Pages From Microsoft - 70-410

Download as pdf or txt
Download as pdf or txt
You are on page 1of 98

LookingforRealExamQuestionsforITCertificationExams!

WeguaranteeyoucanpassanyITcertificationexamatyourfirstattemptwithjust1012
hoursstudyofourguides.

Ourstudyguidescontainactualexamquestions;accurateanswerswithdetailedexplanation
verifiedbyexpertsandallgraphicsanddragndropexhibitsshownjustasontherealtest.

Totestthequalityofourguides,youcandownloadtheonefourthportionofanyguidefrom
http://www.certificationking.comabsolutelyfree.Youcanalsodownloadtheguidesforretired
examsthatyoumighthavetakeninthepast.

Forpricingandplacingorder,pleasevisithttp://certificationking.com/order.html
Weacceptallmajorcreditcardsthroughwww.paypal.com

Forotherpaymentoptionsandanyfurtherquery,feelfreetomailusat
[email protected]

Page No | 2

Product Questions: 475


Version: 31.0
Question 1
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed.
An iSCSI SAN is available on the network.
Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.
You create a LUN on the SAN to host the virtual hard drive fles for the virtual machines.
You need to create a 3-TB virtual hard disk for VM1 on the LUN. The soluton must prevent VM1 from being paused if
the LUN runs out of disk space.
Which type of virtual hard disk should you create on the LUN?
A. Dynamically expanding VHDX
B. Fixed-size VHDX
C. Fixed-size VHD
D. Dynamically expanding VHD

Aoswern B
Explanatonn
The virtual disk needs to be a VHDX fle since it is going to be over 2TB in size and it must be fxed-size so that the
space is already taken on the server (that way the server does not run out of space as the volume grows) even if the
actual virtual disk does not yet hold that amount of data.

Question 2
Your network contains an Actve Directory domain named adatum.com. The domain contains a member server
named Host1. Host1 runs Windows Server 2012 R2 and has the Hyper-V server role installed.
Host1 hosts two virtual machines named VM5 and VM6. Both virtual machines connect to a virtual switch named
Virtual1.
On VM5, you install a network monitoring applicaton named Monitor1.
You need to capture all of the inbound and outbound trafc to VM6 by using Monitor1.
Which two commands should you run from Windows PowerShell? (Each correct answer presents part of the soluton.
Choose two.)
A. Get-VM VM6 | Set-VMNetworkAdapter-IovWeight 1
B. Get-VM VM5 I Set-VMNetworkAdapter -IovWeight 0
C. Get-VM VM5 | Set-VMNetworkAdapter -PortMirroring Source
D. Get-VM VM6 | Set-VMNetworkAdapter -AllowTeaming On
E. Get-VM VM6 | Set-VMNetworkAdapter -PortMirroring Destnaton
F. Get-VM VM5 | Set-VMNetworkAdapter -AllowTeaming On

Aoswern C, E
Explanatonn
-PortMirroring specifes the port mirroring mode for the network adapter. This can be set to None, Source, and

________________________________________________________________________________________________

www.Certificationking.com

Page No | 3

Destnaton.
If set to Source, a copy of every network packet it sends or receives is forwarded to a virtual network adapter
confgured to receive the packets.
If set to Destnaton, it receives copied packets from the source virtual network adapter.
In this scenario, VM5 is the destnaton which must receive a copy of the network packets from VM6, which s the
source.
Referencen htpn::technet.microsoo.com:en-us:library:hh848457.aspx

Question 3
You have a Hyper-V host named Server1 that runs Windows Server 2012 R2. Server1 has the virtual switches listed in
the following table.

You create a virtual machine named VM1.VM1 has two network adapters. One network adapter connects to vSwitch1.
The other network adapter connects to vSwitch2.You confgure NIC teaming on VM1.
You need to ensure that if a physical NIC fails on Server1, VM1 remains connected to the network.
What should you do on Server1?
A. Run the Set-VmNetworkAdaptercmdlet.
B. Add a new network adapter to VM1.
C. Create a new virtual switch on Server 1.
D. Modify the propertes of vSwitch1 and vSwitch2.

Aoswern A
Question 4
Your network contains two Hyper-V hosts that run Windows Server 2012 R2. The Hyper-V hosts contain several virtual
machines that run Windows Server 2012 R2.
You install the Network Load Balancing feature on the virtual machines.
You need to confgure the virtual machines to support Network Load Balancing (NLB).
Which virtual machine setngs should you confgure?
A. DHCP guard
B. Port mirroring
C. Router guard
D. MAC address

Aoswern D
Explanatonn
htpn::social.technet.microsoo.com:Forums:windowsserver:en-US:5b3a0a9d-26a2-49ba-bbbeon-hyperv?forum=winserverhyperv
For NLB to be confgured you need to enable MAC address spoofng.

29d11fcbb7ce:nlb-

Question 5
________________________________________________________________________________________________

www.Certificationking.com

Page No | 4

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed.
Server1 is connected to two Fibre Channel SANs and is confgured as shown in the following table.

You have a virtual machine named VM1.


You need to confgure VM1 to connect to SAN1.
What should you do frst?
A. Add one HBA
B. Create a Virtual Fibre Channel SAN.
C. Create a Hyper-V virtual switch.
D. Confgure network adapter teaming.

Aoswern B
Explanatonn
You need your virtualized workloads to connect easily and reliably to your existng storage arrays.
Windows Server 2012 provides Fibre Channel ports within the guest operatng system, which allows you to connect to
Fibre Channel directly from within virtual machines. This feature protects your investments in Fibre Channel, enables
you to virtualize workloads that use direct access to Fibre Channel storage, allows you to cluster guest operatng
systems over Fibre Channel, and provides an important new storage opton for servers hosted in your virtualizaton
infrastructure.
With this Hyper-V virtual Fibre Channel feature, you can connect to Fibre Channel storage from within a virtual
machine. This allows you to use your existng Fibre Channel investments to support virtualized workloads.
Support for Fibre Channel in Hyper-V guests also includes support for many related features, such as virtual SANs, live
migraton, and MPIO.

________________________________________________________________________________________________

www.Certificationking.com

Page No | 5

Question 6
Your network contains an Actve Directory domain named contoso.com. The domain contains a server named Server1.
Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed.
On Server1, you create and start a virtual machine named VM1. VM1 is confgured as shown in the following table.

You need to recommend a soluton to minimize the amount of disk space used for the checkpoint of VM1.
What should you do before you create the checkpoint?
A. Run the Resize-VHD cmdlet.
B. Convert Disk1.vhd to a dynamically expanding disk.
C. Shut down VM1.
D. Run the Convert-VHD cmdlet.

Aoswern C
Explanatonn
Changing between a fxed and dynamic disk type does not alter the size of a SNAPSHOT much at all.
However, since a snapshot is a record of a VMs state at the exact tme that the snapshot was taken, shutng down the
VM before taking the snapshot prevents the snapshot from having to contain all of the data in RAM (as there is no
data in memory when a machine is powered down).
The queston states that the soluton should minimize the amount of disk space used for the checkpoint of VM1. If the
checkpoint is taken while VM1 is running, there will be two atritonal fles present at the checkpoint locatonn a .VSV
with VM1 saved state fles and a .BIN fle which contains VM1s memory contents. If, however, VM1 is shut down frst,
these fles will not be created, thus saving disk space.
In order to convert Disk1.vhd to a dynamically expanding disk, VM1 stll have to be shut down.

Question 7
HOTSPOT
You have a Hyper-V host named Hyperv1 that runs Windows Server 2012 R2. Hyperv1 hosts a virtual machine named
Server1. Server1 uses a disk named Server1.vhdx that is stored locally on Hyperv1.
You stop Server1, and then you move Server1.vhdx to an iSCSI target that is located on another server.
You need to confgure Server1 to meet the following requirementsn
Ensure that Server1 can start by using Server1.vhdx.
Prevent Server1.vhdx from consuming more than 500 IOPS on the iSCSI target.
Which two objects should you confgure? To answer, select the appropriate two objects in the answer area.

________________________________________________________________________________________________

www.Certificationking.com

Page No | 6

Aoswern

________________________________________________________________________________________________

www.Certificationking.com

Page No | 7

Question 8
You have a print server named Server1 that runs Windows Server 2012 R2.
You discover that when there are many pending print jobs, the system drive occasionally runs out of free space.
You add a new hard disk to Server1.You create a new NTFS volume.
You need to prevent the print jobs from consuming disk space on the system volume.
What should you modify?
A. The propertes on the new volume
B. The propertes of the Print Spooler service
C. The Print Server Propertes
D. The propertes of each shared printer

Aoswern C
Explanatonn
Windows spools print jobs by default to the following directory as they are processedn

________________________________________________________________________________________________

www.Certificationking.com

Page No | 8

%SystemRoot%\SYSTEM32\SPOOL\PRINTERS.
It is possible for the administrator of a Windows print server to manually instruct Windows the locaton for placing
the spool fles, if for example there is a concern for disk space.

Question 9
HOTSPOT
A printer named Printer1 is confgured as shown in the exhibit. (Click the Exhibit buton.)

To answer, complete each statement according to the informaton presented in the exhibit. Each correct selecton is
worth one point.

________________________________________________________________________________________________

www.Certificationking.com

Page No | 9

Aoswern

Explanatonn
* The printer is paused.
* Jobs can always be permited (even if the printer is paused, or printer not started).
Noten
StartTime
Date and tme that a printer can start to print a job if the printer is limited to print at specifc tmes. This value is
expressed as the tme elapsed since 12n00 AM GMT (Greenwich Mean Time).
This is sort of a trick queston. As it stands, when the PowerShell script was executed, the printer is in "Paused" status,
so any submited job will go to the queue and remain there untl the status is "Available". As for the ability to submit a
job, a user can SUBMIT the job at any tme. If it is outside of the printer's availability range, it will simply remain in the
queue untl the printer's start tme is reached.

Question 10
HOTSPOT
Your network contains an Actve Directory domain named contoso.com. The domain contains a print server named
Server1 that runs Windows Server 2012 R2.
You share several printers on Server1.
You need to ensure that you can view the printer objects associated to Server1 in Actve Directory Users and
Computers.
Which opton should you select?

________________________________________________________________________________________________

www.Certificationking.com

Page No | 10

To answer, select the appropriate opton in the answer area.

Aoswern

Explanatonn
You can view printer objects in Actve Directory by clicking Users, Groups, and Computers as containers from the View
menu in the Actve Directory Users and Computers snap-in. By default, printer objects are created under the machine
object in which they are shared. Aoer you turn on the Users, Groups, and Computers as containers opton, you can
see printers by expanding the printer's host computer.
Referencen htpn::support.microsoo.com:kb:235925

Question 11
HOTSPOT
You have a shared folder named Share1. The folder permissions of Share1 are confgured as shown in the Folder
Permissions exhibit. (Click the Exhibit buton.)

________________________________________________________________________________________________

www.Certificationking.com

Page No | 11

The Share permissions of Share1 are confgured as shown in the Share Permissions exhibit. (Click the Exhibit buton.)

You have a group named Group1. The members of Group1 are shown in the Group1 exhibit. (Click the Exhibit buton.)

________________________________________________________________________________________________

www.Certificationking.com

Page No | 12

Select Yes if the statement can be shown to be true based on the available informatonn otherwise select No. Each
correct selecton is worth one point.

Aoswern

________________________________________________________________________________________________

www.Certificationking.com

Page No | 13

Explanatonn
NTFS permissions control access to the fles and folders stored on disk volumes formated with the NTFS fle system.
Share permissions control access to folders over a network. To access a fle over a network, a user must have
appropriate share permissions (and appropriate NTFS permissions if the shared folder is on an NTFS volume).Grantng
a user Full Control NTFS permission on a folder enables that user to take ownership of the folder unless the user is
restricted in some other way.User1 was not granted Full Control permission.
The Administrators have Full Control permission. I assume that User2 is an administrator since the Group1 exhibit
shows only User1 as a member.
Referencesn htpn::technet.microsoo.com:en-us:library:cc754178.aspx
Exam Reference 70-410n Installing and confguring Windows Server 2012 R2, Chapter 2n Confgure server roles and
features, Objectve 2.1n Confgure fle and share access, p.75-80

Question 12
Your network contains an Actve Directory domain named adatum.com. The domain contains a server named Server1
that runs Windows Server 2012 R2.
On a server named Core1, you perform a Server Core Installaton of Windows Server 2012 R2. You join Core1 to the
adatum.com domain.
You need to ensure that you can use Event Viewer on Server1 to view the event logs on Core1.
What should you do on Core1?
A. Run the Disable NetFirewallRule cmdlet.
B. Install Remote Server Administraton Tools (RSAT).
C. Install Windows Management Framework.
D. Run the Enable-Com + Network Access Firewall Rule.

Aoswern D
Explanatonn
Informaton regarding IPsec policy changes, etc. can be found in the Event Viewer. Thus you need to enable the
NetFirewallRule command. This will allow you to view the event logs.

Question 13
Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 and

________________________________________________________________________________________________

www.Certificationking.com

Page No | 14

Server2 are part of a workgroup.


On Server1 and Server2, you create a local user account named Admin1.You add the account to the local
Administrators group. On both servers, Admin1 has the same password.
You log on to Server1 as Admin1. You open Computer Management and you.connect to Server2.
When you atempt to create a scheduled task, view the event logs, and manage the shared folders, you receive Access
Denied messages.
You need to ensure that you can administer Server2 remotely from Server1 by using Computer Management.
What should you confgure on Server2?
A. From Server Manager, modify the Remote Management setng.
B. From Local Users and Groups, modify the membership of the Remote Management Users group.
C. From Windows Firewall, modify the Windows Management Instrumentaton (WMI) frewall rule.
D. From Registry Editor, confgure the LocalAccountTokenFilterPolicy registry value.

Aoswern D
Explanatonn
The LocalAccountTokenFilterPolicy setng afects how administrator credentals are applied to remotely administer
the computer.
Referencen htpn::support.microsoo.com:kb:942817

Question 14
HOTSPOT
You have a print server named Server1 that runs Windows Server 2012 R2.
On Server1, you create and share a printer named Printer1.
The Advanced setngs of Printer1 are shown in the Advanced exhibit. (Click the Exhibit buton.)

________________________________________________________________________________________________

www.Certificationking.com

Page No | 15

The Security setngs of Printer1 are shown in the Security exhibit. (Click the Exhibit buton.)

The Members setngs of a group named Group1 are shown in the Group1 exhibit. (Click the Exhibit buton.)

Select Yes if the statement can be shown to be true based on the available informatonn otherwise select No. Each

________________________________________________________________________________________________

www.Certificationking.com

Page No | 16

correct selecton is worth one point.

Aoswern

Question 15
Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server
role installed.
Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.
Server1 is confgured as shown in the following table.

