Assignment Help logo
Live Chat

Loading...

Score %0 (0 correct0 incorrect82 unanswered)

Q1. You need to create a file share for your company that must be accessible from all branch offices, and its share path must have the name Work Share. Which server role do you install?

Windows Server Q01

  • BranchCache for Network Files
  • File Server
  • Work Folders
  • DFS Namespaces

Q2. You support an IT infrastructure for an organization that has five physical locations and WAN connections from the main office to each branch. You are designing a network where users at all locations have access to shared files, both online and offline. Which Windows technology is best for your design?

  • Data Deduplication
  • BranchCache
  • DFS Replication
  • File and Storage Services

Q3. Which type of DNS record is most commonly used in a forward lookup zone to resolve a hostname to a specific IP address?

  • an MX record
  • an A record
  • an RTP record
  • a TXT record

Q4. What can you perform to free up space on a Windows Server 2012 R2 C: drive?

  • a disk migration
  • a disk cleanup
  • a disk consolidation
  • a disk defragmentation

Q5. A Windows Server 2012 R2 VM is available to use. You created an XML file that includes all the server roles and features you require for a file server. The XML file is stored at the root of the D: drive. What PowerShell command do you run to configure the server?

  • Install-WindowsServices -ConfigurationFilePath d:\PowerShellConfig.xml
  • Install-WindowsFeature -ConfigurationFilePath d:\root\PowerShellConfigFile.xml
  • Install-WindowsRole -ConfigurationFilePath d:\FileServerConfig.xml
  • Install-WindowsFeature -ConfigurationFiIePath d:\FileServerConfig.xml

Q6. When configuring a CA, which role service provides a web interface for users to easily request and renew certificates?

  • Network Device Enrollment Service
  • Certification Authority Web Enrollment
  • Online Responder
  • Certificate Enrollment Policy Web Service

Q7. Hyper-V _ is a disaster recovery tool that replicates virtual machines from one Hyper-V host server to another in a Hyper-V Windows Server 2016 environment.

  • Manager
  • Replica
  • Backup
  • Data Protection Manager

Q8. You deployed a Windows Server 2012 R2 virtual machine and configured the File and Storage Services server role. Where do you begin configuring the use of Previous Versions for restoring files?

  • A

Windows Server Q10A

  • B

Windows Server Q10B

  • C

Windows Server Q10C

  • D

Windows Server Q10D

Q9. You have installed the Remote Desktop Services role. Which remote desktop mode comes with two built-in licenses?

  • RDA Administration Mode
  • RDS Session Mode
  • RDS User Mode
  • RDA Application Mode

Q10. How would you link a unique user policy made for the Human Resources Department users in your domain?

  • Link the GPO to the Human Resources OU.
  • Link the GPO to the Default Domain Policy.
  • Link the GPO to the domain root
  • Link the GPO to the Computers OU.

Q11. You've deployed a server-core installation of Windows Server 2016. Which is NOT a way to update the server?

  • Configure the server to use a WSUS server with Group Policy.
  • Run the following command: Net stop wuauserv %systemroot%\system32\Cscript scregedit.wsf /AU 4 Net start wuauserv.
  • Run the following command: Wusa <updatename>.msu /quiet.
  • Install the WSUS server role.

Q12. When deploying a Windows Server as a print server, which role needs to be installed?

  • Print Services
  • File Services
  • Print and Document Services
  • Print Server

Reference

Q13. Which type of DNS record is NOT specifically associated with an AD domain controller?

  • LDAP
  • Kerberos
  • GC
  • PTR

Q14. Your Hyper-V server has two physical disks installed, Disk 1 is a C: drive that hosts the Windows system files, and Disk 2 is a D: drive that has no data. You need to connect the D: drive to a newly created VM using a pass-through disk configuration. What is true about the D: drive?

  • The physical disk must be in a RAID 6 configuration.
  • The physical disk must be reformatted.
  • The physical disk must be offline.
  • The physical disk must use iSCSI.

