Looking for:
Installing and configuring windows server 2012 r2 ebook download
Fully updated for Windows Server R2! Designed to help enterprise administrators develop real-world, job-role-specific skills – this Training Guide focuses on deploying and managing core infrastructure services in Windows Server R2.
Build hands-on expertise through a series of lessons, exercises, and suggested practices – and help maximize your performance on the job. Mitch Tulloch is a well-known expert on Windows administration, deployment, and virtualization. Mitch has written hundreds of articles for various technology sites and has authored several dozen books including the best-selling Windows 7 Resource Kit from Microsoft Press.
Published weekly, WServerNews helps keep sysadmins and IT managers up to date on security-related issues, third-party tools, updates and upgrades, Windows compatibility issues, and many related matters.
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness. This Microsoft Training Guide : Provides in-depth, hands-on training you take at your own pace Focuses on job-role-specific expertise for deploying and managing core infrastructure services Creates a foundation of skills which, along with on-the-job experience, can be measured by Microsoft Certification exams such as Topics include: Preparing for Windows Server R2 Deploying servers Server remote management New Windows PowerShell capabilities Deploying domain controllers Active Directory administration Network administration Advanced networking capabilities.
Previous page. Microsoft Press. Publication date. April 24, Print length. See all details. Next page. Frequently bought together. Total price:. To see our price, add these items to your cart.
Choose items to buy together. Get it as soon as Wednesday, Jan 4. Customers who bought this item also bought. Page 1 of 1 Start over Page 1 of 1. Orin Thomas. Ken St. Practical Network Scanning: Capture network vulnerabilities using standard tools such as Nmap and Nessus. Ajay Singh Chauhan. Data Protection and Information Lifecycle Management. Tom Petrocelli. Paul Rohmeyer. Information Security Handbook: Develop a threat model and incident response strategy to build a strong information security framework.
Darren Death. About the Author Mitch Tulloch is a widely recognized expert on Windows administration and has been awarded Microsoft Most Valuable Professional MVP status for his contributions supporting those who deploy and use Microsoft platforms, products, and solutions. Brief content visible, double tap to read full content. Full content visible, double tap to read brief content. Help others learn more about this product by uploading a video! About the author Follow authors to get new release updates, plus improved recommendations.
Mitch Tulloch. Read more Read less. Customer reviews. How customer reviews and ratings work Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
Learn more how customers reviews work on Amazon. Top reviews Most recent Top reviews. Top reviews from the United States. There was a problem filtering reviews right now. Please try again later. April Hayes Top Contributor: Coloring. Verified Purchase. Great training guide to use in getting ready for MCSA. I like the fact that this is written by and for Microsoft. Covers all the topic that will been on this exam and helps walk you through each step.
Great tool and like that I can also purchase with Exam-ref book that narrows down topics and goes through each point in easy to read format. One person found this helpful. I goes over all the items that I need, I am using it to train my Junior admin. So thank you Microsoft for another great book. Considering Microsoft is the one that develops their exams and their exam questions come right out of their Exam Ref’s, there’s no real other choice. Mitch always does a good job of it.
My husband was very happy with the guide, and found it a useful tool for his study for recertification. This book was about useless in helpi. This book provides a very high level overview of topics and leaves out all the details that you actually need for the exam.
It also provides links and tells you to just go learn from Microsoft websites like TechNet. This book was about useless in helping me for the exam. Good for beginners. See all reviews. Top reviews from other countries. Translate all reviews to English.
The description for this book is a bit misleading as it assumes that you already have a good working knowledge of the subject matter. This is not a beginner’s training guide. Report abuse. This book covers some good subject matter but it hasnt been proof-read in even the slightest way since the upgrade from Server to R2.
To add to this, the errata page on the publishers website is simply an email address for you to SUBMIT errors, rather than containing any actual corrections. A shameless and lazy update in order to make a quick buck – unfortunately there isnt much better out there on this subject matter so you wont have a great deal of choice.
I am learning lots from this book Might be time for me to consider MCSA;. Report abuse Translate review to English. Your recently viewed items and featured recommendations. Back to top. Get to Know Us. Make Money with Us. Amazon Payment Products. Let Us Help You. Amazon Music Stream millions of songs. Amazon Advertising Find, attract, and engage customers. Amazon Drive Cloud storage from Amazon. Sell on Amazon Start a Selling Account. AmazonGlobal Ship Orders Internationally. ComiXology Thousands of Digital Comics.
DPReview Digital Photography. Shopbop Designer Fashion Brands. Deals and Shenanigans. Ring Smart Home Security Systems. Blink Smart Security for Every Home. PillPack Pharmacy Simplified. Amazon Renewed Like-new products you can trust.
You create two IPv4 scopes on Server1. The scopes are configured as shown in the following table. What should you add? The forest contains two domain controllers. You need to ensure that DC2 can provide authoritative responses for queries to the contoso. On DC2, create a forwarder. On DC1, create a delegation. On DC1, change the replication scope of the contoso. On DC2, modify the Zone Transfers settings. You need to configure the IPv4 settings of the network connection on Server1 as follows: IP address: Name server NS records C.
Forwarders D. The domain contains a domain controller named DC1 that runs Windows Server R2 and a client computer named Computer1 that runs windows 8. Computer1 is configured to obtain an IP address automatically.
Disable the Allow filters. Disable the Deny filters. Authorize DC1. Activate Scope [ The domain contains a server named Server1 that runs Windows Server R2 and has the Remote Access server role installed. A user named User1 must connect to the network remotely. CHAP is enabled on Server1. You need to ensure that User1 can connect to Server1 and authenticate to the domain.
What should you do from Active Directory Users and Computers? From the properties of User1, select Store password using reversible encryption. From the properties of Server1, assign the Allowed to Authenticate permission to User1. From the properties of Server1, select Trust this computer for delegation to any service Kerberos only. The new domain controller will have the following configurations: Schema master Global catalog server DNS Server server role Active Directory Certificate Services server role You need to identify which configurations cannot be fulfilled by using the Active Directory Domain Services Configuration Wizard.
Which two configurations should you identify? ADCS and schema must be done separately. You discover that when users join computers to the domain, the computer accounts are created in the Computers container. From a command prompt, run the redircmp.
From Ldp, configure the properties of the Computers container. You log on to a domain controller by using an account named Admin1. Admin1 is a member of the Domain Admins group. You view the properties of a group named Group1 as shown in the exhibit. Group1 is located in an organizational unit OU named OU1. You need to ensure that users from Group1 can modify the Security settings of OU1 only.
Right-click OU1 and select Delegate Control. Right-click contoso. Modify the Security settings of Group1. Modify the Managed By settings on OU1. The domain contains two domain controllers named DC1 and DC2. Both domain controllers are virtual machines on a Hyper-V host.
You plan to create a cloned domain controller named DC3 from an image of DC1. You need to ensure that you can clone DC1. Run the Enable-AdOptionalFeaturecmdlet. Membership in this group dictates whether a DC can or cannot be cloned. This group has some permissions set on the domain head that should not be removed. Removing these permissions will cause cloning to fail. Also, as a best practice, DCs shouldn’t be added to the group until you plan to clone and DCs should be removed from the group once cloning is complete.
B: DCCloneConfig. You create a software restriction policy to allow an application named App1 by using a certificate rule. You need to ensure that when users attempt to execute App1, the certificate for App1 is verified against a certificate revocation list CRL.
Modify the rule for App1. Modify the Trusted Publishers Properties. Create a new certificate rule for App1. Modify the Enforcement Properties. The domain contains an organizational unit OU named OU1. You need to ensure that when new client computers join the domain, their computer accounts are created in OU1 by default. For backward compatibility reasons, you cannot and must not remove it.
The domain contains user accounts that reside in an organizational unit OU named OU1. The solution must minimize the number of permissions assigned to User1. Modify the permissions on the User1 account. The domain contains a user named User1 and three global security groups named Group1, Group2 and, Group3.
You need to add User1 to Group1, Group2, and Group3. Install-AddsDomainControllcr C. User1 logs on to a client computer named Computer1. You need to disable the computer account of Computer1.
Add AdPrincipalGroupMember. Install -AddsDomainController C. RonameAdObject F. The domain contains a member server named Server1 and a domain controller named DC2. All domain controllers are configured as DNS servers. On Server1, install the Role Administration Tools. On DC2 and Server1, run winrmquickconfig. This lets users refer to network computers by using easy- to-remember names instead of a long series of numbers.
The forest functional level is Windows Server R2. The domain contains a member server named Server1. Server1 runs windows Server R2. You need to share the network scanner on Server1. Which server role should you install on Server1?
Fax Server C. Print and Document Services D. The domain contains three servers named Server1, Server2, and Server3. You create a server group named ServerGroup1. You discover the error message shown in the following exhibit. You need to ensure that Server2 can be managed remotely by using Server Manager.
On Server2, run the Add-Computer cmdlet. To be able to access Server2 remotely through Server Manager the user need to be a member of the Remote Management Users group. VM3 is used to test applications. You need to prevent VM3 from synchronizing its clock to Server1. Thus you should disable the time synchronization using Integration Services.
You try to install the Microsoft. NET Framework 3. You need to ensure that the feature can be installed on Server1. Connect Server1 to the Internet. Run the Add-AppxProvisionedPackagecmdlet. We need to connect the server to the Internet. Important to note that when starting with Windows Server R2 and Windows 8, the feature files for.
NET Framework 2. The files have been removed. Files for features that have been removed in a Features on Demand configuration, along with feature files for.
By default, if feature files are not available on the destination server that is running Windows Server R2 Preview or Windows Server R2, the installation process searches for the missing files by connecting to Windows Update.
You can override the default behavior by configuring a Group Policy setting or specifying an alternate source path during installation, whether you are installing by using the Add Roles and Features Wizard GUI or a command line. The disks on the server are configured as shown in the exhibit. You need to create a storage pool that contains Disk 1 and Disk 2. Create a volume on Disk 2 C. Convert Disk 1 and Disk 2 to dynamic disks D. You add an additional disk to Server1 as shown in the exhibit.
You need to ensure that users can access the additional disk from drive C. Convert Disk 0 to a dynamic disk and add a mirror. Create a simple volume on Disk 1 and mount the volume to a folder. Convert Disk 0 and Disk 1 to dynamic disks and extend a volume.
Convert Disk 1 to a dynamic disk and create a spanned volume. You review the installed features on Server1 as shown in the Features exhibit. You need to install the Server Graphical Shell feature on Server1. Which two possible sources can you use to achieve this goal? Each correct answer presents a complete solution.
Index 1 B. Index 2 C. Index 3 D. The “Server Core Installation” option reduces the space required on disk, the potential attack surface, and especially the servicing requirements, so we recommend that you choose the Server Core installation unless you have a particular need for the additional user interface elements and graphical management tools that are included in the “Server with a GUI” option. For this reason, the Server Core installation is now the default.
Because you can freely switch between these options at any time later, one approach might be to initially install the Server with a GUI option, use the graphical tools to configure the server, and then later switch to the Server Core Installation option.
You download several signed Windows PowerShell scripts from the Internet. You need to run the PowerShell scripts on all of the servers and all of the client computers. What should you modify first? The environment variables on all of the servers B. The execution policy on all of the servers C. The execution policy on all of the client computers D. You need to identify which storage space contains the new hard disk.
Which storage space contains the new disk? Primordial B. Data C. Users D. The domain contains a member server named L0N-DC1. The network contains client computers and 50 IP phones. The computers and the phones are from the same vendor.
You create an IPv4 scope that contains addresses from You need to ensure that the IP phones receive IP addresses in the range of What should you create? Server level policies B. Reservations C. Filters D. Scope level policies are typically settings that only apply to that scope.
They can also overwrite a setting that was set at the server level. You need to create an IPv6 reservation for Server2. Which two values should you obtain from Server2?
The main office contains a server named Server1 that runs Windows Server R2. The IP configuration of each office is configured as shown in the following tablE. You need to add a single static route on Server1 to ensure that Server1 can communicate with the hosts on all of the subnets. Which command should you run? The network contains client computers that run Windows 8.
All of the client computers connect to the Internet by using a web proxy. Server1 has the DNS Server server role installed. You configure all of the client computers to use Server1 as their primary DNS server. You need to prevent Server1 from attempting to resolve Internet host names for the client computers. Create a primary zone named “root”. Create a primary zone named “GlobalNames”. Create a forwarder that points to Create a primary zone named “. Each forest contains one domain.
A two-way forest trust exists between the forests. The forests use the address spaces shown in the following table. From a computer in the contoso. From a computer in the adatum. You need to ensure that you can perform reverse lookups for the servers in the adatum.
A trust point B. A GlobalNames zone C. A delegation D. Instead of forwarding all queries it cannot resolve locally to a forwarder, a conditional forwarder is configured to forward a query to specific forwarders based on the domain name contained in the query.
Forwarding in terms of domain names improves conventional forwarding by adding a name-based condition to the forwarding process. The disks on Server1 are configured as shown in the exhibit. You create a virtual machine on Server1.
You need to ensure that you can configure a pass-through disk for the virtual machine. Convert Disk 1 to a GPT disk. Delete partition E. Convert Disk 1 to a dynamic disk. Take Disk 1 offline.
Share and Storage Management B. New-StoragePool C. New-VirtualDisk D. You open DNS Manager as shown in the exhibit. From the View menu, click Filter From the Action menu, click Properties.
From the View menu, click Advanced. That will yield the DNS server cache. The temporary location experiences intermittent power failures. The file server will contain a dedicated volume for shared folders. You need to create a volume for the shared folders.
