Post Assessment 45 questions Flashcards Preview

2018 - 5 - Summer - CET - 2792C_Install and Configure Windows Server > Post Assessment 45 questions > Flashcards

Flashcards in Post Assessment 45 questions Deck (45):
1

Question 1 : You work as a network administrator for uCertify.com.

The company has a Windows Server 2012 single Active Directory domain-based network.

The network has two subnets.

One of the subnets includes a server named UC-SRV01 that hosts DHCP for assigning IP address leases.

DHCP has two scopes to provide IP leases to its clients.

You are required to ensure that DHCP clients on the local subnet can get the DHCP lease from both scopes in UC-SRV01.

What action will you take to accomplish this task?

Do nothing, clients can get the DHCP lease from either scope.

Deactivate one of the scopes.

Install one more DHCP server on the subnet. Put both scopes separately in different servers. Use the 80/20 design rule.

Use a new superscope on UC-SRV01. Include both scopes into the superscope.

Use a new superscope on UC-SRV01. Include both scopes into the superscope.

2

Question 2 : Mark works as a System Administrator for uCertify.com.

The company has a network that includes a server named UC-SERV01 running Windows Server 2012.

Mark wants to increase the security of the UC-SERV01 server by preventing unauthorized applications to get installed.

He logs on to the UC-SERV01 server.

Now, which of the following tools will he use to accomplish the task?

AppLocker

BitLocker

Credential Locker

UAC

AppLocker

3

Question 3 : You work as a network administrator for uCertify Inc.

The company has a Windows Server 2012-based network and an Active Directory domain named uCertify.com.

The company's network includes multiple servers running Windows Server 2012.

A server named UC-SR07 is configured as a DHCP server.

You have created a multicast scope on UC-SR07.

Which of the following describes a reason for creating a multicast scope?

To group multiple scopes as a single administrative entity

To allow the sending of network traffic to a group of endpoints destination hosts

To support remote DHCP clients located on the far side of DHCP and BOOTP relay agents

To fix inconsistencies of incorrectness or missing information for client IP addresses

To allow the sending of network traffic to a group of endpoints destination hosts

4

Question 4 : You work as a System Administrator for uCertify Inc.

You have multiple remote locations connected to your main office by slow satellite links.

You want to install DNS onto these offices so that clients can locate authoritative DNS servers in the main location.

What type of DNS servers should be installed in the remote locations to accomplish the task?

Primary DNS zones

Secondary DNS zones

Active Directory Integrated zones

Stub zones

Stub zones

5

Question 5 : Mark works as Network Administrator for the uCertify.com.

The company has a network with multiple servers running Windows Server 2012.

This network includes two DNS servers named UC-DNS01 and UC-DNS02. .root zone is created in UC-DNS02.

Recently, Mark has received complaints from the users, who are allowed to use UC-DNS02, that they are unable to access Internet websites.

He wants to enable these users to access the Internet.

Which of the following actions will he take to accomplish the task?

Build a new Active Directory Integrated zone on UC-DNS02.

Remove the .root zone from UC-DNS02, and configure conditional forwarding on UC-DNS02.

Delete the current cache.dns file.

Update the cache.dns file and root hints.

Remove the .root zone from UC-DNS02, and configure conditional forwarding on UC-DNS02.

6

Question 6 : Sally works as a Network Administrator for uCertify.com.

The company has a single domain Active Directory network.

The network contains multiple servers running Windows Server 2012.

Sally is running a training program for junior administrator trainees.

She is currently discussing the new VHD format (VHDX).

Which of the following is true about VHDX?

Each correct answer represents a complete solution.

Choose all that apply.

It supports for storage capacity of virtual hard disk up to 64 GB.

It supports for storage capacity of virtual hard disk up to 64 TB.

It provides protection against data corruption during power failure.

It improves alignment of the virtual hard disk format.

It supports for storage capacity of virtual hard disk up to 64 TB.

It provides protection against data corruption during power failure.

It improves alignment of the virtual hard disk format.

7

Question 7 : You are the system administrator for a small Active Directory domain.

Recently, you hired an intern to assist you with managing user objects within the domain.

