Q1. You need to create a file share for your company that must be accessible from all branch offices and its share path must have the name Work Share. Which server role do you install?
- BranchCache for Network Files
- File Server
- Work Folders
- DFS Namespaces
Q2. You support an IT infrastructure for an organization that has five physical locations and WAN connections from the main office to each branch. You are designing a network where users at all locations have access to shared files, both online and offline. Which Windows technology is best for your design?
- Data Deduplication
- BranchCache
- DFS Replication
- File and Storage Services
Q3. Which type ot DNS record is most commonly used in a forward lookup zone to resolve a host name to a specific IP address?
- an MX record
- an A record
- an RTP record
- a TXT record
- a disk migration
- a disk cleanup
- a disk consolidation
- a disk defragmentation
Q5. A Windows Server 2012 R2 VM is available to use. You created an XML file that includes all the server roles and features you require for a file server. The XML tile is stored at the root of the D: drive. What PowerShell command do you run to configure the server?
-
Install-WindowsServices -ConfigurationFilePath d:\PowerShellConfig.xml
-
Install-WindowsFeature -ConfigurationFilePath d:\root\PowerShellConfigFile.xml
-
Install-WindowsRole -ConfigurationFilePath d:\FileServerConfig.xml
-
Install-WindowsFeature -ConfigurationFiIePath d:\FileServerConfig.xml
Q6. When configuring a CA which role service provides a web interface for users to easily request and renew certificates?
- Network Device Enrollment Service
- Certification Authority Web Enrollment
- Online Responder
- Certificate Enrollment Policy Web Service
Q7. Hyper-V _ is a disaster recovery tool that replicates virtual machines from one Hyper-V host server to another in a Hyper-V Windows Server 2016 environment.
- Manager
- Replica
- Backup
- Data Protection Manager
Q8. You deployed a Windows Server 2012 R2 virtual machine and configured the File and Storage Services server role. Where do you begin configuring the use of Previous Versions for restoring files?
- A
- B
- C
- D
Q9. You have installed the Remote Desktop Services role. Which remote desktop mode comes with two built-in licenses?
- RDA Administration Mode
- RDS Session Mode
- RDS User Mode
- RDA Application Mode
Q10. How would you link a unique users policy made for the Human Resources Department users in your domain?
- Link the GPO to the Human Resources OU.
- Link the GPO to the Default Domain Policy.
- Link the GPO to the domain root
- Link the GPO to the Computers OU.
Q11. You've deployed a Server Core installation of Windows Server 2016. Which is NOT a way to update the server?
- Configure the server to use a WSUS server with Group Policy.
- Run the following command:
Net stop wuauserv %systemroot%\system32\Cscript scregedit.wsf /AU 4 Net start wuauserv
. - Run the following command:
Wusa <updatename>.msu /quiet
. - Install the WSUS server role.
- Print Services
- File Services
- Print and Document Services
- Print Server
- LDAP
- Kerberos
- GC
- PTR
Q14. Your Hyper-V server has two physical disks installed, Disk 1 is a C: drive that hosts the Windows system files, and disk 2 is a D: drive that has no data. You need to connect the D: drive to a newly created VM using a pass-through disk configuration. What is true about the D: drive?
- The physical disk must be in a RAID 6 configuration.
- The physical disk must be reformatted.
- The physical disk must be offline.
- The physical disk must use iSCSI.
Q15. Which Windows Server technology enables replication of volumes between servers or clusters for disaster recovery?
- Storage Replica
- Storage Spaces Direct
- Stretch Cluster
- Storage Spaces
Q16. You are setting up new branch that has 50 client computers, all of which have been joined to the existing Active Directory domain. You deployed a DHCP server and were able to log in with your domain admin credentials, however the local clients are not receiving IP addresses. What is the cause of this issue?
- The DHCP server is not part of the DHCP Servers OU in AD.
- The DHCP server has not been authorized.
- Your domain admin account is not part of the local computer's Administrators group.
- The DHCP server is not part of the AD domain.
Q17. You want to verify that a DHCP server has been authorized use in Active Directory. Which cmdlet do you run in Windows PowerShell?
