You work for a company named Testking.com. Your role of Network Administrator includes the management of the company’s Windows 2012 Active Directory Domain Services (AD DS) domain.
You are configuring an IP Address Management (IPAM) server in the network. The IPAM server will be used to manage the DHCP and DNS servers in the network.
A user named Mia works in the IT department. Mia will help in the administration of the IPAM server. You need to assign Mia the appropriate permissions on the IPAM server.
Company security policy states that all users must be assigned the minimum permissions necessary to perform their required tasks.
Which IPAM security group has the minimum permissions to view all information in server discovery, IP address space, and server management?
A. IPAM Users
B. IPAM multi-server management (MSM) administrators
C. IPAM address space management (ASM) administrators
D. IPAM IP Audit Administrators
E. IPAM Administrators
You work for a company named Testking.com. Your role of Network Administrator includes the management of the company’s Windows 2012 Active Directory Domain Services (AD DS) domain.
You are configuring an IP Address Management (IPAM) server in the network. The IPAM server will be used to manage the DHCP and DNS servers in the network.
A user named Clive works in the IT department. Clive will help in the administration of the IPAM server. You need to assign Clive the appropriate permissions on the IPAM server.
Company security policy states that all users must be assigned the minimum permissions necessary to perform their required tasks.
Which IPAM security group has the minimum permissions to view IP address tracking information?
A. IPAM Users
B. IPAM multi-server management (MSM) administrators
C. IPAM address space management (ASM) administrators
D. IPAM IP Audit Administrators
E. IPAM Administrators
You work for a company named Testking.com. Your role of Network Administrator includes the management of the company’s Windows 2012 Active Directory Domain Services (AD DS) domain.
You are configuring an IP Address Management (IPAM) server in the network. The IPAM server will be used to manage the DHCP and DNS servers in the network.
A user named Myles works in the IT department. Myles will help in the administration of the IPAM server. You need to assign Myles the appropriate permissions on the IPAM server.
Company security policy states that all users must be assigned the minimum permissions necessary to perform their required tasks.
Which IPAM security group has the minimum permissions to create an IP Address Block?
A. IPAM Users
B. IPAM multi-server management (MSM) administrators
C. IPAM address space management (ASM) administrators
D. IPAM IP Audit Administrators
E. IPAM Administrators
You work as a Network Administrator for Testking.com. The network consists of a single Windows Server 2012 Active Directory Domain Services (AD DS) domain named Testking.com. All servers in the domain run Windows Server 2012.
You plan to configure additional DHCP servers in the network. You need to delegate the ability to authorize DHCP servers to a non-enterprise administrator.
You open Active Directory Sites and Services and view the Services Node.
How can you assign the necessary permissions to authorize DHCP servers?
A. By delegating control of the Claims Configuration container.
B. By delegating control of the NetServices container.
C. By delegating control of the Public Key Services container.
D. By delegating control of the RRAS container.
You work as a Network Administrator at Testking.com. The network consists of a single Windows Server 2012 Active Directory Domain Services (AD DS) domain named Testking.com. All servers on the network run Windows Server 2012 and all client computers run Windows 7 Professional.
The company has started working on a project involving a partner company named Weyland Industries. The Weyland Industries network consists of a single Windows Server 2012 Active Directory Domain Services (AD DS) domain named WeylandIndustries.com. A two-way forest trust relationship exists between the domain networks of Testking.com and WeylandIndustries.com.
Users in both domains can resolve the names of resources in the other domain.
You need to implement single-label names in the Testking.com domain. Users in both domains will need to resolve single-label names in the Testking.com domain.
You enable GlobalNames support on a domain controller in the Testking.com domain and create a DNS zone named GlobalNames.
Which two of the following actions should you perform? (Choose two)
A. Create a GlobalNames service location record on a domain controller in the Testking.com domain.
B. Create a GlobalNames service location record on a domain controller in the WeylandIndustries.com domain.
C. Configure a conditional forwarder in the WeylandIndustries.com domain.
D. Enable GlobalNames support in the WeylandIndustries domain.
E. Configure a DNS Stub zone in the WeylandIndustries.com domain.
You work for a company named Testking.com. Your role of Network Administrator includes the management of the company’s Windows 2012 Active Directory Domain Services (AD DS) domain.
You use IP Address Management (IPAM) on a Windows Server 2012 server named TK-IPAM1 to manage the DHCP and DNS servers in the network.