You want to do the following:
• Provide the intern with permissions to access Active Directory using the Active Directory Users and Computers tool.
• Provide the intern with sufficient permissions to change the properties of user accounts and to create and delete user accounts.
• Provide the intern with the ability to create groups and computers.
• Prevent the intern from being able to make any other changes to the Active Directory environment.
To which of the following groups should you add the user?

Backup Operators

Account Operators

Enterprise Admins

Guests

Account Operators

8

Question 8 : You work as a System Administrator for uCertify Inc.

The company has an Active Directory domain named uCertify.com.

The domain includes a DNS server named UC-SRV01 that runs Windows Server 2012.

You observed that a DNS server's cache has become poisoned, as unauthorized domain names or IP addresses are inserted into it.

You need to clear the DNS server's cache.

Which of the following commands will you use to accomplish the task?

ipconfig /flushdns

dnscmd /zonedelete

ipconfig /renew

dnscmd /clearcache

dnscmd /clearcache

9

Question 9 : On a Windows Server 2012 network, which network protocol cannot be routed?

(Choose all that apply.)

TCP

NetBEUI

SNA

IP

TCP

NetBEUI

SNA

10

Question 10 : Mark works as a System Administrator for uCertify.com.

The company has a multiple domain network with multiple servers running Windows Server 2012.

This network includes a domain server named UC-DOMAIN-SERV01.

Group Policy settings for a user are generally cumulative and inherited from GPOs assigned at the site level, at the domain level, and at the OU level.

Mark has applied GPO settings to all users within the domain UC-DOMAIN-SERV01 at the domain level.

But, Mark does not want to apply these settings to an object residing in this domain.

Which of the following actions will Mark take on the object to accomplish the task?

Enable the Enforced option in the GPO settings.

Enable the Block Inheritance option in GPO settings.

Disable the Enforced option in the GPO settings.

Disable the GPO Status option in GPMC.

Enable the Block Inheritance option in GPO settings.

11

Question 11 : You work as a System Administrator for uCertify Inc.

The company's network includes multiple servers running Windows Server 2012.

You are using the DNS Lint tool to verify records of Domain Name System for a specified domain name.

Now you want to verify a user-defined set of DNS records on multiple DNS servers.

Which of the following commands will you run to accomplish the task?

dnslint /d

dnslint /ql

dnslint /ad

dnslint /c

dnslint /ql

12

Question 12 : Mark works as a System Administrator for uCertify.com.

The company has a network that includes a server named UC-SERV01 running Windows Server 2012.

Mark is creating a new Group Policy Object named UC-GPO for UC-SERV01.

Based on the company's network security guideline, he wants to apply a password expiration policy to all the clients under the UC-SERV01 server.

Which of the following group policy features will he enable for UC-GPO to accomplish the task?

Block Policy

Force Policy

RSoP

Loopback Policy

Force Policy

13

Question 13 : You work as a network administrator for uCertify Inc.

The company has an Active Directory domain named uCertify.com.

The domain consists of two servers named UC-SRV01 and UC-SRV02.

UC-SRV01 is a domain controller, and UC-SRV02 is a file server for data storage.

The hard drive of the file server is starting to fill up.

You do not want to install another hard drive.

You want to limit the amount of space everyone gets on the hard drive.

What will you implement to accomplish the task?

CHKDSK

Disk quotas

Event Viewer

Device Manager

Disk quotas

14

Question 14 : Mark works as a Network Administrator for uCertify.com.

The company has a single domain network with multiple servers running Windows Server 2012. This network has a DNS server named UC-SERV01.

UC-SERV01 acts as a DNS client resolver for this network.

Mark wants to discard negative cache entries from the cache, as well as any other entries that have been added dynamically.

Which of the following commands will he execute to accomplish the task?

ipconfig /displaydns

ipconfig /flushdns

ipconfig/registerdns

ipconfig/renew

ipconfig /flushdns

15

Question 15 : You work as a System Administrator for Net World Inc.

The company has a Windows Server 2012 R2 network environment.

The company has a Windows Active Directory-based single domain single forest network.

The functional level of the forest is Windows Server 2012 R2.

You have configured the DHCP to dynamically assign IP addresses to client computers and four DNS servers.

