You administer a Microsoft Windows Server 2012 R2 domain named ABC.com. The ABC.com domain has a server named ABC-DC01 configured as a domain controller.
You are using Data Collector Set (DCS) on ABC-DC01 to collect event logs from all the servers in domain. The collected logs are stored in the C:\DCSLogs folder.
You want ABC-DC01 to automatically delete the log files in C:\DSCLogs when the size of the folder grows to 250MB.
Which of the following actions should you take?
A. You should configure the Data Manager Settings on the Data Collector Set (DCS).
B. You should configure a performance counter alert to clear the log files in C:/DCSLogs.
C. You should create a File Server Resource Manager (FSRM) quota and file screen exception.
D. You should create a File Server Resource Manager (FSRM) storage report task.
You work as a Network Administrator at ABC.com. ABC.com has an Active Directory Domain Services (AD DS) domain named ABC.com. All servers in the ABC.com domain have Microsoft Windows Server 2012 R2 installed.
ABC.com plans to purchase 40 new servers. You plan to configure a server running Windows Deployment Services (WDS) to reduce the administrative effort required to install the new servers.
You install Windows Server 2012 R2 on one of the new servers and configure the required server roles on the server. You name the server ABC-SR15. You plan to use the server as a reference computer.
You need to configure the WDS to take an image of ABC-SR15.
What should you do first?
A. You should add a capture image on the WDS server.
B. You should add an install image on the WDS server.
C. You should add a boot image on the WDS server.
D. You should add a discover image on the WDS server.
You work as a Network Administrator at ABC.com. ABC.com has an Active Directory Domain Services (AD DS) domain named ABC.com. All servers in the ABC.com domain have Microsoft Windows Server 2012 R2 installed. The ABC.com network has a server named ABC-SR28 that configured as a NPS, DNS and DHCP server.
You receive instructions to configure ABC-SR28 so that it only monitors the health requirements of computers that transmit information about their health.
Which of the following actions should you take on ABC-SR28?
A. You should configure Called Station ID constraints and NAS Port Type constraints.
B. You should configure MS-Service Class conditions and Health Policies.
C. You should configure Called Station ID constraints and MS-Service Class conditions.
D. You should configure Health policies and NAP-Capable Computers conditions.
You work as a Network Administrator at ABC.com. ABC.com has an Active Directory Domain Services (AD DS) domain named ABC.com. All servers in the ABC.com domain have Microsoft Windows Server 2012 R2 installed.
A server named ABC-SR11 runs the Internet Information Services (IIS) role. You plan to configure a corporate Intranet Web site on ABC-SR11. You need to configure the Web site to use Secure Sockets Layer (SSL).
You obtain a Web Server certificate from a third party Certification Authority.
You need to identify which certificate store in the Certificates console to import the certificate.
Which store should you identify?
A. Personal under Current User.
B. Trusted Root Certification Authorities under Current User.
C. Client Authentication Issuers under Current User.
D. Personal under Local Computer.
E. Trusted Root Certification Authorities under Local Computer.
F. Client Authentication Issuers under Local Computer.
You work as a Network Administrator at ABC.com. ABC.com has two Directory Domain Services (AD DS) forests named ABC.com and weyland.com. The ABC.com network has three Microsoft Windows Server 2012 R2 servers named ABC-SR06, ABC-SR10, and WEYLAND-SR17.
ABC-SR10 is not joined to domain and is configured as a VPN Server. ABC-SR06 is configured as the DNS and NPS server and is joined to t theABC.com domain, while WEYLAND-SR17 is configured as a File server and NPS server and is joined to the weyland.com domain.
You configure the servers so that ABC-SR06 responds to connection requests from the ABC.com domain and WEYLAND-SR17 responds to connection requests from the weyland.com domain.
Which of the following actions should you take?
A. You should modify the Location Groups and Identity Type conditions of the Connection Request Policies on ABC-SR10.
B. You should modify the Authentication settings and Standard RADIUS Attributes settings of the Connection Request Policies on ABC-SR10.
C. You should modify the User Name and Location Groups condition of the Connection Request Policies on ABC-SR10.
D. You should modify the Authentication settings and User Name conditions of the Connection Request Policies on ABC-SR10.
You work as a Network Administrator at ABC.com. ABC.com has an Active Directory Domain Services (AD DS) domain named ABC.com. All servers in the ABC.com domain have Microsoft Windows Server 2012 R2 installed.
Company developers are developing a custom line-of-business application named CorpApp. The application will run as a service on a Windows Server 2012 R2 server.