You install Windows Server 2012 R2 on VM2 by using Windows Deployment Services (WDS).
You need to ensure that the next tme VM2 restarts, you can connect to the WDS server by using PXE.
Which virtual machine setng should you confgure for VM2?
A. NUMA topology

________________________________________________________________________________________________

www.Certificationking.com

Page No | 17

B. Resource control
C. resource metering
D. virtual Machine Chimney
E. The VLAN ID
F. Processor Compatbility
G. The startup order
H. Automatc Start Acton
I. Integraton Services
J. Port mirroring
K. Single-root I:O virtualizaton

Aoswern G
Explanatonn
Confgure the BIOS of the computer to enable PXE boot, and set the boot order so that it is bootng from the network
is frst.
Referencesn htpn::technet.microsoo.com:en-us:library:cc766320(v=ws.10).aspx
Exam Ref 70-410, Installing and Confguring Windows Server 2012 R2, Chapter 3n Confgure Hyper-V, Objectve 3.1n
Create and Confgure virtual machine setngs, p.144
Training Guiden Installing and Confguring Windows Server 2012 R2n Chapter 7n Hyper-V Virtualizaton, Lesson 2n
Deploying and confguring virtual machines, p.335

Question 16
Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server
role installed.
Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.
Server1 is confgured as shown in the following table.

You plan to schedule a complete backup of Server1 by using Windows Server Backup.
You need to ensure that the state of VM1 is saved before the backup starts.
What should you confgure?
A. NUMA topology
B. Resource control
C. resource metering
D. virtual Machine Chimney
E. The VLAN ID
F. Processor Compatbility
G. The startup order

________________________________________________________________________________________________

www.Certificationking.com

Page No | 18

H. Automatc Start Acton


I. Integraton Services
J. Port mirroring
K. Single-root I:O virtualizaton

Aoswern I
Explanatonn
The Integraton Services setngs on virtual machines include services such as operatng system shutdown, tme
synchronizaton, data exchange, Heartbeat, and Backup (volume snapshot services). This snapshot will ensure that the
state of VM1 is saved prior to backup.
Referencesn htpn::msdn.microsoo.com:en-us:library:dd405549(v=vs.85).aspx
Exam Ref 70-410, Installing and Confguring Windows Server 2012 R2, Chapter 3n Confgure Hyper-V, Objectve 3.1n
Create and Confgure virtual machine setngs, p.144

Question 17
Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server
role installed.
Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.
Server1 is confgured as shown in the following table.

VM2 sends and receives large amounts of data over the network.
You need to ensure that the network trafc of VM2 bypasses the virtual switches of the parent partton.
What should you confgure?
A. NUMA topology
B. Resource control
C. resource metering
D. virtual Machine Chimney
E. The VLAN ID
F. Processor Compatbility
G. The startup order
H. Automatc Start Acton
I. Integraton Services
J. Port mirroring
K. Single-root I:O virtualizaton

Aoswern K

________________________________________________________________________________________________

www.Certificationking.com

Page No | 19

Explanatonn
Single-root I:O virtualizaton -capable network adapters can be assigned directly to a virtual machine to maximize
network throughput while minimizing network latency and the CPU overhead required for processing network trafc.
Referencesn htpn::technet.microsoo.com:en-us:library:cc766320(v=ws.10).aspx
htpn::technet.microsoo.com:en-us:library:hh831410.aspx
Exam Ref 70-410, Installing and Confguring Windows Server 2012 R2, Chapter 3n Confgure Hyper-V, Objectve 3.1n
Create and Confgure virtual machine setngs, p.144
Training Guiden Installing and Confguring Windows Server 2012 R2n Chapter 7n Hyper-V Virtualizaton, Lesson 2n
Deploying and confguring virtual machines, p.335

Question 18
Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server
role installed.
Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.
Server1 is confgured as shown in the following table.

You need to ensure that VM1 can use more CPU tme than the other virtual machines when the CPUs on Server1 are
under a heavy load.
What should you confgure?
A. NUMA topology
B. Resource control
C. resource metering
D. virtual Machine Chimney
E. The VLAN ID
F. Processor Compatbility
G. The startup order
H. Automatc Start Acton
I. Integraton Services
J. Port mirroring
K. Single-root I:O virtualizaton

Aoswern B
Explanatonn
B. Resource controls provide you with several ways to control the way that Hyper-V allocates resources to virtual
machine. Resource control in used in the event where you need to adjust the computng resources of a virtual
machine, you can reconfgure the resources to meet the changing needs. You can also specify resource controls to
automate how resources are allocated to virtual machines.

________________________________________________________________________________________________

www.Certificationking.com

Page No | 20

Referencesn
htpn::technet.microsoo.com:en-us:library:cc766320(v=ws.10).aspx
htpn::technet.microsoo.com:en-us:library:hh831410.aspx
htpn::technet.microsoo.com:en-us:library:cc742470.aspx
Exam Ref 70-410, Installing and Confguring Windows Server 2012 R2, Chapter 3n Confgure Hyper-V, Objectve 3.1n
Create and Confgure virtual machine setngs, p.144
Training Guiden Installing and Confguring Windows Server 2012 R2n Chapter 7n Hyper-V Virtualizaton, Lesson 2n
Deploying and confguring virtual machines, p.335

Question 19
HOTSPOT
Your network contains an Actve Directory domain named contoso.com.
Computer accounts for the marketng department are in an organizatonal unit (OU) named
Departments\Marketng\Computers. User accounts for the marketng department are in an OU named
Departments\Marketng\Users.
Marketng users can only log on to the client computers in the Departments\Marketng\Computers OU.
You need to apply an applicaton control policy to all of the marketng users.
Which Group Policy Object (GPO) should you confgure?
To answer, select the appropriate GPO in the answer area.

Aoswern
________________________________________________________________________________________________

www.Certificationking.com

Page No | 21

Explanatonn
Applicaton control policies specify which programs are allowed to run on the local computer and which are not.
Referencesn
htpn::technet.microsoo.com:en-us:library:hh125923(v=ws.10).aspx
htpn::technet.microsoo.com:en-us:library:cc781458(v=WS.10).aspx
htpn::technet.microsoo.com:en-us:library:hh967461.aspx
htpn::technet.microsoo.com:en-us:library:ee461050.aspx
htpn::technet.microsoo.com:en-us:library:ee461044.aspx

Question 20
HOTSPOT
Your network contains an Actve Directory domain named contoso.com.
The domain contains an organizatonal unit (OU) named OU1 as shown in the OU1 exhibit. (Click the Exhibit buton.)

________________________________________________________________________________________________

www.Certificationking.com

Page No | 22

The membership of Group1 is shown in the Group1 exhibit. (Click the Exhibit buton.)

You confgure GPO1 to prohibit access to Control Panel. GPO1 is linked to OU1 as shown in the GPO1 exhibit. (Click the
Exhibit buton.)

________________________________________________________________________________________________

www.Certificationking.com

Page No | 23

Select Yes if the statement can be shown to be true based on the available informatonn otherwise select No. Each
correct selecton is worth one point.

Aoswern

________________________________________________________________________________________________

www.Certificationking.com

Page No | 24

Explanatonn
Group Policy does NOT APPLY TO SECURITY GROUPS, only users and computers in an OU. Consequently, the only users
in the OU are User2 and User4. Since the Security Filtering specifes that the policy will only apply to users:computers
in the OU who are members of Group1 or User3, User4 will not have the policy applied. Since User2 is, in fact, a
member of Group1, the policy will be applied to user 2. Thus, the only user who will not be able to access the control
panel is User2.

Question 21
HOTSPOT
Your network contains an Actve Directory domain named adatum.com. All domain controllers run Windows Server
2012 R2. All client computers run Windows 7. The computer accounts for all of the client computers are located in an
organizatonal unit (OU) named OU1.
An administrator links a Group Policy object (GPO) to OU1. The GPO contains several applicaton control policies.
You discover that the applicaton control policies are not enforced on the client computers.
You need to modify the GPO to ensure that the applicaton control policies are enforced on the client computers.
What should you confgure in the GPO?
To answer, select the appropriate service in the answer area.

________________________________________________________________________________________________

www.Certificationking.com

Page No | 25

Aoswern

________________________________________________________________________________________________

www.Certificationking.com

Page No | 26

Explanatonn
Does AppLocker use any services for its rule enforcement?
Yes, AppLocker uses the Applicaton Identty service (AppIDSvc) for rule enforcement. For AppLocker rules to be
enforced, this service must be set to start automatcally in the GPO.
Before you can enforce AppLocker policies, you must start the Applicaton Identty service by using the Services snapin console.
Membership in the local Administrators group, or equivalent, is the minimum required to complete this procedure.
To start the Applicaton Identty service
Click Start, click Administratve Tools, and then click Services.
In the Services snap-in console, double-click Applicaton Identty.
In the Applicaton Identty Propertes dialog box, click Automatc in the Startup type list, click Start, and then click OK.
Referencen htpn::technet.microsoo.com:en-us:library:dd759130.aspx

Question 22
Your network contains an Actve Directory domain named contoso.com. You have a Group Policy object (GPO) named
GP1 that is linked to the domain. GP1 contains a sooware restricton policy that blocks an applicaton named App1.
You have a workgroup computer named Computer1 that runs Windows 8. A local Group Policy on Computer1
contains an applicaton control policy that allows App1.
You join Computer1 to the domain.
You need to prevent App1 from running on Computer1.
What should you do?

________________________________________________________________________________________________

www.Certificationking.com

Page No | 27

A. From Computer1, run gpupdate:force.


B. From Group Policy Management, add an applicaton control policy to GP1.
C. From Group Policy Management, enable the Enforced opton on GP1.
D. In the local Group Policy of Computer1, confgure a sooware restricton policy.

Aoswern B
Explanatonn
AppLocker policies take precedence over policies generated by SRP on computers that are running an operatng
system that supports AppLocker.
AppLocker policies in the GPO are applied, and they supersede the policies generated by SRP in the GPO and local
AppLocker policies or policies generated by SRP.

Question 23
Your network contains an Actve Directory domain named contoso.com. All client computer accounts are in an
organizatonal unit (OU) named AllComputers. Client computers run either Windows 7 or Windows 8.
You create a Group Policy object (GPO) named GP1.
You link GP1 to the AllComputers OU.
You need to ensure that GP1 applies only to computers that have more than 8 GB of memory.
What should you confgure?
A. The Security setngs of GP1
B. The Block Inheritance opton for AllComputers
C. The Security setngs of AllComputers
D. The WMI flter for GP1

Aoswern D
Explanatonn
Windows Management Instrumentaton (WMI) flters allow you to dynamically determine the scope of Group Policy
objects (GPOs) based on atributes of the target computer.
When a GPO that is linked to a WMI flter is applied on the target computer, the flter is evaluated on the target
computer. If the WMI flter evaluates to false, the GPO is not applied (except if the client computer is running
Windows Server, in which case the flter is ignored and the GPO is always applied). If the WMI flter evaluates to true,
the GPO is applied. WMI flters, like GPOs, are stored on a per-domain basis. A WMI flter and the GPO it is linked to
must be in the same domain.
Referencesn
Training Guiden Installing and Confguring Windows Server 2012 R2n Chapter 10n Implementng Group Policy, p.470,
482
htpn::technet.microsoo.com:en-us:library:jj134176
WMI fltering using GPMC

Question 24
Your network contains an Actve Directory domain named contoso.com. The domain contains an Applicaton server
named Server1. Server1 runs Windows Server 2012 R2.
Server1 is confgured as an FTP server.
Client computers use an FTP Applicaton named App1.exe. App1.exe uses TCP port 21 as the control port and

________________________________________________________________________________________________

www.Certificationking.com

Page No | 28

dynamically requests a data port.


On Server1, you create a frewall rule to allow connectons on TCP port 21.
You need to confgure Server1 to support the client connectons from App1.exe.
What should you do?
A. Run netsh advfrewall set global statefulop enable.
B. Create an inbound frewall rule to allow App1.exe.
C. Create a tunnel connecton security rule.
D. Run Set-NetFirewallRule -DisplayName DynamicFTP -Profle Domain

Aoswern A
Explanatonn
The netsh frewall context is supplied only for backward compatbility. We recommend that you do not use this
context on a computer that is running Windows Vista or a later version of Windows.
In the netsh advfrewall frewall context, the add command only has one variaton, the add rule command. Netsh
advfrewall set global statefulopn
Confgures how Windows Firewall with Advanced Security handles FTP trafc that uses an inital connecton on one
port to request a data connecton on a diferent port.
When statefulop is enabled, the frewall examines the PORT and PASV requests for these other port numbers and
then allows the corresponding data connecton to the port number that was requested.
Syntax
set global statefulop { enable | disable | notconfgured }
Parameters
statefulop can be set to one of the following valuesn
enable
The frewall tracks the port numbers specifed in PORT command requests and in the responses to PASV requests, and
then allows the incoming FTP data trafc entering on the requested port number.
disable
This is the default value. The frewall does not track outgoing PORT commands or PASV responses, and so incoming
data connectons on the PORT or PASV requested port is blocked as an unsolicited incoming connecton.
notconfgured
Valid only when netsh is confguring a GPO by using the set store command.

Question 25
Your network contains an Actve Directory domain named contoso.com.
All client computers run Windows 8.
You deploy a server named Server1 that runs Windows Server 2012 R2.
You install a new client-server applicaton named App1 on Server1 and on the client computers. The client computers
must use TCP port 6444 to connect to App1 on Server1.Server1 publishes the informaton of App1 to an intranet
server named Server2 by using TCP port 3080.
You need to ensure that all of the client computers can connect to App1. The soluton must ensure that the
applicaton can connect to Server2.
Which Windows Firewall rule should you create on Server1?
A. an inbound rule to allow a connecton to TCP port 3080
B. an outbound rule to allow a connecton to TCP port 3080
C. an outbound rule to allow a connecton to TCP port 6444
D. an inbound rule to allow a connecton to TCP port 6444

________________________________________________________________________________________________

www.Certificationking.com

Page No | 29

Aoswern D
Explanatonn
A. Server2 needs inbound on 3080.
B. All ports outbound allowed by default.
D. Server1 gets request from Client PCs it needs an inbound rule for 6444.
By default, Windows Firewall with Advanced Security blocks all unsolicited inbound network trafc, and allows all
outbound network trafc. For unsolicited inbound network trafc to reach your computer, you must create an allow
rule to permit that type of network trafc. If a network program cannot get access, verify that in the Windows Firewall
with Advanced Security snap-in there is an actve allow rule for the current profle. To verify that there is an actve
allow rule, double-click Monitoring and then click Firewall.
If there is no actve allow rule for the program, go to the Inbound Rules node and create a new rule for that program.
Create either a program rule, or a service rule, or search for a group that applies to the feature and make sure all the
rules in the group are enabled. To permit the trafc, you must create a rule for the program that needs to listen for
that trafc. If you know the TCP or UDP port numbers required by the program, you can additonally restrict the rule
to only those ports, reducing the vulnerability of opening up all ports for the program.

Question 26
Your network contains an Actve Directory domain named contoso.com. The domain contains two servers named
Server1 and Server2 that run Windows Server 2012 R2.
You create a security template named Template1 by using the security template snap-in.
You need to apply Template1 to Server2.
Which tool should you use?
A. Security Templates
B. Computer Management
C. Security Confguraton and Analysis
D. System Confguraton

Aoswern C
A security policy is a combinaton of security setngs that afect the security on a computer. You can use your local
security policy to edit account policies and local policies on your local computer.
Explanatonn
A. Template was already created Provide standard security opton to use in security policies
B. Needs to be applied at the GP level
C. Security templates are inactve untl imported into a Group Policy object or the
SecurityConfguraton and Analysis
D. Tool to ID windows problems

Question 27
Your network contains multple subnets.
On one of the subnets, you deploy a server named Server1 that runs Windows Server 2012 R2.
You install the DNS Server server role on Server1, and then you create a standard primary zone named contoso.com.
You need to ensure that client computers can resolve single-label names to IP addresses.
What should you do frst?
A. Create a reverse lookup zone.