You want to ensure the availability of a DNS server for fault tolerance and minimize network traffic generated by the zone transfer.

Which of the following actions will you perform to accomplish the task?

Each correct answer represents a complete solution.

Choose all that apply.

Configure the primary and secondary zones on the network.

Configure DNS for incremental zone transfer.

Configure DNS for secure dynamic updates.

Configure DNS as a forwarder.

Configure the primary and secondary zones on the network.

Configure DNS for incremental zone transfer.

16

Question 16 : How many total partitions can be made on a disk drive with MBR?

Three

Four

Five

Six

Four

17

Question 17 : You are the administrator of ABC.com.

You have a DHCP server that runs Windows Server 2012.

Your database recently crashed, and after rebuilding the server, you restore the DHCP database by using a recent backup.

You want to prevent DHCP clients from receiving IP addresses that are currently in use on the network.

What should you do?

Add the DHCP server option 50.

Add the DHCP server option 5.

Set the Conflict Detection value to 2.

Set the Conflict Detection value to 0.

Set the Conflict Detection value to 2.

Conflict Detection Attempts specifies how many ICMP echo requests (pings) the server sends for an address it is about to offer. The default is 0. Conflict Detection is a way to verify that the DHCP server is not issuing IP addresses that are already being used on the network.

18

Question 18 : Mark works as a network administrator for uCertify.com.

The company has a single domain network with two servers named UC-SERV01 and UC-SERV02 running Windows Server 2012 and multiple workstations running Windows Server 2008.

Mark has configured a virtual machine named UC-VM on UC-SERV01.

If the UC-SERV01 fails, he wants to start this machine on UC-SERV02.

He cannot purchase more hardware as his employers will not allow him to do so.

Which of the following actions will he take to accomplish the task?

Enable the Hyper-V Replica settings for UC-VM on UC-SERV01.

Create the same virtual machine on UC-SERV02.

On UC-SERV01, install the Multipath I/O (MPIO) feature.

On UC-SERV02, install the Multipath I/O (MPIO) feature.

Enable the Hyper-V Replica settings for UC-VM on UC-SERV01.

19

Question 19 : John works as a System Administrator for uCertify Inc.

The company has a single-domain Active Directory network with multiple servers and client computers running Windows Server 2012 R2.

Management instructs John to provide a File and Storage Services feature such that the employees of the company can store and access their work files on personal computers and devices, in addition to corporate PCs.

Which of the following features will he use to accomplish the task?

Shadow copy

Work folders

Storage tier

Write-back cache

Work folders

20

Question 20 : John works as a System Administrator for uCertify Inc.

The company has a single-domain Active Directory network with multiple servers running Windows Server 2012 R2 Hyper-V.

The company's network has a server that hosts two virtual machines named UC_V01 and UC_V02.

Management instructs John to use a feature that allows UC_V01 and UC_V02 to simultaneously share the same physical RAM.

What will he do to accomplish the task?

Use dynamic memory

Use server manager

Use router guard

Use port mirroring

Use dynamic memory

21

Question 21 : Mark works as a System Administrator for uCertify Inc.

The company has an Active Directory-based network containing a Windows Server 2012 Hyper V server named UC-SRV01 and multiple clients running Windows 8.

Due to unavailability of physical memory, Mark needs to use virtual machines.

For this purpose, he needs to provide a reliable restart experience for the virtual machines.

Which of the following will Mark use to accomplish the task?

Repadmin utility

Smart paging

NUMA design

ADSI editor

Smart paging

22

Question 22 : You work as a Network Administrator for uCertify Inc.

The company has a single Active Directory domain named ucertify.com with a domain controller named UC-DC01 hosting the primary DNS zone for ucertify.com.

In the company's network, servers are registering their host names dynamically.

You have installed new Web servers for hosting the duplicate copies of the company's intranet website.

You have configured the servers as given in the following table:

Server name IP address
UC-SRV01 10.0.0.21
UC-SRV02 10.0.0.22




To provide load balancing for name resolution queries, you are required to use DNS between these two servers.

How many DNS records will you create manually, at minimum?

1

2

3

4

2

23

Question 23 : You work as a System Administrator for uCertify Inc.

