Server 2012 R2- Install and Configure Server 2012 R2 Flashcards Preview

Server 2012 R2 > Server 2012 R2- Install and Configure Server 2012 R2 > Flashcards

Flashcards in Server 2012 R2- Install and Configure Server 2012 R2 Deck (68):
1

This protocol allows a host to find clients within the local subnet. It can be used with IPv4 and IPv6 and uses multicasts instead of broadcasts.
A. DNS
B. HOSTS file
C. Link-local Multicast Name Resolution (LLMNR)
D. DNS suffix search list

C. Link-local multicast Name Resolution (LLMNR)

Review Chapter 5

2

A client needs to find a domain name that is not part of the local domain. The DNS server is not authoritative for the domain the client is trying to find and does not have any forwarders to it. What two things must be done for the DNS server to forward the request?

The root zone must be deleted and root hints must be configured.

Review Chapter 5

3

A forward lookup zone does what?

A. forwards DNS requests to other zones
B. provides hostname-to-ipaddress resolution
C. provides ipaddress-to-hostname resolution

B. Provides hostname-to-ipaddress resolution

Review Chapter 5

4

A domain has three DNS servers. Two servers are the Primary and backup DNS servers. The third needs a read-only copy of the DNS records. What zone should be used?

A Secondary Zone.

Review Chapter 5

5

In Domain contoso.com all DNS servers are also Domain Controllers. All DNS servers need to have the ability to read and write DNS changes to the domain. What type of zone should be used?

Active Directory Integrated Zone

Review Chapter 5

6

DallasServer1.contoso.com has an "A" Record in DNS. It needs to be accessed by a simple name. What record should be created in DNS to facilitate this?

A "CNAME" record

Review Chapter 5

7

This record is used for reverse lookup and is contained in the in-addr.arpa namespace or the ip6.arpa namespace.
A. "A" Record
B. "AAA" Record
C. "SRV" Record
D. "PTR" Record

D. "PTR" Record

Review Chapter 5

8

The domain adatum.com utilizes Microsoft and Unix/Linux devices. In order to communicate with UNIX DNS servers, the admin must change the BIND Settings on the Microsoft DNS Server. Where would the BIND properties be found?
A. Forwarders Tab
B. Security Tab
C. Monitoring Tab
D. Advanced Tab

D. Advanced Tab

Review Chapter 5

9

Client A cannot communicate with ClientB. What command can be used to determine if it is a DNS issues?
A. NSLookup
B. ipconfig
C. Netsh
D. Ping

D. Ping

Review Chapter 5

10

This Sever version supports up to 64GB of RAM, 25 LAN connections, 250 RRAS or RD Connections.
A. Server 2012 R2 Essentials
B. Server 2012 R2 Standard
C. Server 2012 R2 Enterprise
D. Server 2012 R2 Server Core

A. Server 2012 R2 Essentials

Review Chapter 1

11

You need to utilize Server 2012 R2 for your company. You need some servers to be Server Core and you need at least 2 Hyper-V gues OS sessions using the same license key as the host. What server edition do you need?
A. Server 2012 R2 Essentials
B. Server 2012 R2 Standard
C. Server 2012 R2 DataCenter
D. Server 2012 R2 Server Core

B. Server 2012 R2 Standard

Review Chapter 1

12

You are the admin of a large corporation spanning the United States. There are hundreds of servers across each region and you need unlimited Hyper-V guest OS sessions using the same license key as the host. What server edition best fits your situation?
A. Server 2012 R2 Essentials
B. Server 2012 R2 Standard
C. Server 2012 R2 DataCenter
D. Server 2012 R2 Server Core

C. Server 2012 R2 DataCenter

Review Chapter 1

13

A Windows Server 2008 R2 Enterprise or Standard Edition with SP1 can be upgraded to which 2012 edition?

Server 2012 R2 Standard or DataCenter

Review Chapter 1

14

A Windows Web Server 2008 R2 edition can be upgraded to which 2012 edition?