- Add-DhcpServerInDC
- Get-DhcpServerInDC
- Get-WindowsFeature DHCP
- Instä11-WindowsFeature DHCP
Q18. You log in to the domain controller to manage some user and computer accounts in Active Directory (AS) and you cannot find the AD tools. To resolve this using the Add Roles and Features Wizard, which feature would you install without any unnecessary services?
- Hyper-V Management Tools
- Remove Server Administration Tools
- Active Directory Rights Management Services
- AD DS and AD LDS Tools
Q19. You deploy Windows Server 2012 R2 server as a VPN server and must configure new firewall rules for workstation connections. Which command do you use to configure the new rules with the least amount of effort?
- Use dism.exe from the command prompt.
- Use dsadd.exe from the command prompt.
- Use the New-NetFirewallRule command in PowerShell.
- use the Enable-NetFirewallRule in PowerShell.
Q20. A basic DHCP server can provide clients with an IP address, subnet mask, default gateway, DNS IP address. and what other IP address?
- file server
- WINS server
- WSUS
- proxy server
Q21. When setting up a disaster recovery plan for your Hyper-V virtual machines in a System Center Virtual Machine Manager (VMM) cloud, what happens during the initial replication?
- A Hyper-V VM snapshot is taken.
- Delta replication begins.
- Delta disk changes are logged and merged with the parent disk.
- Virtual hard disks on the VM are replicated to the secondary site.
Q22. You want to secure your Windows server so the built-in web browser can navigate only to sites listed in Internet Explorer's 'trusted sites' list. How can you configure this security capability?
- Go to the Manager and enable IE Enhanced Security Configuration.
- Go to Internet Explorer's Internet Options end add unauthorized website URLs te the 'restricted sites' list.
- Go to Internet Explorer's Internet Options and add authorized website URLs to the 'trusted sites' list.
- Go to the Control Panel and enable user Account Control.
Q23. After adding a network printer to the Windows print server, you try to add the printer to a Windows 8 desktop client. While typing the network path to the new printer, you are unable to find it. Why is the new network printer unavailable for selection?
- You did not add the printer drivers to the print server.
- You did not select the Share the Printer check box.
- You need to re-add the printer to the Print Management console.
- The printer lost connection to the network.
Q24. You built a container image on Nano Server. The container image has multiple layers, including a custom application built for your company, and your development team pushed the image to your Azure image registry. What happens if you attempt to pull that image to a new server with previously downloaded OS images?
- Your custom layers will be pulled from your Azure registry and you will receive an notifying you of the missing base image.
- You will receive an notifying you of the missing base image and you will not be allowed to pull the image.
- All layers will be downloaded from your Azure registry.
- The base OS image layers will automatically be pulled from Microsoft's registry at Docker Hub, and your custom layers will be pulled from your Azure registry.
Q25. You need to configure your DHCP server to deny certain client MAC addresses receiving an IP address. Where do you configure this setting?
- Filters folder
- Policies folder
- Scope Default folder
- Scope Options folder
Q26. Where can you go to restore deleted objects in Active Directory without the use of Microsoft PowerShell or ldp.exe?
- Active Directory Administrative Center
- Active Directory Domains and Trusts
- Active Directory and Computers
- Active Directory Sites and Services
Q27. You have a running Active Directory Certificate Services (AD CS) server and need to back up the certificate databases and private keys. How do you accomplish this?
- Use the certutil.exe command.
- Schedule a full backup of the server.
- Perform a direct copy of database files and private keys to a file share.
- Schedule an incremental backup of the server.
Q28. You must configure set of three DNS IP addresses to be given to clients that receive IP configuration from your DHCP server. The DNS IP will apply to all DHCP created on the server. Where on your DHCP do you configure this setting?
- Server Options
- Scope Options
- Scope Clients
- Policies
Q29. You are working toward managing cross-forest certificate enrollment deployment and need to copy objects in the source forest to the target forest. How do you keep the source and target forest synchronized?
- storage replication
- pkisync.ps1
- site replication
- certificate templates
Q30. A company IIS server will host the corporate site, which is accessible only by company computers. You need to configure this website to use SSL. You obtain a certificate to install on the server. Into which certificate store should you import the server's certificate?
- Trusted Root Certification Authorities under Local Computer
- Trusted Root Certification Authorities under Current User
- Personal under Local Computer
- Client Authentication Computer
Q31. You are preparing a Windows Server 2016 server image for deployment. You want to further customize your server by adding applications and device drivers, and to test your computer in Windows environment. What sysprep.exe parameters would you select when customizing your server image?