You add a Technician named John to the local administrators group on a DHCP server named TKDHCP1. John logs in locally to TK-DHCP1 and successfully modifies a DHCP scope.
John attempts to modify another DHCP scope on TK-DHCP1 by using IPAM. However, he receives the following error:
“One of more IPAM database errors occurred. Run the IPAM configuration task to synchronize the database with newly applied settings on managed servers.”
You verify that John is a member of the IPAM Users group on TK-IPAM1.
How can you enable John to use IPAM to modify DHCP scopes?
A. By running the Export-IpamAddress PowerShell cmdlet on TK-IPAM1.
B. By adding John to the IPAM Audit Administrators group on TK-IPAM1
C. By adding John to the DHCP Administrators group on TK-DHCP1.
D. By adding John to the IPAM Administrators group on TK-IPAM1.
You work for a company named Testking.com. Your role of Network Administrator includes the management of the company’s Windows 2012 Active Directory Domain Services (AD DS) domain.
A Windows Server 2012 server named TK-DHCP1 is configured as a DHCP server. TK-DHCP1 contains a single DHCP scope and assigns IP configurations to all client computers in the network.
You want to provide redundancy for the DHCP infrastructure so that client computers continue to receive IP configurations in the event of a DHCP server failure.
You plan to configure a second DHCP server named TK-DHCP2.
You need to decide the best way to configure the DHCP infrastructure. Your solution must minimize costs and minimize administrative effort.
Which of the following solutions should you implement?
A. You should split the DHCP scope between the two DHCP servers.
B. You should configure Network Load Balancing (NLB) between the two servers.
C. You should configure DHCP Failover between the two servers.
D. You should install a hardware load balancer.
E. You should configure DNS Round Robin.
You work for a company named Testking.com. Your role of Network Administrator includes the management of the company’s Windows 2012 Active Directory Domain Services (AD DS) domain.
Several company Sales users often work away from the office.
You plan to implement DirectAccess to enable the Sales users to access resources within the corporate network while working away from the office.
You want to ensure that when Sales users are connected using DirectAccess, all traffic is sent over the DirectAccess connection. Traffic destined for the corporate network must go over the DirectAccess connection and traffic destined to the Internet must also go over the DirectAccess connection.
What should you do?
A. You should configure Split Tunneling.
B. You should configure Force Tunneling.
C. You should disable Intra-Site Automatic Tunnel Addressing Protocol (ISATAP).
D. You should modify the default gateway setting on the client computers.
You work as a Network Administrator for Testking.com. The network consists of a single Windows Server 2012 Active Directory Domain Services (AD DS) domain named Testking.com. All servers in the domain run Windows Server 2012.
A Windows Server 2012 server named TK-NPS1 runs the Network Policy Server (NPS) role.
You plan to implement a VPN solution to enable external users to connect to resources within the corporate network.
You install a Windows Server 2012 server named TK-VPN1 and install the Routing and Remote Access role on the server.
You need to configure the environment so that VPN connection requests are authenticated on TKNPS1.
Which two of the following steps should you perform? (Choose two answers).
A. Add a RADIUS client on TK-VPN1.
B. Add a RADIUS client on TK-NPS1.
C. Add a RADIUS proxy on TK-VPN1.
D. Add a RADIUS proxy on TK-NPS1.
E. Modify the authentication settings on TK-VPN1.
F. Modify the authentication settings on TK-NPS1.
You work as a Network Administrator for Testking.com. The network consists of a single Windows Server 2012 Active Directory Domain Services (AD DS) domain named Testking.com. All servers in the domain run Windows Server 2012.
All client computers within the network are assigned IP addresses from a DHCP server.
A Windows Server 2012 server named TK-NPS1 runs the Network Policy Server (NPS) role.
You plan to implement a VPN solution to enable external users to connect to resources within the corporate network. All VPN connections will be assigned an IP address from the DHCP server.
Some external users will connect to the VPN from their home computers that are not members of the domain.
You need to configure Network Access Protection (NAP) to ensure that network access is restricted for internal and external client computers that do not have antivirus software or have outof- date virus definitions.
What should you do?
A. You should configure NAP Enforcement for 802.1X on TK-NPS1.
B. You should configure NAP Enforcement for VPN on TK-NPS1.
C. You should configure NAP Enforcement for DHCP on TK-NPS1.
D. You should configure NAP Enforcement for Terminal Services on TK-NPS1.
E. You should configure NAP Enforcement for IPSec Communications on TK-NPS1.
You work as a Network Administrator for Testking.com. The network consists of a single Windows Server 2012 Active Directory Domain Services (AD DS) domain named Testking.com. All servers in the domain run Windows Server 2012.