The solution must minimize the likelihood of file corruption if a power failure occurs. Which file system should you use? NFS B. FAT32 C. ReFS D. You want to achieve this goal by using the minimum amount of administrative effort. Which command should you run first? You need to add a graphical user interface GUI to Server1.
The Install-WindowsFeaturecmdlet B. The Install-Module cmdlet C. The Install-RoleServicecmdlet D. The setup. Server2 establishes an IPSec connection to Server1. You need to view which authentication method was used to establish the initial IPSec connection. From Windows Firewall with Advanced Security, view the quick mode security association. From Windows Firewall with Advanced Security, view the main mode security association.
A security association SA is the information maintained about that secure channel on the local computer so that it can use the information for future network traffic to the remote computer. You can monitor main mode SAs for information like which peers are currently connected to this computer and which protection suite was used to form the SA.
System Configuration B. A member server named Server1 runs Windows Server R2. On Server1, you test a new set of AppLocker policy settings by using a local computer policy. Import the. From Server1, run the Set-ApplockerPolicycmdlet. From Server1, run the New-ApplockerPolicycmdlet. The merging of policies will remove rules with duplicate rule IDs, and the enforcement setting specified by the AppLocker policy in the target GPO will be preserved.
If the Merge parameter is not specified, then the new policy will overwrite the existing policy. Server1 is connected to two identical print devices. The solution must ensure that if one print device fails, the print jobs will print automatically on the other print device.
Add two printers and configure the priority of each printer. Install the Failover Clustering feature, and then add one printer. A printing pool is one logical printer connected to multiple printers through multiple ports of the print server.
The printer that is idle receives the next document sent to the logical printer. This is useful in a network with a high volume of printing because it decreases the time users wait for their documents. A printing pool also simplifies administration because multiple printers can be managed from the same logical printer on a server. On Server1, you add Server2 to Server Manager. When you attempt to connect to Server2 from Server Manager, you receive the following error message: “Credentials not valid.
On Server 2, run the Configure-SmRemotingcmdlet. On Server 1, run the Set-Item cmdlet. Type the following, and then press Enter to enable all required firewall rule exceptions. Both servers are member servers. On Server2, you install all of the software required to ensure that Server2 can be managed remotely from Server Manager.
Which two tasks should you perform on Server2? Run the systempropertiesremotE. Run the Fnable-PsRemotingcmdlet. Run the Enable-PsSessionConfigurationcmdlet. Run the Confiqure-SMRemoting. Run the Set-ExecutionPolicycmdlet. To configure Server Manager remote management by using Windows PowerShell On the computer that you want to manage remotely, open a Windows PowerShell session with elevated user rights.
In the Windows PowerShell session, type the following, and then press Enter. The domain contains a domain controller named Server1 that runs Windows Server R2. On Server1, you create a work folder named Work1. A user named User1 connects to Work1 from a computer named Computer1. You need to identify the last time the documents in Work1 were synchronized successfully from Computer1.
From Server Manager, review the properties of Computer1. From Server Manager, review the properties of User1. A user named User1 attempts to log on to DC1, but receives the error message shown in the exhibit. You need to ensure that User1 can log on to DC1. Add User1 to the Remote Management Users group. Grant User1 the Allow log on locally user right. Modify the Logon Workstations setting of the User1 account. Modify the Account is sensitive and cannot be delegated setting of the User1 account.
The domain contains hundreds of groups, many of which are nested in other groups. The domain contains a user account named user1. User1 is a direct member of 15 groups. You need to identify of which Active Directory groups User1 is a member, including the nested groups. Active Directory Users and Computers B. Get-ADUser D. You install the Hyper-V server role on Server1.
You create two virtual machines on Server1 that each have 8 GB of memory. You need to minimize the amount of time it takes for both virtual machines to access memory. What should you configure on each virtual machine? Resource control B. Memory weight C. Dynamic Memory D. This capability can help improve the performance of workloads running on virtual machines that are configured with large amounts of memory.
Right-click VM1, and then click Move. PauseVM1, and then modify the settings of VM1. However, since there are already several snapshots in existence, you will need to delete them first because you will not be able to change the location of the snapshot file while there is an existing snapshot. You plan to create a shared folder. The shared folder will have a quota limit.
What should you do on Server1 before you run the New Share Wizard? Configure the Advanced system settings. Run the Install-WindowsFeaturecmdlet. Run the Set-SmbSharecmdlet. Install the Share and Storage Management tool. This cmdlet is equivalent to and replaces Add-WindowsFeature, the cmdlet that was used to install roles, role services, and features in Windows Server R2. On Server1, you create a printer named Printed. You share Printed and publish Printed in Active Directory.
You need to provide a group named Group1 with the ability to manage Printer1. From Print Management, configure the Sharing settings of Printer1. From Print Management, configure the Security settings of Printer1. From Print Management, configure the Advanced settings of Printer1.
Set permissions for print servers 1. Open Print Management. In the left pane, clickPrint Servers, right-click the applicable print server and then 2.
On theSecuritytab, underGroup or users names, click a user or group for which you 3. To editSpecial permissions, clickAdvanceD. On thePermissionstab, click a user group, and then clickEdit. In thePermissionEntrydialog box, select theAlloworDenycheck boxes for the 7. On Print1, you share a printer named Printer1. You need to ensure that only the members of the Server Operators group, the Administrators group, and the Print Operators group can send print jobs to Printer1. Remove the permissions for the Creator Owner group.
Assign the Print permission to the Server Operators group. Remove the permissions for the Everyone group. Assign the Print permission to the Administrators group. This permissions need to be removed. A network technician installs a new disk on Server1 and creates a new volume. The properties of the new volume are shown in the exhibit.
You need to ensure that you can restore files on volume D by using the Previous Versions tab What should you do first? Install the File Server Resource Manager role service. Run the convert. Format volume D. A Shadow copy is essentially a copy of the disk at a specific moment in time, and this has to be set up do that you can have a Previous Version that can be used to restore files.
You join Server2 to the contoso. You need to ensure that you can manage Server2 by using the Computer Management console on Server1. What should you do on Server2? Run sconfig. You must be a member of the Administrators group to use the tool.
You connect three new hard disks to Server1. You need to create a storage space that contains the three disks. The solution must meet the following requirements: Provide fault tolerance if a single disk fails. Maximize the amount of files that can be stored in the storage space.
A mirrored space B. A spanned volume C. A parity space D. Client computers run either Windows 7 or Windows 8. All of the computer accounts of the client computers reside in an organizational unit OU named Clients.
All of the client computers use a DNS server named Server1. You need to identify the maximum number of IPv6 subnets you can create. How many IPv6 subnets should you identify? Although bits can express over 3. You create a checkpoint of VM1, and then you install an application on VM1. You verify that the application runs properly. You need to ensure that the current state of VM1 is contained in a single virtual hard disk file. The solution must minimize the amount of downtime on VM1. From a command prompt, run dism.
From Hyper-V Manager, delete the checkpoint. From Hyper-V Manager, inspect the virtual hard disk. Server1 has a virtual switch named RDS Virtual. On each virtual machine, modify the Advanced Features settings of the network adapter.
Modify the settings of the RDS Virtual virtual switch. On each virtual machine, modify the BIOS settings. Delete, and then recreate the RDS Virtual virtual switch. On each virtual machine, modify the Hardware Acceleration settings of the network adapter.
The additional step that is necessary when using SR-IOV is to ensure the checkbox is checked when the virtual switch is being created. The choice must be made a switch creation time.
Thus you should first delete the existing virtual switch and then recreate it. E: Once a virtual switch has been created, the next step is to configure a virtual machine. We have rearranged the settings for a virtual machine to introduce sub-nodes under a network adapter, one of which is the hardware acceleration node.
You need to ensure that a user named User1 can install Windows features on VM1. To which group should you add User1? Hyper-V Administrators on Server1 B. Administrators on VM1 C. Server Operators on Server1 D.
Server1 is located in an isolated network that cannot access the Internet. On Server1, you install a new virtual machine named VM1. After 30 days, you discover that VM1 shuts down every 60 minutes.
You need to resolve the issue that causes VM1 to shut down every 60 minutes. OnVM1, run slmgr. OnServer1, run slmgr. Create a new internal virtual network and attach VM1 to the new virtual network. A trust relationship does not exist between the forests. In the contoso. You transfer the backup of GPO1 to a domain controller in the contoso. You need to create a GPO in contoso. You must achieve this goal by using the minimum amount of administrative effort. An organizational unit OU named OU1 contains the computer accounts for laptops and desktop computers.
You need to ensure that the configuration settings in GP1 are applied only to a user named User1. Modify the security settings of OU1. Modify the security settings of GP1. All domain controllers run Windows Server R2. You create and enforce the default AppLocker executable rules.
Users report that they can no longer execute a legacy application installed in the root of drive C. You need to ensure that the users can execute the legacy application.
Create a new rule. Delete an existing rule. Modify the action of the existing rules. Add an exception to the existing rules. You need to ensure that User1 can manage the group membership of Group1. Rename AdOh F. You can modify commonly used property values by using the cmdlet parameters. ManagedBySpecifies the user or group that manages the object by providing one of the following property values. The password policy for the domain is set to require a minimum password length of 10 characters.
A user named User1 and a user named User2 work for the sales department. User1 is forced to create a domain password that has a minimum of 12 characters.
User2 is forced to create a domain password that has a minimum of eight characters. You need to identify what forces the two users to have different password lengths. Group Policy Management B. Credential Manager C. Active Directory Administrative Center D. For example, to increase the security of privileged accounts, you can apply stricter settings to the privileged accounts and then apply less strict settings to the accounts of other users.
Or in some cases, you may want to apply a special password policy for accounts whose passwords are synchronized with other data sources. This is found in the Active Directory Administrative Center. An organizational unit OU named OU1 contains user accounts and computer accounts. You need to prevent the User Configuration settings in GP1 from being applied to users. The solution must ensure that the Computer Configuration settings in GP1 are applied to all client computers.
The Block Inheritance feature C. The Group Policy loopback processing mode D. You need to ensure that you can use the script to promote Server1 to a domain controller. Which file extension should you use to save the script? This enables you to use the Server Manager graphical interface as a Windows PowerShell deployment studio. Use the Active Directory Domain Services Configuration Wizard to configure options, export the configuration, and then cancel the wizard.
This process creates a valid and syntactically correct sample for further modification or direct use. The forest contains five domains. The contoso. You need to ensure that Admin1 and Admin2 can configure hardware and services on all of the member servers in the forest. The solution must minimize the number of privileges granted to Admin1 and Admin2. Which built-in groups should you use? Administrators local groups B. Administrators domain local groups C.
Domain Admins global groups D. An administrator provides you with a file that contains the information to create user accounts for temporary employees. The file is shown in the exhibit. You need to automate the creation of the user accounts. Ldifde B. Dsadd D. This would be the least amount of administrative effort in this case. Average physical memory usage, measured in megabytes. Minimum memory usage lowest amount of physical memory. Maximum memory usage highest amount of physical memory.
Maximum amount of disk space allocated to a virtual machine. Total incoming network traffic, measured in megabytes, for a virtual network adapter. You need to enable access-based enumeration for a file share on Server1. Share and Storage Management C. Server Manager D. You need to ensure that when users are connected to the network, they always use local offline files that are cached from Server1.
Which Group Policy setting should you configure? Configure Slow link speed. Turn on economical application of administratively assigned Offline Files. Configure slow-link mode. Enable file synchronization on costed networks.
The domain contains a standalone server named Server2 that is located in a perimeter network. Both servers run Windows Server R2. You need to manage Server2 remotely from Server1. From Server1, run the Enable-PsRemotingcmdlet. From Server2, run the winrm command. From Server1, run the winrm command. Corel has the Hyper-V server role installed. Corel has two network adapters from different third- party hardware vendors.
You need to configure network traffic failover to prevent connectivity loss if a network adapter fails. What should you use? New-NetSwitchTeam B. Install-Feature C. On Server1, you modify the file set for the Web servers. You need to ensure that all of the Web servers have the latest configurations. Which cmdlet should you run on Server1? Get-DcsConfiguration B. Restore-DcsConfiguration C. You add a 4-TB disk named Disk 5 to Server1. You need to ensure that you can create a 3-TB volume on Disk 5.
The domain contains a virtual machine named VM1. A developer wants to attach a debugger to VM1. You need to ensure that the developer can connect to VM1 by using a named pipe. Which virtual machine setting should you configure? BIOS B. Network Adapter C. COM 1 D. From Sconfig. Run the sc. This cmdlet statically adds DNS server addresses to the interface.
The servers are configured as shown in the following table. Server3 is configured to obtain an IP address automatically. You need to prevent Server3 from receiving an IP address from Server1. What should you create on Server1? An exclusion B. A scope option C. A filter D. Server1 is a member of a workgroup. You need to configure a local Group Policy on Server1 that will apply only to non- administrators.
Group Policy Object Editor B. Group Policy Management C. Group Policy Management Editor D. The domain contains 20 computer accounts that reside in an organizational unit OU named OU1. GPO1 is used to assign several user rights to a user named User1. In the Users container, you create a new user named User2. You need to ensure that User2 is assigned the same user rights as User1 on all of the client computers in OU1.
Modify the settings in GPO1. Modify the link of GPO1. Run the Set-VmNetworkAdapterlsolationcmdlet. Modify the properties of the network adapters on VM1. Run the Add-WindowsPackagecmdlet. Specify an alternate source path. A network technician installs a new disk on Server2 and creates a new volume. Format volume D B. Print1 has 10 shared printers. You need to change the location of the spool folder. The properties of the Print Spooler service B. The Print Server Properties C.
The user environment variables D. The PrintQueue. From the View menu, select Advanced Features. Your company hires temporary employees for the summer.