The company has an Active Directory domain named uCertify.com.

Based on the company's storage guidelines, you need to make sure the hard disk space for your virtual machines is only occupied when needed.

What type of virtual hard disk will you prefer to accomplish the task?

Dynamically expanding disk

Fixed-size disk

Differencing disk

Physical or pass-through disk

Dynamically expanding disk

24

Question 24 : You are the network administrator responsible for administering and creating new OUs for your organization.

You just changed an internal company name and need to make that change in Active Directory.

Which of the following is the easiest way to make this change?

Rename the OU.

Delete the OU and re-create it.

Using the Active Directory Sites and Services tool, use the Name option to make the change.

Create a new OU, name it, and delete the old OU.

Rename the OU.

25

Question 25 : Which of the following allows Hyper-V administrators to copy files to the virtual machine while the virtual machine is running without using a network connection?

Active Directory Domain Service

Integration Service

Federation Proxy Service

Remote Desktop Service

Integration Service

26

Question 26 : The process of assigning permissions to set Group Policy for objects within an OU is known as which of the following?

Promotion

Inheritance

Delegation

Filtering

Delegation

27

Question 27 : You work as a network administrator for uCertify.com.

The company has Windows Server 2012 network-based infrastructure.

You are instructed to use clustering to achieve higher availability.

For this purpose, Windows Server 2012 provides two types of clustering.

Drag and drop the clustering type with its related statement.

Network Load Balancing

Failover clustering

Statements

This type of clustering is used for network-based services such as web and FTP servers.

This type of clustering is used for applications and services such as SQL Server and Exchange Server.

Explanation:
The following are the two types of clustering:
• Network Load Balancing: This type of clustering is used for network-based services such as web and FTP servers.
• Failover clustering: This type of clustering is used for applications and services such as SQL Server and Exchange Server.

28

Question 28 : Mark works as a Network Administrator for uCertify Inc.

The company's network has an Active Directory domain named ucertify.com.

The domain includes two servers named UC-SEVR01 running Windows Server 2012 and UC-SERV02 running Windows Server 2008 R2.

Mark installs the DHCP server role on both servers.

Based on the company's security requirements and to reduce his administrative overhead of managing from two places, he decides to manage DHCP on UC-SERV02 by using the DHCP console on UC-SERV01.

Which of the following actions will Mark take first to accomplish the task?

Create an inbound rule using Windows Firewall with Advanced Security on UC-SERV02.

Install Windows Management Framework 3.0 using Internet Explorer on UC-SERV02.

Install a feature using Server Manager on UC-SERV01.

Execute the Enable-PSRemoting cmdlet using Windows PowerShell on UC-SERV02.

Execute the Enable-PSRemoting cmdlet using Windows PowerShell on UC-SERV02.

29

Question 29 : You work as a network administrator for uCertify Inc.

The company has an Active Directory domain named ucertify.com.

The network contains twelve servers running Windows Server 2012.

One of the servers, named UC-DC01, is configured as a domain controller.

DNS is configured on UC-DC01.

During a training session on security, you are explaining security of DNS resource records to a group of trainees. You discuss about DNSSEC.

Which of the following is true regarding DNSSEC?

Each correct answer represents a complete solution.

Choose all that apply.

DNSSEC is a suite of extensions that add security to the DNS protocol.

The DNSSEC protocol secures DNS servers by validating DNS responses.

DNSSEC ensures that the data has not been modified or tampered with in any way

DNSSEC uses the IPSecurity protocol for the signing process.

With DNSSEC, non-authoritative DNS servers are able to validate the responses they receive when they query other DNS servers.

DNSSEC is a suite of extensions that add security to the DNS protocol.

The DNSSEC protocol secures DNS servers by validating DNS responses.

DNSSEC ensures that the data has not been modified or tampered with in any way

With DNSSEC, non-authoritative DNS servers are able to validate the responses they receive when they query other DNS servers.

30

Question 30 : Mark works as a Network Administrator for uCertify.com.

The company has a single domain network with multiple servers running Windows Server 2012.

This network has a server named UC-DC-01 that acts as a domain controller and runs Server Core Installation of Windows Server 2012.

