GroupPolicy files?

Answer:%SystemRoot%\SYSVOL\Domain\Policies\GPOGUID path, whereGPOGUID is the GUID of the Group Policy container.

Item: 136To reinstall a role or feature that has been completelyremoved from Windows Server 2012 R2, whatresource(s) do you require?

Answer:Either the original installation source, or access toWindows Update

Item: 137What cmdlet can you use to enable remotemanagement on a Server Core installation of WindowsServer 2012 R2?

Answer:Enable-NetFirewallRule -DisplayGroup"Windows Remote Management"

Item: 138What does the convert option do in the Virtual HardDisk wizard?

Answer:It converts a virtual hard disk by copying the contentsto a new virtual hard disk. The new virtual disk can usea different type and format than the original virtualhard disk.

Item: 139Which IPv6 prefix is a global unicast allocation?

Answer:2000::/3

Item: 140What action must you perform on a runningGeneration 2 virtual machine before disabling SecureBoot?

Answer:Power off the VM

Item: 141Why would you get the error *** ns.domain.comcan't find child.domain.com.: Nonexistentdomain when using the nslookup utilityto query records in a child domain?

Answer:The name server does not allow zone transfers to thezone that contains records for the child domain

Item: 142Which type of Windows servers responds to forestwideLightweight Directory Access Protocol (LDAP)queries over port 3268?

Answer:the global catalog server

Item: 143What is the path to the central store that is used to store and replicate Windows policy files on a domain controller?

Answer:%logonserver%\sysvol\%userdnsdomain%\policies\PolicyDefinitions

Item: 144How do you copy Windows Firewall with AdvancedSecurity rules from one server to another?

Answer:In the Windows Firewall with Advanced Security MMCsnap-in, click Export Policy to export the rules to afile. On the other server, open the Windows Firewallwith Advanced Security MMC snap-in and click Importto the file.

Item: 145If a 3 GB file is compressed to 2 GB, what file size willcount toward the disk quota?

Answer:3 GB will be counted toward the disk quota becausecompressed files are tracked based on theiruncompressed sizes

Item: 146What type of condition would you apply to anAppLocker rule to restrict users from running softwarefrom a specific software vendor?

Answer:a publisher rule

Item: 147Which type of domain controller contains a partial,read-only replica of every domain in the forest otherthan its own domain?

Answer:global catalog server

Item: 148Which ports and protocols should you enable on theWindows Firewall for a Windows Server 2012 R2acting as a VPN server to allow inbound L2TPconnections?

Answer:UDP port 500 and 4500 as well as IP Protocol ID 50

Item: 149What is the difference between "Same Sign-On" and"Single Sign-On"?

Answer:"Single Sign-On" is used with ADFS and allows user toaccess resources without being prompted forcredentials if they are logged in to the AD network.."Same Sign-On" prompts users for credentials even ifthey are logged in to the AD network.

Item: 150If you have three disks with 600 GB free on each diskand you create a RAID-5 volume from the free space,how much disk space would be available to the user?

Answer:1200 GB (or 1.2 TB)

Item: 151What is the difference between deleting a virtualmachine snapshot in Hyper-V Manager in WindowsServer 2008 R2 versus in Windows Server 2012?

Answer:When you delete a snapshot in Hyper-V Manager inWindows Server 2012, you do not have to restart orturn off the virtual machine to reclaim the space

Item: 152What will happen if all scopes on a DHCP server aredeactivated, but the DHCP server is authorized?

Answer:The scope must be activated to issue IP addresses toclients on the subnet

Item: 153What feature in Windows Server 2008 and WindowsServer 2012 enables users to reliably print from aRemoteApp program or from a terminal server desktopsession to the correct printer on their client computer?

Answer:The Remote Desktop Easy Print driver

Item: 154Which new feature of Windows Server 2012 R2 movesfrequently accessed data to solid-state drives, andinfrequently accessed data to slower drives?

Answer:Storage tiers

Item: 155Which feature of the Hyper-V role addressesthe scalability issues of VLANs where tenantseach have multiple virtual subnets?