The human resources department gives you a Microsoft Excel document that contains a list of the temporary employees. You need to automate the creation of user accounts for the temporary employees.
The csvde. Active Directory Users and Computers D. This would be the least amount of administrative effort in this case especially considering that these would be temporary employees. What should you perform?
An offline servicing by using Dism B. A clean installation of Windows Server R2 C. You need to ensure that you can view processor usage and memory usage information in Server Manager. The Performance Counters, when started can be set to collect and display data regarding processor usage, memory usage, amongst many other resources like disk-related and security related data, that can be monitored.
The domain contains three member servers. All client computers receive updates from Server2. On Server3, you add a shared printer named Printer1. Printer1 uses a Type 4 driver that is not included in the Windows 8 installation media. You need to ensure that when users connect to the printer for the first time, the printer driver is installed automatically on their client computer.
From the Print Management console on Server3, add additional drivers for Printer1. From the Update Services console on Server2, import and approve updates. All updates have to be approved prior to installation. Tom Petrocelli. Paul Rohmeyer. Information Security Handbook: Develop a threat model and incident response strategy to build a strong information security framework. Darren Death. About the Author Mitch Tulloch is a widely recognized expert on Windows administration and has been awarded Microsoft Most Valuable Professional MVP status for his contributions supporting those who deploy and use Microsoft platforms, products, and solutions.
Brief content visible, double tap to read full content. Full content visible, double tap to read brief content. Help others learn more about this product by uploading a video! About the author Follow authors to get new release updates, plus improved recommendations. Mitch Tulloch. Read more Read less. Customer reviews. How customer reviews and ratings work Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
Learn more how customers reviews work on Amazon. Top reviews Most recent Top reviews. Top reviews from the United States. There was a problem filtering reviews right now.
Please try again later. April Hayes Top Contributor: Coloring. Verified Purchase. Great training guide to use in getting ready for MCSA. I like the fact that this is written by and for Microsoft. Covers all the topic that will been on this exam and helps walk you through each step. Great tool and like that I can also purchase with Exam-ref book that narrows down topics and goes through each point in easy to read format.
One person found this helpful. I goes over all the items that I need, I am using it to train my Junior admin. So thank you Microsoft for another great book. Considering Microsoft is the one that develops their exams and their exam questions come right out of their Exam Ref’s, there’s no real other choice.
Mitch always does a good job of it. My husband was very happy with the guide, and found it a useful tool for his study for recertification. This book was about useless in helpi. This book provides a very high level overview of topics and leaves out all the details that you actually need for the exam.
It also provides links and tells you to just go learn from Microsoft websites like TechNet. This book was about useless in helping me for the exam. Good for beginners. See all reviews. Top reviews from other countries. Translate all reviews to English. The description for this book is a bit misleading as it assumes that you already have a good working knowledge of the subject matter. This is not a beginner’s training guide. Report abuse. This book covers some good subject matter but it hasnt been proof-read in even the slightest way since the upgrade from Server to R2.
To add to this, the errata page on the publishers website is simply an email address for you to SUBMIT errors, rather than containing any actual corrections. A shameless and lazy update in order to make a quick buck – unfortunately there isnt much better out there on this subject matter so you wont have a great deal of choice.
I am learning lots from this book Might be time for me to consider MCSA;. Report abuse Translate review to English.
Install the Windows PowerShell 2. Install Microsoft. NET Framework 4 on Server2. The domain contains two servers named Server1 and Server2. From the Microsoft Management Console on Server1, add a snap-in. Server 1 is stated to not have DHCP installed, so the snap-in therefore cannot be added.
We must add the DHCP server role. Server1 has the Group Policy Management feature installed. Server2 has the Print and Document Services server role installed. On a domain controller, create a Group Policy central store. On Server2, install the Group Policy Management feature. On Server1, configure the security filtering of GPO1.
You will also need the Print Services role installed on a server can be on your DC , and you will be using the Print Management and Group Policy Management consoles to configure the various settings. It is assumed that you have already followed Part One and have one or more printers shared on your server with the necessary drivers, ready to deploy to your client computers. GPMC is not installed by default.
The domain contains a member server named Server 1. You create two IPv4 scopes on Server1. The scopes are configured as shown in the following table. What should you add? The forest contains two domain controllers. You need to ensure that DC2 can provide authoritative responses for queries to the contoso.
On DC2, create a forwarder. On DC1, create a delegation. On DC1, change the replication scope of the contoso. On DC2, modify the Zone Transfers settings. You need to configure the IPv4 settings of the network connection on Server1 as follows: IP address: Name server NS records C. Forwarders D. The domain contains a domain controller named DC1 that runs Windows Server R2 and a client computer named Computer1 that runs windows 8.
Computer1 is configured to obtain an IP address automatically. Disable the Allow filters. Disable the Deny filters. Authorize DC1. Activate Scope [ The domain contains a server named Server1 that runs Windows Server R2 and has the Remote Access server role installed. A user named User1 must connect to the network remotely. CHAP is enabled on Server1.
You need to ensure that User1 can connect to Server1 and authenticate to the domain. What should you do from Active Directory Users and Computers? From the properties of User1, select Store password using reversible encryption. From the properties of Server1, assign the Allowed to Authenticate permission to User1. From the properties of Server1, select Trust this computer for delegation to any service Kerberos only.
The new domain controller will have the following configurations: Schema master Global catalog server DNS Server server role Active Directory Certificate Services server role You need to identify which configurations cannot be fulfilled by using the Active Directory Domain Services Configuration Wizard.
Which two configurations should you identify? ADCS and schema must be done separately. You discover that when users join computers to the domain, the computer accounts are created in the Computers container. From a command prompt, run the redircmp. From Ldp, configure the properties of the Computers container. You log on to a domain controller by using an account named Admin1.
Admin1 is a member of the Domain Admins group. You view the properties of a group named Group1 as shown in the exhibit. Group1 is located in an organizational unit OU named OU1. You need to ensure that users from Group1 can modify the Security settings of OU1 only.
Right-click OU1 and select Delegate Control. Right-click contoso. Modify the Security settings of Group1. Modify the Managed By settings on OU1. The domain contains two domain controllers named DC1 and DC2.
Both domain controllers are virtual machines on a Hyper-V host. You plan to create a cloned domain controller named DC3 from an image of DC1. You need to ensure that you can clone DC1. Run the Enable-AdOptionalFeaturecmdlet. Membership in this group dictates whether a DC can or cannot be cloned. This group has some permissions set on the domain head that should not be removed.
Removing these permissions will cause cloning to fail. Also, as a best practice, DCs shouldn’t be added to the group until you plan to clone and DCs should be removed from the group once cloning is complete. B: DCCloneConfig. You create a software restriction policy to allow an application named App1 by using a certificate rule. You need to ensure that when users attempt to execute App1, the certificate for App1 is verified against a certificate revocation list CRL.
Modify the rule for App1. Modify the Trusted Publishers Properties. Create a new certificate rule for App1. Modify the Enforcement Properties.
The domain contains an organizational unit OU named OU1. You need to ensure that when new client computers join the domain, their computer accounts are created in OU1 by default. For backward compatibility reasons, you cannot and must not remove it. The domain contains user accounts that reside in an organizational unit OU named OU1. The solution must minimize the number of permissions assigned to User1.
Modify the permissions on the User1 account. The domain contains a user named User1 and three global security groups named Group1, Group2 and, Group3. You need to add User1 to Group1, Group2, and Group3.
Install-AddsDomainControllcr C. User1 logs on to a client computer named Computer1. You need to disable the computer account of Computer1. Add AdPrincipalGroupMember. Install -AddsDomainController C. RonameAdObject F. The domain contains a member server named Server1 and a domain controller named DC2.
All domain controllers are configured as DNS servers. On Server1, install the Role Administration Tools. On DC2 and Server1, run winrmquickconfig. This lets users refer to network computers by using easy- to-remember names instead of a long series of numbers.
The forest functional level is Windows Server R2. The domain contains a member server named Server1. Server1 runs windows Server R2. You need to share the network scanner on Server1. Which server role should you install on Server1? Fax Server C. Print and Document Services D. The domain contains three servers named Server1, Server2, and Server3. You create a server group named ServerGroup1.
You discover the error message shown in the following exhibit. You need to ensure that Server2 can be managed remotely by using Server Manager. On Server2, run the Add-Computer cmdlet. To be able to access Server2 remotely through Server Manager the user need to be a member of the Remote Management Users group.
VM3 is used to test applications. You need to prevent VM3 from synchronizing its clock to Server1. Thus you should disable the time synchronization using Integration Services.
You try to install the Microsoft. NET Framework 3. You need to ensure that the feature can be installed on Server1. Connect Server1 to the Internet. Run the Add-AppxProvisionedPackagecmdlet.
We need to connect the server to the Internet. Important to note that when starting with Windows Server R2 and Windows 8, the feature files for. NET Framework 2. The files have been removed. Files for features that have been removed in a Features on Demand configuration, along with feature files for. By default, if feature files are not available on the destination server that is running Windows Server R2 Preview or Windows Server R2, the installation process searches for the missing files by connecting to Windows Update.
You can override the default behavior by configuring a Group Policy setting or specifying an alternate source path during installation, whether you are installing by using the Add Roles and Features Wizard GUI or a command line. The disks on the server are configured as shown in the exhibit. You need to create a storage pool that contains Disk 1 and Disk 2. Create a volume on Disk 2 C.
Convert Disk 1 and Disk 2 to dynamic disks D. You add an additional disk to Server1 as shown in the exhibit. You need to ensure that users can access the additional disk from drive C. Convert Disk 0 to a dynamic disk and add a mirror. Create a simple volume on Disk 1 and mount the volume to a folder. Convert Disk 0 and Disk 1 to dynamic disks and extend a volume. Convert Disk 1 to a dynamic disk and create a spanned volume.
You review the installed features on Server1 as shown in the Features exhibit. You need to install the Server Graphical Shell feature on Server1. Which two possible sources can you use to achieve this goal? Each correct answer presents a complete solution.
Index 1 B. Index 2 C. Index 3 D. The “Server Core Installation” option reduces the space required on disk, the potential attack surface, and especially the servicing requirements, so we recommend that you choose the Server Core installation unless you have a particular need for the additional user interface elements and graphical management tools that are included in the “Server with a GUI” option. For this reason, the Server Core installation is now the default. Because you can freely switch between these options at any time later, one approach might be to initially install the Server with a GUI option, use the graphical tools to configure the server, and then later switch to the Server Core Installation option.
You download several signed Windows PowerShell scripts from the Internet. You need to run the PowerShell scripts on all of the servers and all of the client computers. What should you modify first? The environment variables on all of the servers B. The execution policy on all of the servers C. The execution policy on all of the client computers D. You need to identify which storage space contains the new hard disk. Which storage space contains the new disk? Primordial B. Data C.
Users D. The domain contains a member server named L0N-DC1. The network contains client computers and 50 IP phones. The computers and the phones are from the same vendor. You create an IPv4 scope that contains addresses from You need to ensure that the IP phones receive IP addresses in the range of What should you create?
Server level policies B. Reservations C. Filters D. Scope level policies are typically settings that only apply to that scope. They can also overwrite a setting that was set at the server level.
You need to create an IPv6 reservation for Server2. Which two values should you obtain from Server2? The main office contains a server named Server1 that runs Windows Server R2. The IP configuration of each office is configured as shown in the following tablE.
You need to add a single static route on Server1 to ensure that Server1 can communicate with the hosts on all of the subnets. Which command should you run? The network contains client computers that run Windows 8. All of the client computers connect to the Internet by using a web proxy. Server1 has the DNS Server server role installed. You configure all of the client computers to use Server1 as their primary DNS server. You need to prevent Server1 from attempting to resolve Internet host names for the client computers.
Create a primary zone named “root”. Create a primary zone named “GlobalNames”. Create a forwarder that points to Create a primary zone named “. Each forest contains one domain. A two-way forest trust exists between the forests. The forests use the address spaces shown in the following table. From a computer in the contoso. From a computer in the adatum. You need to ensure that you can perform reverse lookups for the servers in the adatum.
A trust point B. A GlobalNames zone C. A delegation D. Instead of forwarding all queries it cannot resolve locally to a forwarder, a conditional forwarder is configured to forward a query to specific forwarders based on the domain name contained in the query.
Forwarding in terms of domain names improves conventional forwarding by adding a name-based condition to the forwarding process.
The disks on Server1 are configured as shown in the exhibit. You create a virtual machine on Server1. You need to ensure that you can configure a pass-through disk for the virtual machine.
Convert Disk 1 to a GPT disk. Delete partition E. Convert Disk 1 to a dynamic disk. Take Disk 1 offline. Share and Storage Management B. New-StoragePool C. New-VirtualDisk D.
You open DNS Manager as shown in the exhibit. From the View menu, click Filter From the Action menu, click Properties.
From the View menu, click Advanced. That will yield the DNS server cache. The temporary location experiences intermittent power failures. The file server will contain a dedicated volume for shared folders.
You need to create a volume for the shared folders. The solution must minimize the likelihood of file corruption if a power failure occurs. Which file system should you use? NFS B. FAT32 C. ReFS D. You want to achieve this goal by using the minimum amount of administrative effort. Which command should you run first? You need to add a graphical user interface GUI to Server1. The Install-WindowsFeaturecmdlet B. The Install-Module cmdlet C. The Install-RoleServicecmdlet D. The setup.
Server2 establishes an IPSec connection to Server1. You need to view which authentication method was used to establish the initial IPSec connection. From Windows Firewall with Advanced Security, view the quick mode security association.
