Administering Windows Server 2012 Back to exams page. 1. Which tool is used to manage file servers, including configuring quotas and blockingcertain files? File Screening File Management Quota Management File Server Resource ManagerQuestion 1 of 50 2. To make your server more stable you decided to use reliability monitor to find faulted application which affect server. When you open Reliability Monitor you did not find any data you can use to troubleshoot faulted application. Which three steps should you take to enable Reliablity Monitor in order you can use it (choose three steps in correct order) 1 Open Task Scheduler and enable and run the MicrosoftWindowsRACRacTask in Reliability AnalysisWMIWMIEnable value to 1. 2 Use the Registry Editor to change the HKEY_LOCAL_MACHINESOFTWAREMicrosoft Task Scheduler. Enable event subsctiption in Event Viewer. 3 Reboot the computer Question 2 of 50 3. You want to enable failure auditing, but not success auditing, for all audit policies under the Object Access category on a computer running Windows Server 2012 R2. Which of the following commands should you use to accomplish this goal? Auditpol.exe /get /Category:Object Access” /success:Disable /Failure:Disable” Auditpol.exe /set /Category:Object Access” /success:Disable /Failure:Enable” Auditpol.exe /set /subcategory:File System” /success:Enable /failure:Enable” Auditpol.exe /get /Category:Object Access” /success:Disable /Failure:Enable”Question 3 of 50 4. You configured vpn server on Server1 with Windows Server 2012R2. Your users complain about slow internet browsing and delay in IE open pages. You found also high traffic on VPN server. You decided to allow split tunnelling. How do you allow split tunneling? Open Advanced TCP/IP Settings and deselect Use default gateway on remote network Open Advanced TCP/IP Settings and deselect Don’t use default gateway on remote network Open Advanced TCP/IP Settings and select Don’t use default gateway on remote Open Advanced TCP/IP Settings and select Use default gateway on remote networkQuestion 4 of 50 5. Which command do you use to create a zone to a DNS on a DNS server? dnscmd /create dnscmd /zonerefresh dnscmd /zoneadd dnscmd /startQuestion 5 of 50 6. How do you decrypt an EFS-encrypted file for a person who has left an organization? Use a DRA. Use a USB with the username and username password in a text file. Remove the computer with the files from the domain. Create the master certificate to encrypt the certificate, and then decrypt the certificate.Question 6 of 50 7. You have a server, called Server1 running Microsoft Exchange 2010. You want to adda second server (Server2) to be used with your e-mail. How can you ensure that theincoming e-mails will be directed to the two servers with the Server2 having the higherpriority? Create an SRV record for Server1 Set the priority of Server1 to 5 and set the priority of Server2 to 20. Create an SRV record for Server2 Set the priority of Server1 to 20 and set the priority of Server2 to 5.Question 7 of 50 8. You were asked to improve security in your domain to match compliance policy. You decided to modify GPO to restrcit users to change password too frequently to use same password for their convenience. Which setting prevents users from resetting the password several times in a row so that he or she can reset the password back to the original password? Minimum password length Minimum password age Complexity requirements Maximum password ageQuestion 8 of 50 9. You are an administrator for the Contoso Corporation. In Active Directory, you have aWebServer OU, which contains 10 web servers. You have been testing security settingsfor a server (called WebServer01) running IIS. How can you deploy the new security settings to the other web servers? Export the settings on the WebServer01 to a security template. Then import the security settings into a GPO and link the GPO to the WebServer OU. Export the settings on the WebServer 01 to a security template. Use the secedit command to import the settings to each web server. Import the settings into the security.inf file template into a GPO and link the GPO to the WebServer OU. Use the GPMC to export the security settings to the other serversQuestion 9 of 50 10. You decide to implement NAP. You have created a group policy to enable NAP on theclient computers and for the client computers to get updates from WSUS. How can youensure that client computers that do not have critical security updates cannot access dataproduction servers? Remote network access using user rights Enable automatic updates on each client Remote the computer from the domain Quarantine clients that do not have the critical updatesQuestion 10 of 50 11. You have a call from users