Answer:Port Virtual Local Area Network (PVLAN)

Item: 156Which feature of Windows Server 2012 and aboveallows the server to have the ability to operate multipleNICs as a single interface?

Answer:NIC Teaming

Item: 157Which command can be used to redirect newlycreated computer accounts from the default containernamed CN=Computers to a specified container?

Answer:the redircmp command

Item: 158What technology is an address-assignment technologythat you can use to provide unicast IPv6 connectivitybetween IPv6/IPv4 hosts over an IPv4 intranet?

Answer:ISATAP

Item: 159How can you view cached lookups on a Windows DNSserver?

Answer:By clicking View from the menu at the top of DNSManager and clicking Advanced.

Item: 160What must an Enterprise Administrator do in ActiveDirectory Users and Computers before moving anewly created child OU to a different parent OU?

Answer:On the properties of the child OU, under the Objecttab, clear the Protect object from accidentaldeletion checkbox.

Item: 161Which virtual hard disk format, VHD or VHDX, isrecommended for servers needing more than 2 TB of storage?

Answer:VHDX

Item: 162How must you configure a member server with theDNS server in a domain with the DNS server roleloaded to support Active Directory zones?

Answer:Make the server a domain controller

Item: 163What is the default location for Work Folders on aclient computer?

Answer:%USERPROFILE%\Work Folders

Item: 164What path in a GPO do you use to enable theConfigure slow-link mode policy setting?

Answer:Computer Configuration\ Policies \ AdministrativeTemplates \ Network \Offline Files

Item: 165What command provides an offline domain join of aServer Core version of Windows Server 2012 R2 andloads the computer metadata from a file so it can beused to add the %SystemRoot% folder of thecomputer that you want to join to the domain?

Answer:djoin /requestODJ

Item: 166Which cmdlet will remove a network adapter memberfrom a switch team?

Answer:Remove-NetSwitchTeamMember

Item: 167What type of group can include users from any domainwithin a forest, and can be assigned permissions for inany domain in the forest?

Answer:A universal group

Item: 168How many domain controllers can have the domainnaming master role?

Answer:only one domain controller per forest

Item: 169What tool can you use to migrate some server roles,features, operating system settings, shares, and otherdata from computers that are running certain editionsof Windows Server 2003 R2 to computers that arerunning Windows Server 2012 R2?

Answer:Windows Server Migration Tools

Item: 170What technology do you use to allow applications thatdo not support IPv6 to communicate with IPv6 hosts?

Answer:Port Proxy

Item: 171What happens to the original *.vhd file after youchoose the Convert option in the Virtual Hard Disk wizard?

Answer:The original *.vhd file is retained along with the new*.vhdx file that contains the contents of the original *.vhd file.

Item: 172What should you do to allow AppLocker rules to testwhat software will be affected by the rules when theyare implemented?

Answer:Set enforcement to Audit

Item: 173What Windows Server 2012 R2 function replaced theSnapshot function in Hyper-V manager of WindowsServer 2008 and Windows Server 2012?

Answer:Checkpoint

Item: 175Which cmdlet would you use to apply a PowerShellDSC configuration?

Answer:Start-DscConfiguration

Item: 174Which Hyper-V feature allows you to have a VMchange its source MAC address for outgoing packets?

Answer:MacAddressSpoofing

Item: 176What steps would you perform to delegate the Create,delete and manage user accounts task to a groupfor an Organizational Unit (OU)?

Answer:In Active Directory Users and Computers, right-clickthe OU and select Delegate Control

Item: 177Under what circumstances can you NOT perform anin-place upgrade to Windows Server 2012?

Answer:In-place upgrades are NOT supported: From a 32-bit edition of Windows Server From one language to another From one build type to another From a Server Core installation directly to a fullinstallation (GUI mode) From a pre-release version of Windows Server2012

Item: 178Which generation(s) of virtual machines uses a virtualfloppy disk to contain an unattended install answerfile?

Answer:Generation 1 virtual machines only

Item: 179How can you easily configure a Server Coreinstallation of Windows Server 2012 R2 toautomatically download Windows updates?