From Windows Firewall with Advanced Security, view the main mode security association. A security association SA is the information maintained about that secure channel on the local computer so that it can use the information for future network traffic to the remote computer. You can monitor main mode SAs for information like which peers are currently connected to this computer and which protection suite was used to form the SA. System Configuration B.
A member server named Server1 runs Windows Server R2. On Server1, you test a new set of AppLocker policy settings by using a local computer policy. Import the. From Server1, run the Set-ApplockerPolicycmdlet. From Server1, run the New-ApplockerPolicycmdlet. The merging of policies will remove rules with duplicate rule IDs, and the enforcement setting specified by the AppLocker policy in the target GPO will be preserved.
If the Merge parameter is not specified, then the new policy will overwrite the existing policy. Server1 is connected to two identical print devices. The solution must ensure that if one print device fails, the print jobs will print automatically on the other print device. Add two printers and configure the priority of each printer. Install the Failover Clustering feature, and then add one printer. A printing pool is one logical printer connected to multiple printers through multiple ports of the print server.
The printer that is idle receives the next document sent to the logical printer. This is useful in a network with a high volume of printing because it decreases the time users wait for their documents.
A printing pool also simplifies administration because multiple printers can be managed from the same logical printer on a server. On Server1, you add Server2 to Server Manager. When you attempt to connect to Server2 from Server Manager, you receive the following error message: “Credentials not valid. On Server 2, run the Configure-SmRemotingcmdlet. On Server 1, run the Set-Item cmdlet. Type the following, and then press Enter to enable all required firewall rule exceptions. Both servers are member servers.
On Server2, you install all of the software required to ensure that Server2 can be managed remotely from Server Manager.
Which two tasks should you perform on Server2? Run the systempropertiesremotE. Run the Fnable-PsRemotingcmdlet. Run the Enable-PsSessionConfigurationcmdlet. Run the Confiqure-SMRemoting. Run the Set-ExecutionPolicycmdlet. To configure Server Manager remote management by using Windows PowerShell On the computer that you want to manage remotely, open a Windows PowerShell session with elevated user rights. In the Windows PowerShell session, type the following, and then press Enter.
The domain contains a domain controller named Server1 that runs Windows Server R2. On Server1, you create a work folder named Work1. A user named User1 connects to Work1 from a computer named Computer1. You need to identify the last time the documents in Work1 were synchronized successfully from Computer1.
From Server Manager, review the properties of Computer1. From Server Manager, review the properties of User1. A user named User1 attempts to log on to DC1, but receives the error message shown in the exhibit. You need to ensure that User1 can log on to DC1.
Add User1 to the Remote Management Users group. Grant User1 the Allow log on locally user right. Modify the Logon Workstations setting of the User1 account.
Modify the Account is sensitive and cannot be delegated setting of the User1 account. The domain contains hundreds of groups, many of which are nested in other groups. The domain contains a user account named user1. User1 is a direct member of 15 groups. You need to identify of which Active Directory groups User1 is a member, including the nested groups. Active Directory Users and Computers B. Get-ADUser D. You install the Hyper-V server role on Server1. You create two virtual machines on Server1 that each have 8 GB of memory.
You need to minimize the amount of time it takes for both virtual machines to access memory. What should you configure on each virtual machine? Resource control B. Memory weight C. Dynamic Memory D. This capability can help improve the performance of workloads running on virtual machines that are configured with large amounts of memory.
Right-click VM1, and then click Move. PauseVM1, and then modify the settings of VM1. However, since there are already several snapshots in existence, you will need to delete them first because you will not be able to change the location of the snapshot file while there is an existing snapshot. You plan to create a shared folder. The shared folder will have a quota limit. What should you do on Server1 before you run the New Share Wizard? Configure the Advanced system settings. Run the Install-WindowsFeaturecmdlet.
Run the Set-SmbSharecmdlet. Install the Share and Storage Management tool. This cmdlet is equivalent to and replaces Add-WindowsFeature, the cmdlet that was used to install roles, role services, and features in Windows Server R2. On Server1, you create a printer named Printed.
You share Printed and publish Printed in Active Directory. You need to provide a group named Group1 with the ability to manage Printer1. From Print Management, configure the Sharing settings of Printer1.
From Print Management, configure the Security settings of Printer1. From Print Management, configure the Advanced settings of Printer1. Set permissions for print servers 1. Open Print Management. In the left pane, clickPrint Servers, right-click the applicable print server and then 2. On theSecuritytab, underGroup or users names, click a user or group for which you 3.
To editSpecial permissions, clickAdvanceD. On thePermissionstab, click a user group, and then clickEdit. In thePermissionEntrydialog box, select theAlloworDenycheck boxes for the 7.
On Print1, you share a printer named Printer1. You need to ensure that only the members of the Server Operators group, the Administrators group, and the Print Operators group can send print jobs to Printer1. Remove the permissions for the Creator Owner group. Assign the Print permission to the Server Operators group. Remove the permissions for the Everyone group. Assign the Print permission to the Administrators group.
This permissions need to be removed. A network technician installs a new disk on Server1 and creates a new volume. The properties of the new volume are shown in the exhibit. You need to ensure that you can restore files on volume D by using the Previous Versions tab What should you do first?
Install the File Server Resource Manager role service. Run the convert. Format volume D. A Shadow copy is essentially a copy of the disk at a specific moment in time, and this has to be set up do that you can have a Previous Version that can be used to restore files. You join Server2 to the contoso. You need to ensure that you can manage Server2 by using the Computer Management console on Server1.
What should you do on Server2? Run sconfig. You must be a member of the Administrators group to use the tool. You connect three new hard disks to Server1. You need to create a storage space that contains the three disks. The solution must meet the following requirements: Provide fault tolerance if a single disk fails. Maximize the amount of files that can be stored in the storage space.
A mirrored space B. A spanned volume C. A parity space D. Client computers run either Windows 7 or Windows 8.
All of the computer accounts of the client computers reside in an organizational unit OU named Clients. Brief content visible, double tap to read full content. Full content visible, double tap to read brief content. Help others learn more about this product by uploading a video!
About the author Follow authors to get new release updates, plus improved recommendations. Mitch Tulloch. Read more Read less. Customer reviews. How customer reviews and ratings work Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them. Learn more how customers reviews work on Amazon. Top reviews Most recent Top reviews. Top reviews from the United States. There was a problem filtering reviews right now.
Please try again later. April Hayes Top Contributor: Coloring. Verified Purchase. Great training guide to use in getting ready for MCSA. I like the fact that this is written by and for Microsoft. Covers all the topic that will been on this exam and helps walk you through each step.
Great tool and like that I can also purchase with Exam-ref book that narrows down topics and goes through each point in easy to read format. One person found this helpful. I goes over all the items that I need, I am using it to train my Junior admin. So thank you Microsoft for another great book. Considering Microsoft is the one that develops their exams and their exam questions come right out of their Exam Ref’s, there’s no real other choice. Mitch always does a good job of it.
My husband was very happy with the guide, and found it a useful tool for his study for recertification. This book was about useless in helpi. This book provides a very high level overview of topics and leaves out all the details that you actually need for the exam. It also provides links and tells you to just go learn from Microsoft websites like TechNet.
This book was about useless in helping me for the exam. Good for beginners. See all reviews. Pricing is subject to change without notice.
Pricing does not include applicable taxes. Please confirm exact pricing with the exam provider before registering to take an exam. After the retirement date, please refer to the related certification for exam requirements. Skip to main content. This browser is no longer supported.
Table of contents Exit focus mode. Table of contents. Important This exam retired on January 31, Two ways to prepare Online – Free.
Instructor-led – Paid.
By using our site, you agree to our collection of information through the use of cookies. To learn more, view our Privacy Policy. To browse Academia. Your network contains an Active Directory forest named contoso.
The forest contains a single domain. Log in with Facebook Log in with Google. Remember me on this computer. Enter the email address you signed up with and we’ll email you a reset link. Need an account? Click here to sign up. Download Free PDF. Installing and Configuring Windows Server Rizwan Ali. Server1 has the Hyper-V server role installed. Which type of virtual hard disk should you create on the LUN?
Fixed-size VHD D. The domain contains a member server named Host1. Host1 hosts two virtual machines named VM5 and VM6. Both virtual machines connect to a virtual switch named Virtual1. On VM5, you install a network monitoring application named Monitor1. You need to capture all of the inbound and outbound traffic to VM6 by using Monitor1. Which two commands should you run from Windows PowerShell? Each correct answer presents part of the solution.
Choose two. This can be set to None, Source, and Destination. If set to Destination, it receives copied http://replace.me/29218.txt from the source virtual network adapter. In this scenario, VM5 is the destination which must receive a copy of the network packets from VM6, which s the source.
Server1 has the virtual switches listed in the following table. You create a virtual machine named VM1. Installing and configuring windows server 2012 r2 ebook download has two network adapters. One network adapter connects to vSwitch1. The other network adapter connects to vSwitch2. What should you do on Server1? Run the Set-VmNetworkAdaptercmdlet. Add a new network adapter to VM1.
Create a new virtual switch on Server 1. Modify installing and configuring windows server 2012 r2 ebook download properties of vSwitch1 and vSwitch2. You install the Network Load Balancing feature on the virtual machines. Which virtual machine settings should you configure? DHCP guard B. Port mirroring C. Router guard D. You have a virtual machine named VM1. What should you do first? Create a Hyper-V virtual switch. Add one HBA. Configure network adapter teaming. The domain contains a server named Server1.
On Server1, you create and start a virtual machine named VM1. VM1 is configured as shown in the following table. You need to recommend a solution to minimize the amount of disk space used for the checkpoint of VM1. What should you do before you create the checkpoint? Run the Resize-VHD cmdlet. Convert Disk1. Shut down VM1. Run the Convert-VHD cmdlet.
It can only grow to the size limit you designate in the setup узнать больше здесь. You discover that when there are many pending print jobs, the system drive occasionally runs out of free space. You add a new hard disk to Server1. You create a new NTFS volume. You need to prevent the print jobs from consuming disk installing and configuring windows server 2012 r2 ebook download on the system volume.
What should you modify? The properties on the new volume B. Http://replace.me/19007.txt properties of the Print Spooler service C. The Print Server Properties D. The domain contains a server named Server1 that runs Windows Server R2.
You join Corel to взято отсюда adatum. Http://replace.me/21011.txt need to ensure that you can use Event Viewer on Server1 to view the event logs on Corel.
What should installing and configuring windows server 2012 r2 ebook download do on Corel? Run the Enable-NetFirewallRulecmdlet. Run the Disable-NetFirewallRulecmdlet. Install Windows Management Framework. Читать полностью you need to enable the NetFirewallRule command.
This will allow you to view the event logs. Server1 and Server2 are part of a workgroup. On Server1 and Server2, you create a local user account named Admin1. You add the account to the local Administrators group. On both servers, Admin1 has the same password. You log on to Server1 as Admin1. You open Computer Management and vol. When you attempt to create a scheduled task, view the event logs, and manage the shared folders, you receive Access Denied messages.
You need to ensure that you can administer Server2 remotely from Server1 by using Computer Management. What should you configure on Server2? From Server Manager, modify the Remote Management setting.
Server1 is configured as shown in the following table. Which virtual machine setting should you configure for VM2? NUMA topology B. Processor Compatibility G. The startup order H. Automatic Start Action I. Integration Services J. Port mirroring K. You plan to schedule a complete backup of Server1 by using Windows Server Backup.
You need to ensure that the state of VM1 is saved before the backup starts. What should you configure? Resource control C. This snapshot will ensure that the state of VM1 is saved prior to backup. VM2 sends and receives large amounts of data over the network. You need to ensure that the network traffic of VM2 bypasses the virtual switches of the parent partition.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and installing and configuring windows server 2012 r2 ebook download support. This exam retired on January 31, For currently available options, please refer to the Browse Certifications and Exams page. This exam is part one of a series of three exams that ebok the skills and knowledge necessary to implement a core Windows Server infrastructure in ссылка existing enterprise environment.
Passing this exam along with the other two exams confirms that a candidate has the skills and knowledge necessary for implementing, managing, maintaining, and provisioning services beook infrastructure in a Windows Server environment. As of Januarythis exam includes content covering Windows Server R2. Related exams: none. Important: See details. Price based on the country or region in which the exam is proctored. All objectives of the exam are covered in depth so you’ll be ready for any question on the exam.
Download exam skills outline. Learning paths or modules are not yet available for this exam. No current courses available for this exam. There may be certifications and prerequisites related to “Exam Installing and Configuring Windows Server “. Prove your mastery of the primary set of Windows Server skills required to reduce IT costs and deliver more business value. Pricing is subject to change without notice. Pricing does not include applicable taxes.
Please confirm exact pricing installing and configuring windows server 2012 r2 ebook download the exam provider before registering to take an exam. After the retirement date, please refer to the related certification for exam requirements. Skip to main content. This browser is no longer supported. Table of contents Exit focus mode.
Configurihg of contents. Important This exam retired on January 31, Two ways sefver prepare Online – Free. Instructor-led – Paid.
Items in this collection. Hide перейти на страницу. Instructor-led courses to gain the skills needed to become certified. Exam resources Exam Replay See two great offers to help boost your odds of success.
Your certifications Review and manage your scheduled appointments, certificates, and transcripts. Request accommodations Learn more about requesting an accommodation for your exam.
Exam policies and FAQs Review and manage your scheduled appointments, certificates, and transcripts.
