You have been asked to rename the domain from BCDTRAIN.COM to MEASUREUP.NET. You confirm that there are up-to-date backups of the domain, and then you create a new DNS zone for MEASUREUP.NET on the existing DNS servers. What is the next step you should do in the domain rename process?
You want to use the existing deployment of Microsoft System Center Virtual Machine Manager (SC VMM) 2012 to deploy a number of Virtual Guest machines that run Microsoft Windows Server 2012 R2. To do this, you want to create a Guest Operating System profile that includes Windows Server 2012 R2. What is the first thing you need to do to achieve this?
As part of expanding to an additional level in the building, the company wants to ensure that DHCP is correctly configured. You want to create a new DHCP scope that is similar to the current one. What tool should you use? (More than one answer choice may be correct. Choose the BEST answer.)
You determine that it is configured to use Active Directory credentials, and that the "Enable Windows 7 client computers to connect via DirectAccess option is selected. You need to ensure that all end user machines are able to connect to the network remotely. The cost and effort necessary to accomplish this must be kept to a minimum. What should you do? (More than one answer choice may be correct. Choose the BEST answer.)
You are the IT administrator for your company. You are planning an installation of the Microsoft Windows Server 2012 R2 IP Address Management (IPAM) Server. You want to use IPAM to monitor multiple DHCP servers on your network. You plan to deploy an IPAM server in each branch office, configured to manage the network in that office. You want to ensure that the loss of a single IPAM server does not prevent you from managing the network. What is the easiest, most cost-effective way to do this?
You are deploying a virtual machine (VM) on Azure IaaS. The deployment needs to support at least 500 GB of storage. What type of Azure storage is required?
You are an administrator for your company's network. In order to meet projected use requirements, the company is migrating some of its server resources to Azure laaS. You deploy a computer running Microsoft Windows Server 2012 R2 with Routing and Remote Access Service (RRAS) installed and configured. You deploy the RRAS server outside your perimeter network. You configure traffic filters through the RRAS Setup Wizard. You want to support an L2TP/IPSec connection between the RRAS server and the perimeter network. You need to configure the firewall to support the connection. Which ports (inbound and outbound) need to be open on the firewall? (Each correct answer presents part of the solution. Choose all that apply.)
You manage an Active Directory Domain Services (AD DS) domain named example.com. All domain controllers are running Microsoft Windows Server 2012 R2. The forest functional level is Windows Server 2003. The domain functional level is Windows Server 2008. You plan to implement compound authentication for Dynamic Access Control. Which step should you perform first?
You manage the server infrastructure for your company. You are planning a Microsoft Windows Server 2012 R2 deployment. You need to prepare multiple Windows images for deployment on computers with different hardware configurations. You need to generalize the image as part of an unattended installation. What should you do?
- B. Configure the Microsoft-Windows-Deployment I Generalize command in the auditUser configuration pass.
- C. Run sysprep by using a Microsoft-Windows-Deployment I RunSynchronous command in the auditUser configuration pass.
You are the IT administrator for your company. You are planning a deployment of Network Access Protection (NAP) to ensure that computers have up to date protection when they connect to your network. As you are evaluating the various methods of NAP available to you, you decide that you want to make sure that all NAP-related communication is authenticated. You do not currently have a solution that authenticates traffic on your network. Which method of NAP enforcement would NOT be suitable?
You are one of several IT administrators at your company. You have been asked to design an organizational unit structure to support Group Policy. There are four departments in your company. You want to ensure that each user has a drive mapped to their departmental shared folder. You have created five Group Policy objects. One contains all of the common settings that should apply to all users. The other four Group Policy objects contain the specific drive mapping settings for each department. How should you assign the Group Policy objects to achieve the desired result?
- A. Copy all settings from the common policy to the four department-specific Group Policy objects. Configure Enforce Settings on the four departmental policies.
- B. Link all five Group Policy objects to the organizational unit that holds the user objects. Enable Block Policy Inheritance on the same organizational unit.