________________________________________________________________________________________________

www.Certificationking.com

Page No | 30

B. Convert the contoso.com zone to an Actve Directory-integrated zone.


C. Confgure dynamic updates for contoso.com.
D. Create a GlobalNames zone.

Aoswern B
Explanatonn
Although a GlobalNames zone is required in order to resolve single-label names, GNZs must be AD-integrated.
Since this is a standard primary zone (as opposed to an ADDS primary zone), we must frst integrate the zone into
Actve Directory.
Referencesn
Exam Refn 70-410n Installing and Confguring Windows Server 2012 R2, Chapter4n Deploying and confguring core
network services, Objectve 4.3n Deploy and Confgure the DNS service, p.233
htpn::technet.microsoo.com:en-us:library:cc731744.aspx

Question 28
HOTSPOT
Your network contains an Actve Directory domain named contoso.com. The domain contains a single locaton named
Site1. The domain contains a server named Server1 that has the DHCP Server server role installed.
All client computers receive their IPv4 confguratons dynamically.
The domain will expand to include a second locaton named Site2. A server named Server2 will be deployed to Site2.
Site1 and Site2 will connect to each other by using a WAN link.
You need to ensure that the clients in both sites receive their IPv4 confguratons from Server1.
In the table below, identfy which actons must be performed on each server. Make only one selecton in each row.
Each correct selecton is worth one point.

Aoswern

________________________________________________________________________________________________

www.Certificationking.com

Page No | 31

Explanatonn
Referencesn
htpn::technet.microsoo.com:library:hh831416
htpn::technet.microsoo.com:en-us:library:dd469766%28v=WS.10%29.aspx
Exam Referencen 70-410n Installing and Confguring Windows Server 2012 R2, Chapter4n Deploying and confguring
core network services, Objectve 4.1n Confgure IPv4 and IPv6 addressing, p.192, 196

Question 29
Your network contains an Actve Directory domain named contoso.com. The DNS zone for contoso.com is ActveDirectory integrated.
The domain contains 500 client computers. There are an additonal 20 computers in a workgroup.
You discover that every client computer on the network can add its record to the contoso.com zone.
You need to ensure that only the client computers in the Actve Directory domain can register records in the
contoso.com zone.
What should you do?
A. Sign the contoso.com zone by using DNSSEC.
B. Confgure the Dynamic updates setngs of the contoso.com zone.
C. Confgure the Security setngs of the contoso.com zone.
D. Move the contoso.com zone to a domain controller that is confgured as a DNS server.

Aoswern B
Question 30
Your network contains an Actve Directory domain named contoso.com. The domain contains a domain controller
named Server1 that has the DNS Server server role installed. Server1 hosts a primary zone for contoso.com.
The domain contains a member server named Server2 that is confgured to use Server1 as its primary DNS server.
From Server2, you run nslookup.exe as shown in the exhibit. (Click the Exhibit buton.)

________________________________________________________________________________________________

www.Certificationking.com

Page No | 32

You need to ensure that when you run Nslookup, the correct name of the default server is displayed.
What should you do?
A. On Server1, create a reverse lookup zone.
B. On Server1, modify the Security setngs of the contoso.com zone.
C. From Advanced TCP:IP Setngs on Server1, add contoso.com to the DNS sufx list.
D. From Advanced TCP:IP Setngs on Server2, add contoso.com to the DNS sufx list.

Aoswern A
Explanatonn
Make sure that a reverse lookup zone that is authoritatve for the PTR resource record exists.
PTR records contain the informaton that is required for the server to perform reverse name lookups.
Referencesn
htpn::technet.microsoo.com:en-us:library:cc961417.aspx
Exam Refn 70-410n Installing and Confguring Windows Server 2012 R2, Chapter4n Deploying and confguring core
network services, Objectve 4.1n Confgure IPv4 and IPv6 addressing, p.246

Question 31
DRAG DROP
You are confguring a mult-subnet IPv6 network for a regional ofce.
The corporate network administrator allocates the 2001n0db8n1234n0800n n:54 address space for your use.
You need to identfy network IDs of the frst and last subnets that you will be able to create at the ofce.
Which network IDs should you identfy?
To answer, drag the appropriate network IDs to the correct subnets. Each network ID may be used once, more than
once, or not at all. You may need to drag the split bar between panes or scroll to view content.

________________________________________________________________________________________________

www.Certificationking.com

Page No | 33

Aoswern

Question 32
DRAG DROP
You plan to deploy a DHCP server that will support four subnets. The subnets will be confgured as shown in the
following table.

You need to identfy which network ID you should use for each subnet.
What should you identfy?
To answer, drag the appropriate network ID to the each subnet in the answer area.

________________________________________________________________________________________________

www.Certificationking.com

Page No | 34

Aoswern

Explanatonn

Referencesn
Exam Refn 70-410n Installing and Confguring Windows Server 2012 R2, Chapter4n Deploying and confguring core
network services, Objectve 4.1n Confgure IPv4 and IPv6 addressing, p.192, 196

Question 33
Your network contains an Actve Directory domain named contoso.com. The domain contains a DHCP server named
Server1 that runs Windows Server 2012 R2.
You create a DHCP scope named Scope1. The scope has a start address of 192.168.1.10, an end address of
192.168.1.50, and a subnet mask of 255.255.255.192.
You need to ensure that Scope1 has a subnet mask of 255.255.255.0.

________________________________________________________________________________________________

www.Certificationking.com

Page No | 35

What should you do frst?


A. From the DHCP console, reconcile Scope1.
B. From the DHCP console, delete Scope1.
C. From the DHCP console, modify the Scope Optons of Scope1.
D. From Windows PowerShell, run the Set-DhcpServerv4Scope cmdlet.

Aoswern B
Explanatonn
You cannot change the subnet mask of a DHCP scope without deletng the scope and recreatng it with the new
subnet mask.
Set-DhcpServerv4Scope does not include a parameter for the subnet mask.

Question 34
DRAG DROP
You have a server named Server1.Server1 runs Windows Server 2012 R2.
Server1 has two network adapters. Each network adapter must be confgured as shown in the following table.

You need to confgure the correct IPv6 address prefx for each network adapter.
Which prefx should you select for each network adapter?
To answer, drag the appropriate IPv6 prefx to the correct network adapter in the answer area.
Each prefx may be used once, more than once, or not at all. You may need to drag the split bar between panes or
scroll to view content.

Aoswern

________________________________________________________________________________________________

www.Certificationking.com

Page No | 36

Explanatonn
An IPv6 multcast address always begins with 11111111 or FF and includes additonal structure that identfes the
scope of the address and the multcast group to which the interface belongs.IPv6 multcast addresses, therefore, are
always of the form FF00nn:8.
Referencen htpn::www.ian
A. org:assignments:ipv6-address-space:ipv6-address-spacE. xml

Question 35
Your company has a main ofce and two branch ofces. The ofces connect to each other by using a WAN link.
In the main ofce, you have a server named Server1 that runs Windows Server 2012 R2.
Server1 is confgured to use an IPv4 address only.
You need to assign an IPv6 address to Server1. The IP address must be private and routable.
Which IPv6 address should you assign to Server1?
A. fe80nab32n145cnn32ccn401b
B. f00n3ffn65dfn145cndca8nn82a4
C. 2001nab32n145cnn32ccn401b
D. fd00nab32n14nad88nacn58nabc2n4

Aoswern D
Explanatonn
Unique local addresses are IPv6 addresses that are private to an organizaton in the same way that private addresses
such as 10.x.x.x, 192.168.x.x, or 172.16.0.0 172.31.255.255can be used on an IPv4 network.
Unique local addresses, therefore, are not routable on the IPv6 Internet in the same way that an address like
10.20.100.55 is not routable on the IPv4 Internet. A unique local address is always structured as followsn
The frst 8 bits are always 11111101 in binary format. This means that a unique local address always begins with FD
and has a prefx identfer of FD00nn:8.

Question 36
In an isolated test environment, you deploy a server named Server1 that runs a Server Core Installaton of Windows
Server 2012 R2. The test environment does not have Actve Directory Domain Services (AD DS) installed.
You install the Actve Directory Domain Services server role on Server1.
You need to confgure Server1 as a domain controller.
Which cmdlet should you run?
A. Install-ADDSDomainController

________________________________________________________________________________________________

www.Certificationking.com

Page No | 37

B. Install-ADDSDomain
C. Install-ADDSForest
D. Install-WindowsFeature

Aoswern C
Explanatonn
Install-ADDSDomainController Installs a domain controller in Actve Directory.
Install-ADDSDomain Installs a new Actve Directory domain confguraton.
Install-ADDSForest Installs a new Actve Directory forest confguraton.
Install-WindowsFeature Installs one or more Windows Server roles, role services, or features on either the local or a
specifed remote server that is running Windows Server 2012 R2. This cmdlet is equivalent to and replaces AddWindowsFeature, the cmdlet that was used to install roles, role services, and features.
Cn\PS>Install-ADDSForest -DomainName corp.contoso.com -CreateDNSDelegaton DomainMode Win2008 ForestMode Win 2008 R2 -DatabasePath dn\NTDS -SysvolPath dn\SYSVOL LogPath en\LogsInstalls a new forest
named corp.contoso.com, creates a DNS delegaton in the contoso.com domain, sets domain functonal level to
Windows Server 2008 R2 and sets forest functonal level to Windows Server 2008,installs the Actve Directory
database and SYSVOL on the Dn\ drive, installs the log fles on the En\ drive and has the server automatcally restart
aoer AD DS installaton is complete and prompts the user to provide and confrm the Directory Services Restore Mode
(DSRM) password.

Question 37
You have a server named Server1 that runs Windows Server 2012 R2.
You promote Server1 to a domain controller.
You need to view the service locaton (SRV) records that Server1 registers in DNS.
What should you do on Server1?
A. Open the Srv.sys fle.
B. Open the Netlogon.dns fle.
C. Run ipconfg :displaydns.
D. Run Get-DnsServerDiagnostcs.

Aoswern B
Explanatonn
A. Timestamp server driver
B. Netlogon service creates a log fle that contains all the locator resource records stored in netlogon.
C. used to display current resolver cache content
D. Gets DNS event logging details

________________________________________________________________________________________________

www.Certificationking.com

Page No | 38

Question 38
Your network contains an Actve Directory domain named adatum.com. The domain contains several thousand
member servers that run Windows Server 2012 R2. All of the computer accounts for the member servers are in an
organizatonal unit (OU) named ServersAccounts.
Servers are restarted only occasionally.
You need to identfy which servers were restarted during the last two days.
What should you do?
A. Run dsquery computer and specify the staiepwd parameter.
B. Run Get-ADComputer and specify the SearchScope parameter.
C. Run Get-ADComputer and specify the IastLogon property.
D. Run dsquery server and specify the o parameter

Aoswern C
Question 39
Your network contains an Actve Directory forest. The forest contains a single domain named contoso.com. The
domain contains four domain controllers. The domain controllers are confgured as shown in the following table.

________________________________________________________________________________________________

www.Certificationking.com

Page No | 39

All domain controllers are DNS servers.


You plan to deploy a new domain controller named DC5 in the contoso.com domain.
You need to identfy which domain controller must be online to ensure that DC5 can be promoted successfully to a
domain controller.
Which domain controller should you identfy?
A. DC1
B. DC2
C. DC3
D. DC4

Aoswern D
Explanatonn
Relatve ID (RID) Mastern
Allocates actve and standby RID pools to replica domain controllers in the same domain. (corp.contoso.com).
Must be online for newly promoted domain controllers to obtain a local RID pool that is required to advertse or when
existng domain controllers have to update their current or standby RID pool allocaton.
The RID master is responsible for processing RID pool requests from all domain controllers in a partcular domain.
When a DC creates a security principal object such as a user or group, it ataches a unique Security ID (SID) to the
object. This SID consists of a domain SID (the same for all SIDs created in a domain), and a relatve ID (RID) that is
unique for each security principal SID created in a domain. Each DC in a domain is allocated a pool of RIDs that it is
allowed to assign to the security principals it creates. When a DCs allocated RID pool falls below a threshold, that DC
issues a request for additonal RIDs to the domains RID master. The domain RID master responds to the request by
retrieving RIDs from the domains unallocated RID pool and assigns them to the pool of the requestng DC At any one
tme, there can be only one domain controller actng as the RID master in the domain.

The Infrastructure Master The purpose of this role is to ensure that cross-domain object references are correctly

________________________________________________________________________________________________

www.Certificationking.com

Page No | 40

handled. For example, if you add a user from one domain to a security group from a diferent domain, the
Infrastructure Master makes sure this is done properly. As you can guess however, if your Actve Directory deployment
has only a single domain, then the Infrastructure Master role does no work at all, and even in a mult-domain
environment it is rarely used except when complex user administraton tasks are performed, so the machine holding
this role doesnt need to have much horsepower at all.

Question 40
Your network contains an Actve Directory forest that contains three domains.
A group named Group1 is confgured as a domain local distributon group in the forest root domain.
You plan to grant Group1 read-only access to a shared folder named Share1.Share1 is located in a child domain.
You need to ensure that the members of Group1 can access Share1.
What should you do frst?
A. Convert Group1 to a universal security group.
B. Convert Group1 to a global distributon group.
C. Convert Group1 to a universal distributon group.
D. Convert Group1 to a domain local security group.