Server 2012 R2 Standard

15

What DISM module allows you to view installed features on a remote computer?
A. Get-WindowsRemoteFeature
B. Get-WindowsOptionalFeature-Online
C. Get-RemoteOnlineFeature
D. Winrm

B. Get-WindowsOptionalFeature-Online

16

The most secure Server 2012 installation type is which one?

Server Core

17

What utility is used to display the Server Core Server Configuration Utility?
A. winconfig
B. Get-configutility
C. Sconfig
D. serverconfig

C. Sconfig

18

What command do you use to configure network options on a Server Core installation?
A. netsh
B. ipconfig
C. netconfig

A. Netsh

19

You want to remotely send commands to a managed server. What command must you run on the managed server?
A. winrm config
B. config winrm
C. manage serverremote
D. winrm quickconfig

D. winrm quickconfig

20

All Directory data is stored in this file.
A. dir.dit
B. dir.dat
C. ntds.dit
D. ntds.dat

C. NTDS.dit

21

What is the first command used prior to promoting a 2012 server to a Domain Controller?
A. Dcpromo
B. Install-WindowsFeature
C. Install-DomainController

B. Install-WindowsFeature

22

Why should you have a local DC when using Windows Azure?

Azure does not support Group Policies

Review Chapter 4

23

You need to apply a GPO to all computers in the sales department. Twelve of their computers are in the 'Sales' OU, two are in the 'default computers' OU. The OU is created. What is the next step?

The computers in the default computers OU must be moved to the Sales OU. The GPO needs to be applied to the Sales OU.

Review Chapter 4

24

What variable is used in the Profile Path to create a roaming profile?

%username%

Review Chapter 4

25

Use this command to import and export AD objects. It does not modify existing objects.
A. csvde
B. ldifde
C. import-exportobject

A. csvde

Review Chapter 4

26

You can use this command to alter passwords on already existing accounts. It is used for bulk operations.
A. csvde
B. ldifde
C. modify-password

B. ldifde

Review Chapter 4

27

At what group level should permissions be allied in an AD environment?

Domain Local Security Group

Review Chapter 4

28

At what group level should users be directly joined for security purposes?

Global Security Group

Review Chapter 4

29

What are the 2 modes of NIC Teaming? What are they used for?

Switch dependent- increase bandwidth/loadbalancing
Switch independent- failover

30

This disk type supports spanned, striped and mirrored disks. It supports extending volumes to include non-contiguous space.
A. Fixed Disk
B. Dynamic Disk
C. Expanding Disk
D. Healthy Disk

B. Dynamic Disk

31

You need to increase performance and redundancy on your server. Which would you configure?
A. Raid 0
B. Raid 1
C. Raid 5

C. Raid 5

32

You need to create a virtual disk that can only be 500 GB in size and is optimized for performance. What type of vdh or vhdx would you use?

A fixed disk

Review Chapter 3

33

You need to manage a vhd file using command line. What command would be used?
A. manage-vhd
B. diskpart
C. vhd-manage

B. diskpart

Review Chapter 3

34

What type of storage layout is used to provide redundancy if two storage devices fail at one time?
A. Raid 5
B. Striped
C. Three-way mirror
D. Raid 10

C. Three-way mirror

35

What steps must be done if a thin-provisioned storage space is unmounted due to insufficient space? (choose two).
A. Add physical storage space and allocate it
B. It will automatically detect and remount
C. manually bring it back online
D. Run 'compress disk'
E. Run 'cleanup'

A. Add physical storage space and allocate it
C. Manually bring it back online

36

This feature allows a VM to restart even if there is no available physical memory.
A. virtual memory
B. paging memory
C. smart paging
D. vm fixed memory

C. Smart paging

Review Chapter 3

37

How do you enable resource metering on a VM?
A. Enable-resourcemetering
B. Enable-vmresourcemetering
C. resourcemeter-enable
D. start resourcemetering

B. Enable-vmresourcemetering

Review Chapter 3

38

What command is used to check VM resource usage?
A. Get-vmusage
B. Check-vmresourceusage
C. Measure-vm
D. Measure-resourceusage

