Administering Windows Server 2012 Back to exams page. 1. Which of the following can you use to show a list of duplicate files on a volume? File screening Quotas Storage reports File comparisonQuestion 1 of 50 2. Your domain is primarily based in the United States. Your company acquires an office inFrance. You need to ensure that the group policies that you have established support theFrench language. What do you need to do? Run the ADM migrator and convert the current GPOs to French. Load the French Language pack in the GPMC Copy the DML files to the FR folder in the central store. Create a second set of GPOs with the French language.Question 2 of 50 3. You found that you your default GPO policied corrupted. You want to restore them to their default state. Which command allows you to restore the Default Domain Policy or the Default Domain Controllers Policy to their default settings? DCGPOFix ResetGPO GPORestore GPODefQuestion 3 of 50 4. You just enabled SSTP on a server called Server1. When a user tries to log in, he receivesan error: Error 0x80092013: The revocation function is unable to check revocationbecause the revocation server was offline. You look at your certificate and it looks fine.What would you do to overcome this problem? Upgrade the certificate to V3. Add the RRAS server to the client personal store. Renew the certificate. Publish the CRL distribution point to a site that is available over the Internet.Question 4 of 50 5. To automatically unlock a drive protected by BitLocker, which server would the clientget a key from? BitLocker Web server Any server with a BitLocker encrypted drive WDS server DHCP serverQuestion 5 of 50 6. Which policy is used to establish sets of conditions and settings that specify whichRADIUS servers perform the authentication, authorization, and accounting of connectionrequests received by the NPS server from RADIUS clients? Health policies Accounting policies Connection request policies Network policiesQuestion 6 of 50 7. You have users who connect to the corporate network using their laptops. Because thesecomputers often access confidential data, you need to be sure that users access networkresources only from computers that comply with the company policy of having ananti-virus, anti-spyware and have the newest Windows updates. You decide to use NAP. Which is used to make a computer compliant when you have quarantined computersthat are not compliant when using NAP? Reload Windows. Use remediation servers Reboot the computer Reset the computer account in the domain.Question 7 of 50 8. You have DomainController Server1. Database for SD DS placed on D drive where you identify low space warning. You need to compress AD DS database. Identify the steps in order to compress an Active Directory database? 5 Use the compact to command 3 Use the activate instance NTDS command 2 Start the ntdsutil.exe 1 Stop the AD DS Use the integrity command 6 Quit ntdsutil 4 Execute the files command Use the move command Question 8 of 50 9. You were asked to improve security in your domain to match compliance policy. You decided to modify GPO to restrcit users to change password too frequently to use same password for their convenience. Which setting prevents users from resetting the password several times in a row so that he or she can reset the password back to the original password? Complexity requirements Maximum password age Minimum password age Minimum password lengthQuestion 9 of 50 10. Which type of audit policy do you use to specify what to audit based on definedproperties or attributes for a document? Flexible audit policies Expression-based audit policies Attribute detection audit policies Variable audit policiesQuestion 10 of 50 11. You have a call from users which complains about print service on the server. You checked server and found that print service not functioning properly. You decided to restart print service but it fails. Which program allows you to stop a running process? Task Manager Event Viewer Reliability Monitor Performance MonitorQuestion 11 of 50 12. You have a server, called Server1 running Microsoft Exchange 2010. You want to adda second server (Server2) to be used with your e-mail. How can you ensure that theincoming e-mails will be directed to the two servers with the Server2 having the higherpriority? Set the priority of Server1 to 20 and set the priority of Server2 to 5. Set the priority of Server1 to 5 and set the priority of Server2 to 20. Create an SRV record for Server1 Create an SRV record for Server2Question 12 of 50 13. Which command do you use to create a zone to a DNS on a DNS server? dnscmd /zoneadd dnscmd /start dnscmd /zonerefresh dnscmd /createQuestion 13 of 50 14. Which minimum domain controller