Aoswern A
Explanatonn
Universal can be used for any domain or forest. Furthermore a Universal group can span multple domains, even the
entre forest.
Referencesn
Exam Ref 70-410n Installing and Confguring Windows Server 2012 R2n Chapter 5n Install and Administer Actve
Directory, Objectve 5.3 Create and manage Actve Directory groups and Organizaton units, p. 289-291, 293
htpn::technet.microsoo.com:en-us:library:cc781446(v=ws.10).aspx
htpn::technet.microsoo.com:en-us:library:cc755692(v=ws.10).aspx

Question 41
Your network contains an Actve Directory domain named contoso.com. The domain contains 100 servers. The servers
are contained in an organizatonal unit (OU) named Servers OU.
You need to create a group named Group1 on all of the servers in the domain. You must ensure that Group1 is added
only to the servers.
What should you confgure?
A. a Local Users and Groups preferences setng in a Group Policy linked to the Domain Controllers OU
B. a Restricted Groups setng in a Group Policy linked to the domain
C. a Local Users and Groups preferences setng in a Group Policy linked to ServersOU
D. a Restricted Groups setng in a Group Policy linked to Servers OU

Aoswern C
Explanatonn
A. This would add the group to the wrong OU
B. This would afect the whole domain and would efect member of the group
C. allows you to centrally manage local users and groups on domain member computers and is this is the correct OU
for the GPO change

________________________________________________________________________________________________

www.Certificationking.com

Page No | 41

D. Restricted Groups defnes what member or groups should exist as part of a group Why use Group Policy
preferences?
Unlike Group Policy setngs, which App1y to both local computer policy and Actve Directory policy, Group Policy
preferences only App1y to Actve Directory policy.
You use preferences to confgure many areas of the OS, includingn
System devices, such as USB ports, foppy drives and removable media Network shares and mapping network shares
to drive leters System and user environment variables
User and group accounts for the local computer
VPN and dial-up networking connectons
Printer confguraton and mapping
Registry setngs, schedule tasks and system services
Setngs for Folder Optons, Internet Optons and Regional and Language Optons Setngs for power schemes and
power management
Start Menu propertes and menu items

Question 42
Your network contains an Actve Directory forest named contoso.com. All domain controllers currently run Windows
Server 2008 R2.
You plan to install a new domain controller named DC4 that runs Windows Server 2012 R2.
The new domain controller will have the following confguratonsn
Schema master
Global catalog server
Actve Directory Federaton Services server role
Actve Directory Certfcate Services server role
You need to identfy which confguraton can be fulflled by using the Actve Directory Domain Services Confguraton
Wizard.
Which confguraton should you identfy?
A. Enable the global catalog server.
B. Install the DNS Server role.
C. Install the Actve Directory Certfcate Services role.
D. Transfer the schema master.

Aoswern A
Question 43
Your network contains an Actve Directory forest named contoso.com.
The forest contains two domains named contoso.com and child.contoso.com and two sites named Site1 and Site2.
The domains and the sites are confgured as shown in following table.

________________________________________________________________________________________________

www.Certificationking.com

Page No | 42

When the link between Site1 and Site2 fails, users fail to log on to Site2.
You need to identfy what prevents the users in Site2 from logging on to the child.contoso.com domain.
What should you identfy?
A. The placement of the global catalog server
B. The placement of the infrastructure master
C. The placement of the domain naming master
D. The placement of the PDC emulator

Aoswern D
Explanatonn
The exhibit shows that Site2 does not have a PDC emulator. This is important because of the close interacton
between the RID operatons master role and the PDC emulator role.
The PDC emulator processes password changes from earlier-version clients and other domain controllers on a bestefort basisn handles password authentcaton requests involving passwords that have recently changed and not yet
been replicated throughout the domainn and, by default, synchronizes tme. If this domain controller cannot connect
to the PDC emulator, this domain controller cannot process authentcaton requests, it may not be able to synchronize
tme, and password updates cannot be replicated to it.
The PDC emulator master processes password changes from client computers and replicates these updates to all
domain controllers throughout the domain. At any tme, there can be only one domain controller actng as the PDC
emulator master in each domain in the forest.

Question 44
DRAG DROP
Your network contains an Actve Directory domain named contoso.com. The domain contains two servers named
Server1 and Server2. Server1 and Server2 run a Server with a GUI installaton of Windows Server 2012 R2.
You remove the Graphical Management Tools and Infrastructure feature on Server2.
You need to restart Server2.
What should you do? (To answer, drag the appropriate tools to the correct statements. Each tool may be used once,
more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)

________________________________________________________________________________________________

www.Certificationking.com

Page No | 43

Aoswern

Explanatonn
When you uninstall "Server-GUI-Shell" you are leo with a "Minimal Server Interface" server. So, File Explorer and IE10
are unavailable, but MMC and Server Manager work and MMC and Server Manager will allow you to restart server2
either locally or remotely from Server1.
Referencesn
Training Guiden Installing and Confguring Windows Server 2012 R2n Chapter 2n Deploying Servers, p.44
Exam Ref 70-410n Installing and Confguring Windows Server 2012 R2n Chapter 1n Installing and Confguring Servers,
p.19-22

Question 45
You have a server named Server1 that runs Windows Server 2012 R2.
You plan to create a storage pool that will contain a new volume.
You need to create a new 600-GB volume by using thin provisioning. The new volume must use the parity layout.
What is the minimum number of 256-GB disks required for the storage pool?
A. 2
B. 3
C. 4
D. 5

Aoswern C
Explanatonn
It takes 3 discs (minimum) in order to create a storage pool array with parity. If this array were using fxed
provisioning, this would not be enough given the 256MB capacity (since only 2:3rds of 256 X 3 - less than 600 - could
be used as actual data with the rest being parity bits), but since this array uses thin provisioning, a 600GB volume
could technically be set up on a 20GB disc and it would stll show as 600GB. (So, essentally, the queston really
becomes how many drives it takes in a storage pool to create a parity array.)
Referencesn
htpn::technet.microsoo.com:en-us:library:hh831391.aspx

________________________________________________________________________________________________

www.Certificationking.com

Page No | 44

htpn::www.ibeast.com:content:tools:RaidCalc:RaidCalc.asp
htpn::www.raid-calculator.com:default.aspx
htpsn::www.icc-usa.com:raid-calculator

Question 46
You have a server named Server1 that runs Windows Server 2012 R2.
You plan to use Windows PowerShell Desired State Confguraton (DSC) to confrm that the Applicaton Identty
service is running on all fle servers.
You defne the following confguraton in the Windows PowerShell Integrated Scriptng Environment (ISE)n

You need to use DSC to confgure Server1 as defned in the confguraton.


What should you run frst?
A. Service1
B. Confguraton1
C. Start DscConfguraton
D. Test-DscConfgu raton

Aoswern B
Question 47
Your network contains an Actve Directory domain named contoso.com. The domain contains a server named Server1.
Server1 runs Windows Server 2012 R2.
You create a group Managed Service Account named gservice1.
You need to confgure a service named Service1 to run as the gservice1 account.
How should you confgure Service1?
A. From the Services Console, confgure the recovery setngs
B. From a command prompt, run sc.exe and specify the confg parameter
C. From Windows PowerShell, run Set-Service and specify the -PassThrough parameter
D. From a command prompt, run sc.exe and specify the sdset parameter

Aoswern B
Explanatonn
Sc confg, Modifes the value of a services entries in the registry and in the Service Control Manager database.
obj= {<AccountName> | <ObjectName>}
Specifes a name of an account in which a service will run, or specifes a name of the Windows driver object in which
the driver will run. The default setng is LocalSystem.
password= <Password>
Specifes a password. This is required if an account other than the LocalSystem account is used.

________________________________________________________________________________________________

www.Certificationking.com

Page No | 45

Question 48
HOTSPOT
You have a server named Server1 that runs Windows Server 2012 R2.
You need to switch Server1 to a Server Core installaton of Windows Server 2012 R2.
What command should you run?
To answer, select the appropriate optons in the answer area.

Aoswern

Question 49
HOTSPOT
You have a Hyper-V host named Server1 that runs Windows Server 2008 R2. All of the virtual machines on Server1 use
VHDs.
You install the Hyper-V server role on a server named Server2 that runs Windows Server 2012 R2. Server2 has the
same hardware confguratons as Server1.
You plan to migrate the Hyper-V host from Server1 to Server2 by using the Windows Server Migraton Tools.
In the table below, identfy what can be migrated by using the Windows Server Migraton Tools. Make only one
selecton in each row. Each correct selecton is worth one point.

________________________________________________________________________________________________

www.Certificationking.com

Page No | 46

Aoswern

Explanatonn
* The following confguratons and setngs can be migrated automatcally includen
: Most virtual machine confguratons. Virtual machines and their data are moved as part of the migraton, but some
confguratons require manual interventon
: Hyper-V setngs. These include the system-wide setngs and the authorizaton store.
Referencesn
htpn::technet.microsoo.com:en-us:library:ee849855%28v=WS.10%29.aspx

Question 50
DRAG DROP
You have a server named Server1 that runs Windows Server 2012 R2.
You need to create a new volume on Server1.

________________________________________________________________________________________________

www.Certificationking.com

Page No | 47

The new volume must have the following confguratonsn


Be stored on a new virtual hard disk
Be assigned the drive leter G
Have the NTFS fle system
In which order should you run the Diskpart commands?
To answer, move all the Diskpart commands from the list of commands to the answer area and arrange them in the
correct order.

Aoswern
Box 1n create vdisk
Box 2n atach vdisk
Box 3n create partton
Box 4n assign
Box 5n format
Noten Examplen
create vdisk fle="Cn\vdisks\disk1.vhd" maximum=16000
atach vdisk
create partton primary
assign leter=g
format
Explanatonn
Referencesn
htpn::technet.microsoo.com:en-us:library:gg252576.aspx
htpn::technet.microsoo.com:en-us:library:hh831487.aspx
Explanatonn

________________________________________________________________________________________________

www.Certificationking.com

Page No | 48

Noten Examplen
createvdisk fle="Cn\vdisks\disk1.vhd" maximum=16000
atachvdisk
create partton primary
assign leter=g
format
Referencesn
htpn::technet.microsoo.com:en-us:library:gg252576.aspx
htpn::technet.microsoo.com:en-us:library:hh831487.aspx

Question 51
DRAG DROP
Your network contains three servers. The servers are confgured as shown in the following tablE.

Your company plans to standardize all of the servers on Windows Server 2012 R2.
You need to recommend an upgrade path for each server.
The soluton must meet the following requirementsn
Upgrade the existng operatng system whenever possible.
Minimize hardware purchases.
Which upgrade path should you recommend for each server?

________________________________________________________________________________________________

www.Certificationking.com

Page No | 49

To answer, drag the appropriate upgrade path to each server in the answer area. Each upgrade path may be used
once, more than once, or not at all.

Aoswern

Explanatonn
Upgrade paths for Windows Server 2012 R2 are limited. In fact, its easier to specify when you can perform an
upgrade than when you cant. If you have a 64-bit computer running Windows Server 2008 or Windows Server 2008
R2, then you can upgrade it to Windows Server 2012 R2 as long as you use the same operatng system editon.
Windows Server 2012 R2 does not support the followingn
Upgrades from Windows Server versions prior to Windows Server 2008
Upgrades from pre-RTM editons of Windows Server 2012 R2
Upgrades from Windows workstaton operatng systems
Cross-platorm upgrades, such as 32-bit Windows Server 2008 to 64-bit Windows Server 2012
Upgrades from any Itanium editon
Cross-language upgrades, such as from Windows Server 2008, U.S.English to Windows Server 2012, French
In any of these cases, the Windows Setup program will not permit the upgrade to proceed.
Referencesn
htpn::technet.microsoo.com:en-us:library:jj134246.aspx

Question 52
Your network contains an Actve Directory forest named contoso.com. The forest contains a single domain. The
domain contains two domain controllers named DC1 and DC2 that run Windows Server 2012 R2.
The domain contains a user named User1 and a global security group named Group1.
You need to modify the SAM account name of Group1.
Which cmdlet should you run?
A. Add-AdPrincipalGroupMembership
B. Install-AddsDomainController
C. Install-WindowsFeature
D. Install-AddsDomain
E. Rename-AdObject
F. Set AdAccountControl
G. Set-AdGroup

________________________________________________________________________________________________

www.Certificationking.com

Page No | 50

H. Set-User

Aoswern G
Question 53
Your network contains an Actve Directory forest named contoso.com. The forest contains a single domain. The
domain contains two domain controllers named DC1 and DC2 that run Windows Server 2012 R2.
The domain contains a user named User1 and a global security group named Group1.
You need to add a new domain controller to the domain.
You install Windows Server 2012 R2 on a new server named DC3.
Which cmdlet should you run next?
A. Add-AdPrincipalGroupMembership
B. Install-AddsDomainController
C. Install WindowsFeature
D. Install AddsDomain
E. Rename-AdObject
F. Set-AdAccountControl
G. Set-AdGroup
H. Set-User

Aoswern C
Explanatonn
It is the 2nd step when installing a DC by powershell on a fresh server.

Question 54
Your network contains an Actve Directory forest named contoso.com. The forest contains a single domain. The
domain contains two domain controllers named DC1 and DC2 that run Windows Server 2012 R2.
The domain contains a user named User1 and a global security group named Group1.
You need to prevent User1 from changing his password. The soluton must minimize administratve efort.
Which cmdlet should you run?
A. Add-AdPrincipalGroupMembership
B. Install-AddsDomainController
C. Install-WindowsFeature
D. Install-AddsDomain
E. Rename-AdObject
F. Set-AdAccountControl
G. Set-AdGroup
H. Set-User

Aoswern F
Explanatonn
The Set-ADAccountControlcmdlet modifes the user account control (UAC) values for an Actve Directory user or
computer account. UAC values are represented by cmdlet parameters.
CannotChangePassword

________________________________________________________________________________________________

www.Certificationking.com

Page No | 51

Modifes the ability of an account to change its password. To disallow password change by the account set this to
$true. This parameter changes the Boolean value of the CannotChangePassword property of an account.
The following example shows how to specify the PasswordCannotChange parameter.
-CannotChangePassword $false
Referencesn
htpn::technet.microsoo.com:en-us:library:ee617249.aspx
htpn::technet.microsoo.com:en-us:library:hh974723.aspx
htpn::technet.microsoo.com:en-us:library:hh974722.aspx

Question 55
Your network contains an Actve Directory forest named contoso.com. The forest contains a single domain. The
domain contains two domain controllers named DC1 and DC2 that run Windows Server 2012 R2.
The domain contains a user named User1 and a global security group named Group1.
You reconfgure DC2 as a member server in the domain.
You need to add DC2 as the frst domain controller in a new domain in the forest.
Which cmdlet should you run?
A. Add-AdPrincipalGroupMembership
B. Install-AddsDomainController
C. Install WindowsFeature
D. Install AddsDomain
E. Rename-AdObject
F. Set AdAccountControl
G. Set-AdGroup
H. Set-User

Aoswern C
Explanatonn
Since a member server does not have Actve Directory Domain Services installed, you must install this role before you
can confgure the new Domain Controller (which would require you to run Install-ADDSForest).

Question 56
Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server
role installed.
Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.
Server1 is confgured as shown in the following table.

________________________________________________________________________________________________

www.Certificationking.com

Page No | 52

You install a network monitoring applicaton on VM2.


You need to ensure that all of the trafc sent to VM3 can be captured on VM2.
What should you confgure?
A. NUMA topology
B. Resource control
C. Resource metering
D. Virtual Machine Chimney
E. The VLAN ID
F. Processor Compatbility
G. The startup order
H. Automatc Start Acton
I. Integraton Services
J. Port mirroring
K. Single-root I:O virtualizaton

Aoswern J
Explanatonn
With Hyper-V Virtual Switch port mirroring, you can select the switch ports that are monitored as well as the switch
port that receives copies of all the trafc. And since Port mirroring allows the network trafc of a virtual machine to
be monitored by copying the trafc and forwarding it to another virtual machine that is confgured for monitoring,
you should confgure port mirroring on VM2.
Referencen htpn::technet.microsoo.com:en-us:library:jj679878.aspx#bkmk_portmirror

Question 57
You have a Hyper-V host named Host1 that connects to a SAN by using a hardware Fibre Channel adapter.
Host1 contains two virtual machines named VM1 and VM2.
You need to provide VM1 with direct access to the SAN. VM2 must not require access to the SAN.
Which two confguratons should you perform? (Each correct answer presents part of the soluton. Choose two.)
A. On VM1, confgure a Fibre Channel adapter.
B. On Host1, confgure a new virtual switch.
C. On VM1, add a network adapter.
D. On Host1, confgure a new Virtual Fibre Channel SAN.
E. On Host1, modify the Hyper-V setngs.