Q15. Which Windows Server technology enables replication of volumes between servers or clusters for disaster recovery?

  • Storage Replica
  • Storage Spaces Direct
  • Stretch Cluster
  • Storage Spaces

Q16. You are setting up a new branch that has 50 client computers, all of which have been joined to the existing Active Directory domain. You deployed a DHCP server and were able to log in with your domain admin credentials, however, the local clients are not receiving IP addresses. What is the cause of this issue?

  • The DHCP server is not part of the DHCP Servers OU in AD.
  • The DHCP server has not been authorized.
  • Your domain admin account is not part of the local computer's Administrators group.
  • The DHCP server is not part of the AD domain.

Q17. You want to verify that a DHCP server has been authorized to use in Active Directory. Which cmdlet do you run in Windows PowerShell?

  • Add-DhcpServerInDC
  • Get-DhcpServerInDC
  • Get-WindowsFeature DHCP
  • Instä11-WindowsFeature DHCP

Q18. You log in to the domain controller to manage some user and computer accounts in Active Directory (AS), and you cannot find the AD tools. To resolve this using the Add Roles and Features Wizard, which feature would you install without any unnecessary services?

  • Hyper-V Management Tools
  • Remove Server Administration Tools
  • Active Directory Rights Management Services
  • AD DS and AD LDS Tools

Q19. You deploy Windows Server 2012 R2 server as a VPN server and must configure new firewall rules for workstation connections. Which command do you use to configure the new rules with the least amount of effort?

  • Use dism.exe from the command prompt.
  • Use dsadd.exe from the command prompt.
  • Use the New-NetFirewallRule command in PowerShell.
  • use the Enable-NetFirewallRule in PowerShell.

Q20. A basic DHCP server can provide clients with an IP address, subnet mask, default gateway, and DNS IP address. and what other IP address?

  • file server
  • WINS server
  • WSUS
  • proxy server

Q21. When setting up a disaster recovery plan for your Hyper-V virtual machines in a System Center Virtual Machine Manager (VMM) cloud, what happens during the initial replication?

  • A Hyper-V VM snapshot is taken.
  • Delta replication begins.
  • Delta disk changes are logged and merged with the parent disk.
  • Virtual hard disks on the VM are replicated to the secondary site.

Q22. You want to secure your Windows server so the built-in web browser can navigate only to sites listed in Internet Explorer's 'trusted sites' list. How can you configure this security capability?

  • Go to the Manager and enable IE Enhanced Security Configuration.
  • Go to Internet Explorer's Internet Options and add unauthorized website URLs to the 'restricted sites' list.
  • Go to Internet Explorer's Internet Options and add authorized website URLs to the 'trusted sites' list.
  • Go to the Control Panel and enable user Account Control.

Q23. After adding a network printer to the Windows print server, you try to add the printer to a Windows 8 desktop client. While typing the network path to the new printer, you are unable to find it. Why is the new network printer unavailable for selection?

  • You did not add the printer drivers to the print server.
  • You did not select the Share the Printer check box.
  • You need to re-add the printer to the Print Management console.
  • The printer lost connection to the network.

Q24. You built a container image on the Nano Server. The container image has multiple layers, including a custom application built for your company, and your development team pushed the image to your Azure image registry. What happens if you attempt to pull that image to a new server with previously downloaded OS images?

  • Your custom layers will be pulled from your Azure registry, and you will receive a notification of the missing base image.
  • You will receive a notification of the missing base image, and you will not be allowed to pull the image.
  • All layers will be downloaded from your Azure registry.
  • The base OS image layers will automatically be pulled from Microsoft's registry at Docker Hub, and your custom layers will be pulled from your Azure registry.

Q25. You need to configure your DHCP server to deny certain client MAC addresses receiving an IP address. Where do you configure this setting?

  • Filters folder
  • Policies folder
  • Scope Default folder
  • Scope Options folder

Q26. Where can you go to restore deleted objects in Active Directory without the use of Microsoft PowerShell or ldp.exe?