is needed to use Group Policy Preferences (GPP)? Windows Server 2012 Windows Server 2008 Windows Server 2008 R2 Windows Server 2003 R2Question 14 of 50 15. You have domain contoso.com. You have set of GPO to comply with security requirements in your company. Your company acquired another company bubble.com. You want to apply same GPO to new domain to match same in your domain. What needs to be redefined when you copy GPOs between domains? Account settings Security principals Password policy Security settingsQuestion 15 of 50 16. You were asked to deploy 20 servers with defined configuration. To automate task you decided to install and configure WDS. Which roles you need to install in WDS to configure it properly? Choose all available options: PXE server Deployment Server Authentication server Transport ServerQuestion 16 of 50 17. You administer a server (Server1) with WSUS. You use a group policy to configure allWSUS client computers to detect every update and install updates weekly. You justdownloaded a critical update; which of the following actions should be taken to installthe critical update during the next detection interval? Configure the deadline settings for the update Configure the Synchronization Schedule Run the wuauclt.exe /force command Run the gpupdate /force commandQuestion 17 of 50 18. You are an administrator for the Contoso Corporation. In Active Directory, you have aWebServer OU, which contains 10 web servers. You have been testing security settingsfor a server (called WebServer01) running IIS. How can you deploy the new security settings to the other web servers? Import the settings into the security.inf file template into a GPO and link the GPO to the WebServer OU. Use the GPMC to export the security settings to the other servers Export the settings on the WebServer 01 to a security template. Use the secedit command to import the settings to each web server. Export the settings on the WebServer01 to a security template. Then import the security settings into a GPO and link the GPO to the WebServer OU.Question 18 of 50 19. You decide to implement NAP. You have created a group policy to enable NAP on theclient computers and for the client computers to get updates from WSUS. How can youensure that client computers that do not have critical security updates cannot access dataproduction servers? Remote the computer from the domain Enable automatic updates on each client Remote network access using user rights Quarantine clients that do not have the critical updatesQuestion 19 of 50 20. You have the following servers for DirectAccess:• Domain Controller/DNS server running Windows Server 2008 operating atWindows Server 2003 domain functional level• Certificate Authority running Windows Server 2012• File server running Windows Server 2008 R2• DirectAccess Server running Windows Server 2012Which of the following servers do you need to modify? Run the Certificate Authority in Windows Server 2008 R2 compatibilitymode. Upgrade the domain controller to Windows Server 2008 R2. Upgrade the file server to Windows Server 2012 Install the IIS 6.0 compatibility tools on the DirectAccess serverQuestion 20 of 50 21. You have configured a server called Server1 as a DirectAccess server. How doyou need to configure the Windows Firewall on the server to supportDirectAccess? Allow IGMPv6. Allow ICMPv6 Echo Request. Allow IPv6-Route. Allow ICMP v6 Redirect.Question 21 of 50 22. You have two domain controllers in your domain DC1 and DC2. DC2 has domain wide roles, DC1 has forest wide roles. You have call from users that they cannot start legacy application you have deployed in the company. Which role you need to check on server to resolve issue? Schema Master RID Master PDC Emulator Infrastructure MasterQuestion 22 of 50 23. You decided to use managed service account in your domain to run custom service. You need to create root key to be able to generate group Managed Service Account passwords. Which command would you use to create the root key? Set-KDSRootKey_EFFECTIVETIME ((GET-DATE).NOW()) Set-KDSRootKey.CurrentDate() Add-KDSRootKey _EFFECTIVETIME ((GET-DATE).AddHours(-10)) GenerateRootKey_EFFECTIVETIME()Question 23 of 50 24. How do you decrypt an EFS-encrypted file for a person who has left an organization? Remove the computer with the files from the domain. Use a DRA. Use a USB with the username and username password in a text file. Create the master certificate to encrypt the certificate, and then decrypt the certificate.Question 24 of 50 25. You create a Server OU. You want to isolate the Server OU so that it will not be affectedby any of the domain GPOs. What should you do? Use a security group filter. Use block policy inheritance. Use the enforce option. Use a WMI filter.Question 25 of 50 26. You want to configure the default home page for Internet Explorer for your organization.You have IE 7, IE 8, IE 9, and IE 10. How many preferenceitems do you need to create? 