C. Measure-vm

Review Chapter 3

39

You need to create a VM that allows PXE boot using standard network adapter. What generation VM do you need and what type of VM file is used?
A. 1st generation, vhdx
B. 1st generation, vhd
C. 2nd generation, vhd
D. 2nd generation, vhdx

D. 2nd generation, vhdx

Review Chapter 3

40

What command is used to create a snapshot of a running VM?
A. Checkpoint-vm
B. Snapshot-vm
C. Create-vmsnapshot

A. checkpoint-vm

Review Chapter 3

41

Several VMs need to communicate with each other and with the host OS, but not the physical network. What network type should be utilized?
A. Public
B. Private
C. Internal
D. External

C. Internal

Review Chapter 3

42

What option must be configured to allow a guest OS to use a physical network adapter directly?
A. resource sharing
B. VM tools
C. Single Root/IO Virtualization
D. Virtual Network Sharing

C. Single Root/IO Virtualization (SR-IOV)

Review Chapter 3

43

What are the 2 network adapter types in generation 2 VMs? (choose 2)
A. Standard
B. Legacy
C. Ether channel
D. Fibre channel

A. Standard
D. Fibre channel

Review Chapter 3

44

You have five network adapter. All traffic coming into adapter 1 must be monitored. What network feature is needed to evaluate the traffic?
A. Port security
B. Port mirroring
C. Root guard
D. Failover

B. Port mirroring

Review Chapter 3

45

What is used in order to control the throughput of data to the virtual disks?

Input/Output operations per second (IOPS)

Review Chapter 3

46

You have a server named Shared1 that has a directory of shared folders. There is a parent folder named Sales and a subfolder named Contracts. You need to disinherit permissions from Sales on the Contracts folder for the NTFS options. Where do you go?
A. Sharing tab and Advanced Sharing
B. Security tab and Advanced
C. Security tab and Edit

B. Security tab and Advanced

Review Chapter 6

47

You need to copy a folder and keep all NTFS permissions. What command will do this?

Robocopy or xcopy

Review Chapter 6

48

You need to prevent users from seeing folders that they have no permissions to. What feature you do you need to enable?

Access Based Enumeration

Review Chapter 6

49

Where do you go to enable or disable Access Based Enumeration (ABE)?
A. File Share permissions
B. File and Storage Services in Server Management
C. Share and Storage Management in Server Management

B. File and Storage Services in Server Management

Review Chapter 6

50

Users often complain that they must contact an admin to recover files on the shared drive because of accidental deletion or changes. What feature would allow users to restore files and folders to previous versions quickly?

Volume Shadow Copy

Review Chapter 6

51

Permissions for file shares are effective between the NTFS and Share permissions. Where are the permissions normally granted to control access to the shared files?

NTFS

Review Chapter 6

52

If User1 has NTFS Read & Write access to a folder and only has Read access in the share permissions, what permissions does User1 have when accessing the folder through the network?
A. Read & Write
B. Read
C. None
D. Full Control

B. Read

Review Chapter 6

53

You are creating a new shared folder using the New Share Wizard. Your environment consists primarily of Windows systems, however there are several UNIX systems that need access to the shares. What protocol should be used to create the share?
A. SMB
B. NFS
C. NTFS
D. UBX

B. NFS

Review Chapter 6

54

Server1 has a FQDN that is publicly registered. You are required to set-up a system where the CEO and Branch Chiefs can access their work folders from their mobile devices. What do you need to enable for this to work?
A. Shared Folders
B. Roaming Profiles
C. Work Folders
D. Cloud Folders

C. Work Folders

Review Chapter 6

55

Server1 is the printer server for contoso.com. Unix devices must print to printers that are shared through Server1. The print spooler service is restarted. What is the next step to ensure full functionality?
A. Nothing, the print spooler is restarted so printing can resume
B. The print server must be rebooted so computers can reconnect
C. The LPDSVC service must be restarted

C. The LPDSVC service must be restarted

Review Chapter 7

56

If you want to reduce the resources on the print server, what option should you enable in the print Sharing tab?
A. List in the directory
B. Render print jobs on client computers
C. Additional Drivers
D. Cache print jobs in the printer

B. Render print jobs on client computers

Review Chapter 7

57

This feature allows clients to send print jobs to a single printer, and the print server chooses from multiple printers to send the job to.