UC-DC-01 is not performing up to the level. Mark decides to promote another server UC-DC-02 as a domain controller.

So, he removes the UC-DC-01 server from the network without uninstalling it properly.

But, then he finds that the metadata of UC-DC-01 is left behind on the network.

He wants to remove it.

Which of the following cmdlets will Mark execute to accomplish the task?

Remove-ADComputer

ntdsutil.exe

dsamain.exe

Remove-WindowsFeature

ntdsutil.exe

31

Question 31 : Michal works as a Network Administrator for uCertify.com.

The company has a single domain Active Directory network.

The network has a server named UC-SRV01 which has the Hyper-V server role installed and that runs Windows Server 2012.

UC-SERV01 hosts two virtual machines named UC-VM01 and UC-VM02.

Based on the company's requirements, Michal installs Windows Server 2012 on UC-VM02 by using Windows Deployment Services.

Now, he needs to ensure that when the next time UC-VM02 restarts, he can connect to the Windows Deployment Services server by using PXE.

Which of the following settings will he configure for UC-VM02 to accomplish his task?

Startup order

Single-root I/O virtualization

NUMA

DHCP reservation

Startup order

32

Question 32 : John works as a System Administrator for uCertify Inc.

The company has a single-domain Active Directory network with multiple servers and client computers running Windows Server 2012 R2.

The company has a server named UC_01, which has AD DS, AD LDS, and DNS server roles installed.

Which of the following command-line tools will John use to provide management facilities for Active Directory Domain Services (AD DS) and Active Directory Lightweight Directory Services (AD LDS)?

Netdiag

Ntdsutil

Ntfrsutl

Nbtstat

Ntdsutil

33

Question 33 : What command can you use to clear the Windows Server 2012 DNS server's cache?

ipconfig /flushcache

dnscmd /flushcache

ipconfig /clearcache

dnscmd /clearcache

dnscmd /clearcache

34

Question 34 : Grill works as a Network Administrator for uCertify.com.

The company has a single domain Active Directory network.

The network has a server named UC-SRV01 which has the Hyper-V server role installed and that runs Windows Server 2012. UC-SRV01 hosts a virtual machine UC-VM01.

Based on the company's requirement, UC-VM01 is used to test applications.

Now, Grill needs to prevent UC-VM01 from synchronizing its clock to UC-SRV01.

What will he configure to accomplish his task?

Integration Services

Resource metering

Fiber channel

Single-root I/O virtualization

Integration Services

35

Question 35 : You work as a network administrator for uCertify.com.

The company has a multiple domain network with multiple servers running Windows Server 2012.

A server named UC-SERV01 acts as a DNS server for the network.

You find that UC-SERV01 is unable to execute DNS queries for external DNS names that are not part of the network of uCertify.com.

He wants to enable UC-SERV01 to execute such queries.

Which of the following settings will you configure on UC-SERV01 to accomplish this task?

Designate UC-SERV01 as forwarders.

Designate all DNS servers as forwarders.

Disable DNS Cache Locking.

Designate UC-SERV01 as multi-homed servers.

Designate UC-SERV01 as forwarders.

36

Question 36 : You work as a System Administrator for uCertify.com.

You have a server named UC-SRV01 that runs Windows Server 2012.

Based on the company's security requirements, you are required to force replication events between domain controllers and view the replication metadata vectors.

For this, you need to create the replication topology manually.

What will you use to accomplish the task?

Repadmin

Wbadmin

Dsamain.exe

ADSI editor

Repadmin

37

Question 37 : Mark works as a Server Manager for uCertify Inc.

The company has a Windows Server 2012 domain-based network.

Mark creates a new quota template and applies the quotas to 123 folders by using this template. Now he wants to modify the quota settings for all those folders.

Which of the following actions will Mark take to accomplish the task?

Delete and recreate the quota template.

Create a file screen template.

Create a hard quota template.

Modify the quota template.

Modify the quota template.

38

Question 38 : You are the administrator of a large company that has decided to switch from Virtual Server to Microsoft Hyper-V.

You have created a Hyper-V virtual machine with Windows Server 2012.

You want to be able to do Time Synchronization in the virtual machine.

What do you need to install to get the volume snapshots?