4 2 1 3Question 26 of 50 27. You are an administrator at the Contoso Corporation. You have the responsibility to makesure that the passwords for all users are at least eight characters and that are changed every 90 days. You must ensure that each password is a strong password. What should you do? Create new domain password policy Modify default domain password policy Create new fine-grained password policies Change Complexity requirementsQuestion 27 of 50 28. What is an ordered list of servers and targets that a client computer receives from adomain controller or namespace server when a user accesses a namespace root or a DFSfolder with targets? Target priority list Referrals Replication list SID control listQuestion 28 of 50 29. You configured vpn server on Server1 with Windows Server 2012R2. Your users complain about slow internet browsing and delay in IE open pages. You found also high traffic on VPN server. You decided to allow split tunnelling. How do you allow split tunneling? Open Advanced TCP/IP Settings and deselect Don’t use default gateway on remote network Open Advanced TCP/IP Settings and select Use default gateway on remote network Open Advanced TCP/IP Settings and deselect Use default gateway on remote network Open Advanced TCP/IP Settings and select Don’t use default gateway on remoteQuestion 29 of 50 30. You were tasked to monitor few servers with errors and warning events. What should you do to collect decribed notifications on one server to provide single point of monitor. Please choose all correct answers to configure event subscription. Configure the forwarding computer. Configure the Collecting Computer. Open firewall ports. Create an Event Subscription. Question 30 of 50 31. You have users in the Engineering OU. You need to ensure that when a user logs off, heor she is automatically added to the local Administrators group. What should you do? Configure GPP Modify GPP Configure WMI filtering Enable loopback processing in replace modeQuestion 31 of 50 32. Which type of server stores DNS requests for future use but is not authoritative for anyzone? Stub server Primary name server Conditional forwarding server Caching-only serverQuestion 32 of 50 33. You want to enable failure auditing, but not success auditing, for all audit policies under the Object Access category on a computer running Windows Server 2012 R2. Which of the following commands should you use to accomplish this goal? Auditpol.exe /get /Category:Object Access” /success:Disable /Failure:Enable” Auditpol.exe /set /subcategory:File System” /success:Enable /failure:Enable” Auditpol.exe /get /Category:Object Access” /success:Disable /Failure:Disable” Auditpol.exe /set /Category:Object Access” /success:Disable /Failure:Enable”Question 33 of 50 34. Which tool is used to manage file servers, including configuring quotas and blockingcertain files? File Screening File Management File Server Resource Manager Quota ManagementQuestion 34 of 50 35. To make your server more stable you decided to use reliability monitor to find faulted application which affect server. When you open Reliability Monitor you did not find any data you can use to troubleshoot faulted application. Which three steps should you take to enable Reliablity Monitor in order you can use it (choose three steps in correct order) 3 Reboot the computer 2 Use the Registry Editor to change the HKEY_LOCAL_MACHINESOFTWAREMicrosoft Enable event subsctiption in Event Viewer. Reliability AnalysisWMIWMIEnable value to 1. Task Scheduler. 1 Open Task Scheduler and enable and run the MicrosoftWindowsRACRacTask in Question 35 of 50 36. Which account runs a service on multiple computers that belong to a cluster and thatautomatically have the password changed on a regular basis? User account Computer account Managed service account Group managed service accountQuestion 36 of 50 37. You have a domain-based namespace called DFS, running Windows Server 2008 Servermode. How do you ensure users can only see files and folders in which the users havepermission to access? Modify the view permissions Disable referrals Enable access-based enumeration Modify the discretionary access control listQuestion 37 of 50 38. You are an administrator of several regional offices. You install WDS on Server1 andcreate three images for each regional office. You want to deploy the images using WDS,but you want to ensure that the administrator for each regional office can view only theimages for his or her regional office. Which of the following actions