Q1. - (Topic 3)
Your network contains an Active Directory domain named adatum.com. The domain contains three domain controllers.
The domain controllers are configured as shown in the following table.
DC3 loses network connectivity due to a hardware failure.
You plan to remove DC3 from the domain.
You log on to DC3.
You need to identify which service location (SRV) records are registered by DC3.
What should you do?
A. Open the %windir%\system32\config\netlogon.dns file.
B. Run dcdiag /test:dns
C. Open the %windir%\system32\dns\backup\adatum.com.dns file.
D. Run ipconfig /displaydns.
Answer: A
Explanation:
A. Netlogon service creates a log file that contains all the locator resource records and
places the logfile in the following location:
B. Analyzes the state of domain controllers in a forest or enterprise and reports any
problems to help introubleshooting.
C. dns backup file
D. used to display current resolver cache content You can verify SRV locator resource
records by viewing netlogon.dns, located in the %systemroot%\System32\Config folder.
The SRV record is a Domain Name System (DNS) resource record that is used to identify
computers that host specific services.
SRV resource records are used to locate domain controllers for Active Directory.
You can use Notepad, to view this file.
The first record in the file is the domain controller’s Lightweight Directory Access Protocol
(LDAP) SRV record.
This record should appear similar to the following: _ldap._tcp.Domain_Name
Q2. HOTSPOT - (Topic 3)
Your network contains an Active Directory domain named contoso.com.
Technicians use Windows Deployment Services (WDS) to deploy Windows Server 2012 R2.
The network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed.
You need to ensure that you can use WDS to deploy Windows Server 2012 R2 to a virtual machine named VM1.
Which settings should you configure?
To answer, select the appropriate settings in the answer area.
Answer:
Q3. - (Topic 3)
A company has a forest with 4 sites. Subnets are as follows:
MainOffice 172.16.1.0 Subnet: 255.255.255.0 Gateway 172.16.1.254 Site1 192.168.12.0 Subnet: 255.255.255.0 Site 2 192.168.13.0 Subnet: 255.255.255.0 Site 3 192.168.14.0 Subnet: 255.255.255.0 Site 4 192.168.15.0 Subnet: 255.255.255.0
You add a new server to the MainOffice and it needs to be able to communicate to all sites.
Which route command would you run?
A. route add -p 192.168.8.0 netmask 255.255.252.0 172.16.1.254
B. route add -p 192.168.0.0 netmask 255.255.248.0 172.16.1.254
C. route add -p 192.168.12.0 netmask 255.255.252.0 172.16.1.254
D. route add -p 192.168.12.0 netmask 255.255.240.0 172.16.1.254
Answer: C
Q4. HOTSPOT - (Topic 1)
Your network contains an Active Directory domain named contoso.com. The domain contains a print server named Server1 that runs Windows Server 2012 R2.
You share several printers on Server1.
You need to ensure that you can view the printer objects associated to Server1 in Active
Directory Users and Computers.
Which option should you select?
To answer, select the appropriate option in the answer area.
Answer:
Q5. - (Topic 3)
A company’s network administrator needs to ensure a specific IP address is never assigned by a Windows Server 2012 R2 DHCP server to any device connecting to the network.
Which of the following should the administrator configure on the Windows Server 2012 R2 DHCP server?
A. Reservation
B. Scope options
C. NAP
D. Scope properties
Answer: B
Explanation:
Configuring an IP address as a reservation will restrict a DHCP server’s assignment of that address unless a specific MAC address makes a request for the address. Exclusion is for not use the IP Address or range inside the Scope Pool, Filter is for not use theMAC Address or range. Quick Tip: Policies can also be defined per scope or server. Policy based assignment (PBA) allows an administrator to group DHCP clients by specific attributes based on fields contained in the DHCP client request packet. This feature allows for targeted administration and greater control of configuration parameters delivered to network devices.
Q6. - (Topic 1)
You have a server named Server1. Server1 runs Windows Server 2012 R2.
Server1 has a thin provisioned disk named Disk1.