Answer:use sconfig to configure Windows Updates

Item: 180After creating ADMX files to define registrybasedpolicy settings on all client computers inthe domain, what should you do to ensure thatthe custom ADMX file for the Chinese languageis automatically available to all Group Policyadministrators in the domain?

Answer:Create an ADML file and copy it to theSYSVOLl\domain\policies\PolicyDefinitions\[MUIculture]folder on the domain controller.

Item: 181What feature of Hyper-V in Windows Server 2012 R2uses disk resources as additional, temporary memorywhen more memory is required to restart a virtualmachine?

Answer:Smart Paging

Item: 182Which user feature protects the computer from theunauthorized installation of any software?

Answer:User Account Control (UAC)

Item: 183If you have a domain with both Windows Server 2012and Windows Server 2008 servers, which cmdlet mustyou run before you configure anything using aPowerShell cmdlet on a Windows Server 2008 ServerCore edition server?

Answer:Import-module ServerManager

Item: 184Which installation method can reduce the replicationtraffic that is initiated during the installation of anadditional domain controller in an Active Directorydomain?

Answer:the install from media (IFM) method

Item: 185How can you filter objects in Active Directory Usersand Computers to only display printer objects?

Answer:You can choose Filter Options from the View menuand check Only printers in the Filter Options screen.

Item: 186What type of network adapter is required on a virtualmachine to perform a network-based operating systeminstallation for the VM?

Answer:legacy network adapter

Item: 187What is the term that describes a physical print devicebeing shared by multiple users while allowing thedocuments of one group of users to take precedenceover documents from another group?

Answer:Print priorities

Item: 188Which PowerShell cmdlet modifies properties of OU?

Answer:Set-ADOrganizationalUnit

Item: 189What deprecated command in Windows Server 2012allows you to perform unattended installations of Windows Server 2012 R2 domain controllers withlegacy scripts that have not been converted to PowerShell?

Answer:dcpromo /unattended

Item: 190How can you ensure that Alice and John are membersof the Backup Operators group on every computer indomain?

Answer:Configure Backup Operators as a restricted group in aGPO at the domain level with Alice and John asmembers

Item: 191How do you use Server Manager to uninstall thegraphical user interface (GUI) on a full installation ofWindows Server 2012 R2?

Answer:From Server Manager, uninstall the User Interfacesand Infrastructure feature.

Item: 192Which generation(s) of virtual machines allows the VMto boot using IPv6?

Answer:Generation 2 virtual machines only

Item: 193Which firewall rules should be configured to allow pingcommands to work?

Answer:the correct echo rules, such as "File and PrinterSharing (Echo Request - ICMPv4-In)"

Item: 194Which user right allows a user to add workstations tothe domain?

Answer:the Add workstations to domain local policy

Item: 195What command will display the Server Configurationmenu on a Windows Server 2012 R2 Server Coreserver?

Answer:sconfig.cmd

Item: 196How do you export AppLocker rules from a GPO inone domain to another GPO in another domain?

Answer:Export the AppLocker rules from the source GPO toan XML file. Import the XML file with Group PolicyEditor on the destination GPO

Item: 197Which new feature of Windows Server 2012 R2reduces the latency of writes by buffering smallrandom writes to solid-state drives?

Answer:Write-back cache

Item: 198What feature of Hyper-V in a multitenant environmentensures that VMs belonging to one tenant do notconsume excessive storage resources, affecting VMsthat belong to another tenant?

Answer:Storage Quality of Service (QoS) for Hyper-V

Item: 199What are the four steps for Windows Server MigrationTools installation and preparation?

Answer:1. Install Windows Server Migration Tools ondestination servers that run Windows Server2012 R2.2. Create deployment folders on destinationservers that run Windows Server 2012 R2, forcopying to source servers.3. Copy deployment folders from destinationservers to source servers.4. Register Windows Server Migration Tools onsource servers.

Item: 200Which user right gives a user permissions to back upfiles and folders on a computer, but not restore them?

Answer:the Back up files and directories local policy

Item: 201How can you copy AppLocker rules to anothercomputer?

