arse

1. You have a group managed Service Account name, Account01. Only three servers named Server01, Server02, and Server03 are allowed to use Account01 service account. You plan to decommission Server01. You need to prevent Server01 from using the Account01 service account.

The solution must ensure that Server02 and Server03 continue to use the Account01 service account. What command should you run? To answer, select the appropriate options in the answer area.

Question 1 of 50

2. Active Directory Recycle Bin is enabled. You discover that a support technician accidentally removed 100 users from an Active Directory group named Group1 an hour ago. You need to restore the membership of Group1. What should you do?

Question 2 of 50

3. You configure server1 for SSL for all WSUS metadata by using a CA. Server2 must sync from server1.

What should you do?

Question 3 of 50

4. Your Network contains one Active Directory domain, named contoso.com.
You pilot Direct Access on the network.
During the pilot deployment, you enable Direct Access only for a group, ContosoTest Computers. Once the pilot is complete, you need to enable Direct Access for all the client computers in the domain.
What should you do?

Question 4 of 50

5. Your network contains an Active Directory domain, named contoso.com.
All user accounts reside in an organizational unit (OU), named OU1.
All of the users in the marketing department are members of a group, named Marketing.
All of the users in the human resources department are members of a group, named HR.
You create a Group Policy object (GPO), named GPO1.
You link GPO1 to OU1.
You configure the Group Policy preferences of GPO1 to add two shortcuts, named Link1 and Link2, to the desktop of each user.
You need to ensure that Link1 only appears on the desktop of client computers that have more than 80 GB of free disk space and Link2 only appears on the desktop of client computers that have less than 80 GB of free disk space.
What should you configure?

Question 5 of 50

6. Your Network contains an Active Directory domain, named contoso.com.
All domain controllers run Windows Server 2012 R2. A central store is configured on the domain controller, named DC1. You have a custom administrative template file, App1.admx. App1.admx contains application settings for an application, App1.
You copy App1.admx to the central store.

You create a Group Policy object (GPO), named App1_Setting. When you edit App1_Settings, you receive the warning massage shown below:

An appropriate recourse file could not be found for file \contoso.comSysVolcontoso.comPoliciesDefinationsApp1.admx (error =2):
The system cannot find the file specified.

You need to ensure that you can edit the settings for App1_Settings GPO.
What should you do?

Question 6 of 50

7. Your network contains a single Active Directory domain, named contoso.com. All domain controllers run Windows Server 2012. The domain contains 400 desktop computers that run Windows 8, and ten desktop computers that run Windows XP Service Pack 3 (SP3). All new desktop computers that are added to the domain run Windows 8. All of the desktop computers are located in an organizational unit (OU), named OU1. You create a Group Policy object (GPO), named GPO1. GPO1 contains start-up script settings.

You link GPO1 to OU1. You need to ensure that GPO1 is applied only to computers that run Windows XP SP3. What should you do?

Question 7 of 50

8. Computer1 is located in an OU and in GPO1. User1 is in another OU and in GPO2. To ensure you can apply GPO1 to User1. what should you do?

Question 8 of 50

9. Your network contains multiple Active Directory sites. You have a Distributed File System (DFS) namespace that has a folder target in each site. You discover that some client computers connect to DFS targets in other sites. You need to ensure that the client computers only connect to a DFS target in their respective site. What should you modify?

Question 9 of 50

10. Your network contains an Active Directory domain, named contoso.com. All domain controllers run either Windows Server 2008 or Windows Server 2008 R2. You deploy a new domain controller, named DC1, that runs Windows Server 2012 R2. You log on to DC1 by using an account that is a member of the Domain Admins group. You discover that you cannot create Password Settings objects (PSOs) by using Active Directory Administrative Center.

You need to ensure that you can create PSOs from Active Directory Administrative Center.

What should you do?

Question 10 of 50

11.

Your network contains an Active Directory domain, named contoso.com. The domain contains a read-only domain controller (RODC), named RODC1.

You create a global group, named RODC_Admins.

You need to provide the members of RODC_Admins with the ability to manage the hardware and the software on RODC1.

The solution must not provide RODC_Admins with the ability to manage Active Directory objects.

What should you do?

 

Question 11 of 50

12.

Your network contains an Active Directory domain, named contoso.com. The domain contains a domain controller, named DC1 that runs Windows Server 2012 R2.

You create an Active Directory snapshot of DC1 each day.

You need to view the contents of an Active Directory snapshot from two days ago.

What should you do first?

 

Question 12 of 50

13.