- C. Link all five Group Policy objects to the organizational unit that holds the user objects. Configure Item Level Targeting on the four departmental policies based on group membership.
You are an administrator for an Active Directory Domain Services (AD DS) domain that includes a main office and a branch office. The branch office connects to the main office and the Internet through a limited bandwidth connection through a perimeter network. Users in the branch office need access to data stored on a file server in the main office and in a cloud data center. Different users often need access to the same data. You need to minimize the bandwidth necessary to support data access in the branch office. What should you do?
You are setting up a host cluster on a computer running Microsoft Windows Server 2012 R2 with the Hyper-V role installed. You are using System Center 2012 R2 Virtual Machine Manager (VMM) to configure the host cluster. You are planning to use a file server running Windows Server 2012 R2 to store the operating system and shared storage files for the cluster virtual machines. You want to ensure that the .vhdx file used for shared storage is kept on an SSD disk and not moved to HDD storage. What should you do?
You manage your company's domain controllers. You want to monitor the replication status of your Active Directory Domain Services domain controllers. Which command-line tool can you use for this?
You are the IT administrator for your organization. Your company has recently opened a small branch office to support a new initiative, and five people work in the office. It is connected via a low speed connection. You have deployed a domain controller in the new office. However, when the WAN connection fails, users report that they are unable to log on to their machines. What can you do to enable users to log on when the WAN connection has failed?
You are deploying an IPSec enforcement method for a client. You are configuring the Health Registration Authority (HRA) server on the network. You want to ensure that all client computers are checked and issued certificates if they meet the health conditions, whether they are part of the Active Directory Domain Services domain or not. How should you achieve this?
You manage an Active Directory Domain Services (AD DS) domain named example.com. The domain functional level is Windows 2008. All domain controllers run a Server Core installation of Microsoft Windows Server 2012. You need to raise the domain functional level to Windows Server 2012. You need to perform this task locally on the domain controller. Which tool should you use?
- A. Ntdsutil.exe
- B. LDP.exe
You are an administrator for an Active Directory Domain Services (AD DS) domain. You recently acquired another company and have migrated its users and resources to your domain. You then decommissioned the acquired domain. The company you acquired included two servers running UNIX. You have physically relocated these servers to your main office and want to give them access to shared storage on a computer running Microsoft Windows Server 2012 configured as a file server named FSSrc. You install and configure Server for Network File System (NFS) on FSSrc. You configure NFS shares and identify the UNIX servers as belonging to an NFS client group that has access to the NFS shares. You need to configure the authentication type used when authenticating the UNIX servers. What should you do?
You are the IT administrator for your organization. You are designing a DHCP strategy. Which of the following options would you select for lease duration for laptop devices operating remotely from the corporate network?
You are the IT administrator for your organization. Your security team alerts you to the fact that unauthorized devices are being connected to your network in one of your branch offices and are being given IP addresses by the DHCP server in the headquarters. They ask you to prevent this from happening. You confirm with your PC supplier that all devices have network interface cards from the same manufacturer. You determine that the unauthorized devices have network interface cards from other manufacturers. What should you do?
You are consulting for a local IT organization that is investigating the use of Windows Deployment Services (WDS) to build the servers in the company's datacenter. The organization has already deployed Microsoft Windows Server 2008 R2 Active Directory Domain Services (AD DS). The AD DS infrastructure also hosts the company's DNS. DHCP is delivered by its network hardware. What else does the organization need to do in order for WDS to work?
You manage the server infrastructure for your company. A server named Serverl runs Microsoft Windows Server 2008 R2 with Hyper-V role installed. You migrated the Hyper-V role from Server1 to a new server named Server2 that runs Microsoft Windows Server 2012 R2. After the migration you noticed that migrated virtual machines have no network connectivity. What is cause of this issue?
- B. Virtual networks on Server2 must be modified to map to the appropriate physical network adapters.