which complains about print service on the server. You checked server and found that print service not functioning properly. You decided to restart print service but it fails. Which program allows you to stop a running process? Event Viewer Reliability Monitor Task Manager Performance MonitorQuestion 11 of 50 12. You decided to use managed service account in your domain to run custom service. You need to create root key to be able to generate group Managed Service Account passwords. Which command would you use to create the root key? Add-KDSRootKey _EFFECTIVETIME ((GET-DATE).AddHours(-10)) Set-KDSRootKey_EFFECTIVETIME ((GET-DATE).NOW()) Set-KDSRootKey.CurrentDate() GenerateRootKey_EFFECTIVETIME()Question 12 of 50 13. Which type of audit policy do you use to specify what to audit based on definedproperties or attributes for a document? Flexible audit policies Expression-based audit policies Variable audit policies Attribute detection audit policiesQuestion 13 of 50 14. Identify the benefits of using Active Directory-integrated zones. (Not all answers will beused.) Fault tolerance Customized selected replication Security Self-healing Efficient replicationQuestion 14 of 50 15. Which minimum domain controller is needed to use Group Policy Preferences (GPP)? Windows Server 2008 R2 Windows Server 2003 R2 Windows Server 2012 Windows Server 2008Question 15 of 50 16. Which of the following are reasons not to enable auditing for everything? (Choose allthat apply.) Makes it difficult to find relevant events Logs quickly fill up Makes it impossible to secure computer Affects performance of computerQuestion 16 of 50 17. You have domain contoso.com. You have set of GPO to comply with security requirements in your company. Your company acquired another company bubble.com. You want to apply same GPO to new domain to match same in your domain. What needs to be redefined when you copy GPOs between domains? Security principals Password policy Security settings Account settingsQuestion 17 of 50 18. Which policy is used to establish sets of conditions and settings that specify whichRADIUS servers perform the authentication, authorization, and accounting of connectionrequests received by the NPS server from RADIUS clients? Connection request policies Accounting policies Health policies Network policiesQuestion 18 of 50 19. Which of the following can you use to show a list of duplicate files on a volume? Storage reports Quotas File comparison File screeningQuestion 19 of 50 20. Which of the following is the compression algorithm used in DFS Replication foundwith Windows Server 2012? FRS EFS Remote differential compression BitLockerQuestion 20 of 50 21. What is an ordered list of servers and targets that a client computer receives from adomain controller or namespace server when a user accesses a namespace root or a DFSfolder with targets? Referrals Target priority list Replication list SID control listQuestion 21 of 50 22. You have configured a server called Server1 as a DirectAccess server. How doyou need to configure the Windows Firewall on the server to supportDirectAccess? Allow IGMPv6. Allow IPv6-Route. Allow ICMP v6 Redirect. Allow ICMPv6 Echo Request.Question 22 of 50 23. You have a domain with four domain controllers. Server1 is a domain controller, DHCPserver, DNS server, and a database server. You need to move the database to anotherdrive. The solution must minimize impact to the users. What should you do? Restart the computer in DSRM. Create an image of the server. Stop the AD DS service. Restart the computer in Save mode.Question 23 of 50 24. You have three NPS servers known as Server1, Server2, and Server3. On Server1, youhave a Remote RADIUS Server Group that contains Server2 and Server3. Server2 andServer 3 are configured to authentication remote users. What do you need to do to configure Server1 to forward RADIUS authentication requests to Server2 and Server3? Create a network policy. Create a remediation server group. Create a connection request policy. Create a health policy.Question 24 of 50 25. You just enabled SSTP on a server called Server1. When a user tries to log in, he receivesan error: Error 0x80092013: The revocation function is unable to check revocationbecause the revocation server was offline. You look at your certificate and it looks fine.What would you do to overcome this problem? Add the RRAS server to the client personal store. Upgrade the certificate to V3. Renew the certificate. Publish the CRL distribution point to a site that is available over the Internet.Question 25 of 50 26. You have DomainController Server1. Database for SD DS placed on D drive where you identify low space warning. You need to compress AD DS database. Identify the steps in order to compress an Active Directory database? 