Installing and configuring windows server 2012 r2 ebook download.Exam Installing and Configuring Windows Server – Certifications | Microsoft Learn
AdAll Licenses are Backed by Best-in-class ESS Technical Support. Buy Now with Confidence! Microsoft Windows Server – Essentials, Standard and Datacenter. Full replace.me has been visited by 10K+ users in the past month. WebDec 11, · Understand some of the steps involved in an infrastructure-migration . AdRent or Buy eTextbooks from Chegg and Save! Get Instant Access to Your eTextbook. Get step-by-step Textbook Solutions for your homework with a free trial of Chegg Study!replace.me has been visited by K+ users in the past month.
Ей слышался голос Дэвида: Беги, Сьюзан, беги. Стратмор приближался к ней, его лицо казалось далеким воспоминанием. Холодные серые глаза смотрели безжизненно.
Сьюзан переживала из-за того, что ей configurong солгать любимому человеку, но у нее не было другого выхода. Все, что она сказала, было правдой еще несколько лет назад, но с тех пор положение в АН Б изменилось. Да и нажмите для продолжения мир криптографии изменился.
– Второе, что никогда не ставилось под сомнение, – это чутье Мидж. – Идем, – сказала она, вставая. – Выясним, права ли. Бринкерхофф проследовал за Мидж в ее кабинет. Она села и начала, подобно пианисту-виртуозу, перебирать клавиши «Большого Брата».
.Exam 70-410: Installing and Configuring Windows Server 2012
Доктор, – повторила. – Скажи первое, что придет в голову. – Ассоциативный ряд? – по-прежнему недоумевал Дэвид.
Не обращайте на него внимания, – засмеялась. – Он просто расстроен. Но он получит то, что ему причитается. – Она встряхнула волосами и подмигнула. – Может быть, все-таки скажете что-нибудь .
Думала, кое-кто помоложе? – засмеялся Стратмор. – Да нет, сэр, – попыталась она сгладить неловкость. – Не в этом дело… – Да в этом. – Он все еще посмеивался.
Add two printers. Modify the priorities of each printer and the security settings of each printer. Add one printer and configure printer pooling. You log on to Server1. You need to retrieve a list of the active TCP connections on Server2. Which command should you run from Server1? Server1 and Server2 are member servers. You need to ensure that you can manage Server2 from Server1 by using Server Manager.
Which two tasks should you perform? Install Windows Management Framework 3. Install the Windows PowerShell 2. Install Microsoft. NET Framework 4 on Server2. The domain contains two servers named Server1 and Server2. From the Microsoft Management Console on Server1, add a snap-in. Server 1 is stated to not have DHCP installed, so the snap-in therefore cannot be added. We must add the DHCP server role. Server1 has the Group Policy Management feature installed.
Server2 has the Print and Document Services server role installed. On a domain controller, create a Group Policy central store.
On Server2, install the Group Policy Management feature. On Server1, configure the security filtering of GPO1. You will also need the Print Services role installed on a server can be on your DC , and you will be using the Print Management and Group Policy Management consoles to configure the various settings. It is assumed that you have already followed Part One and have one or more printers shared on your server with the necessary drivers, ready to deploy to your client computers.
GPMC is not installed by default. The domain contains a member server named Server 1. You create two IPv4 scopes on Server1. The scopes are configured as shown in the following table. What should you add? The forest contains two domain controllers. You need to ensure that DC2 can provide authoritative responses for queries to the contoso. On DC2, create a forwarder. On DC1, create a delegation.
On DC1, change the replication scope of the contoso. On DC2, modify the Zone Transfers settings. You need to configure the IPv4 settings of the network connection on Server1 as follows: IP address: Name server NS records C.
Forwarders D. The domain contains a domain controller named DC1 that runs Windows Server R2 and a client computer named Computer1 that runs windows 8. Computer1 is configured to obtain an IP address automatically. Disable the Allow filters. Disable the Deny filters. Authorize DC1. Activate Scope [ The domain contains a server named Server1 that runs Windows Server R2 and has the Remote Access server role installed.
A user named User1 must connect to the network remotely. CHAP is enabled on Server1. You need to ensure that User1 can connect to Server1 and authenticate to the domain. What should you do from Active Directory Users and Computers? From the properties of User1, select Store password using reversible encryption. From the properties of Server1, assign the Allowed to Authenticate permission to User1. From the properties of Server1, select Trust this computer for delegation to any service Kerberos only.
The new domain controller will have the following configurations: Schema master Global catalog server DNS Server server role Active Directory Certificate Services server role You need to identify which configurations cannot be fulfilled by using the Active Directory Domain Services Configuration Wizard.
Which two configurations should you identify? ADCS and schema must be done separately. You discover that when users join computers to the domain, the computer accounts are created in the Computers container.
From a command prompt, run the redircmp. From Ldp, configure the properties of the Computers container. You log on to a domain controller by using an account named Admin1. Admin1 is a member of the Domain Admins group. You view the properties of a group named Group1 as shown in the exhibit. Group1 is located in an organizational unit OU named OU1.
You need to ensure that users from Group1 can modify the Security settings of OU1 only. Right-click OU1 and select Delegate Control. Right-click contoso. Modify the Security settings of Group1. Modify the Managed By settings on OU1. The domain contains two domain controllers named DC1 and DC2. Both domain controllers are virtual machines on a Hyper-V host. You plan to create a cloned domain controller named DC3 from an image of DC1.
You need to ensure that you can clone DC1. Run the Enable-AdOptionalFeaturecmdlet. Membership in this group dictates whether a DC can or cannot be cloned. This group has some permissions set on the domain head that should not be removed. Removing these permissions will cause cloning to fail. Also, as a best practice, DCs shouldn’t be added to the group until you plan to clone and DCs should be removed from the group once cloning is complete.
B: DCCloneConfig. You create a software restriction policy to allow an application named App1 by using a certificate rule. You need to ensure that when users attempt to execute App1, the certificate for App1 is verified against a certificate revocation list CRL.
Modify the rule for App1. Modify the Trusted Publishers Properties. Create a new certificate rule for App1.
Modify the Enforcement Properties. The domain contains an organizational unit OU named OU1. You need to ensure that when new client computers join the domain, their computer accounts are created in OU1 by default. For backward compatibility reasons, you cannot and must not remove it.
The domain contains user accounts that reside in an organizational unit OU named OU1. The solution must minimize the number of permissions assigned to User1. Modify the permissions on the User1 account. The domain contains a user named User1 and three global security groups named Group1, Group2 and, Group3. You need to add User1 to Group1, Group2, and Group3. Install-AddsDomainControllcr C.
User1 logs on to a client computer named Computer1. You need to disable the computer account of Computer1. Add AdPrincipalGroupMember. Install -AddsDomainController C. RonameAdObject F. The domain contains a member server named Server1 and a domain controller named DC2. All domain controllers are configured as DNS servers.
On Server1, install the Role Administration Tools. On DC2 and Server1, run winrmquickconfig. This lets users refer to network computers by using easy- to-remember names instead of a long series of numbers. The forest functional level is Windows Server R2. The domain contains a member server named Server1. Server1 runs windows Server R2. You need to share the network scanner on Server1. Which server role should you install on Server1? Fax Server C. Print and Document Services D. The domain contains three servers named Server1, Server2, and Server3.
You create a server group named ServerGroup1. You discover the error message shown in the following exhibit. You need to ensure that Server2 can be managed remotely by using Server Manager. On Server2, run the Add-Computer cmdlet. To be able to access Server2 remotely through Server Manager the user need to be a member of the Remote Management Users group. VM3 is used to test applications. You need to prevent VM3 from synchronizing its clock to Server1.
Thus you should disable the time synchronization using Integration Services. You try to install the Microsoft. NET Framework 3. You need to ensure that the feature can be installed on Server1. Connect Server1 to the Internet. Run the Add-AppxProvisionedPackagecmdlet. We need to connect the server to the Internet. Important to note that when starting with Windows Server R2 and Windows 8, the feature files for.
NET Framework 2. The files have been removed. Files for features that have been removed in a Features on Demand configuration, along with feature files for. By default, if feature files are not available on the destination server that is running Windows Server R2 Preview or Windows Server R2, the installation process searches for the missing files by connecting to Windows Update.
You can override the default behavior by configuring a Group Policy setting or specifying an alternate source path during installation, whether you are installing by using the Add Roles and Features Wizard GUI or a command line.
The disks on the server are configured as shown in the exhibit. You need to create a storage pool that contains Disk 1 and Disk 2. Create a volume on Disk 2 C. Convert Disk 1 and Disk 2 to dynamic disks D.
You add an additional disk to Server1 as shown in the exhibit. You need to ensure that users can access the additional disk from drive C. Convert Disk 0 to a dynamic disk and add a mirror. Create a simple volume on Disk 1 and mount the volume to a folder. Convert Disk 0 and Disk 1 to dynamic disks and extend a volume. Convert Disk 1 to a dynamic disk and create a spanned volume.
You review the installed features on Server1 as shown in the Features exhibit. You need to install the Server Graphical Shell feature on Server1. Which two possible sources can you use to achieve this goal? Each correct answer presents a complete solution. Index 1 B. Index 2 C. Index 3 D. The “Server Core Installation” option reduces the space required on disk, the potential attack surface, and especially the servicing requirements, so we recommend that you choose the Server Core installation unless you have a particular need for the additional user interface elements and graphical management tools that are included in the “Server with a GUI” option.
For this reason, the Server Core installation is now the default. Because you can freely switch between these options at any time later, one approach might be to initially install the Server with a GUI option, use the graphical tools to configure the server, and then later switch to the Server Core Installation option.
You download several signed Windows PowerShell scripts from the Internet. You need to run the PowerShell scripts on all of the servers and all of the client computers. What should you modify first? The environment variables on all of the servers B. The execution policy on all of the servers C. The execution policy on all of the client computers D. You need to identify which storage space contains the new hard disk.
Which storage space contains the new disk? Primordial B. Data C. Users D. The domain contains a member server named L0N-DC1. The network contains client computers and 50 IP phones.
The computers and the phones are from the same vendor. You create an IPv4 scope that contains addresses from You need to ensure that the IP phones receive IP addresses in the range of What should you create? Server level policies B. Reservations C. Filters D. Scope level policies are typically settings that only apply to that scope. They can also overwrite a setting that was set at the server level. You need to create an IPv6 reservation for Server2.
Which two values should you obtain from Server2? The main office contains a server named Server1 that runs Windows Server R2. The IP configuration of each office is configured as shown in the following tablE. You need to add a single static route on Server1 to ensure that Server1 can communicate with the hosts on all of the subnets. Which command should you run? The network contains client computers that run Windows 8. All of the client computers connect to the Internet by using a web proxy.
Server1 has the DNS Server server role installed. You configure all of the client computers to use Server1 as their primary DNS server. You need to prevent Server1 from attempting to resolve Internet host names for the client computers.
Create a primary zone named “root”. Create a primary zone named “GlobalNames”. Create a forwarder that points to Create a primary zone named “. Each forest contains one domain.
A two-way forest trust exists between the forests. The forests use the address spaces shown in the following table. From a computer in the contoso. From a computer in the adatum. You need to ensure that you can perform reverse lookups for the servers in the adatum.
A trust point B. A GlobalNames zone C. A delegation D. Instead of forwarding all queries it cannot resolve locally to a forwarder, a conditional forwarder is configured to forward a query to specific forwarders based on the domain name contained in the query.
Forwarding in terms of domain names improves conventional forwarding by adding a name-based condition to the forwarding process. The disks on Server1 are configured as shown in the exhibit. You create a virtual machine on Server1. You need to ensure that you can configure a pass-through disk for the virtual machine.
Convert Disk 1 to a GPT disk. Delete partition E. Convert Disk 1 to a dynamic disk. Take Disk 1 offline. Share and Storage Management B. New-StoragePool C. New-VirtualDisk D. You open DNS Manager as shown in the exhibit. From the View menu, click Filter From the Action menu, click Properties. From the View menu, click Advanced. That will yield the DNS server cache.
The temporary location experiences intermittent power failures. The file server will contain a dedicated volume for shared folders.
You need to create a volume for the shared folders. The solution must minimize the likelihood of file corruption if a power failure occurs. Which file system should you use? NFS B. FAT32 C. ReFS D. You want to achieve this goal by using the minimum amount of administrative effort. Which command should you run first? You need to add a graphical user interface GUI to Server1. The Install-WindowsFeaturecmdlet B. The Install-Module cmdlet C.
The Install-RoleServicecmdlet D. The setup. Server2 establishes an IPSec connection to Server1. You need to view which authentication method was used to establish the initial IPSec connection. From Windows Firewall with Advanced Security, view the quick mode security association. From Windows Firewall with Advanced Security, view the main mode security association. A security association SA is the information maintained about that secure channel on the local computer so that it can use the information for future network traffic to the remote computer.
You can monitor main mode SAs for information like which peers are currently connected to this computer and which protection suite was used to form the SA. System Configuration B. A member server named Server1 runs Windows Server R2. On Server1, you test a new set of AppLocker policy settings by using a local computer policy. Import the. From Server1, run the Set-ApplockerPolicycmdlet. From Server1, run the New-ApplockerPolicycmdlet.
The merging of policies will remove rules with duplicate rule IDs, and the enforcement setting specified by the AppLocker policy in the target GPO will be preserved.
If the Merge parameter is not specified, then the new policy will overwrite the existing policy. Server1 is connected to two identical print devices. The solution must ensure that if one print device fails, the print jobs will print automatically on the other print device.
Add two printers and configure the priority of each printer. Install the Failover Clustering feature, and then add one printer. A printing pool is one logical printer connected to multiple printers through multiple ports of the print server. The printer that is idle receives the next document sent to the logical printer. This is useful in a network with a high volume of printing because it decreases the time users wait for their documents.