- A
- B
- C
- D
Q32. A domain GPO must apply to users based on the location of the computer to which they are logging in. You set up this ability by using which group policy feature?
- inheritance
- administrative
- loopback
- filter
Q33. You are planning to install a SAN that will utilize iSCSI storage. You want to provide automatic discovery, management and configuration of iSCSI devices. After running the Get-WindowsFeature * PowerShell command, which should you install?
- Network Load Balancing
- EnhancedStorage
- iSNS
- Multipath IO
Q34. As you create a new share, you are unable to configure the default classification of data on the folder. Why would the New Share Wizard prevent this configuration?
- The File Resource Manager must be installed.
- The Distributed File System server must also be installed.
- The Windows server license is not compatible with the feature.
- The file share groups must be configured first.
Q35. When installing the AD DS server role, which will NOT be installed as part of the requited features and services for AD DS to run?
- DFS Replication
- DFS Namespaces
- Active Directory Lightweight Directory Services
- File Replication services
- The current address pool is almost depleted and more clients will added.
- Clients will be migrated to a new scope in a phased approach.
- More than one DHCP server wants to manage separate logical IP networks on the same physical network segment.
- A proven failover option is required so clients are always connected.
Q37. You prestaged a computer in Active Directory in a domain controller at company headquarters. After 30 minutes, that new computer object is still not available at the branch office domain What should you run from prompt to get a summary of the AD replication status in your domain from the perspective of all domain controllers?
-
repadmin /replsum
-
repadmin /showrepl *
-
ntdsutil.exe
-
repadmin /queue
Q38. You currently have a DHCP server issuing addresses to clients. Which task should you perform first to set up your DHCP server to dynamically issue addresses to clients on the network?
- Add IPv6 scope.
- Configure an IPv6 address for the interface on the DHCP server.
- Set up Windows client configuration.
- Install the DHCPv6 server role.
Q39. In the Add Roles and Features Wizard window, you are unable to remove Active Directory domain Services—the check box is greyed out. How can you remove AC DS from a Windows Server 2012 R2?
- Click Next and review the Features section.
- Click Previous choose a different server.
- Click Cancel and restart the server.
- Click Cancel and open the Remove Roles and Features Wizard.
- AD CS
- AD FS
- AD DS
- AD LDS
Q41. The first ot root server in a PKI must have the Active Directory Certificate Services installed running which role service?
- Certification Authority Web Enrollment
- Certificate Authority
- Network Device Enrollment Service
- Online Responder
Q42. You have shared folder on your FILESVR01 server. You want to be notified vie email when files are saved in the folder. How do you automate this task?
- Use Storage Reports.
- Use File Management Tasks.
- Use Quota Management.
- Use File Screen Management.
- storage area network
- network attached storage
- hardware security module
- encrypted hard drive
Q44. You are deploying a highly available file server using a Hyper-V cluster configuration. After creating the cluster, why must you add d disk as a cluster shared volume (CSV)?
- to provide nodes in cluster independent VMs slot age location
- to implement fault tolerance zero downtime for the VM
- to protect data from loss
- to prevent nodes in a cluster from accessing a storage location
Q45. When setting up a new RADIUS client, what piece of information verifies a secure and trusted connection with the RADIUS server?
- shared secret
- hash key
- vendor name availability
- authentication methods
Q46. You run a script to encrypt a client computer's hard drive with BitLocker and back up the recovery password to Active Directory. When researching the computer object's properties, you cannot find the BitLocker recovery password. What may be the cause?
- BitLocker Drive Encryption Administration Utilities are not installed on the client computer.
- BitLocker Drive Encryption Administration Utilities are not installed on the domain controller.
- BitLocker Drive Encryption Tools are not installed on the domain controller.
- BitLocker Drive Encryption Tools are not installed on the client computer.
Q47. After running the PowerShell cmdlet Add-WindowsFeature Adcs-Cert-Authority -IncludeManagementTool on a Windows Server 2016 server, which command will make it a Root Certificate Authority (CA)?