Your network contains an Active Directory domain, named contoso.com. All domain controllers run Windows Server 2012 R2.

In a remote site, a support technician installs a server, named DC10, that runs Windows Server 2012 R2. DC10 is currently a member of a workgroup.

You plan to promote DC10 to a read-only domain controller (RODC).

You need to ensure that a user, named Contoso\User1, can promote DC10 to a RODC in the contoso.com domain. The solution must minimize the number of permissions assigned to User1.

What should you do?

 

 

Question 13 of 50

14. Your network contains an Active Directory domain named contoso.com. The domain contains more than 100 Group Policy objects (GPOs). Currently, there are no enforced GPOs.

You have two GPOs linked to an organizational unit (OU), named OU1.

You need to change the precedence orders of the GPOs.

What should you use?

 

Question 14 of 50

15. Your network contains an Active Directory domain, named contoso.com. The domain contains more than 100 Group Policy objects (GPOs). Currently, there are no enforced GPOs.

The domain is renamed to adatum.com. Group Policies no longer function correctly.

You need to ensure that the existing GPOs are applied to users and computers. You want to achieve this goal by using the minimum amount of administrative effort.

What should you use?

 

Question 15 of 50

16.

Your network contains an Active Directory domain, named contoso.com. The domain contains a server, named Server1, that runs Windows Server 2012 R2. Server1 has the Remote Access server role installed.

You log on to Server1 by using a user account, named User2.

From the Remote Access Management Console, you run the Getting Started Wizard and you receive the warning message shown below.

Configure Remote Access

You need to ensure that you can configure DirectAccess successfully. The solution must minimize the number of permissions assigned to User2.

To which group should you add User2?

 

 

Question 16 of 50

17.

Your network contains an Active Directory domain, named contoso.com.

You need to install and configure the Web Application Proxy role service.

What should you do?

 

Question 17 of 50

18.

Your network contains an Active Directory domain, named contoso.com. The domain contains a server, named Server1. Server1 is configured as a VPN server.

You need to configure Server1 to perform network address translation (NAT).

What should you do?

 

Question 18 of 50

19. You have a DNS server, named Served, that has a Server Core Installation on Windows Server 2012 R2.

You need to view the time-to-live (TTL) value of a name server (NS) record that is cached by the DNS Server service on Server1.

What should you run?

 

 

Question 19 of 50

20.

You have a DNS server, named DN51, that runs Windows Server 2012 R2.

On DNS1, you create a standard primary DNS zone, named adatum.com.

You need to change the frequency that secondary name servers will replicate the zone from DNS1.

Which type of DNS record should you modify?

 

Question 20 of 50

21.

Your network contains an Active Directory domain, named contoso.com. The domain contains three servers. The servers are configured as shown in the following table.

table

You need to ensure that end-to-end encryption is used between clients and Server2 when the clients connect to the network by using DirectAccess.

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

 

Question 21 of 50

22.

Your network contains an Active Directory forest. The forest contains two domains, named contoso.com and fabrikam.com. All of the DNS servers in both of the domains run Windows Server 2012 R2.

The network contains two servers, named Server1 and Server2. Server1 hosts an Active Directory-integrated zone for contoso.com. Server2 hosts an Active Directory-integrated zone for fabrikam.com. Server1 and Server2 connect to each other by using a WAN link.

Client computers that connect to Server1 for name resolution cannot resolve names in fabnkam.com. You need to configure Server1 to support the resolution of names in fabnkam.com.

The solution must ensure that users in contoso.com can resolve names in fabrikam.com if the WAN link fails.

What should you do on Server1?

 

Question 22 of 50

23.

Your network contains two servers, named Server1 and Server2. Both servers run Windows Server 2012 R2 and have the DNS Server server role installed.

On Server1, you create a standard primary zone, named contoso.com.

You need to ensure that Server2 can host a secondary zone for contoso.com.

What should you do from Server1?

 

Question 23 of 50

24.

Your network contains an Active Directory domain, named contoso.com. The domain contains a Web server, named www.contoso.com. The web server is available on the Internet.

You implement DirectAccess by using the default configuration. You need to ensure that users never attempt to connect to www.contoso.com by using DirectAccess.

The solution must not prevent the users from using DirectAccess to access other resources in contoso.com.

Which settings should you configure in a Group Policy Object (GPO)?

 

Question 24 of 50

25.

Your network contains a server, named Server1, that has the Network Policy and Access Services server role installed.

All of the network access servers forward connection requests to Server1.