2 Start the ntdsutil.exe 3 Use the activate instance NTDS command 1 Stop the AD DS Use the move command 5 Use the compact to command 4 Execute the files command 6 Quit ntdsutil Use the integrity command Question 26 of 50 27. You have five domain controllers in your domain. You decided to implement Central Store location for your administrative templates. Where is the Central Store located? C:WindowsPolicyDefinitions C:WindowsSYSVOLdomainPoliciesPolicyDefinitions C:WindowsCentral C:WindowsStoreQuestion 27 of 50 28. What are the two default group policies that are already created in Active Directory? Default Domain Policy Default Domain Controller Policy Default User Profile Default Computer profileQuestion 28 of 50 29. You were asked to deploy 20 servers with defined configuration. To automate task you decided to install and configure WDS. Which roles you need to install in WDS to configure it properly? Choose all available options: Transport Server PXE server Authentication server Deployment ServerQuestion 29 of 50 30. You have a server called Server1 that runs Network Policy Server. Server1 is configuredto use SQL logging. You install Server2, which also runs Network Policy Server. Youwant to make sure that the two servers are configured the same. Therefore, you exportthe NPS settings from Server1 and import the settings into Server2. What should youdo next? Restart the Server2. Create an ODBC data course to Server1. Manually configure the SQL logging settings. Create an ODBC data source to a SQL server.Question 30 of 50 31. Which type of server stores DNS requests for future use but is not authoritative for anyzone? Conditional forwarding server Stub server Caching-only server Primary name serverQuestion 31 of 50 32. Which account runs a service on multiple computers that belong to a cluster and thatautomatically have the password changed on a regular basis? User account Group managed service account Computer account Managed service accountQuestion 32 of 50 33. You have users in the Engineering OU. You need to ensure that when a user logs off, heor she is automatically added to the local Administrators group. What should you do? Configure GPP Configure WMI filtering Modify GPP Enable loopback processing in replace modeQuestion 33 of 50 34. You were tasked to monitor few servers with errors and warning events. What should you do to collect decribed notifications on one server to provide single point of monitor. Please choose all correct answers to configure event subscription. Open firewall ports. Configure the forwarding computer. Create an Event Subscription. Configure the Collecting Computer. Question 34 of 50 35. You have domain contoso.com. You have two domain controllers in your domain Server1 and Server2 built on Windows Server 2012R2. Domain functional level of your domain Windows 2003. Forest functional level Windows Server 2008. You have remote site where you decided to deploy RODC due security requirements. What is the minimum forest functional level for deploying RODC? Windows Server 2008 Windows Server 2012 Windows Server 2003 Windows Server 2008 R2Question 35 of 50 36. You are an administrator at the Contoso Corporation. You have the responsibility to makesure that the passwords for all users are at least eight characters and that are changed every 90 days. You must ensure that each password is a strong password. What should you do? Create new domain password policy Create new fine-grained password policies Change Complexity requirements Modify default domain password policyQuestion 36 of 50 37. In order of first to last, specify the tasks that must be completed before you can deployupdates using WSUS. (Not all tasks will be required.) Configure Internet Options in Internet Explorer to use the proxy server. Add *Microsoft.com* to the Windows firewall to allow all packets. 4 Approve the updates for deployment. 3 Configure the clients to use WSUS using group policies. 2 Create computer groups. 1 Select the type of updates to download and synchronize updates. Question 37 of 50 38. You are an administrator of several regional offices. You install WDS on Server1 andcreate three images for each regional office. You want to deploy the images using WDS,but you want to ensure that the administrator for each regional office can view only theimages for his or her regional office. Which of the following actions should you perform? Place the images for each regional office into a separate image group on the WDS server.Then grant each administrator permission to his or her regional office’s image group. Add all images to an image group and assign administrator permissions to the imagegroup. Create an OU for