- Install-CertificationAuthority
- Install-CertificationAuthority -CAType RootCA
- Install-AdcsCertificationAuthority -CAType EnterpriseRootCA
- Install-AdcsCertificationAuthority -CAType RootCA
Q48. A set of computer and user settings can be applied to multiple clients and servers in a domain through the use of ___
.
- Group Policy Objects
- Microsoft Management Console
- Users and Groups
- Computer Objects
- IP address Management (IPAM) Server
- Network Policy Server (NPS)
- Network Load Balancing
- Web Server (IIS)
Q50. After installing the active directory domain services role to your windows server 2016 OS, how do you promote the server to a domain controller using the GUI?
- Open mmc.exe
- Run dcpromo.exe
- Click Add Roles and Features.
- Click the notification flag in the Server Manager windows.
Q51. You want to host two virtual machines on the same physical server. Their memory settings in Hyper-V are set to optimize the use of physical memory for each virtual machine. What makes this optimization possible?
- dynamic memory
- memory buffer
- virtual memory
- ReadyBoost
Q52. Group policy objects are not being applied to domain controllers because the Default Domain Controllers and Default Domain group policies are corrupt. What can you run in a command prompt to recover them?
- dcgpofix.exe
- dcdiagfix.exe
- ntdsutil.exe
- dcpromo.exe
- DFS
- RDS
- IIS
- AD DS
Q54. You want to ensure there are redundant DHCP services available for your network. What should you set up on your server to make this possible?
- create new multicast scope
- create new superscope
- replicate failover scopes
- configure failover
Q55. Two companies with different names and domains are merging. What do you set up to ensure that name resolution requests are forwarded directly to the other company's authoritative server?
- DNS conditional forwarder
- DNS secondary zone
- DNS forward lookup zone
- DNS reverse lookup zone
Q56. You have installed the Remote Desktop Services role. Which remote desktop mode comes with two built-in licenses?
- RDA Administration Mode
- RDS Session Mode
- RDS User Mode
- RDA Application Mode
- The issuing CA servers are placed in different geographical locations.
- The intermediate or policy CA server is offline.
- The root CA server is offline.
- Only FIPS-compliant hardware security modules are used.
Q58. What type of CAs must be domain members and are typically online to issue certificates or certificate policies?
- Client
- Enterprise
- Root
- Standalone
Q59. Windows Server 2012 R2 server has two network adapters. You are required to configure load balancing on a pair of network adapters. Which management console would you use to accomplish this task?
- the Terminal Services Manager console
- the Group Manager console
- the Remote Desktop Manager console
- the Server Manager console
Q60. You set up a storage area network that makes use of iSCSI storage. You then install the iSNS Server service feature on Windows Server 2012 R2. Why do you need this feature?
- to provide discovery services of iSCSI devices
- to view information about host bus adapters
- to manage RAID storage volumes
- to set up storage Fibre Channels
Q61. Using Storage Pools under Files and Storage Services, you configure a mixture of SSD (solid state disk) and HDD (hard disk drive) for tiered storage by creating what?
- multitenancy volumes
- storage pools
- parity volumes
- storage spaces
- Click Server, above Volumes.
- Click Tools.
- Type a computer name in the filter text box.
- Click Manage.
Q63. You need to make assignments to other admins to manage certificate templates in a multidomain forest. What change is required in Active Directory?
- You must create a group in Active Directory and add that group to the security properties of the CA server in the Certificate Authority console.
- Add a group or user to the Certificate Templates property security tab from the configuration partition of your domain using ADSI.
- Add the domain group or user account to the CA root server's local Administrator group.
- The domain group or user account must be given Read and Enroll security permission.
Q64. Your organization has the main datacenter on the west side of North America. A secondary site is located on the east side, where data is replicated from west to east. During a disaster recovery, your organization can pick up operations at the east datacenter in about one to two hours. In an official disaster recovery plan document, the east datacenter is referred to as what type of site?
- far
- backup
- warm
- cold
Q65. You currently have a Windows Server 2008 R2 print server named PRT01. You deploy a Windows Server 2012 R2 print server named PRT02. How do you begin the migration process?
- Run the
printbrm -b
command on PRT02 - Run the
printbrm -b
command on PRT01 - Run the
printbrm -r
command on PRT01 - Run the
printbrm -q
command on PRT02
Q66. Your organization wants to design a disaster recovery plan with two geographical sites. The two sites must be up in an active/active configuration, and some or all services should be able to failover seamlessly. Which Storage Replica configuration would you setup with your Windows Server 2016 systems?
