CBT IT Certification Training

Unlimited IT Certification Courses via Streaming Video

Login to this site requires ssl communication.
Click here to reload the page over ssl.

  • Lost your password?

  • Back to login
Loading
Login to this site requires ssl communication.
Click here to reload the page over ssl.

  • Lost your password?

  • Back to login
Loading
  • Home
  • New Courses
        • Cisco
          • Cisco CCNA Primer
          • Cisco CCNA
  • Courses
        • Amazon
          • AWS Certified Solutions Architect – Associate
          • Amazon AWS SysOps – Associate
        • Career
        • Cisco
        • NetApp
        • CompTIA
        • ITIL
        • Juniper
        • Custom menu
          • custom menu 1
          • custom menu 2
          • Custom menu 3
          • custom menu 4
        • Linux
        • Microsoft
          • Security Fundamentals
          • Windows OS
          • Windows Server
          • Microsoft MCSA – Windows Server 2012
          • Microsoft MTA – Database Administration Fundamentals
          • Microsoft MCSA – Administering Windows Server 2012
          • Microsoft MCSA Configuring Advanced Windows Server 2012 Services
        • TCP-IP
        • Wireshark
        • VMware
        • Web Development
  • Racks
    • vRack
    • Live Cisco Racks
  • Tour
  • Join
  • Join
  • Free Training
  • Meet the Trainers
  • Help
    • Helpdesk
    • FAQ
    • Contact Us
    • Privacy
  • Products
    • Books
    • Audiobooks
  • Login
  • Members
    • Account
    • Exams
    • Forum
    • Live Cisco Rack Training
    • Members Training
    • Member Bonuses
    • My Courses
  • Home
  • New Courses
        • Cisco
          • Cisco CCNA Primer
          • Cisco CCNA
  • Courses
        • Amazon
          • AWS Certified Solutions Architect – Associate
          • Amazon AWS SysOps – Associate
        • Career
        • Cisco
        • NetApp
        • CompTIA
        • ITIL
        • Juniper
        • Custom menu
          • custom menu 1
          • custom menu 2
          • Custom menu 3
          • custom menu 4
        • Linux
        • Microsoft
          • Security Fundamentals
          • Windows OS
          • Windows Server
          • Microsoft MCSA – Windows Server 2012
          • Microsoft MTA – Database Administration Fundamentals
          • Microsoft MCSA – Administering Windows Server 2012
          • Microsoft MCSA Configuring Advanced Windows Server 2012 Services
        • TCP-IP
        • Wireshark
        • VMware
        • Web Development
  • Racks
    • vRack
    • Live Cisco Racks
  • Tour
  • Join
  • Join
  • Free Training
  • Meet the Trainers
  • Help
    • Helpdesk
    • FAQ
    • Contact Us
    • Privacy
  • Products
    • Books
    • Audiobooks
  • Login
  • Members
    • Account
    • Exams
    • Forum
    • Live Cisco Rack Training
    • Members Training
    • Member Bonuses
    • My Courses

Administering Windows Server 2012

Back to exams page.

1. Which of the following can you use to show a list of duplicate files on a volume?
 
 
 
 

Question 1 of 50

2. Your domain is primarily based in the United States. Your company acquires an office in
France. You need to ensure that the group policies that you have established support the
French language. What do you need to do?
 
 
 
 

Question 2 of 50

3. You found that you your default GPO policied corrupted. You want to restore them to their default state. Which command allows you to restore the Default Domain Policy or the Default Domain Controllers Policy to their default settings?
 
 
 
 

Question 3 of 50

4. You just enabled SSTP on a server called Server1. When a user tries to log in, he receives
an error: Error 0x80092013: The revocation function is unable to check revocation
because the revocation server was offline. You look at your certificate and it looks fine.
What would you do to overcome this problem?
 
 
 
 

Question 4 of 50

5. To automatically unlock a drive protected by BitLocker, which server would the client
get a key from?
 
 
 
 

Question 5 of 50

6. Which policy is used to establish sets of conditions and settings that specify which
RADIUS servers perform the authentication, authorization, and accounting of connection
requests received by the NPS server from RADIUS clients?
 
 
 
 

Question 6 of 50

7. You have users who connect to the corporate network using their laptops. Because these
computers often access confidential data, you need to be sure that users access network
resources only from computers that comply with the company policy of having an
anti-virus, anti-spyware and have the newest Windows updates. You decide to use NAP.  Which is used to make a computer compliant when you have quarantined computers
that are not compliant when using NAP?
 
 
 
 

Question 7 of 50

8. You have DomainController Server1. Database for SD DS placed on D drive where you identify low space warning. You need to compress AD DS database. Identify the steps in order to compress an Active Directory database?
  • 5 Use the compact to command
  • 3 Use the activate instance NTDS command
  • 2 Start the ntdsutil.exe
  • 1 Stop the AD DS
  • Use the integrity command
  • 6 Quit ntdsutil
  • 4 Execute the files command
  • Use the move command

Question 8 of 50

9. You were asked to improve security in your domain to match compliance policy. You decided to modify GPO to restrcit users to change password too frequently to use same password for their convenience. Which setting prevents users from resetting the password several times in a row so that he or she can reset the password back to the original password?
 