  • Active Directory Administrative Center
  • Active Directory Domains and Trusts
  • Active Directory and Computers
  • Active Directory Sites and Services

Q27. You have a running Active Directory Certificate Services (AD CS) server and need to back up the certificate databases and private keys. How do you accomplish this?

  • Use the certutil.exe command.
  • Schedule a full backup of the server.
  • Perform a direct copy of database files and private keys to a file share.
  • Schedule an incremental backup of the server.

Q28. You must configure a set of three DNS IP addresses to be given to clients that receive IP configuration from your DHCP server. The DNS IP will apply to all DHCP created on the server. Where on your DHCP do you configure this setting?

  • Server Options
  • Scope Options
  • Scope Clients
  • Policies

Q29. You are working toward managing cross-forest certificate enrollment deployment and need to copy objects in the source forest to the target forest. How do you keep the source and target forest synchronized?

  • storage replication
  • pkisync.ps1
  • site replication
  • certificate templates

Q30. A company IIS server will host the corporate site, which is accessible only by company computers. You need to configure this website to use SSL. You obtain a certificate to install on the server. Into which certificate store should you import the server's certificate?

  • Trusted Root Certification Authorities under Local Computer
  • Trusted Root Certification Authorities under Current User
  • Personal under Local Computer
  • Client Authentication Computer

Q31. You are preparing a Windows Server 2016 server image for deployment. You want to further customize your server by adding applications and device drivers and to test your computer in a Windows environment. What sysprep.exe parameters would you select when customizing your server image?

Windows Server Q32

  • A
  • B
  • C
  • D

Q32. A domain GPO must apply to users based on the location of the computer to which they are logging in. Did you set up this ability by using which group policy feature?

  • inheritance
  • administrative
  • loopback
  • filter

Q33. You are planning to install a SAN that will utilize iSCSI storage. You want to provide automatic discovery, management, and configuration of iSCSI devices. After running the Get-WindowsFeature * PowerShell command, which should you install?

  • Network Load Balancing
  • EnhancedStorage
  • iSNS
  • Multipath IO

Q34. As you create a new share, you are unable to configure the default classification of data on the folder. Why would the New Share Wizard prevent this configuration?

Windows Server Q35

  • The File Resource Manager must be installed.
  • The Distributed File System server must also be installed.
  • The Windows server license is not compatible with the feature.
  • The file share groups must be configured first.

Q35. When installing the AD DS server role, which will NOT be installed as part of the required features and services for AD DS to run?

  • DFS Replication
  • DFS Namespaces
  • Active Directory Lightweight Directory Services
  • File Replication services

Q36. Which is NOT a reason to deploy a DHCP super scope in your network?

  • The current address pool is almost depleted, and more clients will added.
  • Clients will be migrated to a new scope in a phased approach.
  • More than one DHCP server wants to manage separate logical IP networks on the same physical network segment.
  • A proven failover option is required so clients are always connected.

Q37. You pre staged a computer in Active Directory in a domain controller at company headquarters. After 30 minutes, that new computer object is still not available at the branch office domain What should you run from the prompt to get a summary of the AD replication status in your domain from the perspective of all domain controllers?

  • repadmin /replsum
  • repadmin /showrepl *
  • ntdsutil.exe
  • repadmin /queue

Q38. You currently have a DHCP server issuing addresses to clients. Which task should you perform first to set up your DHCP server to dynamically issue addresses to clients on the network?

  • Add IPv6 scope.
  • Configure an IPv6 address for the interface on the DHCP server.
  • Set up Windows client configuration.
  • Install the DHCPv6 server role.

Q39. In the Add Roles and Features Wizard window, you are unable to remove Active Directory Domain Services—the check box is greyed out. How can you remove AC DS from a Windows Server 2012 R2?

  • Click Next and review the Features section.
  • Click Previous and choose a different server.
  • Click Cancel and restart the server.
  • Click Cancel and open the Remove Roles and Features Wizard.