- Cluster-to-Cluster
- Server-to-Server
- Storage Replica is incompatible.
- Stretch Cluster
Q67. Suppose you want to deploy a new Windows Server. You want an installation that has a reduced attack surface and more efficient use of memory and disk space. Which installation option would you use?
- Windoes Server Datacenter
- Windows Server Minimal Server Interface
- Windows Server (Desktop Experience)
- Windoes Server Core
- Print and Remote Services
- Print and File Services
- Print and Document Services
- Print and Network Services
Q69. Your environment consists of legacy devices that use NetBIOS names. In the Add Roles and Features Wizard, which feature allows other computers and users to search and find these legacy devices through the wireless LAN?
- Wireless LAN Service
- WINS Server
- Windows Search Service
- Windows Identity Foundation 3.5
Q70. You work at a company with an Enterprise environment operating on Windows Server 2008. Sixty percent of the servers have 64-bit CPUs; the rest are 32-bit. Management has decided to upgrade to Windows Server 2012 R2. The budget for this upgrade is small. What would be your recommendation for a successful deployment of Windows Server 2012 R2 operating systems?
- Do not upgrade to Windows Server 2012 R2, as it would exceed the allocated budget.
- Upgrade servers with 64-bit CPUs only, and discard servers with 32-bit CPUs.
- Upgrade servers with 32-bit CPUs only.
- Upgrade servers with 32-bit CPUs to 64-bit CPUs before proceeding.
Q71. Which of the following is not an option for evaluating Storage Spaces Direct in Windows Server 2016?
- Hyper-V virtual machines
- Validated server configuration from a partner
- Any computer that has a hard disk
- Existing hardware if it meets the requirements
- It will run on the Server 2016 but cannot be moved back to the Server 2012
- It will fail because the configuration of the virtual machine has to match the 2016 version
- It will automatically update the virtual machine configuration to the 2016 version
- The virtual machine configuration is not updated so it can be moved back to the Server 2012
- Is only possible if you install it without the Desktop Experience
- Is only possible if you install it as Standard
- Is possible but it will not activate after installation
- Is not possible
- They allow an administrator to enforce policy settings by assigning a template to a group of relying parties
- They allow adding Windows Server 2016 nodes to the existing farm while minimizing farm downtime
- They make it easier to migrate from Active Directory Federation Services in Windows Server 2012 R2
- They allow to add a new Windows Server 2016 Federation Servers to an existing
- SET Architecture
- RAS Gateway
- NIC Teaming
- Flow Engine
Q76. The _ feature helps prevent malicious users from starting the denial of service attacks by using your DNS servers.
- IPv6 Root Hints
- Unknown Record Support
- DNS-Based Authentication of Names Entities
- Response Rate Limiting
Q77. A user is added to multiple time-bound groups. His Kerberos ticket-granting ticket lifetime will be the _.
- Lowest time-to-live among all groups
- Sum of the time-to-live values across all groups
- Highest time-to-live among all groups
- None of these answers
Q78. Which Hyper-V switch feature helps you set up a virtual machine as a virtual appliance and direct specific VLAN traffic to it?
- Internet Protocol v6
- Trunk mode to a virtual machine
- Network traffic monitoring
- Isolated VLANs
- Neither the server-to-server and cluster-to-cluster
- Only the cluster-to-cluster
- Only the server-to-server
- Both the server-to-server and cluster-to-cluster
- Object-Oriented PowerShell syntax
- Active Memory Dumps
- Cluster OS Rolling Upgrade
- Network Name Diagnostics
- You need a compute cluster with the Hyper-V role enabled
- You need a computer cluster that has at least one server with the Hyper-V role enabled
- You need Hyper-V configured using Cluster Shared Volumes for storage
- You don't actually need a Scale-Out File Server cluster functioning as a storage cluste
Q82. When doing a bare metal restore of your Windows Server 2012 R2 server, how would you recover your system from an image?
- Boot into Windows Recovery Environment.
- Use a third-party backup tool.
- Run wbadmin.msc from a command prompt.
- Add additional physical disks to the server.