should you perform? Add all images to an image group and assign administrator permissions to the imagegroup. Create an OU for each regional office and place the computers in the appropriateregional OU. Place the images for each regional office into a separate image group on the WDS server.Then grant each administrator permission to his or her regional office’s image group. Grant each administrator administrative permissions to the images assigned to theregional office.Question 38 of 50 39. Identify the benefits of using Active Directory-integrated zones. (Not all answers will beused.) Customized selected replication Security Fault tolerance Self-healing Efficient replicationQuestion 39 of 50 40. In order of first to last, specify the tasks that must be completed before you can deployupdates using WSUS. (Not all tasks will be required.) 3 Configure the clients to use WSUS using group policies. Configure Internet Options in Internet Explorer to use the proxy server. Add *Microsoft.com* to the Windows firewall to allow all packets. 4 Approve the updates for deployment. 2 Create computer groups. 1 Select the type of updates to download and synchronize updates. Question 40 of 50 41. What are the two default group policies that are already created in Active Directory? Default Computer profile Default User Profile Default Domain Controller Policy Default Domain PolicyQuestion 41 of 50 42. You have a new server called Server1 that you just assigned an IPv6 address. You need toensure that clients can find the server’s address. Which resource record should you use? A SRV CNAME AAAAQuestion 42 of 50 43. Which of the following is the compression algorithm used in DFS Replication foundwith Windows Server 2012? BitLocker EFS Remote differential compression FRSQuestion 43 of 50 44. You have domain contoso.com. You have two domain controllers in your domain Server1 and Server2 built on Windows Server 2012R2. Domain functional level of your domain Windows 2003. Forest functional level Windows Server 2008. You have remote site where you decided to deploy RODC due security requirements. What is the minimum forest functional level for deploying RODC? Windows Server 2008 R2 Windows Server 2012 Windows Server 2008 Windows Server 2003Question 44 of 50 45. Which of the following are reasons not to enable auditing for everything? (Choose allthat apply.) Affects performance of computer Logs quickly fill up Makes it impossible to secure computer Makes it difficult to find relevant eventsQuestion 45 of 50 46. You have a server called Server1 that runs Network Policy Server. Server1 is configuredto use SQL logging. You install Server2, which also runs Network Policy Server. Youwant to make sure that the two servers are configured the same. Therefore, you exportthe NPS settings from Server1 and import the settings into Server2. What should youdo next? Manually configure the SQL logging settings. Create an ODBC data source to a SQL server. Create an ODBC data course to Server1. Restart the Server2.Question 46 of 50 47. You have three NPS servers known as Server1, Server2, and Server3. On Server1, youhave a Remote RADIUS Server Group that contains Server2 and Server3. Server2 andServer 3 are configured to authentication remote users. What do you need to do to configure Server1 to forward RADIUS authentication requests to Server2 and Server3? Create a network policy. Create a connection request policy. Create a health policy. Create a remediation server group.Question 47 of 50 48. You have a domain with four domain controllers. Server1 is a domain controller, DHCPserver, DNS server, and a database server. You need to move the database to anotherdrive. The solution must minimize impact to the users. What should you do? Restart the computer in Save mode. Create an image of the server. Restart the computer in DSRM. Stop the AD DS service.Question 48 of 50 49. You have five domain controllers in your domain. You decided to implement Central Store location for your administrative templates. Where is the Central Store located? C:WindowsCentral C:WindowsPolicyDefinitions C:WindowsStore C:WindowsSYSVOLdomainPoliciesPolicyDefinitionsQuestion 49 of 50 50. You have a main office and 12 branch offices. The users and computers are within asingle domain. All servers are Windows Server 2008 R2 and Windows Server 2012. Youmust make sure that all data is encrypted by using end-to-end encryption. In addition,instead of using usernames and passwords, you need to use computer-level authentication.What should you do? Configure L2TP with IPsec and MS-CHAPv2. Configure SSTP with IPsec and PAP. Configure a PPTP connection and MS-CHAPv2. Configure L2TP with IPsec and EAP-TSL authentication.Question 50 of 50 Loading…