Answer:Export the AppLocker rules from a GPO or localsecurity policy to an XML file, and import the XML fileto another GPO or another local security policy

Item: 202Which local group(s) membership on a member serverallows the user to back up and restore files anddirectories on the server?

Answer:Membership in the Administrators OR BackupOperators groups

Item: 203How many domain controllers can have the schemamaster role?

Answer:only one domain controller per forest

Item: 204Which Hyper-V features can be accessed by membersof the Hyper-V Administrators group?

Answer:Members of the Hyper-V Administrators havecomplete and unrestricted access to all features ofHyper-V.

Item: 205Which user can always change permissions on anobject, even when that user is denied all access to theobject?

Answer:The user or group that is the owner of the object

Item: 206What is the minimum number of dynamic drivesrequired to create a RAID-5 volume?

Answer:3

Item: 207What type of condition would you apply to anAppLocker rule to restrict users from running a specificversion number of a program?

Answer:a file hash rule

Item: 208Which guest operating system(s) support enhancedsession mode connections?

Answer:Windows Server 2012 R2 and Windows 8.1

Item: 209How do you recover a lost command prompt on aServer Core installation of Windows Server 2012 R2?

Answer:Press Ctrl+Alt+Del and select Task Manager. Fromthe File menu choose Run new task and entercmd.exe.

Item: 210What setting of a virtual machine in Hyper-V managerallows you select the order in which boot devices arechecked to start the operating system?

Answer:Startup Order

Item: 211How can you use the Recycle Bin to retrieveyesterday's version of a document that was mistakenlyupdated with erroneous information today?

Answer:You can't. The Recycle Bin can only be used toretrieve files that have been deleted, not updated.

Item: 212What is the difference between a soft quota and ahard quota?

Answer:A hard quota type will not allow the users to exceedthe quota limit. A soft quota type will allow the user toexceed the quota limit. A soft quota type is usedtypically for monitoring storage use beforeimplementing a hard quota type.

Item: 213What are three ways that you can configure a ServerCore installation of Windows Server 2012 R2 toautomatically download Windows updates from aspecific WSUS server?

Answer: Using Group Policy Object Editor and editingthe Local Group Policy object Editing the registry directly by using the registryeditor (Regedit.exe) Centrally deploying these registry entries byusing System Policy in Windows NT 4.0 style

Item: 214Which type of virtual hard disk provides better use ofphysical storage space and is recommended for servers running applications that are not diskintensive?

Answer:Dynamically expanding virtual hard drive that uses theVHDX format

Item: 215For each IP network segment that contains DHCPclients but does not contain a DHCP server, whatcomponent must be installed if the router does notforward Bootp broadcasts?

Answer:the DHCP Relay Agent

Item: 216Which PowerShell cmdlet would you use to add acomputer to a domain such that you will be promptedto supply credentials to join the domain?

Answer:Add-Computer

Item: 217Which group can reduce the number of users thatbelong to the local Administrators group whileproviding users with access to Hyper-V?

Answer:Hyper-V Administrators

Item: 218Which operations master role is responsible forupdating references from local objects to objects inother domains?

Answer:infrastructure master

Item: 219What technology uses 128-bit IP addresses andallows for the use of 340 undecillion addresses?

Answer:IPv6

Item: 220What type of AppLocker rules are available toconfigure in a GPO for Windows 8.1 or WindowsServer 2012 R2 computers?

Answer:packaged app rules, executable rules, WindowsInstaller rules, and script rules

Item: 221What comprises the membership list of a domain localgroup?

Answer: Users and computers from any trusted domain Global groups from any trusted domain Universal groups from within the forest Domain local groups from the same domain

Item: 222Which type of zone prevents the DNS server fromlooking outside the zones on the DNS server toresolve a name?

Answer:A root zone

Item: 223Which parameter of the Dism command will allow youremove a GUI interface from an image of a full installation of Windows Server 2012 R2?

Answer:/disable-feature

Item: 224What feature in a Group Policy policies allow you tocontrol the membership of sensitive groups throughActive Directory rather than through traditional groupmembership editing tools, such as Active DirectoryUsers and Computers or PowerShell?