A printing pool also simplifies administration because multiple printers can be managed from the same logical printer on a server. On Server1, you add Server2 to Server Manager. When you attempt to connect to Server2 from Server Manager, you receive the following error message: “Credentials not valid. On Server 2, run the Configure-SmRemotingcmdlet. On Server 1, run the Set-Item cmdlet.
Type the following, and then press Enter to enable all required firewall rule exceptions. Both servers are member servers. On Server2, you install all of the software required to ensure that Server2 can be managed remotely from Server Manager. Which two tasks should you perform on Server2? Run the systempropertiesremotE. Run the Fnable-PsRemotingcmdlet.
Run the Enable-PsSessionConfigurationcmdlet. Run the Confiqure-SMRemoting. Run the Set-ExecutionPolicycmdlet. To configure Server Manager remote management by using Windows PowerShell On the computer that you want to manage remotely, open a Windows PowerShell session with elevated user rights. In the Windows PowerShell session, type the following, and then press Enter. The domain contains a domain controller named Server1 that runs Windows Server R2. On Server1, you create a work folder named Work1.
A user named User1 connects to Work1 from a computer named Computer1. You need to identify the last time the documents in Work1 were synchronized successfully from Computer1. From Server Manager, review the properties of Computer1. From Server Manager, review the properties of User1. A user named User1 attempts to log on to DC1, but receives the error message shown in the exhibit.
You need to ensure that User1 can log on to DC1. Add User1 to the Remote Management Users group. Grant User1 the Allow log on locally user right. Modify the Logon Workstations setting of the User1 account. Modify the Account is sensitive and cannot be delegated setting of the User1 account. The domain contains hundreds of groups, many of which are nested in other groups. The domain contains a user account named user1. User1 is a direct member of 15 groups.
You need to identify of which Active Directory groups User1 is a member, including the nested groups. Active Directory Users and Computers B. Get-ADUser D. You install the Hyper-V server role on Server1. You create two virtual machines on Server1 that each have 8 GB of memory.
You need to minimize the amount of time it takes for both virtual machines to access memory. What should you configure on each virtual machine? Resource control B. Memory weight C. Dynamic Memory D. This capability can help improve the performance of workloads running on virtual machines that are configured with large amounts of memory. Right-click VM1, and then click Move. PauseVM1, and then modify the settings of VM1. However, since there are already several snapshots in existence, you will need to delete them first because you will not be able to change the location of the snapshot file while there is an existing snapshot.
You plan to create a shared folder. The shared folder will have a quota limit. What should you do on Server1 before you run the New Share Wizard? Configure the Advanced system settings. Run the Install-WindowsFeaturecmdlet. Run the Set-SmbSharecmdlet. Install the Share and Storage Management tool. This cmdlet is equivalent to and replaces Add-WindowsFeature, the cmdlet that was used to install roles, role services, and features in Windows Server R2.
On Server1, you create a printer named Printed. You share Printed and publish Printed in Active Directory. You need to provide a group named Group1 with the ability to manage Printer1. From Print Management, configure the Sharing settings of Printer1.
From Print Management, configure the Security settings of Printer1. From Print Management, configure the Advanced settings of Printer1. Set permissions for print servers 1.
Open Print Management. In the left pane, clickPrint Servers, right-click the applicable print server and then 2. On theSecuritytab, underGroup or users names, click a user or group for which you 3. To editSpecial permissions, clickAdvanceD. On thePermissionstab, click a user group, and then clickEdit. In thePermissionEntrydialog box, select theAlloworDenycheck boxes for the 7. On Print1, you share a printer named Printer1.
You need to ensure that only the members of the Server Operators group, the Administrators group, and the Print Operators group can send print jobs to Printer1. Remove the permissions for the Creator Owner group. Assign the Print permission to the Server Operators group. Remove the permissions for the Everyone group. Assign the Print permission to the Administrators group.
This permissions need to be removed. A network technician installs a new disk on Server1 and creates a new volume. The properties of the new volume are shown in the exhibit. You need to ensure that you can restore files on volume D by using the Previous Versions tab What should you do first? Install the File Server Resource Manager role service. Run the convert. Format volume D.
A Shadow copy is essentially a copy of the disk at a specific moment in time, and this has to be set up do that you can have a Previous Version that can be used to restore files. You join Server2 to the contoso. You need to ensure that you can manage Server2 by using the Computer Management console on Server1. What should you do on Server2? Run sconfig. You must be a member of the Administrators group to use the tool. You connect three new hard disks to Server1.
You need to create a storage space that contains the three disks. The solution must meet the following requirements: Provide fault tolerance if a single disk fails. Maximize the amount of files that can be stored in the storage space. A mirrored space B.
A spanned volume C. A parity space D. Client computers run either Windows 7 or Windows 8. All of the computer accounts of the client computers reside in an organizational unit OU named Clients. All of the client computers use a DNS server named Server1. You need to identify the maximum number of IPv6 subnets you can create. How many IPv6 subnets should you identify? Although bits can express over 3. You create a checkpoint of VM1, and then you install an application on VM1.
You verify that the application runs properly. You need to ensure that the current state of VM1 is contained in a single virtual hard disk file. The solution must minimize the amount of downtime on VM1. From a command prompt, run dism. From Hyper-V Manager, delete the checkpoint. From Hyper-V Manager, inspect the virtual hard disk. Server1 has a virtual switch named RDS Virtual. On each virtual machine, modify the Advanced Features settings of the network adapter.
Modify the settings of the RDS Virtual virtual switch. On each virtual machine, modify the BIOS settings. Delete, and then recreate the RDS Virtual virtual switch. On each virtual machine, modify the Hardware Acceleration settings of the network adapter. The additional step that is necessary when using SR-IOV is to ensure the checkbox is checked when the virtual switch is being created. The choice must be made a switch creation time. Thus you should first delete the existing virtual switch and then recreate it.
E: Once a virtual switch has been created, the next step is to configure a virtual machine. We have rearranged the settings for a virtual machine to introduce sub-nodes under a network adapter, one of which is the hardware acceleration node. You need to ensure that a user named User1 can install Windows features on VM1. To which group should you add User1? Hyper-V Administrators on Server1 B. Administrators on VM1 C.
Server Operators on Server1 D. Server1 is located in an isolated network that cannot access the Internet. On Server1, you install a new virtual machine named VM1. After 30 days, you discover that VM1 shuts down every 60 minutes.
You need to resolve the issue that causes VM1 to shut down every 60 minutes. OnVM1, run slmgr. OnServer1, run slmgr. Create a new internal virtual network and attach VM1 to the new virtual network. A trust relationship does not exist between the forests.
In the contoso. You transfer the backup of GPO1 to a domain controller in the contoso. You need to create a GPO in contoso. You must achieve this goal by using the minimum amount of administrative effort. An organizational unit OU named OU1 contains the computer accounts for laptops and desktop computers.
You need to ensure that the configuration settings in GP1 are applied only to a user named User1. Modify the security settings of OU1. Modify the security settings of GP1. All domain controllers run Windows Server R2. You create and enforce the default AppLocker executable rules. Users report that they can no longer execute a legacy application installed in the root of drive C.
You need to ensure that the users can execute the legacy application. Create a new rule. Delete an existing rule. Modify the action of the existing rules. Add an exception to the existing rules.
You need to ensure that User1 can manage the group membership of Group1. Rename AdOh F. You can modify commonly used property values by using the cmdlet parameters. ManagedBySpecifies the user or group that manages the object by providing one of the following property values. The password policy for the domain is set to require a minimum password length of 10 characters. A user named User1 and a user named User2 work for the sales department. User1 is forced to create a domain password that has a minimum of 12 characters.
User2 is forced to create a domain password that has a minimum of eight characters. You need to identify what forces the two users to have different password lengths. Group Policy Management B. Credential Manager C. Active Directory Administrative Center D. For example, to increase the security of privileged accounts, you can apply stricter settings to the privileged accounts and then apply less strict settings to the accounts of other users.
Or in some cases, you may want to apply a special password policy for accounts whose passwords are synchronized with other data sources. This is found in the Active Directory Administrative Center. An organizational unit OU named OU1 contains user accounts and computer accounts. You need to prevent the User Configuration settings in GP1 from being applied to users. The solution must ensure that the Computer Configuration settings in GP1 are applied to all client computers.
The Block Inheritance feature C. The Group Policy loopback processing mode D. You need to ensure that you can use the script to promote Server1 to a domain controller. Which file extension should you use to save the script? This enables you to use the Server Manager graphical interface as a Windows PowerShell deployment studio. Use the Active Directory Domain Services Configuration Wizard to configure options, export the configuration, and then cancel the wizard.
This process creates a valid and syntactically correct sample for further modification or direct use. The forest contains five domains. The contoso. You need to ensure that Admin1 and Admin2 can configure hardware and services on all of the member servers in the forest. The solution must minimize the number of privileges granted to Admin1 and Admin2. Which built-in groups should you use?
Administrators local groups B. Administrators domain local groups C. Domain Admins global groups D. An administrator provides you with a file that contains the information to create user accounts for temporary employees.
The file is shown in the exhibit. You need to automate the creation of the user accounts. Ldifde B. Dsadd D. This would be the least amount of administrative effort in this case.
Average physical memory usage, measured in megabytes. Minimum memory usage lowest amount of physical memory. Maximum memory usage highest amount of physical memory. Maximum amount of disk space allocated to a virtual machine. Total incoming network traffic, measured in megabytes, for a virtual network adapter.
You need to enable access-based enumeration for a file share on Server1. Share and Storage Management C. Server Manager D. You need to ensure that when users are connected to the network, they always use local offline files that are cached from Server1. Which Group Policy setting should you configure? Configure Slow link speed. Turn on economical application of administratively assigned Offline Files. Configure slow-link mode. Enable file synchronization on costed networks.
The domain contains a standalone server named Server2 that is located in a perimeter network. Both servers run Windows Server R2. You need to manage Server2 remotely from Server1. From Server1, run the Enable-PsRemotingcmdlet. From Server2, run the winrm command. From Server1, run the winrm command.
Corel has the Hyper-V server role installed. Corel has two network adapters from different third- party hardware vendors. You need to configure network traffic failover to prevent connectivity loss if a network adapter fails. What should you use? New-NetSwitchTeam B. Install-Feature C. On Server1, you modify the file set for the Web servers.
You need to ensure that all of the Web servers have the latest configurations. Which cmdlet should you run on Server1? Get-DcsConfiguration B. Restore-DcsConfiguration C. You add a 4-TB disk named Disk 5 to Server1. You need to ensure that you can create a 3-TB volume on Disk 5. The domain contains a virtual machine named VM1. A developer wants to attach a debugger to VM1. You need to ensure that the developer can connect to VM1 by using a named pipe. Which virtual machine setting should you configure?
BIOS B. Network Adapter C. COM 1 D. From Sconfig. Run the sc. This cmdlet statically adds DNS server addresses to the interface. The servers are configured as shown in the following table. Server3 is configured to obtain an IP address automatically. You need to prevent Server3 from receiving an IP address from Server1. What should you create on Server1? An exclusion B. A scope option C. A filter D. Server1 is a member of a workgroup. You need to configure a local Group Policy on Server1 that will apply only to non- administrators.
Group Policy Object Editor B. Group Policy Management C. Group Policy Management Editor D. The domain contains 20 computer accounts that reside in an organizational unit OU named OU1. GPO1 is used to assign several user rights to a user named User1. In the Users container, you create a new user named User2. You need to ensure that User2 is assigned the same user rights as User1 on all of the client computers in OU1.
Modify the settings in GPO1. Modify the link of GPO1. Run the Set-VmNetworkAdapterlsolationcmdlet. Modify the properties of the network adapters on VM1. Run the Add-WindowsPackagecmdlet. Specify an alternate source path. A network technician installs a new disk on Server2 and creates a new volume. Format volume D B. Ajay Singh Chauhan. Data Protection and Information Lifecycle Management. Tom Petrocelli. Paul Rohmeyer. Information Security Handbook: Develop a threat model and incident response strategy to build a strong information security framework.
Darren Death. About the Author Mitch Tulloch is a widely recognized expert on Windows administration and has been awarded Microsoft Most Valuable Professional MVP status for his contributions supporting those who deploy and use Microsoft platforms, products, and solutions. Brief content visible, double tap to read full content. Full content visible, double tap to read brief content. Help others learn more about this product by uploading a video!
About the author Follow authors to get new release updates, plus improved recommendations. Mitch Tulloch. Read more Read less. Customer reviews. How customer reviews and ratings work Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them. Learn more how customers reviews work on Amazon. Top reviews Most recent Top reviews. Top reviews from the United States. There was a problem filtering reviews right now.
Please try again later. April Hayes Top Contributor: Coloring. Verified Purchase. Great training guide to use in getting ready for MCSA. I like the fact that this is written by and for Microsoft. Covers all the topic that will been on this exam and helps walk you through each step.
Great tool and like that I can also purchase with Exam-ref book that narrows down topics and goes through each point in easy to read format. One person found this helpful. I goes over all the items that I need, I am using it to train my Junior admin. So thank you Microsoft for another great book. Considering Microsoft is the one that develops their exams and their exam questions come right out of their Exam Ref’s, there’s no real other choice.
Mitch always does a good job of it. My husband was very happy with the guide, and found it a useful tool for his study for recertification. This book was about useless in helpi. This book provides a very high level overview of topics and leaves out all the details that you actually need for the exam. It also provides links and tells you to just go learn from Microsoft websites like TechNet. This book was about useless in helping me for the exam. Good for beginners. See all reviews. Top reviews from other countries.