You plan to implement a VPN solution to enable external users to connect to resources within the corporate network. You install a Windows Server 2012 server running the Routing and Remote Access (RRAS) role.
Some external users will connect to the VPN using domain-joined portable computers while other users will connect from their home computers that are not members of the domain.
The client computers run a mix of Windows XP, Windows 7 or Windows 8.
You need to implement a solution to configure all client computers with the appropriate settings to connect to the VPN.
You install the Connection Manager Administration Kit (CMAK).
Which two of the following actions should you perform next? (Choose two).
A. Configure a RemoteApp application package.
B. Configure a Connection Profile package.
C. Publish the package in a Group Policy Object (GPO).
D. Publish the package in an Extranet Web Site.
E. Configure a logon script to install the package.
You work for a company named Testking.com. Your role of Network Administrator includes the management of the company’s Windows 2012 Active Directory Domain Services (AD DS) domain. All servers in the network run Windows Server 2012. All client computers run either Windows 7 or Windows 8.
All client computers run Windows Defender. Currently all client computers are configured to download the latest Windows Defender antivirus definitions every night.
You want to implement a centralized solution for the management of the Windows Defender updates. Your solution must reduce the bandwidth used for downloading the updates and minimize costs.
What should you use to manage the Windows Defender antivirus definitions?
A. Microsoft System Center 2012 Operations Manager
B. Windows Server Update Services (WSUS)
C. Microsoft System Center 2012 Endpoint Protection
D. Microsoft System Center 2012 Configuration Manager
You work for a company named Testking.com. Your role of Network Administrator includes the management of the company’s Windows 2012 Active Directory Domain Services (AD DS) domain. All servers in the network run Windows Server 2012. All client computers run either Windows 7 or Windows 8.
You are implementing Network Access Protection (NAP) in the network. You need to create a policy that allows only client computers that have up-to-date security patches to connect to network servers and the Internet. All non-compliant client computers should only be able to connect to a server running Window Server Update Services (WSUS) to download the required updates.
You divide the network into three VLANs. You place the WSUS server in one VLAN. You place all client computers in another VLAN. You then place all network servers into a third VLAN. Only the third VLAN can connect to the Internet.
You need to restrict client computers access to either the VLAN containing the WSUS server or the VLAN containing the other network servers according to their security update policy compliance.
You need to configure a Network Access Protection (NAP) enforcement method.
Which NAP enforcement method should you use?
A. You should configure NAP Enforcement for 802.1X.
B. You should configure NAP Enforcement for VPN.
C. You should configure NAP Enforcement for DHCP.
D. You should configure NAP Enforcement for Terminal Services.
E. You should configure NAP Enforcement for IPSec Communications.
You work for a company named Testking.com. Your role of Network Administrator includes the management of the company’s Windows 2012 Active Directory Domain Services (AD DS) domain. All servers in the network run Windows Server 2012.
The network includes a Windows Server 2012 server named TK-File1. TK-File1 runs the File and Storage Services server role.
You need to increase the file storage space on TK-File1. You attach four new physical hard disks to TK-File1.
You need to configure the disks to ensure that no data is lost in the event of a single disk failure while maximizing the storage space that can be used on the disks.
How should you configure the disks?
A. Create two storage pools each with two physical disks then create a storage space using the mirror option.
B. Create a single storage pool using all four disks then create a storage space using the mirror option.
C. Create a single storage pool using all four disks then create a storage space using the parity option.
D. Create four storage pools each with one physical disk then create a storage space using the parity option.
You work as a Network Administrator for Testking.com. The network consists of a single Windows Server 2012 Active Directory Domain Services (AD DS) domain named Testking.com. The company has a main office and four branch offices. All offices are connected to each other by reliable WAN links. All servers in the domain run Windows Server 2012.
The main office contains 5,000 computers. The branch offices each contain 400 computers.
You are planning to deploy Microsoft System Center 2012 Configuration Manager (SCCM) to enable the centralized management of all computers on the network. You plan to install new servers in each office to run SCCM components.
The main office will be configured as the Central Administration Site. You need to deploy the appropriate SCCM component to the branch offices.
Which SCCM component is recommended in this scenario?