Virtual Machine Additions

Integration Services

Virtual Integration

Virtual Machine Services

Integration Services

39

Question 39 : Mark works as a Network Administrator for uCertify.com.

The company has a network with multiple servers running Windows Server 2012.

Mark is working on a client machine that gets its IP configuration via DHCP.

He notices that the client received different configuration information the last few times its lease was renewed.

Which of the following is the most likely cause for the problem on this network?

The DHCP server is not working properly.

Another computer on the network has taken over the machine's configuration information since the last renewal.

The client is receiving only the information that has changed since the last renewal.

An administrator is changing the configuration information between lease renewals.

When clients renew their leases, they receive all of their configuration information.

An administrator is changing the configuration information between lease renewals.

When clients renew their leases, they receive all of their configuration information. An administrator is changing the configuration information between lease renewals.

40

Question 40 : Mark works as a System Administrator for uCertify.com.

The company has a network with multiple servers running Windows Server 2012.

This network consists of a single domain named ucertify.com.

The server named UC-SERV01 acts as the domain controller for the network.

Mark has created a GPO at the domain level and linked it to the UC-SERV01 server.

He wants to enforce this GPO to all servers connected to UC-SERV01.

So, he needs to create a group and add it to local groups of all servers connected to UC-SERV01.

He also wants to ensure that this group cannot be removed from the local group of the member servers.

Which of the following groups will he create on UC-SERV01 to accomplish the task?

Restricted group

Global group

User group

Server group

Restricted group

41

Question 41 : Mary works as a System Administrator for uCertify.com.
The company has a single domain (ucertify.com) network with multiple servers running Windows Server 2012.
This network includes a server named UC-SERV01.

The company has released a new security policy for the users lying under this network.
According to the new policy, if a user enters an incorrect password four times within 10 minutes, he will be locked out for 30 minutes.

Which of the following three actions will Mary take to implement the policy?
Each correct answer represents a part of the solution.

Choose all that apply.

Set the Account Lockout Duration setting to 10 minutes.

Set the Account Lockout Duration setting to 30 minutes.

Set the Account Lockout Threshold setting to 4 invalid logon attempts.

Set the Account Lockout Threshold setting to 30 minutes.

Set the Reset Account Lockout Counter setting to 10 minutes.

Set the Reset Account Lockout Counter setting to 4 times.

Set the Account Lockout Duration setting to 30 minutes.

Set the Account Lockout Threshold setting to 4 invalid logon attempts.

Set the Reset Account Lockout Counter setting to 10 minutes.

42

Question 42 : Which of the following statements are true about printer pooling?
Each correct answer represents a complete solution.

Choose all that apply.

Associates two or more identical printers with one set of printer software.

All printers in the pool are the same model.

Printer ports can be of the same type or mixed (parallel, serial, and network).

All printers should be in different locations.

Associates two or more identical printers with one set of printer software.

All printers in the pool are the same model.

Printer ports can be of the same type or mixed (parallel, serial, and network).

43

Question 43 : Mark works as a Network Administrator uCertify.com.

The company has a single domain network with multiple servers running Windows Server 2012.

This network has a server named UC-SERV.

Clients connected to UC-SERV are using Windows operating systems that are located behind NAT routers. Mark is configuring the network to make IPv4-to-IPv6 transition easy.

Which of the following tunneling mechanisms will he use to accomplish this task?

ISATAP

6to4

Teredo

Dual-stack implementation

Teredo

44

Question 44 : You need to add 900 computers to a new site.

Which Class B subnet mask would you use to accommodate the 900 computers and minimize the number of unused addresses in the subnet?

172.16.0.0/16

172.16.0.0/18

172.16.0.0/22

172.16.0.0/24

172.16.0.0/22

45

Question 45 : You work as a network administrator for uCertify Inc.
The company has a single domain Active Directory-based network. The network contains a domain named ucertify.com.
All servers on the domain run Windows Server 2012.

You are discussing about the BranchCache feature with your network administrator trainees.

Which of the following modes of configurations are supported by BranchCache?
Each correct answer represents a complete solution.

Choose all that apply.

Offline

Hosted Cache

Distributed Cache

DFS

Hosted Cache

Distributed Cache