You want to configure a user account in Active Directory to be used as the service account for CorpApp.
You want to configure the settings on the Delegation tab in the properties of the user account. You discover that there is no Delegation tab in the user account properties.
What do you need to do before you can view the Delegation tab?
A. You need to enable the user account.
B. You need to add the user account to the domain admins group.
C. You need to set a Service Principal Name (SPN) for the account.
D. You need to set a User Principal Name (UPN) for the account.
You work as a Network Administrator at ABC.com. ABC.com has an Active Directory Domain Services (AD DS) domain named ABC.com. All servers in the ABC.com domain have Microsoft Windows Server 2012 R2 installed.
All domain controllers in the network run a custom application that was created by developers at ABC.com.
You want to deploy additional domain controllers using domain controller cloning. You verify that the custom application supports domain controller cloning.
You run the Get-ADDCCloningExcludedApplicationList cmdlet and it returns the name of the custom application.
You need to prepare a domain controller for cloning. You plan to create an XML file and add information about the custom application to the file to enable the domain controller to be cloned.
What should you name the XML file?
A. You should name the file DCCloneConfig.xml.
B. You should name the file CustomDCCloneAllowList.xml.
C. You should name the file Sysprep.xml.
D. You should name the file ADDCCloningExcludedApplicationList.xml.
You work as a Network Administrator at ABC.com. ABC.com has an Active Directory Domain Services (AD DS) domain named ABC.com. All servers in the ABC.com domain have Microsoft Windows Server 2012 R2 installed.
ABC.com has a Sales department and a Research department. An OU exists for each department. The OUs contain the user and computer accounts for the respective departments.
A user named Janice works in the Research department. A password settings object named JanicePSO is applied to Janice’s user account and applies a minimum password length of 12 characters.
A shadow group named SalesSG is configured for the Sales OU and contains all objects within the Sales OU. A password settings object named SalesPSO is applied to the SalesSG group and applies a minimum password length of 10 characters.
A group policy object (GPO) named SalesGPO is linked to the Sales OU and applies a minimum password length of 8 characters.
The default domain policy applies a minimum password length of 8 characters.
Janice moves from the Research department to the Sales department. Her user account is moved to the Sales OU and the SalesSG shadow group is updated to include Janice’s user account.
What is the effective minimum password length for Janice?
A. 6
B. 8
C. 10
D. 12
You work as a Network Administrator at ABC.com. ABC.com has an Active Directory Domain Services (AD DS) domain named ABC.com. All domain controllers in the ABC.com domain have Microsoft Windows Server 2012 R2 installed.
You want to move the Active Directory logs to a different folder. You plan to use the “move logs to” statement in ntdsutil.exe to specify the new location.
Which context should you use in ntdsutil?
A. You should run Ntdsutil in the DS Behavior context.
B. You should run Ntdsutil in the IFM context.
C. You should run Ntdsutil in the Roles context.
D. You should run Ntdsutil in the Configurable Settings context.
E. You should run Ntdsutil in the Files context.
F. You should run Ntdsutil in the Partition Management context.
You work as a Network Administrator at ABC.com. ABC.com has an Active Directory Domain Services (AD DS) domain named ABC.com. All domain controllers in the ABC.com domain have either Windows Server 2008 R2 Service Pack 1 (SP1) or Windows Server 2012 R2 installed.
You plan to create a Windows Server 2012 R2 Read Only Domain Controller in the ABC.com domain.
You open Active Directory Users and Computers and select the Pre-create a read-only domain controller account option. You go through the Welcome to the Active Directory Domain Services Installation Wizard and specify the settings to create an account named ABC-RODC1. You use the Export Settings option to export the settings to a file named ABC-RODC1.txt. You plan to use this text file to automate the installation of the Read Only Domain Controller.
You install a Window Server 2012 R2 Server.
How can you automate the promotion of the server using the settings in the ABC-RODC1.txt file?
A. You should run the Install-ADDSDomainController PowerShell cmdlet.
B. You should run the Install-WindowsFeature PowerShell cmdlet.
C. You should run the DCPromo command.
D. You should run the Add Roles Wizard in Server Manager.
You are hired by ABC.com to administrate an Active Directory domain named ABC.com. ABC.com utilizes a server named ABC-DC01 running Windows Server 2012.
Your senior network administrator authorizes the use of Routing and Remote Access (RRAS) and configures it on ABC-DC01, thereafter you create a user account for a new ABC.com employee.
Which of the following actions need to be taken if you are assigned the task of confirming that a specified ABC.com employee is capable of establishing VPN connections to ABC-DC01?