each regional office and place the computers in the appropriateregional OU. Grant each administrator administrative permissions to the images assigned to theregional office.Question 38 of 50 39. Your domain is primarily based in the United States. Your company acquires an office inFrance. You need to ensure that the group policies that you have established support theFrench language. What do you need to do? Load the French Language pack in the GPMC Run the ADM migrator and convert the current GPOs to French. Create a second set of GPOs with the French language. Copy the DML files to the FR folder in the central store.Question 39 of 50 40. You want to configure the default home page for Internet Explorer for your organization.You have IE 7, IE 8, IE 9, and IE 10. How many preferenceitems do you need to create? 2 1 4 3Question 40 of 50 41. You have a new server called Server1 that you just assigned an IPv6 address. You need toensure that clients can find the server’s address. Which resource record should you use? CNAME A SRV AAAAQuestion 41 of 50 42. To automatically unlock a drive protected by BitLocker, which server would the clientget a key from? DHCP server WDS server Any server with a BitLocker encrypted drive BitLocker Web serverQuestion 42 of 50 43. You create a Server OU. You want to isolate the Server OU so that it will not be affectedby any of the domain GPOs. What should you do? Use a security group filter. Use a WMI filter. Use the enforce option. Use block policy inheritance.Question 43 of 50 44. You have a main office and 12 branch offices. The users and computers are within asingle domain. All servers are Windows Server 2008 R2 and Windows Server 2012. Youmust make sure that all data is encrypted by using end-to-end encryption. In addition,instead of using usernames and passwords, you need to use computer-level authentication.What should you do? Configure a PPTP connection and MS-CHAPv2. Configure L2TP with IPsec and EAP-TSL authentication. Configure L2TP with IPsec and MS-CHAPv2. Configure SSTP with IPsec and PAP.Question 44 of 50 45. You have a domain-based namespace called DFS, running Windows Server 2008 Servermode. How do you ensure users can only see files and folders in which the users havepermission to access? Enable access-based enumeration Modify the view permissions Modify the discretionary access control list Disable referralsQuestion 45 of 50 46. You have users who connect to the corporate network using their laptops. Because thesecomputers often access confidential data, you need to be sure that users access networkresources only from computers that comply with the company policy of having ananti-virus, anti-spyware and have the newest Windows updates. You decide to use NAP. Which is used to make a computer compliant when you have quarantined computersthat are not compliant when using NAP? Reload Windows. Use remediation servers Reboot the computer Reset the computer account in the domain.Question 46 of 50 47. You have two domain controllers in your domain DC1 and DC2. DC2 has domain wide roles, DC1 has forest wide roles. You have call from users that they cannot start legacy application you have deployed in the company. Which role you need to check on server to resolve issue? RID Master Infrastructure Master Schema Master PDC EmulatorQuestion 47 of 50 48. You found that you your default GPO policied corrupted. You want to restore them to their default state. Which command allows you to restore the Default Domain Policy or the Default Domain Controllers Policy to their default settings? GPORestore GPODef ResetGPO DCGPOFixQuestion 48 of 50 49. You have the following servers for DirectAccess:• Domain Controller/DNS server running Windows Server 2008 operating atWindows Server 2003 domain functional level• Certificate Authority running Windows Server 2012• File server running Windows Server 2008 R2• DirectAccess Server running Windows Server 2012Which of the following servers do you need to modify? Upgrade the file server to Windows Server 2012 Upgrade the domain controller to Windows Server 2008 R2. Run the Certificate Authority in Windows Server 2008 R2 compatibilitymode. Install the IIS 6.0 compatibility tools on the DirectAccess serverQuestion 49 of 50 50. You administer a server (Server1) with WSUS. You use a group policy to configure allWSUS client computers to detect every update and install updates weekly. You justdownloaded a critical update; which of the following actions should be taken to installthe critical update during the next detection interval? Run the gpupdate /force command Configure the deadline settings for the update Run the wuauclt.exe /force command Configure the Synchronization ScheduleQuestion 50 of 50 Loading…