Aoswern A, D
Explanatonn
Step 1n
D. Building a Virtual SAN
The process of setng up virtual Fibre Channel starts with building a virtual SAN. The easiest way to accomplish this is
to open the Hyper-V Manager, right click on the listng for your Hyper-V server in the console tree, and then choose
the Virtual SAN Manager command from the shortcut menu.
Step 2n
A. Once you have created a virtual SAN, the next step in the process is to link a virtual machine to the virtual SAN. To
do so, right click on the virtual machine for which you want to provide Fibre Channel connectvity and select the
Setngs command from the resultng shortcut menu. Next, select the Add Hardware container, as shown in the fgure

________________________________________________________________________________________________

www.Certificationking.com

Page No | 53

above, and then select the Fibre Channel Adapter opton from the list of available hardware. Etc.
Noten
* Virtual Fibre Channel for Hyper-V (also referred to as Synthetc Fibre Channel) provides VM guest operatng systems
with direct access to a Fibre Channel SAN by using a standard World Wide Name (WWN) associated with a virtual
machine.

Question 58
You have a Hyper-V host named Server1 that runs Windows Server 2012 R2.
Server1 hosts a virtual machine named VM1 that runs Windows Server 2012 R2.
VM1 has several snapshots.
You need to modify the snapshot fle locaton of VM1.
What should you do?
A. Right-click VM1, and then click Export.
B. Shut down VM1, and then modify the setngs of VM1.
C. Delete the existng snapshots, and then modify the setngs of VM1.
D. Pause VM1, and then modify the setngs of VM1.

Aoswern C
Question 59
You have virtual machine named VM1.
VM1 uses a fxed size virtual hard disk (VHD) named Disk1.vhD. Disk1.vhd is 200 GB.
You shut down VM1.
You need to reduce the size of disk1.vhd.
Which acton should you select from the Edit Virtual Hard Disk Wizard?
A. Merge
B. Compact
C. Shrink
D. Convert

Aoswern C
Question 60
Your network contains an Actve Directory domain named contoso.com. The domain contains a server named Server1.
Server1 runs Windows Server 2012 R2.
You need to create a 3-TB virtual hard disk (VHD) on Server1.
Which tool should you use?
A. New-StoragePool
B. Diskpart
C. File Server Resource Manager (FSRM)
D. New-StorageSubsytemVirtualDisk

Aoswern B

________________________________________________________________________________________________

www.Certificationking.com

Page No | 54

Explanatonn
You can create a VHD from either the Disk Management snap-in or the command line (diskpart).
From the DiskPart command-line tool at an elevated command prompt, run the create vdisk command and specify
the fle (to name the fle) and maximum (to set the maximum size in megabytes) parameters. The following code
demonstrates how to create a VHD fle at Cn\vdisks\disk1.vdh with a maximum fle size of 16 GB (or 16,000 MB).
DiskPart
Microsoo DiskPart version 6.1.7100
Copyright (C) 1999-2008 Microsoo Corporaton.
On computern WIN7
DISKPART> create vdisk fle="Cn\vdisks\disk1.vhd" maximum=16000

Question 61
HOTSPOT
You have a Hyper-V host named Server1 that runs Windows Server 2012 R2. Server1 hosts 40 virtual machines that
run Windows Server 2008 R2. The virtual machines connect to a private virtual switch.
You have a fle that you want to copy to all of the virtual machines.
You need to identfy to which servers you can copy fles by using the Copy-VmFile cmdlet.
What command should you run? To answer, select the appropriate optons in the answer area.

Aoswern

________________________________________________________________________________________________

www.Certificationking.com

Page No | 55

Question 62
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed.
On Server1, you create a virtual machine named VM1. VM1 has a legacy network adapter.
You need to assign a specifc amount of available network bandwidth to VM1.
What should you do frst?
A. Remove the legacy network adapter, and then run the Set-VMNetworkAdapter cmdlet.
B. Add a second legacy network adapter, and then run the Set-VMNetworkAdopter cmdlet.
C. Add a second legacy network adapter, and then confgure network adapter teaming.
D. Remove the legacy network adapter, and then add a network adapter.

Aoswern D
Explanatonn
A. Set-VMNetworkAdaptercmdlet confgures features of the virtual network adapter in a virtual machine or the
management operatng system
B. The legacy network adapter doesnt support bandwidth management
C. The legacy network adapter doesnt support bandwidth management
D. Add a New network adapter. The legacy network adapter doesnt support bandwidth management.

Question 63
Your network contains an Actve Directory domain named contoso.com. The domain contains a server named Server1
that runs Windows Server 2012 R2.
You create a new inbound rule by using Windows Firewall with Advanced Security.
You need to confgure the rule to allow Server1 to accept unsolicited inbound packets that are received through a
network address translaton (NAT) device on the network.
Which setng in the rule should you confgure?
A. Interface types
B. Authorized computers
C. Remote IP address
D. Edge traversal

Aoswern D
Explanatonn

________________________________________________________________________________________________

www.Certificationking.com

Page No | 56

Edge traversal This indicates whether edge traversal is enabled (Yes) or disabled (No). When edge traversal is
enabled, the applicaton, service, or port to which the rule applies is globally addressable and accessible from outside
a network address translaton (NAT) or edge device.
Select one of the following optons from the listn Block edge traversal (default) Prevent applicatons from receiving
unsolicited trafc from the Internet through a NAT edge device. Allow edge traversal Allow applicatons to receive
unsolicited trafc directly from the Internet through a NAT edge device. Defer to user Let the user decide whether to
allow unsolicited trafc from the Internet through a NAT edge device when an applicaton requests it. Defer to
applicaton Let each applicaton determine whether to allow unsolicited trafc from the Internet through a NAT
edge device.
Referencen htpn::technet.microsoo.com:en-us:library:cc731927.aspx

Question 64
HOTSPOT
Your network contains an Actve Directory domain named contoso.com. All domain controllers run Windows Server
2012 R2.
All servers are confgured to enforce AppLocker policies.
You install a server named Server1.
On Server1, you install an applicaton named App1.exe in a folder located on Cn\App1.
You have two domain groups named Group1 and Group2.A user named User1 is a member of Group1 and Group2.
You create a Group Policy object (GPO) named GPO1. You link GPO1 to contoso.com.
You create the executable rules as shown in the exhibit by using the Create Executable Rules wizard. (Click the Exhibit
buton.)

To answer, complete each statement according to the informaton presented in the exhibit. Each correct selecton is
worth one point.

________________________________________________________________________________________________

www.Certificationking.com

Page No | 57

Aoswern

Question 65
Your network contains an Actve Directory domain named contoso.com. All servers run Windows Server 2012 R2. A
server named Server1 is confgured to encrypt all trafc by using IPSec.
You need to ensure that Server1 can respond to ping requests from computers that do not support IPSec.
What should you do?
A. From a command prompt, run netsh set global autotuninglevel = highlyrestrictedcongestonprovider=none.
B. From a command prompt, run netsh set global autotuninglevel = restricted congestonprovider = ctcp.
C. From Windows Firewall with Advanced Security, allow unicast responses for the Domain Profle.
D. From Windows Firewall with Advanced Security, exempt ICMP from IPSec.

Aoswern D
Question 66
DRAG DROP
You have a server named Server1 that runs Windows Server 2012 R2.
You need to perform the following storage confguraton tasks on Server1n
Bring a disk named Disk1 online.

________________________________________________________________________________________________

www.Certificationking.com

Page No | 58

Defragment a volume named Volume1.


Remove a disk named Disk2 from a storage pool named Pool1.
Which cmdlet should you use to perform each task?
To answer, drag the appropriate cmdlets to the correct tasks. Each cmdlet may be used once, more than once, or not
at all. You may need to drag the split bar between panes or scroll to view content.

Aoswern

Question 67
You have a server named Server1 that runs Windows Server 2012 R2.
You need to create a script that will create and mount a virtual hard disk.
Which tool should you use?
A. diskpart.exe
B. vdsldr.exe
C. fsutl.exe
D. vds.exe

Aoswern A
Question 68
You have a server named Server1 that runs Windows Server 2012 R2.

________________________________________________________________________________________________

www.Certificationking.com

Page No | 59

Server1 has three physical network adapters named NIC1, NIC2, and NIC3.
On Server1, you create a NIC team named Team1 by using NIC1 and NIC2. You confgure Team1 to accept network
trafc on VLAN 10.
You need to ensure that Server1 can accept network trafc on VLAN 10 and VLAN 11. The soluton must ensure that
the network trafc can be received on both VLANs if a network adapter fails.
What should you do?
A. From Server Manager, change the load balancing mode of Team1.
B. Run the New-NetLbfoTeam cmdlet.
C. From Server Manager, add an interface to Team1.
D. Run the Add-NetLbfoTeamMember cmdlet.

Aoswern C
Question 69
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has six network adapters. Two of the
network adapters are connected to a network named LAN1, two of the network adapters are connected to a network
named LAN2, and two of the network adapters are connected to a network named LAN3.
You create a network adapter team named Team1 from the two adapters connected to LAN1. You create a network
adapter team named Team2 from the two adapters connected to LAN2.
A company policy states that all server IP addresses must be assigned by using a reserved address in DHCP.
You need to identfy how many DHCP reservatons you must create for Server1.
How many reservatons should you identfy?
A. 3
B. 4
C. 6
D. 8

Aoswern B
Explanatonn
1 for each NIC Team (2 total) and 1 for each non-teamed NIC (2 total) -> 4 total IP addresses are required.

Question 70
DRAG DROP
You have a server named Server1 that runs Windows Server 2012 R2.
You need to create a new volume on Server1.
The new volume must have the following confguratonsn
Be stored on a new virtual hard disk
Be assigned the drive leter G
Have the NTFS fle system
In which order should you run the Diskpart commands?
To answer, move all the Diskpart commands from the list of commands to the answer area and arrange them in the
correct order.

________________________________________________________________________________________________

www.Certificationking.com

Page No | 60

Aoswern
Box 1n create vdisk
Box 2n atach vdisk
Box 3n create partton
Box 4n assign
Box 5n format
Noten Examplen
createvdisk fle="Cn\vdisks\disk1.vhd" maximum=16000
atachvdisk
create partton primary
assign leter=g
format
Explanatonn
Referencesn
htpn::technet.microsoo.com:en-us:library:gg252576.aspx
htpn::technet.microsoo.com:en-us:library:hh831487.aspx

Question 71
You have a server named Server1 that runs Windows Server 2012 R2.
On Server1, you open Computer Management as shown in the exhibit. (Click the Exhibit buton.)

________________________________________________________________________________________________

www.Certificationking.com

Page No | 61

You need to ensure that you can create a 3-TB volume on Disk 1.
What should you do frst?
A. Create a storage pool.
B. Convert the disk to a GPT disk.
C. Create a VHD, and then atach the VHD.
D. Convert the disk to a dynamic disk.

Aoswern B
Question 72
You have a server named Server1. Server1 runs Windows Server 2012 R2.
Server1 has a thin provisioned disk named Disk1.
You need to expand Disk1.
Which two actons should you perform? (Each correct answer presents part of the soluton. Choose two.)
A. From File and Storage Services, extend Disk1.
B. From File and Storage Services, add a physical disk to the storage pool.
C. From Disk Management, extend the volume.
D. From Disk Management, delete the volume, create a new volume, and then format the volume.
E. From File and Storage Services, detach Disk1.

Aoswern A, B
Explanatonn
Step 1 (B)n if required add physical disk capacity.
Step 2 (A)n Dynamically extend the virtual disk (not volume).
The File and Storage Services role and the Storage Services role service are installed by default, but without any
additonal role services. This basic functonality enables you to use Server Manager or Windows PowerShell to
manage the storage functonality of your servers.
Windows Server 2012 Storage Space subsystem now virtualizes storage by abstractng multple physical disks into a
logical construct with specifed capacity.

________________________________________________________________________________________________

www.Certificationking.com

Page No | 62

The process is to group selected physical disks into a container, the so-called storage pool, such that the total capacity
collectvely presented by those associated physical disks can appear and become manageable as a single and
seemingly contnuous space. Subsequently storage administrator creates a virtual disk based on a storage pool,
confgure a storage layout which is essentally a RAID level, and expose the storage of the virtual disk as a drive leter
or a mapped folder in Windows Explorer.
The system administrator uses File and Storage Services in Server Manager or the Disk Management tool tore scan
the disk, bring the disk online, and extend the disk size.

Question 73
Your network contains an Actve Directory domain named contoso.com.
You have a DHCP server named Server1 that runs Windows Server 2008.
You install Windows Server 2012 R2 on a server named Server2. You install the DHCP Server server role on Server2.
You need to migrate the DHCP services from Server1 to Server2. The soluton must meet the following requirementsn
Ensure that existng leases are migrated.
Prevent lease conficts.
Which three actons should you perform? (Each correct answer presents part of the soluton. Choose three.)
A. On Server1, run the Export-DhcpServer cmdlet.
B. On Server1, run the Stop-Service cmdlet.
C. On Server2, run the Receive-SmigServerData cmdlet.
D. On Server2, run the Stop-Service cmdlet.
E. On Server2, run the Import-DhcpServer cmdlet.
F. On Server1, run the Send-SmigServerData cmdlet.

Aoswern A, B, E
Question 74
Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Print and
Document Services server role installed.
You connect a new print device to the network. The marketng department and the sales department will use the
print device.
You need to provide users from both departments with the ability to print to the network print device. The soluton
must ensure that if there are multple documents queued to print, the documents from the sales users print before
the documents from the marketng users.
What should you do on Server1?
A. Add two printers. Modify the priorites of each printer and the security setngs of each printer
B. Add two printers and confgure printer pooling
C. Add one printer and confgure printer pooling.
D. Add one printer. Modify the printer priority and the security setngs

Aoswern A
Explanaton
To set diferent print priority to diferent groups
Open Printers and Faxes.
Right-click the printer you want to set, click Propertes, and then click the Advanced tab. In Priority, click the up or
down arrows, and then click OK. Or, type a priority level, where 1 is the lowest level and 99 is the highest, and then

________________________________________________________________________________________________

www.Certificationking.com

Page No | 63

click OK. Click Add Printer to add a second logical printer for the same physical printer. For instructons, see Related
Topics.
Click the Advanced tab.
In Priority, set a priority higher than that of the frst logical printer. Instruct the regular group of users to use the frst
logical printer name and the group with higher priority to use the second logical printer name. Set the appropriate
permissions for the diferent groups.

Question 75
Your network contains an Actve Directory domain named contoso.com. The domain contains two member servers
named Server1 and Server2 that run Windows Server 2012 R2.
You log on to Server1.
You need to retrieve a list of the actve TCP connectons on Server2.
Which command should you run from Server1?
A. winrm get server2
B. netstat> server2
C. dsquery * -scope base -atrip, server2
D. winrs -rnserver2 netstat

Aoswern D
Explanatonn
This command line tool enables administrators to remotely execute most Cmd.exe commands using the
WSManagement protocol.