Translate all reviews to English. The description for this book is a bit misleading as it assumes that you already have a good working knowledge of the subject matter. This is not a beginner’s training guide. Report abuse. This book covers some good subject matter but it hasnt been proof-read in even the slightest way since the upgrade from Server to R2.
To add to this, the errata page on the publishers website is simply an email address for you to SUBMIT errors, rather than containing any actual corrections. A shameless and lazy update in order to make a quick buck – unfortunately there isnt much better out there on this subject matter so you wont have a great deal of choice. I am learning lots from this book
Ответа не последовало. Бринкерхофф подошел к кабинету. Голоса показались ему знакомыми. Он толкнул дверь.
«Альфонсо Тринадцатый». Очень хорошо, прямо сейчас туда загляну. Спасибо, что помогли. Дэвид Беккер повесил трубку.
«Ну что еще? – застонал. – Хочет предъявить мне обвинение во вторжении в личную жизнь?» Девушка волокла за собой туристскую сумку. Подойдя к нему, она на этот раз расплылась в широкой улыбке.
Merge D. Converting changes the disk format to the newer VHDX. This process recreates the virtual disk, and allows you to specify the size of the VHDX. New-StoragePool B. Diskpart C. From the DiskPart command-line tool at an elevated command prompt, run the create vdisk command and specify the file to name the file and maximum to set the maximum size in megabytes parameters. DiskPart Microsoft DiskPart version 6. On Server1, you create a virtual machine named VM1.
VM1 has a legacy network adapter. You need to assign a specific amount of available network bandwidth to VM1. Add a second legacy network adapter, and then configure network adapter teaming. Remove the legacy network adapter, and then add a network adapter. You create a new inbound rule by using Windows Firewall with Advanced Security. You need to configure the rule to allow Server1 to accept unsolicited inbound packets that are received through a network address translation NAT device on the network.
Which setting in the rule should you configure? Interface types B. Authorized computers C. Remote IP address D. All servers run Windows Server R2. A server named Server1 is configured to encrypt all traffic by using IPSec. You need to ensure that Server1 can respond to ping requests from computers that do not support IPSec. You need to create a script that will create and mount a virtual hard disk.
The solution must ensure that the network traffic can be received on both VLANs if a network adapter fails. From Server Manager, change the load balancing mode of Team1. Run the New-NetLbfoTeamcmdlet. From Server Manager, add an interface to Team1. Server1 has six network adapters. Two of the network adapters are connected to a network named LAN1, two of the network adapters are connected to a network named LAN2, and two of the network adapters are connected to a network named LAN3. You create a network adapter team named Team2 from the two adapters connected to LAN2.
How many reservations should you identify? On Server1, you open Computer Management as shown in the exhibit. You need to ensure that you can create a 3-TB volume on Disk 1. Create a storage pool. Convert the disk to a GPT disk. Convert the disk to a dynamic disk. Server1 has a thin provisioned disk named Disk1. You need to expand Disk1. Which two actions should you perform? From File and Storage Services, extend Disk1. From File and Storage Services, add a physical disk to the storage pool.
From Disk Management, extend the volume. From Disk Management, delete the volume, create a new volume, and then format the volume. From File and Storage Services, detach Disk1. Step 2 A : Dynamically extend the virtual disk not volume. The File and Storage Services role and the Storage Services role service are installed by default, but without any additional role services. This basic functionality enables you to use Server Manager or Windows PowerShell to manage the storage functionality of your servers.
You install Windows Server R2 on a server named Server2. The solution must meet the following requirements: Ensure that existing leases are migrated. Prevent lease conflicts. Which three actions should you perform? Choose three. On Server1, run the Export-DhcpServercmdlet.
On Server1, run the Stop-Service cmdlet. On Server2, run the Stop-Service cmdlet. On Server2, run the Import-DhcpServercmdlet. Server1 has the Print and Document Services server role installed.
You connect a new print device to the network. The marketing department and the sales department will use the print device. You need to provide users from both departments with the ability to print to the network print device. The solution must ensure that if there are multiple documents queued to print, the documents from the sales users print before the documents from the marketing users.
Add two printers and configure printer pooling. Add one printer. Modify the printer priority and the security settings. Add two printers. Modify the priorities of each printer and the security settings of each printer.
Add one printer and configure printer pooling. You log on to Server1. You need to retrieve a list of the active TCP connections on Server2. Which command should you run from Server1? Server1 and Server2 are member servers. You need to ensure that you can manage Server2 from Server1 by using Server Manager. Which two tasks should you perform? Install Windows Management Framework 3. Install the Windows PowerShell 2. Install Microsoft. NET Framework 4 on Server2. The domain contains two servers named Server1 and Server2.
From the Microsoft Management Console on Server1, add a snap-in. Server 1 is stated to not have DHCP installed, so the snap-in therefore cannot be added. We must add the DHCP server role. Server1 has the Group Policy Management feature installed. Server2 has the Print and Document Services server role installed. On a domain controller, create a Group Policy central store.
On Server2, install the Group Policy Management feature. On Server1, configure the security filtering of GPO1. You will also need the Print Services role installed on a server can be on your DC , and you will be using the Print Management and Group Policy Management consoles to configure the various settings. It is assumed that you have already followed Part One and have one or more printers shared on your server with the necessary drivers, ready to deploy to your client computers.
GPMC is not installed by default. The domain contains a member server named Server 1. You create two IPv4 scopes on Server1. The scopes are configured as shown in the following table. What should you add? The forest contains two domain controllers.
You need to ensure that DC2 can provide authoritative responses for queries to the contoso. On DC2, create a forwarder. On DC1, create a delegation. On DC1, change the replication scope of the contoso. On DC2, modify the Zone Transfers settings. You need to configure the IPv4 settings of the network connection on Server1 as follows: IP address: Name server NS records C.
Forwarders D. The domain contains a domain controller named DC1 that runs Windows Server R2 and a client computer named Computer1 that runs windows 8. Computer1 is configured to obtain an IP address automatically.
Disable the Allow filters. Disable the Deny filters. Authorize DC1. Activate Scope [ The domain contains a server named Server1 that runs Windows Server R2 and has the Remote Access server role installed. A user named User1 must connect to the network remotely. CHAP is enabled on Server1. You need to ensure that User1 can connect to Server1 and authenticate to the domain. What should you do from Active Directory Users and Computers?
From the properties of User1, select Store password using reversible encryption. From the properties of Server1, assign the Allowed to Authenticate permission to User1.
From the properties of Server1, select Trust this computer for delegation to any service Kerberos only. The new domain controller will have the following configurations: Schema master Global catalog server DNS Server server role Active Directory Certificate Services server role You need to identify which configurations cannot be fulfilled by using the Active Directory Domain Services Configuration Wizard.
Which two configurations should you identify? ADCS and schema must be done separately. You discover that when users join computers to the domain, the computer accounts are created in the Computers container. From a command prompt, run the redircmp.
From Ldp, configure the properties of the Computers container. You log on to a domain controller by using an account named Admin1. Admin1 is a member of the Domain Admins group. You view the properties of a group named Group1 as shown in the exhibit. Group1 is located in an organizational unit OU named OU1. You need to ensure that users from Group1 can modify the Security settings of OU1 only.
Right-click OU1 and select Delegate Control. Right-click contoso. Modify the Security settings of Group1. Modify the Managed By settings on OU1. The domain contains two domain controllers named DC1 and DC2.
Both domain controllers are virtual machines on a Hyper-V host. You plan to create a cloned domain controller named DC3 from an image of DC1. You need to ensure that you can clone DC1. Run the Enable-AdOptionalFeaturecmdlet. Membership in this group dictates whether a DC can or cannot be cloned.
This group has some permissions set on the domain head that should not be removed. Removing these permissions will cause cloning to fail. Also, as a best practice, DCs shouldn’t be added to the group until you plan to clone and DCs should be removed from the group once cloning is complete.
B: DCCloneConfig. You create a software restriction policy to allow an application named App1 by using a certificate rule. You need to ensure that when users attempt to execute App1, the certificate for App1 is verified against a certificate revocation list CRL. Modify the rule for App1. Modify the Trusted Publishers Properties. Create a new certificate rule for App1. Modify the Enforcement Properties. The domain contains an organizational unit OU named OU1.
You need to ensure that when new client computers join the domain, their computer accounts are created in OU1 by default. For backward compatibility reasons, you cannot and must not remove it. The domain contains user accounts that reside in an organizational unit OU named OU1.
The solution must minimize the number of permissions assigned to User1. Modify the permissions on the User1 account. The domain contains a user named User1 and three global security groups named Group1, Group2 and, Group3.
You need to add User1 to Group1, Group2, and Group3. Install-AddsDomainControllcr C. User1 logs on to a client computer named Computer1. You need to disable the computer account of Computer1. Add AdPrincipalGroupMember. Install -AddsDomainController C. RonameAdObject F. The domain contains a member server named Server1 and a domain controller named DC2. All domain controllers are configured as DNS servers. On Server1, install the Role Administration Tools. On DC2 and Server1, run winrmquickconfig.
This lets users refer to network computers by using easy- to-remember names instead of a long series of numbers. The forest functional level is Windows Server R2. The domain contains a member server named Server1.
Server1 runs windows Server R2. You need to share the network scanner on Server1. Which server role should you install on Server1? Fax Server C. Print and Document Services D. The domain contains three servers named Server1, Server2, and Server3. You create a server group named ServerGroup1. You discover the error message shown in the following exhibit. You need to ensure that Server2 can be managed remotely by using Server Manager.
On Server2, run the Add-Computer cmdlet. To be able to access Server2 remotely through Server Manager the user need to be a member of the Remote Management Users group. VM3 is used to test applications. You need to prevent VM3 from synchronizing its clock to Server1. Thus you should disable the time synchronization using Integration Services. You try to install the Microsoft.
NET Framework 3. You need to ensure that the feature can be installed on Server1. Connect Server1 to the Internet. Run the Add-AppxProvisionedPackagecmdlet. We need to connect the server to the Internet. Important to note that when starting with Windows Server R2 and Windows 8, the feature files for. NET Framework 2. The files have been removed. Files for features that have been removed in a Features on Demand configuration, along with feature files for.
By default, if feature files are not available on the destination server that is running Windows Server R2 Preview or Windows Server R2, the installation process searches for the missing files by connecting to Windows Update. You can override the default behavior by configuring a Group Policy setting or specifying an alternate source path during installation, whether you are installing by using the Add Roles and Features Wizard GUI or a command line.
The disks on the server are configured as shown in the exhibit. You need to create a storage pool that contains Disk 1 and Disk 2. Create a volume on Disk 2 C. Convert Disk 1 and Disk 2 to dynamic disks D. You add an additional disk to Server1 as shown in the exhibit.
You need to ensure that users can access the additional disk from drive C. Convert Disk 0 to a dynamic disk and add a mirror. Create a simple volume on Disk 1 and mount the volume to a folder. Convert Disk 0 and Disk 1 to dynamic disks and extend a volume. Convert Disk 1 to a dynamic disk and create a spanned volume. You review the installed features on Server1 as shown in the Features exhibit.
You need to install the Server Graphical Shell feature on Server1. Which two possible sources can you use to achieve this goal?
Each correct answer presents a complete solution. Index 1 B. Index 2 C. Index 3 D. The “Server Core Installation” option reduces the space required on disk, the potential attack surface, and especially the servicing requirements, so we recommend that you choose the Server Core installation unless you have a particular need for the additional user interface elements and graphical management tools that are included in the “Server with a GUI” option.
For this reason, the Server Core installation is now the default. Because you can freely switch between these options at any time later, one approach might be to initially install the Server with a GUI option, use the graphical tools to configure the server, and then later switch to the Server Core Installation option. You download several signed Windows PowerShell scripts from the Internet.
You need to run the PowerShell scripts on all of the servers and all of the client computers. What should you modify first? The environment variables on all of the servers B. The execution policy on all of the servers C. The execution policy on all of the client computers D.
You need to identify which storage space contains the new hard disk. Which storage space contains the new disk? Primordial B. Data C. Users D. The domain contains a member server named L0N-DC1.
The network contains client computers and 50 IP phones. The computers and the phones are from the same vendor. You create an IPv4 scope that contains addresses from You need to ensure that the IP phones receive IP addresses in the range of What should you create?
Server level policies B. Reservations C. Filters D. Scope level policies are typically settings that only apply to that scope. They can also overwrite a setting that was set at the server level. You need to create an IPv6 reservation for Server2. Which two values should you obtain from Server2? The main office contains a server named Server1 that runs Windows Server R2. The IP configuration of each office is configured as shown in the following tablE.
You need to add a single static route on Server1 to ensure that Server1 can communicate with the hosts on all of the subnets. Which command should you run?
The network contains client computers that run Windows 8. All of the client computers connect to the Internet by using a web proxy. Server1 has the DNS Server server role installed. You configure all of the client computers to use Server1 as their primary DNS server.
You need to prevent Server1 from attempting to resolve Internet host names for the client computers. Create a primary zone named “root”.
Create a primary zone named “GlobalNames”. Create a forwarder that points to Create a primary zone named “. Each forest contains one domain. A two-way forest trust exists between the forests. The forests use the address spaces shown in the following table.
From a computer in the contoso. From a computer in the adatum. You need to ensure that you can perform reverse lookups for the servers in the adatum. A trust point B. A GlobalNames zone C. A delegation D. Instead of forwarding all queries it cannot resolve locally to a forwarder, a conditional forwarder is configured to forward a query to specific forwarders based on the domain name contained in the query. Forwarding in terms of domain names improves conventional forwarding by adding a name-based condition to the forwarding process.