Q40. In the image below, what is being installed on the server?

Windows Server Q41

  • AD CS
  • AD FS
  • AD DS
  • AD LDS

Q41. The first ot root server in a PKI must have the Active Directory Certificate Services installed running which role service?

  • Certification Authority Web Enrollment
  • Certificate Authority
  • Network Device Enrollment Service
  • Online Responder

Q42. You have shared folder on your FILESVR01 server. You want to be notified vie email when files are saved in the folder. How do you automate this task?

  • Use Storage Reports.
  • Use File Management Tasks.
  • Use Quota Management.
  • Use File Screen Management.

Q43. What you use to implement a secure hardware store for your CA keys?

  • storage area network
  • network attached storage
  • hardware security module
  • encrypted hard drive

Q44. You are deploying a highly available file server using a Hyper-V cluster configuration. After creating the cluster, why must you add d disk as a cluster shared volume (CSV)?

  • to provide nodes in cluster independent VMs slot age location
  • to implement fault tolerance zero downtime for the VM
  • to protect data from loss
  • to prevent nodes in a cluster from accessing a storage location

Q45. When setting up a new RADIUS client, what piece of information verifies a secure and trusted connection with the RADIUS server?

  • shared secret
  • hash key
  • vendor name availability
  • authentication methods

Q46. You run a script to encrypt a client computer's hard drive with BitLocker and back up the recovery password to Active Directory. When researching the computer object's properties, you cannot find the BitLocker recovery password. What may be the cause?

  • BitLocker Drive Encryption Administration Utilities are not installed on the client computer.
  • BitLocker Drive Encryption Administration Utilities are not installed on the domain controller.
  • BitLocker Drive Encryption Tools are not installed on the domain controller.
  • BitLocker Drive Encryption Tools are not installed on the client computer.

Q47. After running the PowerShell cmdlet Add-WindowsFeature Adcs-Cert-Authority -IncludeManagementTool on a Windows Server 2016 server, which command will make it a Root Certificate Authority (CA)?

  • Install-CertificationAuthority
  • Install-CertificationAuthority -CAType RootCA
  • Install-AdcsCertificationAuthority -CAType EnterpriseRootCA
  • Install-AdcsCertificationAuthority -CAType RootCA

Q48. A set of computer and user settings can be applied to multiple clients and servers in a domain through the use of ___.

  • Group Policy Objects
  • Microsoft Management Console
  • Users and Groups
  • Computer Objects

Q49. What is the Microsoft implementation of a RADIUS server?

  • IP address Management (IPAM) Server
  • Network Policy Server (NPS)
  • Network Load Balancing
  • Web Server (IIS)

Q50. After installing the active directory domain services role to your windows server 2016 OS, how do you promote the server to a domain controller using the GUI?

  • Open mmc.exe
  • Run dcpromo.exe
  • Click Add Roles and Features.
  • Click the notification flag in the Server Manager windows.

Q51. You want to host two virtual machines on the same physical server. Their memory settings in Hyper-V are set to optimize the use of physical memory for each virtual machine. What makes this optimization possible?

  • dynamic memory
  • memory buffer
  • virtual memory
  • ReadyBoost

Q52. Group policy objects are not being applied to domain controllers because the Default Domain Controllers and Default Domain group policies are corrupt. What can you run in a command prompt to recover them?

  • dcgpofix.exe
  • dcdiagfix.exe
  • ntdsutil.exe
  • dcpromo.exe

Ref

Q53. A domain controller is a server running __.

  • DFS
  • RDS
  • IIS
  • AD DS

Q54. You want to ensure there are redundant DHCP services available for your network. What should you set up on your server to make this possible?

  • create new multicast scope
  • create new superscope
  • replicate failover scopes
  • configure failover

ref

Q55. Two companies with different names and domains are merging. What do you set up to ensure that name resolution requests are forwarded directly to the other company's authoritative server?