A. You will need to make use of RADIUS Authentication and Authorization.
B. You will need to define the Remote Desktop Services permissions settings.
C. You will need to alter the RASENTRY structure.
D. You will need to have the employees Dial-in settings amended.
You work as a Network Administrator at ABC.com. ABC.com has a forest with a single an Active Directory Domain Services (AD DS) domain named ABC.com. All servers in the ABC.com domain have Microsoft Windows Server 2012 R2 installed.
ABC.com works with a partner company named Redbridge Logistics. The Redbridge Logistics network consists of a single Active Directory forest named RedbridgeLogistics.com. The forest contains a single Active Directory Domain Services (AD DS) domain named RedbridgeLogistics.com. All servers in the RedbridgeLogistics.com domain have Windows Server 2012 R2 installed.
A forest trust exists between the two forests. The two networks are connected by a WAN link.
A server named ABC-SR08 hosts an Active Directory-integrated zone for ABC.com. A server named REDBRIDGE-SR25 hosts an Active Directory-integrated zone for RedbridgeLogistics.com
Users in the ABC.com domain need to be able to resolve names of servers in the RedbridgeLogistics.com domain.
You need to configure a name resolution solution that will enable name resolution in the event of a WAN link failure.
What should you do?
A. You should configure a forwarder on ABC-SR08.
B. You should configure a forwarder on REDBRIDGE-SR25.
C. You should configure a secondary zone on ABC-SR08.
D. You should configure a stub zone on REDBRIDGE-SR25.
E. You should configure a stub zone on ABC-SR08.
F. You should configure a conditional forwarder on ABC-SR08.
You work as a Network Administrator at ABC.com. ABC.com has an Active Directory Domain Services (AD DS) domain named ABC.com. All servers in the ABC.com domain have Microsoft Windows Server 2012 R2 installed.
ABC.com has a main office and a branch office. The two offices are connected by a WAN link.
A server in the main office named ABC-SR22 runs the DNS Server role and hosts a primary zone for ABC.com. A server named ABC-SR22 in the branch office hosts a secondary zone for ABC.com.
You change several DNS records on ABC-SR22. You need to immediately replicate the ABC.com zone to ABC-SR22.
Which two of the following actions should you take to force replication of the ABC.com DNS zone? (Choose two)
A. You should open the DNS console can connect to ABC-SR21.
B. You should open the DNS console can connect to ABC-SR22.
C. You should right click on the ABC.com zone and select Transfer from Master.
D. You should right click on the ABC.com zone and select Reload.
E. You should right click on the DNS server and select Update Server Data File.
You work as a Network Administrator at ABC.com. ABC.com has an Active Directory Domain Services (AD DS) domain named ABC.com. All domain controllers in the ABC.com domain have Microsoft Windows Server 2012 R2 installed.
Several Sales users spend most of their time away from the office.
You implement DirectAccess to enable the Sales users to connect to the network when they are away from the office. All computers used by the Sales users are joined to the domain.
You create a DirectAccess client group named SalesDirectAccess and add all the computer accounts for the Sales users’ computers to the SalesDirectAccess group.
Some Sales users report that they are unable to access the network using DirectAccess. Other Sales report that they can connect successfully.
You discover that only users using laptop computers can connect using DirectAccess. Sales users are unable to connect when they use desktop computers.
How can you enable all Sales users to access the network using DirectAccess?
A. You should add the computer accounts for the Sales user computers to the RAS and IAS Servers group.
B. You should add the user accounts for the Sales users to the SalesDirectAccess group.
C. You should modify the group that the Direct Access Client Settings GPO applies to.
D. You should modify the WMI filter that the Direct Access Client Settings GPO is linked to.
You work as a Network Administrator at ABC.com. ABC.com has an Active Directory Domain Services (AD DS) domain named ABC.com. All servers in the ABC.com domain have Microsoft Windows Server 2012 R2 installed.
Sales users often work away from the office. The Sales users have portable computers that have Windows 7, Windows Vista or Windows XP installed. All client computers are members of the ABC.com domain.
You have been asked to implement a remote access solution to enable the Sales users to connect to the network when they are working away from the office.
The remote access solution must ensure that all Sales users can connect to the network.
Which VPN solution should you implement?
A. Point-to-Point Tunneling Protocol (PPTP).
B. Layer 2 Tunneling Protocol (L2TP).
C. Secure Socket Tunneling Protocol (SSTP).
D. DirectAccess.
You are hired by ABC.com to administrate a DNS server named ABC-SR08 which is currently equipped with a Server Core Installation on Windows Server 2012.