The disks on Server1 are configured as shown in the exhibit. You create a virtual machine on Server1. You need to ensure that you can configure a pass-through disk for the virtual machine. Convert Disk 1 to a GPT disk. Delete partition E. Convert Disk 1 to a dynamic disk. Take Disk 1 offline.
Share and Storage Management B. New-StoragePool C. New-VirtualDisk D. You open DNS Manager as shown in the exhibit. From the View menu, click Filter From the Action menu, click Properties.
From the View menu, click Advanced. That will yield the DNS server cache. The temporary location experiences intermittent power failures. The file server will contain a dedicated volume for shared folders. You need to create a volume for the shared folders. The solution must minimize the likelihood of file corruption if a power failure occurs. Which file system should you use? NFS B. FAT32 C.
ReFS D. You want to achieve this goal by using the minimum amount of administrative effort. Which command should you run first? You need to add a graphical user interface GUI to Server1. The Install-WindowsFeaturecmdlet B. The Install-Module cmdlet C. The Install-RoleServicecmdlet D. The setup. Server2 establishes an IPSec connection to Server1. You need to view which authentication method was used to establish the initial IPSec connection.
From Windows Firewall with Advanced Security, view the quick mode security association. From Windows Firewall with Advanced Security, view the main mode security association. A security association SA is the information maintained about that secure channel on the local computer so that it can use the information for future network traffic to the remote computer. You can monitor main mode SAs for information like which peers are currently connected to this computer and which protection suite was used to form the SA.
System Configuration B. A member server named Server1 runs Windows Server R2. On Server1, you test a new set of AppLocker policy settings by using a local computer policy. Import the. From Server1, run the Set-ApplockerPolicycmdlet. From Server1, run the New-ApplockerPolicycmdlet. The merging of policies will remove rules with duplicate rule IDs, and the enforcement setting specified by the AppLocker policy in the target GPO will be preserved. If the Merge parameter is not specified, then the new policy will overwrite the existing policy.
Server1 is connected to two identical print devices. The solution must ensure that if one print device fails, the print jobs will print automatically on the other print device. Add two printers and configure the priority of each printer.
Install the Failover Clustering feature, and then add one printer. A printing pool is one logical printer connected to multiple printers through multiple ports of the print server. The printer that is idle receives the next document sent to the logical printer. This is useful in a network with a high volume of printing because it decreases the time users wait for their documents. A printing pool also simplifies administration because multiple printers can be managed from the same logical printer on a server.
On Server1, you add Server2 to Server Manager. When you attempt to connect to Server2 from Server Manager, you receive the following error message: “Credentials not valid. On Server 2, run the Configure-SmRemotingcmdlet. On Server 1, run the Set-Item cmdlet. Type the following, and then press Enter to enable all required firewall rule exceptions. Both servers are member servers.
On Server2, you install all of the software required to ensure that Server2 can be managed remotely from Server Manager. Which two tasks should you perform on Server2? Run the systempropertiesremotE. Run the Fnable-PsRemotingcmdlet. Run the Enable-PsSessionConfigurationcmdlet.
Run the Confiqure-SMRemoting. Run the Set-ExecutionPolicycmdlet. To configure Server Manager remote management by using Windows PowerShell On the computer that you want to manage remotely, open a Windows PowerShell session with elevated user rights.
In the Windows PowerShell session, type the following, and then press Enter. The domain contains a domain controller named Server1 that runs Windows Server R2.
On Server1, you create a work folder named Work1. A user named User1 connects to Work1 from a computer named Computer1. You need to identify the last time the documents in Work1 were synchronized successfully from Computer1. From Server Manager, review the properties of Computer1. From Server Manager, review the properties of User1. A user named User1 attempts to log on to DC1, but receives the error message shown in the exhibit.
You need to ensure that User1 can log on to DC1. Add User1 to the Remote Management Users group. Grant User1 the Allow log on locally user right. Modify the Logon Workstations setting of the User1 account. Modify the Account is sensitive and cannot be delegated setting of the User1 account. The domain contains hundreds of groups, many of which are nested in other groups. The domain contains a user account named user1. User1 is a direct member of 15 groups.
You need to identify of which Active Directory groups User1 is a member, including the nested groups. Active Directory Users and Computers B. Get-ADUser D. You install the Hyper-V server role on Server1. You create two virtual machines on Server1 that each have 8 GB of memory.
You need to minimize the amount of time it takes for both virtual machines to access memory. What should you configure on each virtual machine? Resource control B. Memory weight C. Dynamic Memory D. This capability can help improve the performance of workloads running on virtual machines that are configured with large amounts of memory. Right-click VM1, and then click Move. PauseVM1, and then modify the settings of VM1. However, since there are already several snapshots in existence, you will need to delete them first because you will not be able to change the location of the snapshot file while there is an existing snapshot.
You plan to create a shared folder. The shared folder will have a quota limit. What should you do on Server1 before you run the New Share Wizard? Configure the Advanced system settings. Run the Install-WindowsFeaturecmdlet. Run the Set-SmbSharecmdlet. Install the Share and Storage Management tool. This cmdlet is equivalent to and replaces Add-WindowsFeature, the cmdlet that was used to install roles, role services, and features in Windows Server R2.
On Server1, you create a printer named Printed. You share Printed and publish Printed in Active Directory. You need to provide a group named Group1 with the ability to manage Printer1. From Print Management, configure the Sharing settings of Printer1. From Print Management, configure the Security settings of Printer1. From Print Management, configure the Advanced settings of Printer1.
Set permissions for print servers 1. Open Print Management. In the left pane, clickPrint Servers, right-click the applicable print server and then 2. On theSecuritytab, underGroup or users names, click a user or group for which you 3.
To editSpecial permissions, clickAdvanceD. On thePermissionstab, click a user group, and then clickEdit. In thePermissionEntrydialog box, select theAlloworDenycheck boxes for the 7.
On Print1, you share a printer named Printer1. You need to ensure that only the members of the Server Operators group, the Administrators group, and the Print Operators group can send print jobs to Printer1. Remove the permissions for the Creator Owner group.
Assign the Print permission to the Server Operators group. Remove the permissions for the Everyone group. Assign the Print permission to the Administrators group. This permissions need to be removed. A network technician installs a new disk on Server1 and creates a new volume. The properties of the new volume are shown in the exhibit. You need to ensure that you can restore files on volume D by using the Previous Versions tab What should you do first?
Install the File Server Resource Manager role service. Run the convert. Format volume D. A Shadow copy is essentially a copy of the disk at a specific moment in time, and this has to be set up do that you can have a Previous Version that can be used to restore files. You join Server2 to the contoso. You need to ensure that you can manage Server2 by using the Computer Management console on Server1.
What should you do on Server2? Run sconfig. You must be a member of the Administrators group to use the tool. You connect three new hard disks to Server1. You need to create a storage space that contains the three disks.
The solution must meet the following requirements: Provide fault tolerance if a single disk fails. Maximize the amount of files that can be stored in the storage space.
A mirrored space B. A spanned volume C. A parity space D. Client computers run either Windows 7 or Windows 8. All of the computer accounts of the client computers reside in an organizational unit OU named Clients. All of the client computers use a DNS server named Server1. You need to identify the maximum number of IPv6 subnets you can create. How many IPv6 subnets should you identify? Although bits can express over 3.
You create a checkpoint of VM1, and then you install an application on VM1. You verify that the application runs properly. You need to ensure that the current state of VM1 is contained in a single virtual hard disk file. The solution must minimize the amount of downtime on VM1. From a command prompt, run dism. From Hyper-V Manager, delete the checkpoint. From Hyper-V Manager, inspect the virtual hard disk. Server1 has a virtual switch named RDS Virtual. On each virtual machine, modify the Advanced Features settings of the network adapter.
Modify the settings of the RDS Virtual virtual switch. On each virtual machine, modify the BIOS settings. Delete, and then recreate the RDS Virtual virtual switch. On each virtual machine, modify the Hardware Acceleration settings of the network adapter.
The additional step that is necessary when using SR-IOV is to ensure the checkbox is checked when the virtual switch is being created.
The choice must be made a switch creation time. Thus you should first delete the existing virtual switch and then recreate it. E: Once a virtual switch has been created, the next step is to configure a virtual machine.
We have rearranged the settings for a virtual machine to introduce sub-nodes under a network adapter, one of which is the hardware acceleration node.
You need to ensure that a user named User1 can install Windows features on VM1. To which group should you add User1? Hyper-V Administrators on Server1 B. Administrators on VM1 C. Server Operators on Server1 D. Server1 is located in an isolated network that cannot access the Internet.
On Server1, you install a new virtual machine named VM1. After 30 days, you discover that VM1 shuts down every 60 minutes. You need to resolve the issue that causes VM1 to shut down every 60 minutes. OnVM1, run slmgr. OnServer1, run slmgr. Create a new internal virtual network and attach VM1 to the new virtual network. A trust relationship does not exist between the forests.
In the contoso. You transfer the backup of GPO1 to a domain controller in the contoso. You need to create a GPO in contoso. You must achieve this goal by using the minimum amount of administrative effort. An organizational unit OU named OU1 contains the computer accounts for laptops and desktop computers.
You need to ensure that the configuration settings in GP1 are applied only to a user named User1. Modify the security settings of OU1. Modify the security settings of GP1. All domain controllers run Windows Server R2. You create and enforce the default AppLocker executable rules. Users report that they can no longer execute a legacy application installed in the root of drive C.
You need to ensure that the users can execute the legacy application. Create a new rule. Delete an existing rule. Modify the action of the existing rules. Add an exception to the existing rules. You need to ensure that User1 can manage the group membership of Group1. Rename AdOh F. You can modify commonly used property values by using the cmdlet parameters. ManagedBySpecifies the user or group that manages the object by providing one of the following property values.
The password policy for the domain is set to require a minimum password length of 10 characters. A user named User1 and a user named User2 work for the sales department. User1 is forced to create a domain password that has a minimum of 12 characters. User2 is forced to create a domain password that has a minimum of eight characters.
You need to identify what forces the two users to have different password lengths. Group Policy Management B. Credential Manager C. Active Directory Administrative Center D.
For example, to increase the security of privileged accounts, you can apply stricter settings to the privileged accounts and then apply less strict settings to the accounts of other users. Or in some cases, you may want to apply a special password policy for accounts whose passwords are synchronized with other data sources. This is found in the Active Directory Administrative Center. An organizational unit OU named OU1 contains user accounts and computer accounts.
You need to prevent the User Configuration settings in GP1 from being applied to users. The solution must ensure that the Computer Configuration settings in GP1 are applied to all client computers. The Block Inheritance feature C. The Group Policy loopback processing mode D. You need to ensure that you can use the script to promote Server1 to a domain controller. Which file extension should you use to save the script? This enables you to use the Server Manager graphical interface as a Windows PowerShell deployment studio.
Use the Active Directory Domain Services Configuration Wizard to configure options, export the configuration, and then cancel the wizard. This process creates a valid and syntactically correct sample for further modification or direct use.
The forest contains five domains. The contoso. You need to ensure that Admin1 and Admin2 can configure hardware and services on all of the member servers in the forest. The solution must minimize the number of privileges granted to Admin1 and Admin2. Which built-in groups should you use? Administrators local groups B.
Administrators domain local groups C. Domain Admins global groups D. An administrator provides you with a file that contains the information to create user accounts for temporary employees.
The file is shown in the exhibit. You need to automate the creation of the user accounts. Ldifde B. Dsadd D. This would be the least amount of administrative effort in this case. Average physical memory usage, measured in megabytes. Minimum memory usage lowest amount of physical memory. Maximum memory usage highest amount of physical memory.
Maximum amount of disk space allocated to a virtual machine. To see our price, add these items to your cart. Choose items to buy together. Get it as soon as Wednesday, Jan 4. Customers who bought this item also bought. Page 1 of 1 Start over Page 1 of 1. Orin Thomas. Ken St. Practical Network Scanning: Capture network vulnerabilities using standard tools such as Nmap and Nessus. Ajay Singh Chauhan. Data Protection and Information Lifecycle Management.
Tom Petrocelli. Paul Rohmeyer. Information Security Handbook: Develop a threat model and incident response strategy to build a strong information security framework. Darren Death. About the Author Mitch Tulloch is a widely recognized expert on Windows administration and has been awarded Microsoft Most Valuable Professional MVP status for his contributions supporting those who deploy and use Microsoft platforms, products, and solutions.
Brief content visible, double tap to read full content. Full content visible, double tap to read brief content. Help others learn more about this product by uploading a video! About the author Follow authors to get new release updates, plus improved recommendations. Mitch Tulloch. Read more Read less. Customer reviews. How customer reviews and ratings work Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
Learn more how customers reviews work on Amazon. Top reviews Most recent Top reviews. Top reviews from the United States. There was a problem filtering reviews right now. Please try again later.
April Hayes Top Contributor: Coloring. Verified Purchase. Great training guide to use in getting ready for MCSA. I like the fact that this is written by and for Microsoft. Covers all the topic that will been on this exam and helps walk you through each step. Great tool and like that I can also purchase with Exam-ref book that narrows down topics and goes through each point in easy to read format.
One person found this helpful. I goes over all the items that I need, I am using it to train my Junior admin. So thank you Microsoft for another great book. Considering Microsoft is the one that develops their exams and their exam questions come right out of their Exam Ref’s, there’s no real other choice. Mitch always does a good job of it. My husband was very happy with the guide, and found it a useful tool for his study for recertification.
This book was about useless in helpi. This book provides a very high level overview of topics and leaves out all the details that you actually need for the exam. It also provides links and tells you to just go learn from Microsoft websites like TechNet. This book was about useless in helping me for the exam. Good for beginners.
See all reviews. Top reviews from other countries.