Question 76
Your network contains an Actve Directory domain named contoso.com. The network contains a server named

________________________________________________________________________________________________

www.Certificationking.com

Page No | 64

Server1 that runs Windows Server 2012 R2 and a server named Server2 that runs Windows Server 2008 R2 Service
Pack 1 (SP1). Server1 and Server2 are member servers.
You need to ensure that you can manage Server2 from Server1 by using Server Manager.
Which two tasks should you perform? (Each correct answer presents part of the soluton. Choose two.)
A. Install Remote Server Administraton Tools on Server1.
B. Install Windows Management Framework 3.0 on Server2.
C. Install the Windows PowerShell 2.0 engine on Server1.
D. Install Microsoo .NET Framework 4 on Server2.
E. Install Remote Server Administraton Tools on Server2.

Aoswern B, D
Explanatonn
To be able to fully manage remote servers that run Windows Server 2008 or the R2 Service Pack 1 operatng system,
you should install the .NET Framework 4 on Server2 frst followed by the Windows Management Framework 3.0.

Question 77
Your network contains an Actve Directory domain named contoso.com. The domain contains two servers named
Server1 and Server2. Server1 runs Windows Server 2012 R2. Server2 runs Windows Server 2008 R2 Service Pack 1
(SP1) and has the DHCP Server server role installed.
You need to manage DHCP on Server2 by using the DHCP console on Server1.
What should you do frst?
A. From Windows PowerShell on Server2, run Enable-PSRemotng cmdlet.
B. From Windows PowerShell on Server1, run Install-Windows Feature.
C. From Windows Firewall with Advanced Security on Server2, create an inbound rule.
D. From Internet Explorer on Server2, download and install Windows Management Framework 3.0.

Aoswern B
Explanatonn
When the DHCP role is installed, it appears that the frewall rules are automatcally added, so C is not valid (not only
that, but either way it is an existng rule that one would need only enable nonetheless, not create a new rule). This
means you only need to add the DHCP Manager MMC snap-in which is a Role Administraton Tool feature.
So the correct answer must be B.
Referencesn
Training Guiden Installing and Confguring Windows Server 2012 R2, Chapter 6 Network Administraton, p.228

Question 78
Your network contains an Actve Directory domain named contoso.com. The domain contains two servers named
Server1 and Server2 that run Windows Server 2012 R2. Server1 has the Group Policy Management feature installed.
Server2 has the Print and Document Services server role installed.
On Server2, you open Print Management and you deploy a printer named Printer1 by using a Group Policy object
(GPO) named GPO1.When you open GPO1 on Server1, you discover that the Deployed Printers node does not appear.
You need to view the Deployed Printers node in GPO1.
What should you do?

________________________________________________________________________________________________

www.Certificationking.com

Page No | 65

A. On Server1, modify the Group Policy fltering optons of GPO1.


B. On a domain controller, create a Group Policy central store.
C. On Server2, install the Group Policy Management feature.
D. On Server1, confgure the security fltering of GPO1.

Aoswern C
Explanatonn
Pre-Requisites
To use Group Policy for printer deployment you will need to have a Windows Actve Directory domain, and this artcle
assumes that your Domain Controller is a Windows 2008 R2 Server. You will also need the Print Services role installed
on a server (can be on your DC), and you will be using the Print Management and Group Policy Management consoles
to confgure the various setngs. Its assumed that you have already followed Part One and have one or more printers
shared on your server with the necessary drivers, ready to deploy to your client computers.

Question 79
Your network contains an Actve Directory domain named contoso.com. The domain contains a member server
named Server 1. Server1 runs Windows Server 2012 R2 and has the DHCP Server server role installed.
You create two IPv4 scopes on Server1. The scopes are confgured as shown in the following table.

The DHCP clients in Subnet_Tor can connect to the client computers in Subnet_Mtl by using an IP address or a FQDN.
You discover that the DHCP clients in Subnet_Mtl can connect to client computers in Subnet_Tor by using an IP
address only.
You need to ensure that the DHCP clients in both subnets can connect to any other DHCP client by using a FQDN.
What should you add?
A. The 006 DNS Servers opton to Subnet_Mtl
B. The 006 DNS Servers opton to Subnet_Tor
C. The 015 DNS Domain Name opton to Subnet_Mtl
D. The 015 DNS Domain Name opton to Subnet_Tor

Aoswern A
Question 80
HOTSPOT
You have a DHCP server named Server1 that runs Windows Server 2012 R2.
On Server1, you run the commands as shown in the exhibit. (Click the Exhibit buton.)

________________________________________________________________________________________________

www.Certificationking.com

Page No | 66

To answer, complete each statement according to the informaton presented in the exhibit. Each correct selecton is
worth one point.

Aoswern

Question 81

________________________________________________________________________________________________

www.Certificationking.com

Page No | 67

Your network contains an Actve Directory forest named contoso.com. The forest contains two domains named
contoso.com and child.contoso.com. The forest contains two domain controllers. The domain controllers are
confgured as shown in the following table.

You need to ensure that DC2 can provide authoritatve responses for queries to the contoso.com namespace.
What should you do?
A. On DC1, create a delegaton.
B. On DC1, change the replicaton scope of the contoso.com zone.
C. On DC2, create a forwarder.
D. On DC2, modify the Zone Transfers setngs.

Aoswern B
Explanatonn
For DC1 to be able to provide authoritatve responses to DNS queries the replicaton scope should be changed
accordingly so that it has the zone data for the contoso.com domain.

Question 82
You have a server named Server1 that runs a Server Core installaton of Windows Server 2012 R2.
Server1 is confgured to obtain an IPv4 address by using DHCP.
You need to confgure the IPv4 setngs of the network connecton on Server1 as followsn
IP addressn 10.1.1.1
Subnet maskn 255.255.240.0
Default gatewayn 10.1.1.254
What should you run?
A. netsh.exe
B. netcfg.exe
C. msconfg.exe
D. ipconfg.exe

Aoswern A
Explanatonn
In order to confgure TCP:IP setngs such as the IP address, Subnet Mask, Default Gateway, DNS and WINS addresses
and many other optons you can use Netsh.exe.
Incorrectn
Not Dn Windows Server 2012 Core stll has IPCONFIG.EXE that can be used to view the IP confguraton.
Modern servers typically come with several network interface ports. This causes IPCONFIG.EXE to scroll of the screen
when viewing its output. Consider piping the output if IPCONFIG.EXE to a fle and view it with Notepad.exe.

Question 83
Your network contains an Actve Directory domain named contoso.com. The domain contains a domain controller

________________________________________________________________________________________________

www.Certificationking.com

Page No | 68

named DC1 that hosts the primary DNS zone for contoso.com.
All client computers are confgured to use DC1 as the primary DNS server.
You need to confgure DC1 to resolve any DNS requests that are not for the contoso.com zone by querying the DNS
server of your Internet Service Provider (ISP).
What should you confgure?
A. Naming Authority Pointer (NAPTR) DNS resource records (RR)
B. Name server (NS) records
C. A Forwarders
D. Conditonal forwarders

Aoswern C
Explanatonn
On a network with several servers and:or client computers a server that is confgured as a forwarder will manage the
Domain Name System (DNS) trafc between your network and the Internet.

Question 84
Your network contains an Actve Directory domain named contoso.com. The domain contains a domain controller
named DC1 that runs Windows Server 2012 R2 and a client computer named Computer1 that runs windows 8.
DC1 is confgured as a DHCP server as shown in the exhibit. (Click the Exhibit buton.)

Computer1 is confgured to obtain an IP address automatcally.


You notce that Computer1 is unable to obtain an IP address from DC1.
You need to ensure that Computer1 can receive an IP address from DC1.
What should you do?
A. Disable the Allow flters.
B. Disable the Deny flters.
C. Authorize DC1.contoso.com.
D. Actvate Scope [10.1.1.0] Contoso.com.

Aoswern A
Explanatonn

________________________________________________________________________________________________

www.Certificationking.com

Page No | 69

A red down arrow indicates an unauthorized DHCP server. A DHCP server that is a domain controller or a member of
an Actve Directory domain queries Actve Directory for the list of authorized servers (identfed by IP address). If its
own IP address is not in the list of authorized DHCP servers, the DHCP Server service does not complete its startup
sequence and automatcally shuts down.

Question 85
Your network contains an Actve Directory domain named contoso.com. The domain contains a server named Server1
that runs Windows Server 2012 R2 and has the Remote Access server role installed.
A user named User1 must connect to the network remotely. The client computer of User1 requires Challenge
Handshake Authentcaton Protocol (CHAP) for remote connectons. CHAP is enabled on Server1.
You need to ensure that User1 can connect to Server1 and authentcate to the domain.
What should you do from Actve Directory Users and Computers?
A. From the propertes of User1, select Store password using reversible encrypton.
B. From the propertes of Server1, assign the Allowed to Authentcate permission to User1.
C. From the propertes of User1, select Use Kerberos DES encrypton types for this account.
D. From the propertes of Server1, select Trust this computer for delegaton to any service (Kerberos only).

Aoswern A
Explanatonn
The Store password using reversible encrypton policy setng provides support for Applicatons that use protocols that
require the users password for authentcaton. Storing encrypted passwords in a way that irreversible means that the
encrypted passwords can be decrypted. A knowledgeable atacker who is able to break this encrypton can then log
on to network resources by using the compromised account. For this reason, never enable Store password using
reversible encrypton for all users in the domain unless Applicaton requirements outweigh the need to protect
password informaton. If you use the Challenge Handshake Authentcaton Protocol (CHAP) through remote access or
Internet Authentcaton Services (IAS), you must enable this policy setng. CHAP is an authentcaton protocol that is
used by remote access and network connectons.
Digest Authentcaton in Internet Informaton Services (IIS) also requires that you enable this policy setng. If your
organizaton uses CHAP through remote access or IAS, or Digest Authentcaton in IIS, you must confgure this policy
setng to Enabled. This presents a security risk when you App1y the setng through Group Policy on a user-by-user
basis because it requires the appropriate user account object to be opened in Actve Directory Users and Computers.

Question 86
Your network contains an Actve Directory forest named contoso.com. All domain controllers currently run Windows
Server 2008 R2.
You plan to install a new domain controller named DC4 that runs Windows Server 2012 R2.
The new domain controller will have the following confguratonsn
Schema master
Global catalog server
DNS Server server role
Actve Directory Certfcate Services server role
You need to identfy which confguratons cannot be fulflled by using the Actve Directory Domain Services
Confguraton Wizard.
Which two confguratons should you identfy? (Each correct answer presents part of the soluton. Choose two.)
A. Install the DNS Server role.

________________________________________________________________________________________________

www.Certificationking.com

Page No | 70

B. Enable the global catalog server.


C. Install the Actve Directory Certfcate Services role.
D. Transfer the schema master.

Aoswern C, D
Explanatonn
Installaton Wizard will automatcally install DNS and allows for the opton to set it as a global catalog server. ADCS
and schema must be done separately.

Question 87
Your network contains an Actve Directory domain named adatum.com.
You discover that when users join computers to the domain, the computer accounts are created in the Computers
container.
You need to ensure that when users join computers to the domain, the computer accounts are automatcally created
in an organizatonal unit (OU) named All_Computers.
What should you do?
A. From a command prompt, run the redircmp.exe command.
B. From ADSI Edit, confgure the propertes of the OU1 object.
C. From Ldp, confgure the propertes of the Computers container.
D. From Windows PowerShell, run the Move-ADObject cmdlet.

Aoswern A
Explanatonn
This command redirects the default container for newly created computers to a specifed, target organizatonal unit
(OU) so that newly created computer objects are created in the specifc target OU instead of in All_Computers.
Referencen htpn::technet.microsoo.com:en-us:library:cc770619.aspx

Question 88
HOTSPOT
Your network contains an Actve Directory domain named contoso.com. All servers run Windows Server 2012 R2.
You need to add a user named User1 to a group named ServerAdmins.
What command should you run? To answer, select the appropriate optons in the answer area.

________________________________________________________________________________________________

www.Certificationking.com

Page No | 71

Aoswern

Question 89
Your network contains an Actve Directory domain named contoso.com.
You log on to a domain controller by using an account named Admin1.Admin1 is a member of the Domain Admins
group.
You view the propertes of a group named Group1 as shown in the exhibit. (Click the Exhibit buton.)

Group1 is located in an organizatonal unit (OU) named OU1.


You need to ensure that users from Group1 can modify the Security setngs of OU1 only.
What should you do from Actve Directory Users and Computers?
A. Modify the Managed By setngs on OU1.
B. Right-click contoso.com and select Delegate Control.

________________________________________________________________________________________________

www.Certificationking.com

Page No | 72

C. Right-click OU1 and select Delegate Control.


D. Modify the Security setngs of Group1.

Aoswern C
Explanatonn
Delegatng control to only the OU will allow the users of Group1 to modify the security setngs.

Question 90
Your network contains an Actve Directory forest named contoso.com. The forest contains a single domain. All servers
run Windows Server 2012 R2. The domain contains two domain controllers named DC1 and DC2. Both domain
controllers are virtual machines on a Hyper-V host.
You plan to create a cloned domain controller named DC3 from an image of DC1.
You need to ensure that you can clone DC1.
Which two actons should you perform? (Each correct answer presents part of the soluton. Choose two.)
A. Add the computer account of DC1 to the Cloneable Domain Controllers group.
B. Create a DCCloneConfg.xml fle on DC1.
C. Add the computer account of DC3 to the Cloneable Domain Controllers group.
D. Run the Enable-AdOptonalFeaturecmdlet.
E. Modify the contents of the DefaultDCCIoneAllowList.xml fle on DC1.

Aoswern A, B
Explanatonn
A. Cloneable Domain Controllers Group Theres a new group in town. Its called Cloneable Domain Controllers and
you can fnd it in the Users container. Membership in this group dictates whether a DC can or cannot be cloned. This
group has some permissions set on the domain head that should not be removed. Removing these permissions will
cause cloning to fail. Also, as a best practce, DCs shouldnt be added to the group untl you plan to clone and DCs
should be removed from the group once cloning is complete. Cloned DCs will also end up in the Cloneable Domain
Controllers group.
B. DCCloneConfg.xml
Theres one key diference between a cloned DC and a DC that is being restored to a previous snapshotn
DCCloneConfg.XML.
DCCloneConfg.xml is an XML confguraton fle that contains all of the setngs the cloned DC will take when it boots.
This includes network setngs, DNS, WINS, AD site name, new DC name and more. This fle can be generated in a few
diferent ways.
The New-ADDCCloneConfgcmdlet in PowerShell
By hand with an XML editor
By editng an existng confg fle, again with an XML editor.
Referencen Virtual Domain Controller Cloning in Windows Server 2012.

Question 91
HOTSPOT
Your network contains an Actve Directory domain named contoso.com. Domain controllers run either Windows
Server 2008 R2 or Windows Server 2012 R2. All client computers run Windows 8.
All computer accounts are located in an organizatonal unit (OU) named OU1.
You create a Group Policy object (GPO) that contains several AppLocker rules. You link the GPO to OU1.