 
 
 

Question 9 of 50

10. Which type of audit policy do you use to specify what to audit based on defined
properties or attributes for a document?
 
 
 
 

Question 10 of 50

11. You have a call from users which complains about print service on the server. You checked server and found that print service not functioning properly. You decided to restart print service but it fails. Which program allows you to stop a running process?
 
 
 
 

Question 11 of 50

12. You have a server, called Server1 running Microsoft Exchange 2010. You want to add
a second server (Server2) to be used with your e-mail. How can you ensure that the
incoming e-mails will be directed to the two servers with the Server2 having the higher
priority?
 
 
 
 

Question 12 of 50

13. Which command do you use to create a zone to a DNS on a DNS server?
 
 
 
 

Question 13 of 50

14. Which minimum domain controller is needed to use Group Policy Preferences (GPP)?
 
 
 
 

Question 14 of 50

15. You have domain contoso.com. You have set of GPO to comply with security requirements in your company. Your company acquired another company bubble.com. You want to apply same GPO to new domain to match same in your domain. What needs to be redefined when you copy GPOs between domains?
 
 
 
 

Question 15 of 50

16. You were asked to deploy 20 servers with defined configuration. To automate task you decided to install and configure WDS. Which roles you need to install in WDS to configure it properly? Choose all available options:
 
 
 
 

Question 16 of 50

17. You administer a server (Server1) with WSUS. You use a group policy to configure all
WSUS client computers to detect every update and install updates weekly. You just
downloaded a critical update; which of the following actions should be taken to install
the critical update during the next detection interval?
 
 
 
 

Question 17 of 50

18. You are an administrator for the Contoso Corporation. In Active Directory, you have a
WebServer OU, which contains 10 web servers. You have been testing security settings
for a server (called WebServer01) running IIS. How can you deploy the new security settings to the other web servers?
 
 
 
 

Question 18 of 50

19. You decide to implement NAP. You have created a group policy to enable NAP on the
client computers and for the client computers to get updates from WSUS. How can you
ensure that client computers that do not have critical security updates cannot access data
production servers?
 
 
 
 

Question 19 of 50

20. You have the following servers for DirectAccess:
• Domain Controller/DNS server running Windows Server 2008 operating at
Windows Server 2003 domain functional level
• Certificate Authority running Windows Server 2012
• File server running Windows Server 2008 R2
• DirectAccess Server running Windows Server 2012
Which of the following servers do you need to modify?
 
 
 
 

Question 20 of 50

21. You have configured a server called Server1 as a DirectAccess server. How do
you need to configure the Windows Firewall on the server to support
DirectAccess?
 
 
 
 

Question 21 of 50

22. You have two domain controllers in your domain DC1 and DC2. DC2 has domain wide roles, DC1 has forest wide roles. You have call from users that they cannot start legacy application you have deployed in the company.  Which role you need to check on server to resolve issue?
 
 
 
 

Question 22 of 50

23. You decided to use managed service account in your domain to run custom service. You need to create root key to be able to generate group Managed Service Account passwords. Which command would you use to create the root key?
 
 
 
 

Question 23 of 50

24. How do you decrypt an EFS-encrypted file for a person who has left an organization?
 
 
 
 

Question 24 of 50

25. You create a Server OU. You want to isolate the Server OU so that it will not be affected
by any of the domain GPOs. What should you do?
 
 
 
 

Question 25 of 50

26. You want to configure the default home page for Internet Explorer for your organization.
You have  IE 7, IE 8, IE 9, and IE 10. How many preference
items do you need to create?
 
 
 
 

Question 26 of 50

27. You are an administrator at the Contoso Corporation. You have the responsibility to make
sure that the passwords for all users are at least eight characters and that are changed every 90 days. You must ensure that each password is a strong password.  What should you do?
 
 
 
 

Question 27 of 50

28. What is an ordered list of servers and targets that a client computer receives from a
domain controller or namespace server when a user accesses a namespace root or a DFS
folder with targets?
 
 
 
 

Question 28 of 50

29. You configured vpn server on Server1 with Windows Server 2012R2. Your users complain about slow internet browsing and delay in IE open pages. You found also high traffic on VPN server. You decided to allow split tunnelling. How do you allow split tunneling?
 
 
 
 

Question 29 of 50

30. You were tasked to monitor few servers with errors and warning events. What should you do to collect decribed notifications on one server to provide single point of monitor. Please choose all correct answers to configure event subscription.
  • Configure the forwarding computer.
  • Configure the Collecting Computer.
  • Open firewall ports.
  • Create an Event Subscription.

Question 30 of 50

31. You have users in the Engineering OU. You need to ensure that when a user logs off, he
or she is automatically added to the local Administrators group. What should you do?
 
 
 
 

Question 31 of 50

32. Which type of server stores DNS requests for future use but is not authoritative for any
zone?
 
 
 
 

Question 32 of 50

33. You want to enable failure auditing, but not success auditing, for all audit policies under the Object Access category on a computer running Windows Server 2012 R2. Which of the following commands should you use to accomplish this goal?
 