A. A primary site server running all SCCM roles.
B. A secondary site server running all SCCM roles.
C. A management point server.
D. A distribution point.
You work for a company named Testking.com. Your role of Network Administrator includes the management of the company’s Windows 2012 Active Directory Domain Services (AD DS) domain. All servers in the network run Windows Server 2012.
You have recently implemented Microsoft System Center 2012 Virtual Machine Manager to manage Windows Server 2012 Hyper-V host servers.
You are configuring Virtual Machine Manager Self-service Portal (VMMSSP) to enable the deployment of Windows Server 2012 Virtual Machines (VMs).
You need to create to create a virtual machine template to deploy the Windows Server 2012 VMs.
Which three of the following components must be included in the VM template? (Choose three).
A. A Host Profile.
B. A Guest OS Profile.
C. A Hardware Profile.
D. An Application Profile.
E. A VHD
You work for a company named Testking.com. Your role of Network Administrator includes the management of the company’s Active Directory Domain Services (AD DS) domain.
You have recently upgraded the company’s Windows Server 2008 R2 servers to Windows Server 2012. You now plan to deploy additional Windows Server 2012 servers.
You plan to use the Windows Assessment and Deployment Kit (Windows ADK) suite of tools and the Windows Deployment Services (WDS) server role for the management and deployment of server images to new servers.
By using Windows ADK and WDS, which of the following will you NOT be able to achieve?
A. You will not be able to add software packages to the server deployment images.
B. You will not be able to add drivers to the server deployment images.
C. You will not be able to perform Wake On LAN zero touch installations on bare-metal servers.
D. You will not be able modify the server deployment images.
You work for a company named Testking.com. Your role of Network Administrator includes the management of the company’s Windows 2012 Active Directory Domain Services (AD DS) domain. All servers in the network run Windows Server 2012.
You are configuring Windows Deployment Services (WDS) to deploy 80 new Windows Server 2012 servers.
You plan to deploy 40 servers running the Full Installation of Windows Server 2012 and 40 servers running the Server Core installation of Windows Server 2012.
Some servers running the full installation will be configured as Domain Controllers running the Active Directory Domain Services and DNS Server roles.
The remaining servers running the full installation will be configured as file servers running the File and Storage Services role.
Some servers running the server core installation will be configured virtual machine host servers running the Hyper-V role.
The remaining servers running the server core installation will be configured as web servers running the Web Server (IIS) role.
Which of the following describes the minimum number of images you need to create to deploy the servers?
A. Two images in total - one image for the Full Installations and one image for the Server Core Installations.
B. Two images in total - one image for the Domain Controllers and one image for all other installations.
C. Three images in total - one image for the Domain Controllers, one image for the other Full Installations and one image for the Server Core Installations.
D. Four images in total - one image for each server role configuration.
E. One image in total for all configurations.
You work for a company named Testking.com. Your role of Network Administrator includes the management of the company’s Windows 2012 Active Directory Domain Services (AD DS) domain. All servers in the network run Windows Server 2012.
A Windows Server 2012 server named TK-Array1 is connected to an external disk storage array. TK-Array1 runs the iSCSI Target Server role service.
You are configuring a new Windows Server 2012 file server named TK-File06. You need to configure an area of storage on the storage array to appear as a local disk on TK-File06.
Which two of the following actions should you perform? (Choose two).
A. Configure a Storage Pool on TK-Array1.
B. Install the iSCSI Initiator Service on TK-File06.
C. Install the iSCSI Target Server role service on TK-File06.
D. Create an iSCSI Target on TK-Array1.
E. Create an iSCSI Target on TK-File06.
You work as a Network Administrator for Testking.com. The network consists of a single Windows Server 2012 Active Directory Domain Services (AD DS) domain named Testking.com.
The company has a main office in New York and branch offices in Miami, Dallas and Seattle. The branch offices all connect to the main office by fast WAN links. An Active Directory Site exists for each location. All servers in the domain run Windows Server 2012.
Each branch office has a single domain controller. The main office has eight domain controllers.
The domain controller in the Miami office is taken offline to have the hardware upgraded. You discover that users logging in in the Miami office are being authenticated by the Seattle office domain controller.
You need to ensure that branch office users are authenticated by main office domain controllers in the event of a branch office domain controller going offline.
What should you do?
A. You should disable site link bridging.
B. You should modify the DNS service location (SRV) records for the branch office domain controllers.
C. You should configure the “DC Locator DNS records not registered by the DCs” setting for the branch office domain controllers.
D. You should configure the “DC Locator DNS records not registered by the DCs” setting for the main office domain controllers.