You manage the Active Directory Domain Services (AD DS) domain infrastructure for your company. The domain controller is a server named DC1 that runs Microsoft Windows Server 2012 R2. The network includes a workstation named Computer! that runs Microsoft Windows 8. You run the Search-ADAccount -LockedOut cmdlet from Computer1 to find all locked accounts in the domain. You receive the error message below: Search-ADAccount : The term 'Search-ADAccount is not recognized as the name of a cmdlet, function, script file, or operable program. Check the spelling of the name, or if a path was included, verify that the path is correct and try again. At line:1 c hart Search-ADAccount -LockedOut ▪ Category Info : ObjectNotFound: (Searc h-ADAccount:String) CommandNotFoundException ▪ FullyQualifiedErrorld : CommandNotFoundException You need to search for locked accounts from Computer1. What should you do first to resolve the issue?
You manage the server infrastructure for your company. You plan to deploy DirectAccess using Microsoft Windows Server 2012 R2. You need to identify the requirements for using the IP-HTTPS protocol for IPv6 transition. Which of these statements is correct?
You are the IT administrator for your company. Your company purchases a single regional office of a competitor. You are tasked with merging the IT infrastructures of the two organizations. You are assigned as a system administrator for the company and want to plan how you will merge the two Active Directory Domain Services (AD DS) instances. What should you do to provide users in the newly-acquired office the ability to log on to your company's existing computer systems?
- A. Demote the new office's domain controllers and promote them as domain controllers in your existing domain.
You are consulting with a large enterprise that is deploying a new Microsoft Windows Server 2012 R2 environment. The IT staff has decided that they want to use an exclusively IPv6 network. They have a single line-of-business application that currently relies on WINS for name resolution, since it does not support entering a FQDN in the configuration file. This application must be available in the new environment. What should you advise them to do to ensure that the application works in the new environment with as little manual administration as possible?
You are the IT administrator for your company. You are considering deploying Data Deduplication for your organization. Your file server has four drive letters, as follows: * The C: drive is the system drive. * The D: drive holds small (< 16KB) image files used on the company intranet. * The E: drive holds large Microsoft PowerPoint company presentations. * The F: drive holds encrypted company documents. Which drive(s) would benefit from being configured for Data Deduplication?
You are consulting for a small business. They are planning to upgrade their network to Microsoft Windows Server 2012. They do not currently have a good understanding of what servers and PCs have been deployed. All servers and PCs are located in the same building. Servers all run on one subnet and PCs are all on another subnet. DHCP is used to deliver IP addresses to PCs. Some PCs are joined to the corporate domain, but others have been purchased directly by business units and do not have a corporate build on them, so run in a workgroup mode. There is no management infrastructure in place. PCs and servers are supported by a team of helpdesk staff. You decide to use the Microsoft Assessment and Planning (MAP) toolkit to gather information about the environment. Which discovery method should you use?
You have deployed Network Access Protection (NAP) on a company network. All servers run Microsoft Windows Server 2012. All client computers run Microsoft Windows 8 or Windows 8.1. You need to configure a client computer by specifying a uniform resource locator (URL) of a Health Registration Authority (HRA). You need to accomplish this from the command line. Which command should you use?
You manage a server named Serverl, which runs Microsoft Windows Server 2012 R2 with the Dynamic Host Configuration Protocol (DHCP) server role installed. The client network consists of one IP subnet and contains both thin clients and voice over IP (VolP) phone devices. Thin client devices are automatically configured during the boot process by using the configuration file stored on the TFTP server. The TFTP server name is specified in the DHCP options. VolP administrators are planning to implement the same infrastructure to manage VoIP phones during the boot. During the testing they determined that VoIP phones are not compatible with the TFTP server used to configure thin clients. You need to recommend a solution that allows VoIP phones to receive a configuration from a separate TFTP server during the boot. The solution must use the least amount of administrative effort. What should you recommend?
About Individual Course:
|Learning Style||Self-Paced Learning|
|Course Duration||1 Hour|