  • DNS conditional forwarder
  • DNS secondary zone
  • DNS forward lookup zone
  • DNS reverse lookup zone

reference

Q56. You have installed the Remote Desktop Services role. Which remote desktop mode comes with two built-in licenses?

  • RDA Administration Mode
  • RDS Session Mode
  • RDS User Mode
  • RDA Application Mode

reference

Q57. In a two-tier hierarchy CA design, what is a common security best practice?

  • The issuing CA servers are placed in different geographical locations.
  • The intermediate or policy CA server is offline.
  • The root CA server is offline.
  • Only FIPS-compliant hardware security modules are used.

reference

Q58. What type of CAs must be domain members and are typically online to issue certificates or certificate policies?

  • Client
  • Enterprise
  • Root
  • Standalone

reference

Q59. Windows Server 2012 R2 server has two network adapters. You are required to configure load balancing on a pair of network adapters. Which management console would you use to accomplish this task?

  • the Terminal Services Manager console
  • the Group Manager console
  • the Remote Desktop Manager console
  • the Server Manager console

reference

Q60. You set up a storage area network that makes use of iSCSI storage. You then install the iSNS Server service feature on Windows Server 2012 R2. Why do you need this feature?

  • to provide discovery services of iSCSI devices
  • to view information about host bus adapters
  • to manage RAID storage volumes
  • to set up storage Fibre Channels

reference

Q61. Using Storage Pools under Files and Storage Services, you configure a mixture of SSD (solid state disk) and HDD (hard disk drive) for tiered storage by creating what?

  • multitenancy volumes
  • storage pools
  • parity volumes
  • storage spaces

reference

Q62. In the Server Manager window shown, how can you manage more servers?

Q62

  • Click Server, above Volumes.
  • Click Tools.
  • Type a computer name in the filter text box.
  • Click Manage.

Q63. You need to make assignments to other admins to manage certificate templates in a multidomain forest. What change is required in Active Directory?

  • You must create a group in Active Directory and add that group to the security properties of the CA server in the Certificate Authority console.
  • Add a group or user to the Certificate Templates property security tab from the configuration partition of your domain using ADSI.
  • Add the domain group or user account to the CA root server's local Administrator group.
  • The domain group or user account must be given Read and Enroll security permission.

Q64. Your organization has the main datacenter on the west side of North America. A secondary site is located on the east side, where data is replicated from west to east. During a disaster recovery, your organization can pick up operations at the east datacenter in about one to two hours. In an official disaster recovery plan document, the east datacenter is referred to as what type of site?

  • far
  • backup
  • warm
  • cold

Q65. You currently have a Windows Server 2008 R2 print server named PRT01. You deploy a Windows Server 2012 R2 print server named PRT02. How do you begin the migration process?

  • Run the printbrm -b command on PRT02
  • Run the printbrm -b command on PRT01
  • Run the printbrm -r command on PRT01
  • Run the printbrm -q command on PRT02

Q66. Your organization wants to design a disaster recovery plan with two geographical sites. The two sites must be up in an active/active configuration, and some or all services should be able to failover seamlessly. Which Storage Replica configuration would you setup with your Windows Server 2016 systems?

  • Cluster-to-Cluster
  • Server-to-Server
  • Storage Replica is incompatible.
  • Stretch Cluster

Q67. Suppose you want to deploy a new Windows Server. You want an installation that has a reduced attack surface and more efficient use of memory and disk space. Which installation option would you use?

  • Windoes Server Datacenter
  • Windows Server Minimal Server Interface
  • Windows Server (Desktop Experience)
  • Windoes Server Core

Q68. A Windows Server machine configured to be a file server has which server role installed?

  • Print and Remote Services
  • Print and File Services
  • Print and Document Services
  • Print and Network Services

Q69. Your environment consists of legacy devices that use NetBIOS names. In the Add Roles and Features Wizard, which feature allows other computers and users to search and find these legacy devices through the wireless LAN?