Printer pooling

Review Chapter 7

58

All users need rights to print and are granted the Print permission. Dave is the designated HR admin and needs the ability to make changes to printer properties. What permission does Dave need?
A. Manage Printer
B. Manage Documents
C. Creator Owner

A. Manage Printer

Review Chapter 7

59

The Sales Branch Manager shares a printer with the rest of the Sales Department. When preparing documents for meetings with the CEO he constantly has to wait for the printer, causing delays in high level meetings. What feature in Print Management needs to be configured to allow him to have a higher priority than the other users?
A. Printer Permissions
B. Printer Pooling
C. Multiple Printer Objects
D. Deploy with Group Policy

C. Multiple Printer Objects

Review Chapter 7

60

Your Organization uses Group Policy to manage configuration settings for users and computers. You need to add an option to disallow users the ability to Shut the System down. What setting category would you go configure?
A. Account Policies
B. Local Policies/Security Options
C. Administrative Templates
D. Local Policies/User Rights Assignment

D. Local Policies/User Rights Assignment

Review Chapter 8

61

What GPO setting category would you configure if you need to customize the Start Menu, taskbar or desktop environment?
A. Account Policies
B. Registry
C. Administrative Templates
D. Local Policies/Security Options

C. Administrative Templates

Review Chapter 8

62

You use an Administrative Template to create Group Policies. You want other domain administrators to be able to edit the templates. What must you do?

Create a Central Store

Review Chapter 8

63

Which of the following are true regarding GPOs?
A. Computer GPOs are applied when the computer boots
B. computer GPOs are applied when the computer is signed into
C. User policies are applied when the computer boots
D. User policies are applied when the computer is signed into
E. GPOs must be linked to a site, domain or OU
F. GPOs are automatically enforced to all OUs

A. Computer GPOs are applied when the computer boots
D. User policies are applied when the computer is signed into
E. GPOs must be linked to a site, domain or OU

Review Chapter 8

64

Place the GPOs in the correct order of how they are applied.
A. GPO linked to the domain
B. GPO associated with a site
C. The local Group Policy on the computer
D. GPO linked to the OU

C, B, A, D

Review Chapter 8

65

You can use this method of GPOs to dynamically determine the scope of a GPO based on specific data. The script results in a 'yes' or 'no' response.

WMI Filtering

Review Chapter 8

66

All users must use the default domain password policy. The HR department deals with sensitive user data and it was determined they need more stringent password policies to protect PII. All HR personnel belong to the HR Global Security Group. What do you need to do to enforce this?

Create a granular password policy (or Password Settings Object)

Review Chapter 8

67

You need to restrict CD-ROM drive access to locally logged on users. Where would you do this?
A. Security settings, Accounts category
B. Security settings, Devices category
C. Security settings, Interactive logon category
D. User rights settings, security category

B. Security settings, Devices category

Review Chapter 8

68

You need all users to logon using a standard user name and password. All admins have a separate admin username and password, but are restricted from logging onto systems directly. You need to make sure that performing administrative actions are done with the admin username and password. What do you configure?
A. 'Behavior of the elevation prompt for administors in Admin Approval Mode' set to 'Prompt for consent on the secure desktop'
B. 'User Account Control: Switch to the secure desktop when prompting for elevation' set to 'enabled'
C. 'Behavior of the elevation prompt for administrators in Admin Approval Mode' set to 'Elevate without prompting'

A. 'Behavior of the elevation prompt for administors in Admin Approval Mode' set to 'Prompt for consent on the secure desktop'

Review Chapter 8