You create a new network policy on Server1.

You need to ensure that the new policy applies only to connection requests from the 192.168.0.0/24 subnet

What should you do?

 

Question 25 of 50

26.

You manage a server that runs Windows Server 2012 R2. The server has the Windows Deployment Services server role installed.

You start a virtual machine, named VM1, as shown below.

PXE

You need to configure a pre-staged device for VM1 in the Windows Deployment Services console.

Which two values should you assign to the device ID? (Each correct answer presents a complete solution. Choose two.)

 

 

Question 26 of 50

27.

You have a server, named Server1, that runs Windows Server 2012 R2.

On Server1, you configure a custom Data Collector Set (DCS), named DCS1. DCS1 is configured to store performance log data in C:\Logs. You need to ensure that the contents of C:\Logs are deleted automatically when the folder reaches 100 MB in size.

What should you configure?

 

Question 27 of 50

28.

Your network contains an Active Directory domain, named contoso.com.

The domain contains a server, named Server1, that runs Windows Server 2008 R2.

You plan to test Windows Server 2012 R2 by using native-boot virtual hard disks (VHDs). You have a Windows image file, named file1.wim.

You need to add an image of a volume to file1.wim. What should you do?

 

Question 28 of 50

29.

You have Windows Server 2012 R2 installation media that contains a file, named Install.wim.

You need to identify which images are present in Install.wim.

What should you do?

 

Question 29 of 50

30.

You have a file server that has the File Server Resource Manager role service installed.

You open the File Server Resource Manager console as shown in below:

FileServerResourceManager

You need to ensure that all of the folders in Folder1 have a 100-MB quota limit.

What should you do?

 

 

 

Question 30 of 50

31.

Your network contains an Active Directory forest, named contoso.com.

The domain contains three servers. The servers are configured as shown in the following table.

Table2

 

You plan to implement the BitLocker Drive Encryption (BitLocker) Network Unlock feature.

You need to identify which server role must be deployed to the network to support the planned implementation.

Which role should you identify?

 

Question 31 of 50

32.

Your network contains an Active Directory domain, named contoso.com. The domain contains five servers. The servers are configured as shown in the following table.

Table3

All desktop computers in contoso.com run Windows 8 and are configured to use BitLocker Drive Encryption (BitLocker) on all local disk drives.

You need to deploy the Network Unlock feature. The solution must minimize the number of features and server roles installed on the network.

To which server should you deploy the feature?

 

Question 32 of 50

33.

Your network contains an Active Directory domain, named contoso.com. The domain contains a domain controller, named DC1.

You run ntdsutil as shown below.

DISM

You need to ensure that you can access the contents of the mounted snapshot.

What should you do?

 

 

 

Question 33 of 50

34.

Your network contains an Active Directory domain, named contoso.com. All domain controllers run Windows Server 2012 R2.  You create a central store for Group Policy.

You receive a custom administrative template, named Template1.admx.

You need to ensure that the settings in Template1.admx appear in all new Group Policy objects (GPOs).

What should you do?

Question 34 of 50

35.

Your network contains an Active Directory domain, named contoso.com. Network Access Protection (NAP) is deployed to the domain.

You need to create NAP event trace log files on a client computer.

What should you run?

 

Question 35 of 50

36.

Your network contains two Active Directory forests, named adatum.com and contoso.com. The network contains three servers. The servers are configured as shown in the following table.

Table4

You need to ensure that connection requests from adatum.com users are forwarded to Server2 and connection requests from contoso.com users are forwarded to Server3.

Which two should you configure in the connection request policies on Server1? (Each correct answer presents part of the solution. Choose two.)

 

Question 36 of 50

37. You have a server, named Server1, that runs Windows Server 2012 R2.

You need to configure Server1 to create an entry in an event log when the processor usage exceeds 60 percent.

Which type of data collector should you create?

 

 

Question 37 of 50

38.

You have a server that runs Windows Server 2012 R2.

You have an offline image, named Windows2012.vhd, that contains an installation of Windows Server 2012 R2.

You plan to apply several updates to Windows2012.vhd.

You need to mount Wmdows2012.vhd to D:\Mount.

Which tool should you use?

 

Question 38 of 50

39.

Your network contains an Active Directory domain, named contoso.com. The domain contains six domain controllers. The domain controllers are configured as shown in the following table.

table5

The network contains a server, named Server1, that has the Hyper-V server role installed. DC6 is a virtual machine that is hosted on Server1.

You need to ensure that you can clone DC6.