  • Wireless LAN Service
  • WINS Server
  • Windows Search Service
  • Windows Identity Foundation 3.5

Q70. You work at a company with an Enterprise environment operating on Windows Server 2008. Sixty percent of the servers have 64-bit CPUs; the rest are 32-bit. Management has decided to upgrade to Windows Server 2012 R2. The budget for this upgrade is small. What would be your recommendation for a successful deployment of Windows Server 2012 R2 operating systems?

  • Do not upgrade to Windows Server 2012 R2, as it would exceed the allocated budget.
  • Upgrade servers with 64-bit CPUs only, and discard servers with 32-bit CPUs.
  • Upgrade servers with 32-bit CPUs only.
  • Upgrade servers with 32-bit CPUs to 64-bit CPUs before proceeding.

Q71. Which of the following is not an option for evaluating Storage Spaces Direct in Windows Server 2016?

  • Hyper-V virtual machines
  • Validated server configuration from a partner
  • Any computer that has a hard disk
  • Existing hardware if it meets the requirements

Q72. When you move a Hyper-V virtual machine from Windows Server 2012 R2 to Windows Server 2016, _.

  • It will run on the Server 2016 but cannot be moved back to the Server 2012
  • It will fail because the configuration of the virtual machine has to match the 2016 version
  • It will automatically update the virtual machine configuration to the 2016 version
  • The virtual machine configuration is not updated so it can be moved back to the Server 2012

Q73. Installing Windows Server 2016 without a product key _.

  • Is only possible if you install it without the Desktop Experience
  • Is only possible if you install it as Standard
  • Is possible but it will not activate after installation
  • Is not possible

Q74. What is the benefit of access control policy templates?

  • They allow an administrator to enforce policy settings by assigning a template to a group of relying parties
  • They allow adding Windows Server 2016 nodes to the existing farm while minimizing farm downtime
  • They make it easier to migrate from Active Directory Federation Services in Windows Server 2012 R2
  • They allow to add a new Windows Server 2016 Federation Servers to an existing

Q75. The _ capability directly gives you the ability to implement site-to-site VPNs.

  • SET Architecture
  • RAS Gateway
  • NIC Teaming
  • Flow Engine

Q76. The _ feature helps prevent malicious users from starting the denial of service attacks by using your DNS servers.

  • IPv6 Root Hints
  • Unknown Record Support
  • DNS-Based Authentication of Names Entities
  • Response Rate Limiting

Q77. A user is added to multiple time-bound groups. His Kerberos ticket-granting ticket lifetime will be the _.

  • Lowest time-to-live among all groups
  • Sum of the time-to-live values across all groups
  • Highest time-to-live among all groups
  • None of these answers

Q78. Which Hyper-V switch feature helps you set up a virtual machine as a virtual appliance and direct specific VLAN traffic to it?

  • Internet Protocol v6
  • Trunk mode to a virtual machine
  • Network traffic monitoring
  • Isolated VLANs

Q79. In _ replication scenario(s), the replicated servers or clusters can be far from each other.

  • Neither the server-to-server and cluster-to-cluster
  • Only the cluster-to-cluster
  • Only the server-to-server
  • Both the server-to-server and cluster-to-cluster

Q80. The _ Windows Server 2016 feature helps with meeting service level agreements.

  • Object-Oriented PowerShell syntax
  • Active Memory Dumps
  • Cluster OS Rolling Upgrade
  • Network Name Diagnostics

Q81. In the storage Qos deployment scenario based on Hyper-V using a Scale-Out File Server, _.

  • You need a compute cluster with the Hyper-V role enabled
  • You need a computer cluster that has at least one server with the Hyper-V role enabled
  • You need Hyper-V configured using Cluster Shared Volumes for storage
  • You don't actually need a Scale-Out File Server cluster functioning as a storage cluste

Q82. When doing a bare metal restore of your Windows Server 2012 R2 server, how would you recover your system from an image?

  • Boot into Windows Recovery Environment.
  • Use a third-party backup tool.
  • Run wbadmin.msc from a command prompt.
  • Add additional physical disks to the server.