Answer:Restricted Groups

Item: 225Which generation(s) of virtual machines supports bothVHDs and VHDXs?

Answer:Generation 1 virtual machines only

Item: 226What are the two enforcement options that can be seton the enforcement of AppLocker executable rules,Windows Installer rules, script rules, and packagedapp rules?

Answer:Enforce Rules and Audit

Item: 227Which Windows server versions can run as a guestoperating system on a Hyper-V host that can use avirtual Fibre Channel Adapter to connect to anattached virtual SAN?

Answer:Windows Server 2008, Windows Server 2008 R2,Windows Server 2012, and Windows Server 2012 R2

Item: 228How do you configure Group Policy to specify thesource files from which every server in the domainshould install features or roles?

Answer:Specify the source in a Group Policy at ComputerConfiguration > Administrative Templates >System > Specify settings for optional componentinstallation and component repair

Item: 229How many domain controllers can have the PDCemulator role?

Answer:only one domain controller per domain

Item: 230Which command allows you to remotely executecommands on a Windows Server 2012 R2 server?

Answer:winrs

Item: 231What type of AppLocker rule would you use to controlan application from the Windows store?

Answer:a packaged app rule

Item: 232What subnet mask would you use to further divide the10.10.0.0/16 network to a subnet that supports up to2100 hosts?

Answer:/20 or 255.255.240.0 which supports 2^12-2, or 4094,hosts per subnet

Item: 233Which IPv6 prefix is a link-scoped unicast allocation?

Answer:FE80::/10

Item: 234Which cmdlet will create a new switch team that ismanipulated by a forwarding extension in the Hyper-VExtensible Switch?

Answer:New-NetSwitchTeam

Item: 235Which PowerShell cmdlet modifies the properties of acomputer account?

Answer:Set-ADComputer

Item: 236Why do pass-through disks give better performancethan virtual disks for a virtual machine on a Hyper-Vhost?

Answer:Pass-through disks allow for the virtual machines toget raw disk access, which is important when youhave a storage operating system controlling the drives.

Item: 237What should you do to ensure that only authenticatedusers are able to register their records in the DNSzone?

Answer:Create an Active Directory-integrated zone andconfigure the zone for secure dynamic updates only

Item: 238If you have multiple local GPOs on a Windows Server2012 server, in what order are the local GPOsprocessed?

Answer:1. Local Group Policy2. Administrators and Non-Administrators GroupPolicy3. User-specific Local Group Policy

Item: 239Which cmdlet will install Work Folders on a WindowsServer 2012 R2 server?

Answer:Add-WindowsFeature FS-SyncShareService

Item: 240If Joe has Full Control permissions to C:\Software onthe server and Read permissions to the share namedSoftware that points to C:\Software on that server, willJoe be able to copy a file to the Software share fromanother computer?

Answer:No, Joe will only have the effective permissions ofRead on the share.

Item: 241After you have selected Save my settings for futureconnections to this virtual machine and thenclicked Connect to connect to a virtual machine that supports enhanced session mode in a VirtualMachine Connection session, where is theconfiguration file saved?

Answer:%appdata%\roaming\Microsoft\Windows\Hyper-V\Client\1.0

Item: 242Which virtual hard disk format, VHD or VHDX,provides protection against corruption during powerfailures?

Answer:VHDX

Item: 243What are two ways to display the IPv6 Route Table ona Windows Server 2012 R2 server from thePowerShell prompt?

Answer:Run either the netstat -r command or the Get-NetRoute cmdlet from the PowerShell prompt.

Item: 244Which generation(s) of virtual machines can have aboot disk with either a MBR partition table or GPTpartition table?

Answer:Generation 2 virtual machines only

Item: 245What is the maximum size of a file that can be storedin a Work Folder?

Answer:10 GB

Item: 246What feature of a Generation 2 virtual machine helpsprevent unauthorized code from running at boot time?

Answer:Secure Boot

Item: 247Which operations master role is responsible forassigning Security Identifiers (SIDs) to objects such asusers and groups?