Which of the following commands will need to be run if you are required to have the time-to-live (TTL) value of a name server (NS) record displayed, taking into account that the time-to-live (TTL) value is currently being cached by the DNS Server service on ABC-SR08?
A. You will need to run the Show-DNSServerCache command.
B. You will need to run the ipconfig.exe /display command.
C. You will need to run the nslookup.exe command.
D. You will need to run the ipconfig.exe/register command.
You work as a Network Administrator at ABC.com. ABC.com has an Active Directory Domain Services (AD DS) domain named ABC.com. All servers in the ABC.com domain have Microsoft Windows Server 2012 R2 installed.
ABC.com has a main office and a branch office. The two offices are connected by a slow WAN link.
A server in the main office named ABC-SR21 runs the File and Storage Services and Distributed File System roles. A server in the branch office named ABC-SR22 also runs the File and Storage Services and Distributed File System roles.
Shared folders on ABC-SR21 and ABC-SR22 are replicated to each other using DFS Replication (DFSR).
You discover that DFS replication between the two servers is using too much bandwidth over the WAN link.
How can you limit the amount of bandwidth used by DFS replication?
A. You should run the Set-DfsrConnectionSchedule cmdlet.
B. You should run the Set-DfsrGroupSchedule cmdlet.
C. You should run the Set-DfsReplicatedFolder cmdlet.
D. You should run the Set-DfsReplicationGroup cmdlet.
You work as a Network Administrator at ABC.com. ABC.com has an Active Directory Domain Services (AD DS) domain named ABC.com. All servers in the ABC.com domain have Microsoft Windows Server 2012 R2 installed.
ABC.com has a Research department.
A server in the Research department named ABC-SR25 runs the File and Storage Services role and the File Server Resource Manager role service.
Sensitive information is stored in shared folders on ABC-SR25.
You want to be notified by e-mail when an executable file is stored in a shared folder on ABCSR25. The notification must include information about the user who stored the file and the exact location of the file.
What should you do?
A. You should enable Encrypted File System (EFS) on ABC-SR25.
B. You should modify the permissions of the shared folders on ABC-SR25.
C. You should configure a File Screen Exception on ABC-SR25.
D. You should configure a File Screen on ABC-SR25.
You work as a Network Administrator at ABC.com. ABC.com has an Active Directory Domain Services (AD DS) domain named ABC.com. All servers in the ABC.com domain have Microsoft Windows Server 2012 R2 installed.
ABC.com has a Research department. All user and computer accounts in the Research department are located in an organizational unit (OU) named ResearchOU.
A server in the Research department named ABC-SR23 runs the File and Storage Services role and the File Server Resource Manager role service. Sensitive information is stored in shared folders on ABC-SR23.
All users in the Research department are members of a global security group named ResearchUsers.
The ResearchUsers group has full control access to a folder named D:\Data which is shared as \\ABC-SR23\Data.
You link a group policy object (GPO) to the ResearchOU. The GPO configures the Audit File System and Audit File Share settings to Success and Failure.
You need to ensure that all file deletions in \\ABC-SR23\Data by members of the ResearchUsers group are logged.
You delete a test file in the shared folder and verify that an event log entry is added.
You discover that when a user in the ResearchUsers group deletes a file, no event log entry is added.
What should you modify?
A. You should modify the share permissions of \\ABC-SR23\Data.
B. You should modify the audit settings in the GPO.
C. You should modify the discretionary access control list (DACL) D:\Data.
D. You should modify the system access control list (SACL) of D:\Data.
Your role of Network Administrator at ABC.com includes the management of the Active Directory Domain Services (AD DS) domain named ABC.com. All servers in the ABC.com domain have Microsoft Windows Server 2012 R2 installed.
ABC.com has a Sales department and a Production department. An OU exists for each department. The OUs contain the user and computer accounts for the respective departments.
A shadow group named SalesSG is configured for the Sales OU and contains all objects within the Sales OU. A password settings object (PSO) named SalesPSO is applied to the SalesSG group and applies a minimum password length of 6 characters.
You want to modify the PSO to require a minimum password length of 8 characters.
Which of the following cmdlets should you use?
A. You should use the Get-ADAccountResultantPasswordReplicationPolicy cmdlet.
B. You should use the Set-ADDefaultDomainPasswordPolicy cmdlet.
C. You should use the Set-ADFineGrainedPasswordPolicy cmdlet.
D. You should use the Set-ADAccountPassword cmdlet.
E. You should use the Set-ADDefaultDomainPasswordPolicy cmdlet.