 

Question 39 of 50

40.

Your network contains an Active Directory domain, named contoso.com. Domain controllers run either Windows Server 2003, Windows Server 2008 R2, or Windows Server 2012 R2. A support technician accidentally deletes a user account, named User1.

You need to use tombstone reanimation to restore the User1 account.

Which tool should you use?

 

Question 40 of 50

41.

You have a server, named Server1, that runs Windows Server 2012. Server1 has the Remote Access server role installed. On Server1, you create a network policy, named PPTP_Policy.

You need to configure PPTP_Policy to apply only to VPN connections that use the PPTP protocol.

What should you configure in PPTP_Policy?

 

Question 41 of 50

42.

Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in the series. Information and details provided in a question apply only to that question.

Your network contains one Active Directory domain, named contoso.com. The forest functional level is Windows Server 2012. All servers run Windows Server 2012 R2. All client computers run Windows 8.1.

The domain contains 10 domain controllers and a read-only domain controller (RODC), named RODC01. All domain controllers and the RODC are hosted on a Hyper-V host that runs Windows Server 2012 R2.

You need to identify which domain controller must be online when cloning a domain controller.

Which cmdlet should you use?

 

Question 42 of 50

43.

Note: This Question is part of series of question that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in the series. Information and detailed provided in a question apply only to that question.

You network contains one Active Directory domain, named contoso.com. The forest functional level is Windows Server 2012. All servers run Windows Server 2012 R2. All client computers run Windows 8.1.

The domain contains 10 domain controllers and a read-only domain controller (RODC), named RODC01. All domain controllers and RODCs are hosted on a Hyper-V host that runs Windows Server 2012 R2.

You need to identify whether the members of the protected Users group will be prevented from authenticating by using NTLM.

Which cmdlet should you use?

 

 

Question 43 of 50

44.

Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in the series. Information and details provided in a question apply only to that question.

Your network contains one Active Directory domain, named contoso.com. The forest functional level is Windows Server 2012. All servers run Windows Server 2012 R2. All client computers run Windows 8.1.

The domain contains 10 domain controllers and a read-only domain controller (RODC), named RODC01. All domain controllers and the RODC are hosted on a Hyper-V host that runs Windows Server 2012 R2.

You need to identify which security principals are authorized to have their password cached on RODC1?

Which cmdlet should you use?

 

Question 44 of 50

45.

Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in the series. Information and details provided in a question apply only to that question.

Your network contains one Active Directory domain, named contoso.com. The forest functional level is Windows Server 2012. All servers run Windows Server 2012 R2. All client computers run Windows 8.1.

The domain contains 10 domain controllers and a read-only domain controller (RODC), named RODC01. All domain controllers and the RODC are hosted on a Hyper-V host that runs Windows Server 2012 R2.

Determine what domain controller needs to be online to promote a RODC.

Which cmdlet should you use?

 

Question 45 of 50

46.

You have a DNS server that runs Windows Server 2012 R2. The server hosts the zone for contoso.com and is accessible from the internet.

You need to create a DNS record for the Sender Policy Framework (SPF) to lists that are authorized to send email for contoso.com

Which type of record should you create?

 

 

 

Question 46 of 50

47.

Your network contains an Active Directory domain, named contoso.com. All client computers connect to the Internet by using a server that has Microsoft Forefront Threat Management Gateway (TMG) installed. You deploy a server, named Server1, that runs Windows Server 2012.

You install the Windows Server Update Services server role on Server1. From the Windows Server Update Services Configuration Wizard, you click Start Connecting, and you receive the HTTP error message, shown below.

WSUS

You need to configure Server1 to download Windows updates from the Internet.

What should you do?

 

Question 47 of 50

48.

You have a Direct Access Server, named Server1, running Server 2012.

You need to add "prevent users from accessing websites from an Internet connection."

What should you configure?

 

Question 48 of 50

49.

Your network contains an Active Directory domain, named adatum.com. The domain contains a server, named WDS1, that runs Windows Server 2012.

You install the Windows Deployment Services server role on WDS1. You have a virtual machine, named VM1, that runs Windows Server 2012. VM1 has several line-of-business applications installed.

You need to create an image of VM1 by using Windows Deployment Services. Which type of image should you add to VM1 first?

 

Question 49 of 50

50.

Your company has a remote office that contains 600 client computers on a single subnet. You need to select a subnet mask for the network that will support all of the client computers. The solution must minimize the number of unused addresses.

Which subnet mask should you select?

 

Question 50 of 50