Answer:RID Master

Item: 248What type of condition would you apply to anAppLocker rule to restrict users from installingsoftware in a particular location?

Answer:a path rule

Item: 249What type of partition table will support a volume over2 TB?

Answer:a GUID partition table (GPT) type

Item: 250What are the five characteristics that you can use tosegregate or group client computers based on aDHCP policy?

Answer:MAC AddressVendor ClassUser ClassClient IdentifierRelay Agent Information

Item: 251What PowerShell cmdlet creates a snapshot of eachvirtual machine on a Windows Server 2012 R2 serverthat is running the Hyper-V role?

Get-VM -ComputerName | Checkpoint-VM

Item: 252Which GPO setting manages mapped drives,scheduled tasks, environment variables, printermappings, and Start menu settings?

Answer:Preferences

Item: 253When configuring MAC address ranges on differentHyper-V hosts, what guidelines should you follow?

Answer: The ranges that you specify cannot overlap. The first three octets of the beginning andending MAC address must be the same. You must enter a valid hexadecimal valuesbetween 00 and FF.

Item: 254What type of storage layout from a storage pool willsupport up to two disk failures?

Answer:mirror spaces

Item: 255What will happen if all scopes on a DHCP server areactivated, but the DHCP server is not authorized?

Answer:If the DHCP server is not authorized, it will not leaseIP addresses to DHCP clients.

Item: 256What must you enable on your computer to recoveryfiles that were accidently overwritten?

Answer:Shadow Copies of Shared Folders

Item: 257Which DHCP option number specifies a list of IPaddresses for routers on the client's subnet?

Answer:003

Item: 258What are two ways to remove the GUI Managementtools from a full installation of Windows Server 2012R2?

Answer:run Uninstall-WindowsFeature or use ServerManager to remove the Graphical Management Toolsand Infrastructure feature

Item: 259Which PowerShell cmdlet would you use to rename aWindows Server 2012 R2 Server Core server?

Answer:Rename-Computer

Item: 260What is the role of the Teredo server?

Answer:To assist the Teredo clients with address configurationand to facilitate IPv6 connectivity on an IPv4 Internet

Item: 261When enabled, what feature of Hyper-V in WindowsServer 2012 R2 allows network traffic to bypass thesoftware switch layer of the Hyper-V virtualizationstack?

Answer:Single Root I/O Virtualization (SR-IOV)

Item: 262What type of storage layout from a storage pool is bestsuited for archival data and streaming media, such asmusic and videos?

Answer:Parity spaces

Item: 263Which generation(s) of virtual machines allows avirtual machine to boot from a device attached to aSCSI controller?

Answer:Generation 2 virtual machines only

Item: 264To create installation media for a full (writable) domaincontroller, what command must you run on a writabledomain controller that is running WindowsServer 2012 R2?

Answer:the ntdsutil ifm command

Item: 265Which parameter of the Dism command will allow youadd a GUI interface to a Server Core installation ofWindows Server 2012 R2?

Answer:/enable-feature

Item: 266What technology uses 32-bit IP addresses and allowsfor the use of 4 billion addresses?

Answer:IPv4

Item: 267Which cmdlet replaces the Remove-WindowsFeature cmdlet in Windows Server 2012?

Answer:Uninstall-WindowsFeature

Item: 268What PowerShell cmdlet would you use to set a staticIP address on a Windows Server 2012 R2 ServerCore server?

Answer:New-NetIPAddress

Item: 269How do you remove the binary files to free up spaceon the server when you uninstall a role or feature withthe Windows PowerShell cmdlet Uninstall-WindowsFeature ?

Answer:Use the Remove option with the Uninstall-WindowsFeature cmdlet

Item: 270What feature or functionality must you disable on aGeneration 2 virtual machine to enable kerneldebugging on the virtual machine?

Answer:Secure Boot

Item: 271Which user right gives a user permissions to changethe time and date on the internal clock of thecomputer?

Answer:the Change the system time local policy

Item: 272What feature of a Windows Server 2012 R2 serverallows the computer a local Internet router to provide asite with IPv6 connectivity over the IPv4 Internet?

Answer:6to4 router


Recommended