 
 
 

Question 33 of 50

34. Which tool is used to manage file servers, including configuring quotas and blocking
certain files?
 
 
 
 

Question 34 of 50

35. To make your server more stable you decided to use reliability monitor to find faulted application which affect server. When you open Reliability Monitor you did not find any data you can use to troubleshoot faulted application. Which three steps should you take to enable Reliablity Monitor in order you can use it (choose three steps in correct order)
  • 3 Reboot the computer
  • 2 Use the Registry Editor to change the HKEY_LOCAL_MACHINESOFTWAREMicrosoft
  • Enable event subsctiption in Event Viewer.
  • Reliability AnalysisWMIWMIEnable value to 1.
  • Task Scheduler.
  • 1 Open Task Scheduler and enable and run the MicrosoftWindowsRACRacTask in

Question 35 of 50

36. Which account runs a service on multiple computers that belong to a cluster and that
automatically have the password changed on a regular basis?
 
 
 
 

Question 36 of 50

37. You have a domain-based namespace called DFS, running Windows Server 2008 Server
mode. How do you ensure users can only see files and folders in which the users have
permission to access?
 
 
 
 

Question 37 of 50

38. You are an administrator of several regional offices. You install WDS on Server1 and
create three images for each regional office. You want to deploy the images using WDS,
but you want to ensure that the administrator for each regional office can view only the
images for his or her regional office. Which of the following actions should you perform?
 
 
 
 

Question 38 of 50

39. Identify the benefits of using Active Directory-integrated zones. (Not all answers will be
used.)
 
 
 
 
 

Question 39 of 50

40. In order of first to last, specify the tasks that must be completed before you can deploy
updates using WSUS. (Not all tasks will be required.)
  • 3 Configure the clients to use WSUS using group policies.
  • Configure Internet Options in Internet Explorer to use the proxy server.
  • Add *Microsoft.com* to the Windows firewall to allow all packets.
  • 4 Approve the updates for deployment.
  • 2 Create computer groups.
  • 1 Select the type of updates to download and synchronize updates.

Question 40 of 50

41. What are the two default group policies that are already created in Active Directory?
 
 
 
 

Question 41 of 50

42. You have a new server called Server1 that you just assigned an IPv6 address. You need to
ensure that clients can find the server’s address. Which resource record should you use?
 
 
 
 

Question 42 of 50

43. Which of the following is the compression algorithm used in DFS Replication found
with Windows Server 2012?
 
 
 
 

Question 43 of 50

44. You have domain contoso.com. You have two domain controllers in your domain Server1 and Server2 built on Windows Server 2012R2. Domain functional level of your domain Windows 2003. Forest functional level Windows Server 2008. You have remote site where you decided to deploy RODC due security requirements. What is the minimum forest functional level for deploying RODC?
 
 
 
 

Question 44 of 50

45. Which of the following are reasons not to enable auditing for everything? (Choose all
that apply.)
 
 
 
 

Question 45 of 50

46. You have a server called Server1 that runs Network Policy Server. Server1 is configured
to use SQL logging. You install Server2, which also runs Network Policy Server. You
want to make sure that the two servers are configured the same. Therefore, you export
the NPS settings from Server1 and import the settings into Server2. What should you
do next?
 
 
 
 

Question 46 of 50

47. You have three NPS servers known as Server1, Server2, and Server3. On Server1, you
have a Remote RADIUS Server Group that contains Server2 and Server3. Server2 and
Server 3 are configured to authentication remote users. What do you need to do to configure Server1 to forward RADIUS authentication requests to Server2 and Server3?
 
 
 
 

Question 47 of 50

48. You have a domain with four domain controllers. Server1 is a domain controller, DHCP
server, DNS server, and a database server. You need to move the database to another
drive. The solution must minimize impact to the users. What should you do?
 
 
 
 

Question 48 of 50

49. You have five domain controllers in your domain. You decided to implement Central Store location for your administrative templates. Where is the Central Store located?
 
 
 
 

Question 49 of 50

50. You have a main office and 12 branch offices. The users and computers are within a
single domain. All servers are Windows Server 2008 R2 and Windows Server 2012. You
must make sure that all data is encrypted by using end-to-end encryption. In addition,
instead of using usernames and passwords, you need to use computer-level authentication.
What should you do?
 
 
 
 

Question 50 of 50

Loading... Loading…

 

About Us

This site has been created to help you make the best out of your IT career. Whether you are trying to get your first job, get promoted, or start your own IT business, we have a course for you.

Most Popular

Cisco ICND1 Wireshark WCNA NetApp NCSA CompTIA Network+ VMware VCA-DCV Microsoft MTA OS Fundamentals

Members

  • Account
  • Forum
  • Live Cisco Rack Training
  • Members Training
  • Member Bonuses
  • My Courses

Newsletter

Free IT Webinar Training

Secure Site

website security

Copyright 2016 Reality Press Ltd . / Paul Browning