You need to expand Disk1.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. From File and Storage Services, extend Disk1.
B. From File and Storage Services, add a physical disk to the storage pool.
C. From Disk Management, extend the volume.
D. From Disk Management, delete the volume, create a new volume, and then format the volume.
E. From File and Storage Services, detach Disk1.
Answer: A,B
Explanation:
Step 1 (B): if required add physical disk capacity.
Step 2 (A): Dynamically extend the virtual disk (not volume).
The File and Storage Services role and the Storage Services role service are installed by
default, but without any additional role services. This basic functionality enables you to use
Server Manager or Windows PowerShell to manage the storage functionality of your
servers.
Windows Server 2012 Storage Space subsystem now virtualizes storage by abstracting
multiple physical disks into a logical construct with specified capacity.
The process is to group selected physical disks into a container, the so-called storage pool,
such that the total capacity collectively presented by those associated physical disks can
appear and become manageable as a single and seemingly continuous space.
Subsequently storage administrator creates a virtual disk based on a storage pool,
configure a storage layout which is essentially a RAID level, and expose the storage of the
virtual disk as a drive letter or a mapped folder in Windows Explorer.
The system administrator uses File and Storage Services in Server Manager or the Disk
Management tool tore scan the disk, bring the disk online, and extend the disk size.
Q7. - (Topic 3)
Your network contains multiple subnets.
On one of the subnets, you deploy a server named Server1 that runs Windows Server 2012 R2.
You install the DNS Server server role on Server1, and then you create a standard primary zone named contoso.com.
You need to ensure that client computers can resolve IP addresses to host names.
What should you do first?
A. Create a GlobalNames zone.
B. Convert the contoso.com zone to an Active Directory-integrated zone.
C. Configure dynamic updates for contoso.com.
D. Create a reverse lookup zone.
Answer: D
Explanation:
Use a reverse lookup zone to be able to resolve IP addresses to host names.
Q8. - (Topic 1)
You have a Hyper-V host named Server1 that runs Windows Server 2012 R2.Server1 has the virtual switches listed in the following table.
You create a virtual machine named VM1.VM1 has two network adapters. One network adapter connects to vSwitch1. The other network adapter connects to vSwitch2.You configure NIC teaming on VM1.
You need to ensure that if a physical NIC fails on Server1, VM1 remains connected to the network.
What should you do on Server1?
A. Run the Set-VmNetworkAdaptercmdlet.
B. Add a new network adapter to VM1.
C. Create a new virtual switch on Server 1.
D. Modify the properties of vSwitch1 and vSwitch2.
Answer: A
Q9. - (Topic 1)
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2.
You create a new inbound rule by using Windows Firewall with Advanced Security.
You need to configure the rule to allow Server1 to accept unsolicited inbound packets that are received through a network address translation (NAT) device on the network.
Which setting in the rule should you configure?
A. Interface types
B. Authorized computers
C. Remote IP address
D. Edge traversal
Answer: D
Explanation:
Edge traversal – This indicates whether edge traversal is enabled (Yes) or disabled (No). When edge traversal is enabled, the application, service, or port to which the rule applies is globally addressable and accessible from outside a network address translation (NAT) or edge device.
Select one of the following options from the list: Block edge traversal (default) – Prevent applications from receiving unsolicited traffic from the Internet through a NAT edge device. Allow edge traversal – Allow applications to receive unsolicited traffic directly from the Internet through a NAT edge device. Defer to user – Let the user decide whether to allow unsolicited traffic from the Internet through a NAT edge device when an application requests it. Defer to application – Let each application determine whether to allow unsolicited traffic from the Internet through a NAT edge device.
: http://technet.microsoft.com/en-us/library/cc731927.aspx
Q10. DRAG DROP - (Topic 3)
You plan to deploy a DHCP server that will support four subnets. The subnets will be configured as shown in the following table:
You need to identify which network ID you should use for each subnet. What should you identify? To answer, drag the appropriate network ID to the each subnet in the answer area.
Answer: