Alex Quito
Quiz by , created more than 1 year ago

This exam includes updates that relate to Windows Server 2012 R2 task which include installing and configuring servers, configuring server roles and features, configuring Hyper-V, deploying and configuring core network services, installing and administering Active Directory, and creating and managing Group Policy. I've done as much research as I can on each question to ensure they're accurate, but please let me know if any questions need to be revised.

248
1
0
saheed Tijani
Created by saheed Tijani over 8 years ago
Alex Quito
Copied by Alex Quito over 8 years ago
Close

Microsoft Exam 70-410: Volume 1- Test 3

Question 1 of 47

1

You work as a senior administrator at Contoso.com. The Contoso.com network consists of
a single domain named Contoso.com. All servers on the Contoso.com network have
Windows Server 2012 R2 installed.
You are running a training exercise for junior administrators. You are currently discussing
the new VHD format called VHDX.
Which of the following is TRUE with regards to VHDX? (Choose all that apply.) (2)

Select one or more of the following:

  • It supports virtual hard disk storage capacity of up to 64 GB.

  • It supports virtual hard disk storage capacity of up to 64 TB.

  • It does not provide protection against data corruption during power failures.

  • It has the ability to store custom metadata about the file that the user might want to
    record.

Explanation

Question 2 of 47

1

Your network contains one Active Directory domain named contoso.com. The domain
contains 10 domain controllers and a read-only domain controller (RODC) named
RODC01.
You plan to replace a domain controller named DC1. DC1 has the schema operations master role.
You need to transfer the schema master role to another domain controller named DC10
before you remove Active Directory from DC1.
Which tool should you use?

Select one of the following:

  • the ntdsutil command

  • the Set-ADDomain cmdlet

  • the Install-ADDSDomain cmdlet

  • the dsadd command

  • the dsamain command

  • the dsmgmt command

  • the net user command

  • the Set-ADForest cmdlet

Explanation

Question 3 of 47

1

You have a file server named Server1 that runs Windows Server 2012 R2. Server1
contains a folder named Folder1.
You share Folder1 as Share1 by using Advanced Sharing. Access-based enumeration is
enabled.
Share1 contains an application named Appl.exe.
You configure the NTFS permissions on Folder1 as shown in the following table

Group 1 - Read & Execute
Group 2 - Read & Execute, Write

The members of Group2 report that they cannot make changes to the files in Share1. The
members of Group1 and Group2 run Appl.exe successfully.
You need to ensure that the members of Group2 can edit the files in Share1.
What should you do?

Select one of the following:

  • Replace the NTFS permissions on all of the child objects.

  • Edit the Share permissions.

  • Edit the NTFS permissions.

  • Disable access-based enumeration.

Explanation

Question 4 of 47

1

You perform a Server Core Installation of Windows Server 2012 R2 on a server named
Server1.
You need to add a graphical user interface (GUI) to Server1.
Which tool should you use?

Select one of the following:

  • The Install-WindowsFeature cmdlet

  • The Install-Module cmdlet

  • The Install-RoleService cmdlet

  • The setup.exe command

Explanation

Question 5 of 47

1

You work as a senior administrator at Contoso.com. The Contoso.com network consists of
a single domain named Contoso.com. All servers on the Contoso.com network have
Windows Server 2012 R2 installed.
You are running a training exercise for junior administrators. You are currently discussing
the Windows Firewall with Advanced Security feature.
Which of the following is TRUE with regards to Windows Firewall with Advanced Security?
(Choose all that apply.) (2)

Select one or more of the following:

  • It provides host-based, two-way network traffic filtering for a computer.

  • It provides host-based, one-way network traffic filtering for a computer.

  • It blocks unauthorized network traffic flowing into or out of the local computer

  • It only blocks unauthorized network traffic flowing into the local computer

  • It only blocks unauthorized network traffic flowing out of the local computer.

Explanation

Question 6 of 47

1

Your network contains an Active Directory domain named contoso.com. All servers run
Windows Server 2012 R2. The domain contains a member server named Server1. Server1
has the File Server server role installed.
On Server1, you create a share named Documents. The Documents share will contain the
files and folders of all users.
You need to ensure that when the users connect to Documents, they only see the files to
which they have access.
What should you do?

Select one of the following:

  • Enable access-based enumeration.

  • Configure Dynamic Access Control.

  • Modify the Share permissions.

  • Modify the NTFS permissions.

Explanation

Question 7 of 47

1

You work as a senior administrator at Contoso.com. The Contoso.com network consists of
a single domain named Contoso.com. All servers on the Contoso.com network have
Windows Server 2012 installed, and all workstations have Windows 8 installed.
You are running a training exercise for junior administrators. You are currently discussing
the Always Offline Mode.
Which of the following is TRUE with regards to the Always Offline Mode? (Choose all that
apply.)

Select one or more of the following:

  • It allows for swifter access to cached files and redirected folders.

  • To enable Always Offline Mode, you have to satisfy the forest and domain functionallevel
    requirements, as well as schema requirements

  • It allows for lower bandwidth usage due to users are always working offline

  • To enable Always Offline Mode, you must have workstations running Windows 7 or
    Windows Server 2008 R2.

Explanation

Question 8 of 47

1

You have a server named Server1. Server1 runs Windows Server 2012 R2 and has the
File and Storage Services server role installed.
You attach four 500-GB disks to Server1.
You need to configure the storage to meet the following requirements:
Storage for an application named Application1 must be provided. Application1
requires 20 GB and will require a maximum of 800 GB in three years.
Storage for an application named Application2 must be provided. Application2
requires 20 GB and will require a maximum of 900 GB in three years.
The solution must provide the ability to dynamically add storage without requiring
configuration changes to the applications.
The storage must be available if a single disk fails.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)

Select one or more of the following:

  • From File and Storage Services, create virtual disks by using fixed provisioning.

  • From File and Storage Services, create virtual disks by using thin provisioning.

  • From File and Storage Services, create a storage pool that uses all four disks.

  • From Disk Management, create a new RAID-5 volume that uses all four disks.

  • From Disk Management, create two new mirror volumes that use two disks each.

Explanation

Question 9 of 47

1

You work as an administrator at Contoso.com. The Contoso.com network consists of a
single domain named Contoso.com. All servers in the Contoso.com domain, including
domain controllers, have Windows Server 2012 R2 installed.
You have just executed the Uninstall-WindowsFeature Server-Gui-Shell Contoso.com
server, named ENSUREPASS-SR13.
Which of the following is the reason for doing this?

Select one of the following:

  • To only remove Windows Explorer from ENSUREPASS-SR13.

  • To only remove the Windows Internet Explorer from ENSUREPASS-SR13.
    C. To

  • To only remove the components and files related to Windows Explorer from
    ENSUREPASSSR13.

  • To remove Windows Explorer, Windows Internet Explorer, and all associated
    components and files from ENSUREPASS-SR13.

Explanation

Question 10 of 47

1

Your network contains an Active Directory domain named contoso.com.
You have a starter Group Policy object (GPO) named GPO1 that contains more than 100 settings.
You need to create a new starter GPO based on the settings in GPO1.
You must achieve this goal by using the minimum amount of administrative effort.
What should you do?

Select one of the following:

  • Run the New-GPStarterGPO cmdlet and the Copy-GPO cmdlet.

  • Create a new starter GPO and manually configure the policy settings of the starter GPO.

  • Right-click GPO1, and then click Back Up. Create a new starter GPO. Right-click the
    new GPO, and then click Restore from Backup.

  • Right-click GPO1, and then click Copy. Right-click Starter GPOs, and then click Paste

Explanation

Question 11 of 47

1

A company’s server deployment team needs to install fourteen Windows Server 2012 R2 to
handle the expected increase in holiday traffic. The team would like the option of switching
the servers between Server Core and Full GUI servers and do not want to be locked in to
their first choice.
The server team would like four of the servers to include the Windows 8 Shell.
Which installation option is required for these servers?

Select one of the following:

  • Server Core

  • Desktop Experience

  • Server with a GUI

  • Minimal Server Interface

Explanation

Question 12 of 47

1

You have a Hyper-V host named server1 that runs windows server 2012 R2.server1 host
50 virtual machines that run windows server 2012 R2
You enable and configure enhanced session mode on Server1.
You need to identify a new functionality available for the virtual machines hosted on
server1.
What should you identify?

Select one of the following:

  • Smart card authentication using virtual machine connections

  • Redirection of RemoteFX USB drivers by using remote desktop connections

  • Redirection of RemoteFX USB drivers using virtual machine connections

  • smart card authentication using the remote desktop client.

Explanation

Question 13 of 47

1

You have a server named Server1 that runs Windows Server 2012 R2. You promote
Server1 to domain controller. You need to view the service location (SVR) records that
Server1 registers on DNS. What should you do on Server1?

Select one of the following:

  • Open the Srv.sys file

  • Open the Netlogon.dns file

  • Run ipconfig/displaydns

  • Run Get-DnsServerDiagnostics

Explanation

Question 14 of 47

1

Your network contains an Active Directory domain named contoso.com. The domain
contains a member server named Server1. Server1 runs Windows Server 2012 R2 and has
the File and Storage Services server role installed.
On Server1, you create a share named Documents.
You need to ensure that users can recover files that they accidently delete from
Documents.
What should you do?

Select one of the following:

  • Enable shadow copies by using Computer Management.

  • Create a storage pool that contains a two-way mirrored volume by using Server
    Manager.

  • Modify the Startup type of the Volume Shadow Copy Service (VSS) by using the
    Services console.

  • Create a recovery partition by using Windows Assessment and Deployment Kit
    (Windows ADK).

Explanation

Question 15 of 47

1

A company’s server virtualization team needs to provision a series of Hyper-V workloads to
use existing network storage arrays. The team has chosen to use Fibre Channel ports
within the guest operating systems.
Which of the following Windows Server versions can be used as guest operating systems
when using Hyper-V Fibre Channel ports?

Select one or more of the following:

  • 2003 R2

  • 2008

  • 2003

  • 2012

Explanation

Question 16 of 47

1

Your network contains an Active Directory domain named contoso.com. The domain
contains a user account named User1 that resides in an organizational unit (OU) named
OU1.
A Group Policy object (GPO) named GPO1 is linked to OU1. GPO1 is used to publish
several applications to a user named User1.
In the Users container, you create a new user named User2.
You need to ensure that the same applications are published to User2.
What should you do?

Select one of the following:

  • Modify the settings in GPO1

  • Move User2 to OU1

  • Link a WMI filter to GPO1

  • Modify the security of GPO1.

Explanation

Question 17 of 47

1

Your network contains two Active Directory forests named contoso.com and adatum.com.
All servers run Windows Server 2012 R2.
A one-way external trust exists between contoso.com and adatum.com.
Adatum.com contains a universal group named Group1. You need to prevent Group1 from
being used to provide access to the resources in contoso.com.

What should you do?

Select one of the following:

  • Modify the Managed By settings of Group1

  • Modify the Allowed to Authenticate permissions in adatum.com.

  • Change the type of Group1 to distribution.

  • Modify the name of Group1.

Explanation

Question 18 of 47

1

Your network contains an Active Directory domain named contoso.com. The domain
contains an application server named Server1. Server1 runs Windows Server 2012 R2.
You have a client application named App1 that communicates to Server1 by using dynamic
TCP ports.
On Server1, a technician runs the following command: New-NetFirewallRule -DisplayName
AllowDynamic - Direction Outbound -LocalPort 1024- 65535 -Protocol TCP.
Users report that they can no longer connect to Server1 by using App1.
You need to ensure that App1 can connect to Server1.
What should you run on Server1?

Select one of the following:

  • Set-NetFirewallRule -DisplayName AllowDynamic -Action Allow

  • netsh advfirewall firewall set rule name=allowdynamic new action = allow

  • Set-NetFirewallRule -DisplayName AllowDynamic -Direction Inbound

  • netsh advfirewall firewall add rule name=allowdynamic action=allow

Explanation

Question 19 of 47

1

You work as a senior administrator at Contoso.com. The Contoso.com network consists of
a single domain named Contoso.com. All servers on the Contoso.com network have
Windows Server 2012 R2 installed.
You are running a training exercise for junior administrators. You are currently discussing
printer pooling.
Which of the following is TRUE with regards to printer pooling? (Choose all that apply.)

Select one or more of the following:

  • Printers in a pool must be of the same model, and use the same printer driver.

  • Each printer in the pool must have a different printer driver.

  • Printer ports used in the pool must be of the same type

  • The types of printer ports used in the pool must be mixed

  • Pooled printers appear to workstations as a single printer

  • A minimum of three printers are required to configure a printer pool

Explanation

Question 20 of 47

1

You work as an administrator at Contoso.com. The Contoso.com network consists of a
single domain named Contoso.com. All servers on the Contoso.com network have
Windows Server 2008 R2 installed.
Most of the Contoso.com servers have 64 – bit CPU’s installed, while the rest have 32 – bit
CPU’s installed. You are informed that Contoso.com wants to deploy Windows Server 2012
R2 on all their servers.
You need to make recommendations to ensure that this is possible.
Which of the following would you recommend?

Select one of the following:

  • You should inform Contoso.com that the deployment can proceed without any changes.

  • You should inform Contoso.com that the servers with 32 bit CPU’s must be upgraded to
    include 64 bit CPU’s for the deployment to proceed.

  • You should inform Contoso.com that the servers with 64 bit CPU’s must be upgraded to
    include 32 bit CPU’s for the deployment to proceed.

  • You should inform Contoso.com that the deployment is not in any way possible.

Explanation

Question 21 of 47

1

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the
Hyper-V server role installed.
An iSCSI SAN is available on the network.
Server1 hosts four virtual machines named VM1, VM2, VM3, VM4.
You create a LUN on the SAN.
You need to provide VM1 with access to the LUN. The solution must prevent other virtual
machines from accessing the LUN.
What should you configure?

Select one of the following:

  • A fixed-size VHDX

  • A dynamically expanding VHDX

  • A fixed-size VHD

  • A pass-through disk

  • A dynamically expanding VHD

Explanation

Question 22 of 47

1

You work as a senior administrator at Contoso.com. The Contoso.com network consists of
a single domain named Contoso.com. All servers on the Contoso.com network have
Windows Server 2012 R2 installed.
You are running a training exercise for junior administrators. You are currently discussing
connection security rules.
Which of the following is TRUE with regards to connection security rules? (Choose all that
apply.) (3)

Select one or more of the following:

  • Connection security rules allows for traffic to be secured via IPsec.

  • Connection security rules do not allow the traffic through the firewall.

  • Connection security rules are applied to programs or services.

  • Connection security rules are applied between two computers.

Explanation

Question 23 of 47

1

Your company has an Active Directory domain. You log on to the domain controller. The
Active Directory Schema snap-in is not available in the Microsoft Management Console
(MMC).
You need to access the Active Directory Schema snap-in. What should you do?

Select one of the following:

  • Register Schmmgmt.dll.

  • Log off and log on again by using an account that is a member of the Schema Admins
    group.

  • Use the Ntdsutil.exe command to connect to the schema master operations master and
    open the schema for writing.

  • Add the Active Directory Lightweight Directory Services (AD/LDS) role to the domain
    controller by using Server Manager.

Explanation

Question 24 of 47

1

Your network contains an Active Directory domain named contoso.com. The domain
contains an application server named Server1. Server1 runs Windows Server 2012 R2.
You have a client application named App1 that communicates to Server1 by using dynamic
TCP ports.
On Server1, a technician runs the following command:
New-NetFirewallRule -DisplayNameAllowDynamic -Direction Outbound -LocalPort 1024-
65535 -Protocol TCP. Users report that they can no longer connect to Server1 by using
Appl.
You need to ensure that App1 can connect to Server1.
What should you run on Server1?

Select one of the following:

  • Set-NetFirewallRule -DisplayNameAllowDynamic -Action Allow

  • netshadvfirewall firewall add rule name=allowdynamic action-allow

  • netshadvfirewall firewall set rule name-allowdynamic new action- allow

  • Set-NetFirewallRule -DisplayNameAllowDynamic -Direction Inbound

Explanation

Question 25 of 47

1

You have a server named Server1. Server1 runs a Server Core installation of Windows
Server 2012 R2. The local area connection on Server1 has the following configuration:
IP address: 10.1.1.1
Subnet mask: 255.255.240.0
Default gateway: 10.1.1.254
Preferred DNS server: <none>
The network contains a DNS server that has an IPv4 address of 10.1.1.200. You need to
configure Server1 to use 10.1.1.200 as the preferred DNS server. The solution must not
change any other settings on Server1.
Which command should you run?

Select one of the following:

  • sconfig.cmd

  • net.exe

  • Set-NetIPInterface

  • netsh.exe

Explanation

Question 26 of 47

1

You work as an administrator at Contoso.com. The Contoso.com network consists of a
single domain named Contoso.com. All servers on the Contoso.com network have
Windows Server 2008 R2 installed. Some of Contoso.com’s workstations have Windows 7
installed, while the rest have Windows 8 installed.
After installing a new Windows Server 2012 computer in the Contoso.com domain, you
configure it to run the File and Storage Services server role. You are instructed to create a
shared folder on the new server, and configure the use of Previous Versions for restoring
files located in the shared folder.
Which of the following actions should you take?

Select one of the following:

  • You should consider configuring the Shadow Copies settings on the new server

  • You should consider configuring the Snapshot settings on the new server.

  • You should consider configuring the Background Copy settings on the new server.

  • You should consider configuring the Permission settings on the new server.

Explanation

Question 27 of 47

1

You have a file server named Server1 that runs Windows Server 2012 R2. Server1 has
following hardware configurations:
- 16GB of RAM
- A single quad-core CPU
- Three network teams that have two network adapters each
You add additional CPUs and RAM to Server 1.
You repurpose Server1 as a virtualization host. You install the Hyper-V server role on
Server1. You need to create four external virtual switches in Hyper-V. Which cmdlet should
you run first?

Select one of the following:

  • Set-NetAdapter.

  • Add-Net1.bfoTeamNic

  • Add-VMNetworkAdapter

  • Remove-NetLbfoTeam

Explanation

Question 28 of 47

1

You work as a senior administrator at Contoso.com. The Contoso.com network consists of
a single domain named Contoso.com. All servers in the Contoso.com domain, including
domain controllers, have Windows Server 2012 R2 installed.
You are running a training exercise for junior administrators. You are currently discussing
the Virtual Fibre Channel SAN feature.
Which of the following is TRUE with regards to the Virtual Fibre Channel SAN feature?
(Choose all that apply.)

Select one or more of the following:

  • It prevents virtual machines from connecting directly to Fibre Channel storage.

  • It allows for virtual machines to connect to Fibre Channel storage directly.

  • It includes support for virtual SANs, live migration, and multipath I/O.

  • It includes support for virtual SANs, and live migration, but not multipath I/O.

Explanation

Question 29 of 47

1

Your network contains an Active Directory domain named contoso.com. The domain
contains servers named Server1 and Server2 that run Windows Server 2012 R2. Server1
has the Active Directory Federation Services server role installed.Server2 is a file server.
Your company introduces a Bring Your Own Device (BYOD) policy.
You need to ensure that users can use a personal device to access domain resources by
using Single Sign-On (SSO) while they are connected to the internal network.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)

Select one or more of the following:

  • Enable the Device Registration Service in Active Directory.

  • Publish the Device Registration Service by using a Web Application Proxy

  • Configure Active Directory Federation Services (AD FS) for the Device Registration
    Service.

  • Install the Work Folders role service on Server2.

  • Create and configure a sync share on Server2.

Explanation

Question 30 of 47

1

You perform a Server Core Installation of Windows Server 2012 R2 on a server named
Server1.
You need to add a graphical user interface (GUI) to Server1.
Which tool should you use? (2)

Select one or more of the following:

  • the dism.exe command

  • the Add-WindowsFeature cmdlet

  • the imagex.exe command

  • the setup.exe command

  • the ocsetup.exe command

  • the Add-WindowsPackage cmdlet

  • the Install-Module cmdlet

  • the Install-RoleService cmdlet

Explanation

Question 31 of 47

1

You work as an administrator at Contoso.com. The Contoso.com network consists of a
single domain named Contoso.com. All servers in the Contoso.com domain, including
domain controllers, have Windows Server 2012 installed.
You have been instructed to modify an Active Directory computer object.
Which of the following actions should you take?

Select one of the following:

  • You should consider making use of the Get-ADComputer Windows PowerShell cmdlet

  • You should consider making use of the Set-ADComputer Windows PowerShell cmdlet

  • You should consider making use of the New-ADComputer Windows PowerShell cmdlet

  • You should consider making use of the Get-ADComputerServiceAccount Windows
    PowerShell cmdlet

Explanation

Question 32 of 47

1

You perform a Server Core Installation of Windows Server 2012 on a server named Server1. You need to add a graphical user interface (GUI) to Server1. Which tool should you use?

Select one of the following:

  • The setup.exe command

  • The dism.exe command

  • The imagex.exe command

  • Add-WindowsPackage cmdlet

Explanation

Question 33 of 47

1

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server2 runs Windows Server 2012. You create a security template named Template1 by using the Security Templates snap-in. You need to apply Template1 to Server2. Which tool should you use?

Select one of the following:

  • Security Templates.

  • Computer Management.

  • Security Configuration and Analysis.

  • System Configuration.

Explanation

Question 34 of 47

1

Your network contains an Active Directory domain named contoso.com. The domain contains two servers that run Windows Server 2012, Server1 and Server2. You create a security template named Template1 by using the Security Templates snap-in. You need to apply Template1 to Server2. Which tool should you use?

Select one of the following:

  • System Configuration

  • Security Templates

  • Server Manager

  • Security Configuration and Analysis

Explanation

Question 35 of 47

1

Your network contains an Active Directory domain named contoso.com. The domain contains a print server named Server1 that runs Windows Server 2012. Server1 contains a local group named Group1. You share a printer named Printer1 on Server1. You need to configure Printer1 to meet the following requirements:
Ensure that the members of Group1, the Server Operators group, the Administrators group, and the Print Operators group can send print jobs to Printer1.
Prevent other users from sending print jobs to Printer1.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

Select one or more of the following:

  • Assign the Print permission to the Server Operators group

  • Remove the permissions for the Creator Owner group.

  • Remove the permissions for the Everyone group.

  • Assign the Print permission to Group1.

  • Assign the Print permission to the Administrators group.

Explanation

Question 36 of 47

1

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2. Server1 runs Windows Server 2012. Server2 runs Windows Server 2008 R2 Service Pack 1 (SP1) and has the DHCP Server server role installed. You need to manage DHCP on Server2 by using the DHCP console on Server1. What should you do first?

Select one of the following:

  • From Server Manager on Server2, enable Windows Remote Management.

  • From a command prompt on Server2, run winrm.exe.

  • From Server Manager on Server1, install a feature.

  • From the Microsoft Management Console on Server1, add a snap-in.

Explanation

Question 37 of 47

1

You have a server named Server1 that runs a Server Core installation of Windows Server 2012. Server1 is configured to obtain an IPv4 address by using DHCP. You need to configure the IPv4 settings of the network connection on Server1 as follows:
IP address: 10.1.1.1
Subnet mask: 255.255.240.0
Default gateway: 10.1.1.254

What should you run?

Select one or more of the following:

  • Set-NetlPInterface

  • netcfg.exe

  • New-NetlPAddress

  • msconfig.exe

Explanation

Question 38 of 47

1

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012. You create a new inbound rule by using Windows Firewall with Advanced Security. You need to configure the rule to allow Server1 to accept unsolicited inbound packets that are received through a network address translation (NAT) device on the network. Which setting in the rule should you configure?

Select one of the following:

  • Edge traversal

  • Authorized computers

  • Interface types

  • Remote IP address

Explanation

Question 39 of 47

1

Your network contains two Hyper-V hosts that run Windows Server 2012. The Hyper-V hosts contains several virtual machines that run Windows Server 2012.

You install the Network Load Balancing feature on the virtual machines.

You need to configure the virtual machines to support Network Load Balancing (NLB).

Which virtual machine settings should you configure?

Select one of the following:

  • Port mirroring

  • DHCP guard

  • Router guard

  • MAC address

Explanation

Question 40 of 47

1

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012.

You need to create 3-TB virtual hard disk (VHD) on Server1.

Which tool should you use?

Select one of the following:

  • StorageSubsytemVirtualDisk

  • File Server Resource Manager (FSRM)

  • Server Manager

  • Computer Management

Explanation

Question 41 of 47

1

You have a new server named Server1 that runs Windows Server 2012. Server1 has two dual-core processors and 32 GB of RAM. You install the Hyper-V server role on Server1.

You create two virtual machines on Server1 that each have 8 GB of memory.

You need to minimize the amount of time it takes for both virtual machines to access memory.

What should you configure on each virtual machine?

Select one of the following:

  • Resource control

  • Dynamic Memory

  • NUMA topology

  • Memory weight

Explanation

Question 42 of 47

1

You have a server named Server1 that runs Windows Server 2012. You plan to enable Hyper-V Network Visualization on Server1.

You need to install the Windows Network Virtualization Filter Driver on Server1.

Which Windows PowerShell cmdlet should you run?

Select one of the following:

  • Set-NetVirtualizationGlobal

  • Set-NetAdapterVmq

  • Add-WindowsFeature

  • Enable-NetAdapterBinding

Explanation

Question 43 of 47

1

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 and has the HyperV server role installed.

You need to log the amount of system resources used by each virtual machine. What should you do?

Select one of the following:

  • From Windows PowerShell, run the Enable-VMResourceMetering cmdlet.

  • From Windows System Resource Manager, enable Accounting.

  • From Windows System Resource Manager, add a resource allocation policy.

  • From Windows PowerShell, run the Measure-VM cmdlet.

Explanation

Question 44 of 47

1

You have two servers named Server1 and Server2 that run Windows Server 2012. Server1 and Server2 are part of a workgroup. On Server1, you add Server2 to Server Manager. When you attempt to connect to Server2 from Server Manager, you receive the following error message:
"Credentials not valid."
You need to ensure that you can manage Server2 from Server1 by using Server Manager on Server1.

What should you do?

Select one of the following:

  • On Server 2, run the Configure-SmRemoting cmdlet.

  • On Server 1, run the Set-NetFirewallRule cmdlet.

  • On Server 1, run the Set-Item cmdlet.

  • On Server 2, install the Remote Server Administration Tools (RSAT).

Explanation

Question 45 of 47

1

You have a server named Server1 that runs a Server Core installation of Windows Server 2012 Standard.

You establish a Remote Desktop session to Server1.

You need to identify which task can be performed on Server1 from within the Remote Desktop session.

What should you identify?

Select one of the following:

  • Modify the network settings by using Sconfig.

  • Join a domain by using the System Properties.

  • Disable services by using Msconfig.

  • Install a feature by using Server Manger.

Explanation

Question 46 of 47

1

You have a server named Server1. Server1 runs Windows Server 2012 and is located in a perimeter network.
You need to configure a custom connection security rule on Server1. The rule must encrypt network communications across the Internet to a computer at another company.
Which authentication method should you configure in the connection security rule?

Select one of the following:

  • Advanced

  • User (Kerberos V5)

  • Computer (Kerberos V5)

  • Computer and user (Kerberos V5)

  • Default

Explanation

Question 47 of 47

1

Your network contains two Active Directory forests named contoso.com and adatum.com.

All servers run Windows Server 2012. A one-way external trust exists between contoso.com and adatum.com. Adatum.com contains a universal group named Group1.

You need to prevent Group1 from being used to provide access to the resources in contoso.com

What should you do?

Select one of the following:

  • Modify the Managed By settings of Group1

  • Modify the Allowed to Authenticate permissions in adatum.com

  • Change the type of Group1 to distribution

  • Modify the name of Group1

Explanation