You are employed as a senior network administrator at ABC.com. ABC.com has an Active Directory domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 installed.
You are running a training exercise for junior network administrators. You are currently discussing the implementation of Active Directory Rights Management Services (AD RMS).
Which of the following is considered best practices when implementing AD RMS? (Choose all that apply.)
A. You should always deploy AD RMS using clusters.
B. You should never deploy AD RMS using clusters.
C. You should not install AD RMS on a domain controller.
D. You should always install AD RMS on a domain controller.
E. You should use a common FQDN for both intranet and extranet access to your AD RMS installation.
F. You should use a common FQDN for extranet access to your AD RMS installation only.
G. You should use a common FQDN for intranet access to your AD RMS installation only.
You are employed as a network administrator at ABC.com. ABC.com has an Active Directory domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 installed.
The ABC.com domain has two Active Directory sites configured. You want to make use of change notification to configure replication between these Active Directory sites. You have opened DEFAULTIPSITELINK Properties to configure the necessary attribute.
Which of the following is the attribute that needs to be configured?
A. The revision attribute.
B. The options attribute.
C. The schedule attribute.
D. The proxyAddresses attribute.
You are employed as a senior network administrator at ABC.com. ABC.com has a single Active Directory domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 installed.
You are running a training exercise for junior network administrator. You are currently discussing the Dnslint.exe tool.
Which of the following should this tool be used for? (Choose all that apply.)
A. To help diagnose common DNS name resolution issues.
B. For developing scripts for configuring a DNS server.
C. To administer the DNS Server service.
D. To look for specific DNS record sets and ensure that they are consistent across multiple DNS servers.
E. To verify that DNS records used specifically for Active Directory replication are correct.
F. To create and delete zones and resource records.
You are employed as a network administrator at ABC.com. ABC.com has an Active Directory domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 installed.
ABC.com has a server, named ABC-SR07, which is backed up on a regular basis. A new ABC.com employee, named Kara Lang, has been assigned the duty of backing up ABC-SR07. Kara Lang must be able to use her user account to perform her duty, without granting her unnecessary permissions.
Which of the following actions should you take?
A. You should consider adding Kara Lang’s user account to the Backup Operators group on ABCSR07.
B. You should consider adding Kara Lang’s user account to the Global Backup Operators group in the ABC.com domain.
C. You should consider adding Kara Lang’s user account to the Local Administrators group on ABC-SR07.
D. You should consider adding Kara Lang’s user account to the Global Administrators group in the ABC.com domain.
You are employed as a network administrator at ABC.com. ABC.com has a single Active Directory domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 installed.
You are preparing to install a third-party application on a ABC.com server, named ABC-SR13. You find that the application is unable to install completely due to its driver not being digitally signed.
You want to make sure that the application can be installed successfully.
Which of the following actions should you take?
A. You should consider downloading a signed driver.
B. You should consider having ABC-SR13 is restored to an earlier date.
C. You should consider making use of the Disable Driver Signature Enforcement option from the Advanced Boot Option.
D. You should consider restarting ABC-SR13 in Safe Mode.
You are employed as a network administrator at ABC.com. ABC.com has a single Active Directory domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 installed.
ABC.com has two servers, named ABC-SR07 and ABC-SR08, which are configured in a two-node failover cluster.
You are currently configuring the quorum settings for the cluster. You want to make use of a quorum mode that allows each node to vote if it is available and in communication.
Which of the following is the mode you should use?
A. Node Majority
B. Node and Disk Majority
C. Node and File Share Majority
D. No Majority: Disk Only
You are employed as a network administrator at ABC.com. ABC.com has an Active Directory domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 installed.
ABC.com has two servers, named ABC-SR07 and ABC-SR08, which are configured in a two-node failover cluster. ABC-SR07 includes a folder, named ABCAppData, which is configured as a Distributed File System (DFS) namespace folder target.
After configuring another two nodes in the failover cluster, you are instructed to make sure that access to ABCAppData is highly available. You also have to make sure that application data is replicated to ABCAppData via DFS Replication.
Which of the following actions should you take?
A. You should consider configuring a Scale-Out File Server.
B. You should consider configuring the replication settings for the cluster.
C. You should consider configuring a file server for general use.
D. You should consider configuring the Quorum settings.
You are employed as a network administrator at ABC.com. ABC.com has a single Active Directory
domain named ABC.com. All servers on the ABC.com network have Windows Server 2012
installed.
ABC.com has two servers, named ABC-SR07 and ABC-SR08, which are configured in a two node
the Network Load Balancing (NLB) cluster.
You are currently configuring NLB port rules. You want to make sure that the cluster converges
successfully.
Which of the following actions should you take? (Choose all that apply.)
A. You should consider making sure that each port rule has a unique host priority.
B. You should consider making sure that the port rules on all cluster hosts is variable.
C. You should consider making sure that the correct number of port rules is used.
D. You should consider making sure that no virtual IP address is configured.
You are employed as a senior network administrator at ABC.com. ABC.com has an Active Directory domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 installed.
You are currently running a training exercise for junior network administrators. You are discussing the security mode used by Active Directory Federation Services (AD FS).
Which of the following are security modes used by ADFS? (Choose all that apply.)
A. Message
B. Anonymous
C. Transport
D. Mixed
You are employed as a senior network administrator at ABC.com. ABC.com has an Active Directory domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 installed.
You are currently running a training exercise for junior network administrators. You are discussing the authentication supported by Active Directory Federation Services (AD FS).
Which of the following is an authentication NOT supported by ADFS? (Choose all that apply.)
A. Kerberos
B. Digest Password
C. Blurred Password
D. Clear Password