________________________________________________________________________________________________

www.Certificationking.com

Page No | 73

You need to ensure that the AppLocker rules apply to all of the client computers.
What should you confgure in the GPO?
To answer, select the appropriate service in the answer area.

Aoswern

________________________________________________________________________________________________

www.Certificationking.com

Page No | 74

Explanatonn
Confguring the Applicaton Identty will specify where the Group Policy will be applied.
Referencesn
htpn::www.grouppolicy.biz:2012:08:how-manage-published-a-k-a-metro-apps-in-windows-8-using-grouppolicy:
Exam Refn 70-410n Installing and Confguring Windows Server 2012 R2, Chapter 6n Create and manage Group Policy,
Objectve 6.3n Confgure applicaton restricton policies, p.341

Question 92
Your network contains an Actve Directory domain named contoso.com.
You create a sooware restricton policy to allow an applicaton named App1 by using a certfcate rule.
You need to ensure that when users atempt to execute App1, the certfcate for App1 is verifed against a certfcate
revocaton list (CRL).
What should you do?
A. Modify the rule for App1.
B. Modify the Trusted Publishers Propertes.
C. Create a new certfcate rule for App1.
D. Modify the Enforcement Propertes.

Aoswern B

________________________________________________________________________________________________

www.Certificationking.com

Page No | 75

Question 93
HOTSPOT
Your network contains an Actve Directory forest. The forest contains a single domain named contoso.com.
AppLocker policies are enforced on all member servers.
You view the AppLocker policy applied to the member servers as shown in the exhibit. (Click the Exhibit buton.)

To answer, complete each statement according to the informaton presented in the exhibit. Each correct selecton is
worth one point.

Aoswern

________________________________________________________________________________________________

www.Certificationking.com

Page No | 76

Question 94
Your network contains an Actve Directory domain named contoso.com. The domain contains an organizatonal unit
(OU) named OU1.
You need to ensure that when new client computers join the domain, their computer accounts are created in OU1 by
default.
What should you do?
A. From Windows PowerShell, run the Move-ADObjectcmdlet.
B. From a command prompt, run the redircmp.exe command.
C. From ADSI Edit, confgure the propertes of the OU1 object.
D. From Ldp, confgure the propertes of the Computers container.

Aoswern B
Explanatonn
Redirects the default container for newly created computers to a specifed, target organizatonal unit (OU) so that
newly created computer objects are created in the specifc target OU instead of in CN=Computers.
The CN=Computers container is a computer-protected object. For backward compatbility reasons, you cannot (and
must not) remove it.
Referencen htpn::technet.microsoo.com:en-us:library:cc770619.aspx

Question 95
Your network contains an Actve Directory domain named contoso.com. The domain contains 100 user accounts that
reside in an organizatonal unit (OU) named OU1.
You need to ensure that a user named User1 can link and unlink Group Policy objects (GPOs) to OU1. The soluton
must minimize the number of permissions assigned to User1.
What should you do?
A. Run the Delegaton of Control Wizard on OU1.
B. Add User1 to the Group Policy Creator Owners group.
C. Modify the permission on the \\Contoso.com\SYSVOL\Contoso.com\Policies folder.
D. Modify the permissions on the User1 account.

Aoswern A
________________________________________________________________________________________________

www.Certificationking.com

Page No | 77

Explanatonn
The Delegaton of Control Wizard allows you to delegate tasks, actve Directory Object types and to set permissions.

Question 96
HOTSPOT
Your network contains an Actve Directory domain named adatum.com.
You create an account for a temporary employee named User1.
You need to ensure that User1 can log on to the domain only between 08n00 and 18n00 from a client computer named
Computer1.
From which tab should you perform the confguraton?
To answer, select the appropriate tab in the answer area.

Aoswern

________________________________________________________________________________________________

www.Certificationking.com

Page No | 78

Explanatonn
The User account propertes contains the Logon Hours setngs that you can use to change the hours that this selected
object can log on to the domain. By default, domain logon is allowed 24 hours a day, 7 days a week. Note that this
control does not afect the user's ability to log on locally to a computer using a local computer account instead of a
domain account.
To set logon hours
1. Open Actve Directory Users and Computers.
2. In the console tree, click Users.
Where?
Actve Directory Users and Computers:domain
node:Users Or, click the folder that contains the user account.
3. Right-click the user account, and then click Propertes.
4. On the Account tab, click Logon Hours, and then set the permited or denied logon hours for the user.

________________________________________________________________________________________________

www.Certificationking.com

Page No | 79

Referencen htpn::technet.microsoo.com:en-us:library:dd145547.aspx

Question 97
Your network contains an Actve Directory forest named contoso.com. The forest contains a single domain. The
domain contains two domain controllers named DC1 and DC2 that run Windows Server 2012 R2.
The domain contains a user named User1 and three global security groups named Group1, Group2 and, Group3.
You need to add User1 to Group1, Group2, and Group3.
Which cmdlet should you run?

________________________________________________________________________________________________

www.Certificationking.com

Page No | 80

A. Add-AdPrincipalGroupMembership
B. Install-AddsDomainController
C. Install-WindowsFeature
D. Install-AddsDomain
E. Rename-AdObject
F. Set-AdAccountControl
G. Set-AdGroup
H. Set-User

Aoswern A
Explanatonn
The Add-ADPrincipalGroupMembershipcmdlet adds a user, group, service account, or computer as a new member to
one or more Actve Directory groups.
Referencesn
htpn::technet.microsoo.com:en-us:library:ee617203.aspx
htpn::technet.microsoo.com:en-us:library:hh974723.aspx

Question 98
Your network contains an Actve Directory forest named contoso.com. The forest contains a single domain. The
domain contains two domain controllers named DC1 and DC2 that run Windows Server 2012 R2.
The domain contains a user named User1 and a global security group named Group1.
User1 logs on to a client computer named Computer1.
You need to disable the computer account of Computer1.
Which cmdlet should you run?
A. Add-AdPrincipalGroupMember.hip
B. Install-AddsDomainController
C. Install WindowsFeature
D. Install AddsDomain
E. Roname-AdObject
F. Set-AdAccountControl
G. Set-AdGroup
H. Set-User

Aoswern F
Explanatonn
Set-ADAccountControl Enabled
Specifes if an account is enabled. An enabled account requires a password. This parameter sets the Enabled property
for an account object. This parameter also sets the ADS_UF_ACCOUNTDISABLE fag of the Actve Directory User
Account Control (UAC) atribute. Possible values for this parameter includen
$false or 0
$true or 1
The following example shows how to set this parameter to enable the account.
-Enabled $true

Question 99

________________________________________________________________________________________________

www.Certificationking.com

Page No | 81

Your network contains an Actve Directory domain named contoso.com. The domain contains a member server
named Server1 and a domain controller named DC2.All servers run Windows Server 2012 R2. All domain controllers
are confgured as DNS servers.
On Server1, you open Server Manager and you add DC2 as another server to manage.
From Server Manager on Server1, you right-click DC2 as shown in the exhibit. (Click the Exhibit buton.)

You need to ensure that when you right-click DC2, you see the opton to run DNS Manager.
What should you do?
A. On Server1, install the Role Administraton Tools.
B. In the domain, add Server1 to the DNS Admins group.
C. On DC2 and Server1, run winrmquickconfg.
D. On DC2, install the Feature Administraton Tools.

Aoswern A
Explanatonn
The Domain Name System (DNS) role is a role that provides a standard method for associatng names with numeric
Internet addresses. This lets users refer to network computers by using easy-to-remember names instead of a long
series of numbers. Windows DNS services can be integrated with DHCP services, eliminatng the need to add DNS
records as computers are added to the network.

Question 100
Your network contains an Actve Directory forest. The forest functonal level is Windows Server 2012 R2. The forest
contains a single domain. The domain contains a member server named Server1. Server1 runs windows Server 2012
R2.
You purchase a network scanner named Scanner1 that supports Web Services on Devices (WSD).

________________________________________________________________________________________________

www.Certificationking.com

Page No | 82

You need to share the network scanner on Server1.


Which server role should you install on Server1?
A. Web Server (IIS)
B. Fax Server
C. Print and Document Services
D. File and Storage Services

Aoswern C
Explanatonn
The Print and Document Services role allows for the confguraton to share printers, scanners and fax devices.
Referencesn
Exam Ref 70-410n Installing and Confguring Windows Server 2012 R2, Chapter 1n Installing and Confguring servers,
Objectve 1.2n Confgure servers, p. 8
htpn::technet.microsoo.com:en-us:library:hh831468.aspx

Question 101
Your network contains an Actve Directory domain named contoso.com. The domain contains three servers named
Server1, Server2, and Server3.
You create a server group named ServerGroup1.
You discover the error message shown in the following exhibit. (Click the Exhibit buton.)

You need to ensure that Server2 can be managed remotely by using Server Manager.
What should you do?

________________________________________________________________________________________________

www.Certificationking.com

Page No | 83

A. On DC1, run the Enable-PSSessionConfguraton cmdlet.


B. On Server2, run the Add-Computer cmdlet.
C. On Server2 modify the membership of the Remote Management Users group.
D. From Actve Directory Users and Computers, add a computer account named Server2, and then restart Server2.

Aoswern C
Explanatonn
This is a security issue. To be able to access Server2 remotely through Server Manager the user need to be a member
of the Remote Management Users group.
Noten
* Namen BUILTIN\Remote Management Users
Descriptonn A Builtn Local group. Members of this group can access WMI resources over management protocols
(such as WS-Management via the Windows Remote Management service). This applies only to WMI namespaces that
grant access to the user.
* Enable-ServerManagerStandardUserRemotng
Provides one or more standard, non-Administrator users access to event, service, performance counter, and role and
feature inventory data for a server that you are managing by using Server Manager.
Syntaxn
Parameter Setn Default
Enable-ServerManagerStandardUserRemotng [-User] <String[]> [-Force] [-Confrm] [-WhatIf]
[ <CommonParameters>]
Detailed Descripton
Provides one or more standard, non-Administrator users access to event, service, performance counter, and role and
feature inventory data for a server that you are managing, either locally or remotely, by using Server Manager. The
cmdlet must be run locally on the server that you are managing by using Server Manager. The cmdlet works by
performing the following actonsn
Adds access rights for specifed standard users to the root\cimv2 namespace on the local server (for access to role and
feature inventory informaton).
Adds specifed standard users to required user groups (Remote Management Users, Event Log Readers, and
Performance Log Readers) that allow remote access to event and performance counter logs on the managed server.
Changes access rights in the Service Control Manager to allow specifed standard users remote access to the status of
services on the managed server.
Incorrectn
Not An the Enable-PSSessionConfguraton.This is an advanced cmdlet that is designed to be used by system
administrators to manage customized session confguratons for their users.
Referencen Enable-ServerManagerStandardUserRemotng

Question 102
HOTSPOT
Your company has a main ofce and a sales ofce. The main ofce has 2,000 users. The sales ofce has 20 users. All
client computers in the sales ofce run Windows 8.
The sales ofce contains a print server named App1 that runs Windows Server 2012 R2. App1 has a shared printer
named Printer1. Printer1 connects to a network-atached print device.
You plan to connect all of the users in the sales ofce to Printer1 on App1.
You need to ensure that if App1 fails, the users can contnue to print to Printer1.
What should you confgure on App1? To answer, select the appropriate opton in the answer area.

________________________________________________________________________________________________

www.Certificationking.com

Page No | 84

Aoswern

Explanatonn
Direct printer will bypass the need to print via the print server.
Referencesn
Exam Ref 70-410n Installing and Confguring Windows Server 2012 R2n Objectve 2.3 Confgure Print and Document
services, Chapter 2n Confgure Server roles and Features, p.104, 107.

Question 103
Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server
role installed.
Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4.
Server1 is confgured as shown in the following table.

________________________________________________________________________________________________

www.Certificationking.com

Page No | 85

VM3 is used to test applicatons.


You need to prevent VM3 from synchronizing its clock to Server1.
What should you confgure?
A. NUMA topology
B. Resource control
C. Resource metering
D. Virtual Machine Chimney
E. The VLAN ID
F. Processor Compatbility
G. The startup order
H. Automatc Start Acton
I. Integraton Services
J. Port mirroring
K. Single-root I:O visualizaton

Aoswern I
Explanatonn
Integraton Services setngs on virtual machines includes services such as operatng system shutdown, tme
synchronizaton, data exchange, Heart beat, and Backup (volume snapshot services. Thus you should disable the tme
synchronizaton using Integraton Services.
Referencesn
htpn::blogs.technet.com:b:virtualizaton:archive:2008:08:29:backing-up-hyper-v-virtual-machines.aspx
Exam Ref 70-410, Installing and Confguring Windows Server 2012 R2, Chapter 3n Confgure Hyper-V, Objectve 3.1n
Create and Confgure virtual machine setngs, p. 144

Question 104
HOTSPOT
You deploy a Server with a GUI installaton of Windows Server 2012 R2 Datacenter.
From Windows PowerShell, you run the following commandn
Remove-WindowsFeature Server-Gui-Shell.
In the table below, identfy which tools are available on Server1 and which tools are unavailable on Server1.
Make only one selecton in each row. Each correct selecton is worth one point.

________________________________________________________________________________________________

www.Certificationking.com

Page No | 86

Aoswern

Explanatonn
When you uninstall "Server-GUI-Shell" you are leo with a "Minimal Server Interface" server. So, File Explorer and IE10
are unavailable, but MMC and Server Manager work.
Referencesn
Training Guiden Installing and Confguring Windows Server 2012 R2n Chapter 2n Deploying Servers, p.44
Exam Ref 70-410n Installing and Confguring Windows Server 2012 R2n Chapter 1n Installing and Confguring Servers,
p.19-22

Question 105
You have a server named Server1 that runs Windows Server 2012 R2.
You try to install the Microsoo .NET Framework 3.5 Features feature on Server1, but the installaton fails repeatedly.
You need to ensure that the feature can be installed on Server1.
What should you do?
A. Install Windows Identty Foundaton (WIF) 3.5.

________________________________________________________________________________________________

www.Certificationking.com

Page No | 87

B. Install the Web Server (IIS) server role.


C. Connect Server1 to the Internet.
D. Run the Add-AppxProvisionedPackage cmdlet.

Aoswern C
Explanatonn
The fles needed are no longer available on the local Hard drive. We need to connect the server to the Internet.
Important to note that when startng with Windows Server 2012 R2 and Windows 8, the feature fles for .NET
Framework 3.5 (which includes .NET Framework 2.0 and .NET Framework 3.0) are not available on the local computer
by default. The fles have been removed. Files for features that have been removed in a Features on Demand
confguraton, along with feature fles for .NET Framework 3.5, are available through Windows Update. By default, if
feature fles are not available on the destnaton server that is running Windows Server 2012 R2 Preview or Windows
Server 2012 R2, the installaton process searches for the missing fles by connectng to Windows Update. You can
override the default behavior by confguring a Group Policy setng or specifying an alternate source path during
installaton, whether you are installing by using the Add Roles and Features Wizard GUI or a command line.

Question 106
You have a server that runs Windows Server 2012 R2.
The disks on the server are confgured as shown in the exhibit. (Click the Exhibit buton.)

You need to create a storage pool that contains Disk 1 and Disk 2.
What should you do frst?
A. Delete volume E
B. Convert Disk 1 and Disk 2 to dynamic disks
C. Convert Disk 1 and Disk 2 to GPT disks
D. Create a volume on Disk 2
________________________________________________________________________________________________

www.Certificationking.com

Page No | 88

Aoswern A
Explanatonn
A. Storage Pools use unallocated space
There is no way to create a storage pool with existng data. Storage pools are only a collecton of drives that are
managed by windows.

Question 107
You have a server named Server1 that runs Windows Server 2012 R2.
You add an additonal disk to Server1 as shown in the exhibit. (Click the Exhibit buton.)

You need to ensure that users can access the additonal disk from drive C.
What should you do?
A. Convert Disk 0 to a dynamic disk and add a mirror.
B. Create a simple volume on Disk 1 and mount the volume to a folder.
C. Convert Disk 0 and Disk 1 to dynamic disks and extend a volume.
D. Convert Disk 1 to a dynamic disk and create a spanned volume.

Aoswern B
Question 108
You have a server named Server1 that runs a Server Core Installaton of Windows Server 2012 R2 Datacenter.
You have a WIM fle that contains the four images of Windows Server 2012 R2 as shown in the Images exhibit. (Click

________________________________________________________________________________________________

www.Certificationking.com

Page No | 89

the Exhibit buton.)

You review the installed features on Server1 as shown in the Features exhibit. (Click the Exhibit buton.)

You need to install the Server Graphical Shell feature on Server1.


Which two possible sources can you use to achieve this goal? (Each correct answer presents a complete soluton.
Choose two.)
A. Index 1
B. Index 2
C. Index 3
D. Index 4

Aoswern B, D
Explanatonn
These images (since they are Full GUI, not CORE), contain the binaries necessary to install all GUI elements.
When you install Windows Server 2012 R2, you can choose between Server Core Installaton and Server with a GUI.
The Server with a GUI opton is the Windows Server 2012 R2 equivalent of the Full installaton opton available in
Windows Server 2008 R2. The Server Core Installaton opton reduces the space required on disk, the potental
atack surface, and especially the servicing requirements, so we recommend that you choose the Server Core
installaton unless you have a partcular need for the additonal user interface elements and graphical management
tools that are included in the Server with a GUI opton. For this reason, the Server Core installaton is now the
default. Because you can freely switch between these optons at any tme later, one approach might be to initally

________________________________________________________________________________________________

www.Certificationking.com

Page No | 90

install the Server with a GUI opton, use the graphical tools to confgure the server, and then later switch to the Server
Core Installaton opton.
Referencen Windows Server Installaton Optons

Question 109
HOTSPOT
Your network contains an Actve Directory domain named contoso.com. The domain contains a server named Server
that runs Windows Server 2012 R2.
You perform a Server Core Installaton of Windows Server 2012 R2 on a new server.
You need to ensure that you can add the new server to Server Manager on Server1.
What should you confgure on the new server? To answer, select the appropriate setng in the answer area.

Aoswern
You can add a computer to server manager using IP address. So you need to confgure Network Setngs. If the server
is not member of a domain, you can admin it remotely.
8 - Network Setngs
Explanatonn
You will require a network connecton to the server to manage it from a diferent server, therefore you need to
confgure the network setngs to enable Remote Management.
Referencen htpn::technet.microsoo.com:en-us:library:jj647766.aspx

________________________________________________________________________________________________

www.Certificationking.com

Page No | 91

Question 110
Your network contains several servers that run Windows Server 2012 R2 and client computers that run Windows 8.1.
You download several signed Windows PowerShell scripts from the Internet.
You need to run the PowerShell scripts on all of the servers and all of the client computers.
What should you modify frst?
A. The environment variables on all of the servers
B. The executon policy on all of the servers
C. The executon policy on all of the client computers
D. The environment variables on all client computers

Aoswern C
Explanatonn
The default executon policy of Windows Server 2012 is RemoteSigned meaning that as long as a valid signature is
used on the scripts, they will run. However, the client computers have a default executon policy of restricted meaning
that no scripts will run in PowerShell whatsoever, so this would have to be changed before the scripts could be
executed on the client computers.

Question 111
You have a server named Server1 that runs Windows Server 2012 R2.
Server1 has following storage spacesn
Data
Users
Backups
Primordial
You add an additonal hard disk to Server1.
You need to identfy which storage space contains the new hard disk.
Which storage space contains the new disk?
A. Primordial
B. Data
C. Users
D. Backups

Aoswern A
Explanatonn
All storage that meets acceptable criteria for Storage Spaces will be placed in the Primordial Pool. This can be
considered the default pool for devices from which any other pools will be created. Notce that there are no other
virtual disks or pools at this point. The Primordial Pool will only consist of physical storage devices that do not belong
to any other pools.

Question 112
Your network contains an Actve Directory domain named adatum.com. The domain contains a member server
named L0N-DC1. L0N-DC1 runs Windows Server 2012 R2 and has the DHCP Server server role installed.

________________________________________________________________________________________________

www.Certificationking.com

Page No | 92

The network contains 100 client computers and 50 IP phones. The computers and the phones are from the same
vendor.
You create an IPv4 scope that contains addresses from 172.16.0.1 to 172.16.1.254.
You need to ensure that the IP phones receive IP addresses in the range of 172.16.1.100 to 172.16.1.200. The soluton
must minimize administratve efort.
What should you create?
A. Server level policies
B. Reservatons
C. Filters
D. Scope level policies

Aoswern D
Explanatonn
The scope is already in place.
Scope level policies are typically setngs that only apply to that scope. They can also overwrite a setng that was set
at the server level.
When a client matches the conditons of a policy, the DHCP server responds to the clients based on the setngs of a
policy.
Setngs associated to a policy can be an IP address range and:or optons.
An administrator could confgure the policy to provide an IP address from a specifed sub-range within the overall IP
address range of the scope.
You can also provide diferent opton values for clients satsfying this policy.
Policies can be defned server wide or for a specifc scope.
A server wide policy on the same lines as server wide opton values is applicable to all scopes on the DHCP server.
A server wide policy however cannot have an IP address range associated with it.
There a couple of ways to segregate clients based on the type of device. One way to do this is by using vendor
class:identfer.
This string sent in opton 60 by most DHCP clients identfy the vendor and thereby the type of the device.
Another way to segregate clients based on device type is by using the MAC address prefx. The frst three bytes of a
MAC address is called OUI and identfy the vendor or manufacturer of the device.
By creatng DHCP policies with conditons based on Vendor Class or MAC address prefx, you can now segregate the
clients in your subnet in such a way, that devices of a specifc type get an IP address only from a specifed IP address
range within the scope. You can also give diferent set of optons to these clients.
In conclusion, DHCP policies in Windows Server 2012 R2 enables grouping of clients:devices using the diferent
criteria and delivering targeted network confguraton to them.
Policy based assignment in Windows Server 2012 R2 DHCP allows you to create simple yet powerful rules to
administer DHCP on your network.
Referencesn
Training Guiden Installing and Confguring Windows Server 2012 R2, Chapter 6n Network Administraton, p.253

Question 113
You have two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 has the DHCP Server
server role installed.
You need to create an IPv6 reservaton for Server2.
Which two values should you obtain from Server2? (Each correct answer presents part of the soluton. Choose two.)
A. the hardware ID
B. the DHCPv6 unique identfer

________________________________________________________________________________________________

www.Certificationking.com

Page No | 93

C. the DHCPv6 identty associaton ID


D. the SMSBIOS GUID
E. the MAC address

Aoswern B, C
Explanatonn
The Add-DhcpServerv6Reservaton cmdlet reserves a specifed IPv6 address for the client identfed by the specifed
Dynamic Host Confguraton Protocol (DHCP) v6 unique identfer (ID) (DUID) and identty associaton ID (IAID).

Question 114
HOTSPOT
Your network contains a subnet named Subnet1. Subnet1 contains a DHCP server named Server1.
You deploy a new subnet named Subnet2. On Subnet2, you deploy a new server named Server2 that runs Windows
Server 2012 R2.
You need to confgure Server2 to route DHCP broadcast from Subnet2 to Server1.
Which server role should you install on Server2?
To answer, select the appropriate role in the answer area.

Aoswern

________________________________________________________________________________________________

www.Certificationking.com

Page No | 94

Explanatonn
In Windows Server 2012 R2 the DirectAccess feature and the RRAS role service were combined into a new unifed
server role. This new Remote Access server role allows for centralized administraton, confguraton, and monitoring
of both DirectAccess and VPN-based remote access services. Additonally, Windows Server 2012 R2 DirectAccess
provided multple updates and improvements to address deployment blockers and provide simplifed management.
Referencesn
htpn::technet.microsoo.com:library:hh831416
htpn::technet.microsoo.com:en-us:library:cc732263.aspx

Question 115
DRAG DROP
Your network contains an Actve Directory domain named contoso.com. The domain contains a server named Server1.
Server1 runs a Server Core installaton of Windows Server 2012 R2.
You install the DNS Server server role on Server1.
You need to perform the following confguratons on Server1n
Create an Actve Directory-integrated zone named adatum.com.
Send unresolved DNS client queries for other domain sufxes to the DNS server of your company's Internet Service
Provider (ISP).
Which Windows PowerShell cmdlets should you use?
To answer, drag the appropriate cmdlet to the correct confguraton in the answer area. Each cmdlet may be used
once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

________________________________________________________________________________________________

www.Certificationking.com

Page No | 95

Aoswern

Explanatonn
Add-DnsServerDirectoryParttonn Creates a DNS applicaton directory partton.
Add-DnsServerPrimaryZonen Adds a primary zone to a DNS server.
Set-DNSServer Overwrites a DNS server confguraton.
SET-DNSServerForwarder Changes forwarder setngs on a DNS server
Set-DNSServerDSSetng Modifes DNS Actve Directory setngs.
Set-DNSServerSetng Modifes DNS server setngs.
Referencesn
htpn::technet.microsoo.com:en-us:library:jj649942(v=wps.620).aspx
htpn::technet.microsoo.com:en-us:library:jj649876(v=wps.620).aspx
htpn::technet.microsoo.com:en-us:library:jj649845(v=wps.620).aspx
htpn::technet.microsoo.com:en-us:library:jj649887(v=wps.620).aspx
htpn::technet.microsoo.com:en-us:library:jj649874.aspx
htpn::technet.microsoo.com:en-us:library:jj649909.aspx

Question 116
Your company has a main ofce and four branch ofces. The main ofce contains a server named Server1 that runs
Windows Server 2012 R2.
The IP confguraton of each ofce is confgured as shown in the following table.

________________________________________________________________________________________________

www.Certificationking.com

Page No | 96

You need to add a single statc route on Server1 to ensure that Server1 can communicate with the hosts on all of the
subnets.
Which command should you run?
A. route.exe add -p 10.10.0.0 mask 255.255.252.0 10.10.0.1
B. route.exe add -p 172.16.16.0 mask 255.255.252.0 10.10.0.1
C. route.exe add -p 10.10.0.0 mask 255.255.252.0 172.16.0.0
D. route.exe add -p 172.16.18.0 mask 255.255.252.0 10.10.0.1

Aoswern B
Explanatonn
These parameters will allow communicaton with all the hosts.

Referencesn
Exam Refn 70-410n Installing and Confguring Windows Server 2012 R2, Chapter4n Deploying and confguring core
network services, Objectve 4.1n Confgure IPv4 and IPv6 addressing, p.192, 196

Question 117
Your network contains an Actve Directory domain named contoso.com. The network contains 500 client computers
that run Windows 8. All of the client computers connect to the Internet by using a web proxy.
You deploy a server named Server1 that runs Windows Server 2012 R2. Server1 has the DNS Server server role
installed.
You confgure all of the client computers to use Server1 as their primary DNS server.
You need to prevent Server1 from atemptng to resolve Internet host names for the client computers.
What should you do on Server1?
A. Create a primary zone named root.

________________________________________________________________________________________________

www.Certificationking.com

Page No | 97

B. Create a primary zone named "GlobalNames".


C. Create a forwarder that points to 169.254.0.1.
D. Create a primary zone named ..

Aoswern A
Question 118
Your network contains two Actve Directory forests named contoso.com and adatum.com. Each forest contains one
domain. A two-way forest trust exists between the forests.
The forests use the address spaces shown in the following table.

From a computer in the contoso.com domain, you can perform reverse lookups for the servers in the contoso.com
domain, but you cannot perform reverse lookups for the servers in the adatum.com domain.
From a computer in the adatum.com domain, you can perform reverse lookups for the servers in both domains.
You need to ensure that you can perform reverse lookups for the servers in the adatum.com domain from the
computers in the contoso.com domain.
What should you create?
A. A trust point
B. A GlobalNames zone
C. A delegaton
D. A conditonal forwarder

Aoswern D
Explanatonn
Conditonal forwarders are DNS servers that only forward queries for specifc domain names. Instead of forwarding all
queries it cannot resolve locally to a forwarder, a conditonal forwarder is confgured to forward a query to specifc
forwarders based on the domain name contained in the query. Forwarding according to domain names improves
conventonal forwarding by adding a name-based conditon to the forwarding process.
The conditonal forwarder setng for a DNS server consists of the followingn
The domain names for which the DNS server will forward queries.
One or more DNS server IP addresses for each domain name specifed.
When a DNS client or server performs a query operaton against a DNS server, the DNS server looks to see if the query
can be resolved using its own zone data or the data stored in its cache. If the DNS server is confgured to forward for
the domain name designated in the query, then the query is forwarded to the IP address of a forwarder associated
with the domain name. For example, in the following fgure, each of the queries for the domain names is forwarded to
a DNS server associated with the domain name.
Referencen htpn::technet.microsoo.com:en-us:library:cc757172(v=ws.10).aspx

Question 119
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed.
The disks on Server1 are confgured as shown in the exhibit. (Click the Exhibit buton.)

________________________________________________________________________________________________

www.Certificationking.com

Page No | 98

You create a virtual machine on Server1.


You need to ensure that you can confgure a pass-through disk for the virtual machine.
What should you do?
A. Convert Disk 1 to a GPT disk.
B. Delete partton E.
C. Convert Disk 1 to a dynamic disk.
D. Take Disk 1 ofine.

Aoswern D
Explanatonn
Referencesn
Exam Ref 70-410n Installing and Confguring Windows Server 2012 R2n Objectve 3.2n Create and Confgure virtual
machine storage, Chapter 3n p. 159
Exam Ref 70-410n Installing and Confguring Server 2012n Objectve 1.3n Installing and Confguring servers, Chapter 1n
p. 42-43
htpn::blogs.technet.com:b:askcore:archive:2008:10:24:confguring-pass-through-disks-in-hyper-v.aspx

Question 120
HOTSPOT
You have a Hyper-V host named Server1 that runs Windows Server 2012 R2. Server1 hosts 50 virtual machines.
You need to create a script to list all of the virtual machines that have checkpoints and support Secure Boot.
What should you do? To answer, select the appropriate optons in the answer area.

________________________________________________________________________________________________

www.Certificationking.com

You might also like