70-412 Chapters 1 – 21 – Flashcards

Unlock all answers in this set

Unlock answers
question
1. What is used to transparently distribute traffic equally across multiple servers by using virtual IP addresses and a shared name? a. Network Load Balancing (NLB) b. Failover cluster c. DFS distribution d. Site replication
answer
a. Network Load Balancing (NLB)
question
2. Which of the following would use NLB to provide fault tolerance? a. SQL databases b. Exchange database c. Websites d. Shared folder
answer
a. SQL databases
question
3. What is the maximum number of nodes that is supported in a Windows Server 2012 NLB cluster? a. 2 b. 8 c. 16 d. 32
answer
d. 32
question
4. What is used to detect the failure of cluster nodes? a. autoconfig b. whoami c. Announcements d. Heartbeats
answer
d. Heartbeats
question
5. When you add or remove a node from an NLB cluster, what must happen? a. Adaptation b. Reset c. Convergence d. Redefine
answer
c. Convergence
question
6. Which three types of parameters configure the NLB cluster? a. Convergence rules b. Balance parameters c. Cluster parameters d. Host parameters e. Port rules
answer
c. Cluster parameters d. Host parameters e. Port rules
question
7. What specifies how NLB directs traffic based on the port and protocol? a. Convergence rules b. Balance parameters c. Cluster parameters d. Host parameters e. Port rule
answer
e. Port rule
question
8. What determines how servers are balanced with NLB? a. affinity b. drainstop c. state sequencing d. convergence
answer
a. affinity
question
9. Which mode allows an NLB cluster to use two MAC addresses for the NLB network adapter? a. Unicast mode b. Multicast mode c. Internet Group Management Protocol multicast mode d. Converging mode
answer
b. Multicast mode
question
10. Which action blocks all new connections without terminating existing sessions? a. blocking b. suspended c. drainstop d. multimode
answer
c. drainstop
question
1. Typically you would have port rules to be identical on all nodes on the cluster. What are the exceptions where the port rules don't have to be identical? a. Handling priority b. TCP, UDP, or both c. Load weight d. Ports
answer
a. Handling priority c. Load weight
question
2. Which mode would you choose to configure affinity? a. Multiple hosts b. Single host c. Disable d. Converging host
answer
a. Multiple hosts
question
3. You have a two-node NLB cluster. The cluster is intended to provide high availability and load balancing for the Contoso.com website. You have only the default port rule. Which two steps do you need to configure the NLB cluster to accept only HTTP traffic? (Choose two answers.) a. Run the vlbs disable all command. b. Delete the default port rule. c. Create a new Allow rule for TCP port 80. d. Change the default port rule to a disabled port range rule
answer
b. Delete the default port rule. c. Create a new Allow rule for TCP port 80.
question
4. You have a two-node NLB cluster. The cluster is intended to provide high availability and load balancing for the Contoso.com website. You have a single port rule that evenly distributes HTTP traffic between Server01 and Server02. What do you need to evenly distribute HTTP traffic while having all HTTPS traffic to go Server01? (Choose two answers.) a. On Server02, change the Handling priority for the TCP 443 to a value of 0. b. On Server01, change the Handling priority option for the TCP 443 port rule to the value of 0. c. In the properties for the cluster, create a new port rule for TCP 443 that has a filtering mode option set to a single host. d. In the properties for the cluster, create a new port for port TCP 443 that has the filtering option set to a multiple host and the Affinity set to Single.
answer
a. On Server02, change the Handling priority for the TCP 443 to a value of 0. c. In the properties for the cluster, create a new port rule for TCP 443 that has a filtering mode option set to a single host.
question
5. You have a server called Server01, which hosts the http://www.contoso.com and https:// www.contoso.com websites. You created an NLB cluster using Server01 and Server02. What must you do to ensure that users can connect to the https://www.contoso.com website without any security warnings? a. Make sure both servers point to the same Enterprise CA. b. Create a new digital certificate on Server02 for www.contoso.com. c. Export the SSL certificate from Server01 and import the SSL certificate to Server02. d. Create an image of the website on Server01 and import into Server02.
answer
c. Export the SSL certificate from Server01 and import the SSL certificate to Server02.
question
1. Which type of clustering is used for back-end databases? a. Network Load Balancing (NLB) cluster b. failover cluster c. aggregated cluster d. power cluster
answer
b. failover cluster
question
2. What is the maximum number of nodes you can have on a single cluster? a. 2 b. 8 c. 32 d. 64
answer
d. 64
question
3. Which of the following can networks use in a Windows failover cluster? (Choose all that apply.) a. public-and-private b. private c. public d. central
answer
a. public-and-private b. private c. public
question
4. What port does heartbeats use? a. 80 b. 2232 c. 3343 d. 3389
answer
c. 3343
question
5. Which of the following are SAN technologies that are used for centralized storage when configuring failover clusters? (Choose all that apply.) a. SAS b. Fibre Channel c. Serial ATA d. iSCSI
answer
a. SAS b. Fibre Channel d. iSCSI
question
6. Which type of storage allows multiple nodes to access the storage at the same time? a. Cluster Shared Volume (CSV) b. FAT Volume c. LAN Volume d. WAN Volume
answer
a. Cluster Shared Volume (CSV)
question
7. What is used to provide quorum when you have only two nodes in a cluster? (Choose all that apply.) a. heartbeat b. witness disk c. CSV disk d. shared folder
answer
b. witness disk d. shared folder
question
8. What allows you to automatically patch a cluster node with little or no downtime? a. Cluster-Aware Updating b. Cluster Auto Update c. Cluster Free Update d. Orchestrated Updates
answer
a. Cluster-Aware Updating
question
9. What type of quorum would you use if you have three nodes in a failover cluster? a. Node Majority b. Node and Disk Majority c. Node and File Share Majority d. No Majority
answer
a. Node Majority
question
10. What Windows PowerShell cmdlet would you use to check the progress of updates when using CAU? a. InspectCAU b. Show-CAU c. Run-CAU d. Get-CAURUN
answer
d. Get-CAURUN
question
1. You have an Active Directory Domain called contoso.com. You have two servers called Server1 and Server 2, both of which are running Windows Server 2012. Server1 and 2 make up the failover cluster called Cluster1. You add a third node. What do you need to configure so that the cluster will stop if two of the nodes fail? a. Failover settings b. Host priority c. Cluster Quorum settings d. Quick migration
answer
c. Cluster Quorum settings
question
2. You are going to create a failover cluster that connects to an iSCSI SAN. What is the minimum number of network adapters recommended for each node? a. 1 b. 2 c. 3 d. 4
answer
b. 2
question
3. You are an administrator for the Contoso Corporation. You have a two-node failover cluster with a witness disk. One of the servers failed and the entire server has been replaced. How should you add the replacement server to the cluster? a. Perform an authoritative restore. b. Perform a non-authoritative restore. c. Create an image from the remaining server and restore to the new server. d. Install Windows and the cluster, and copy the cluster folder from the witness disk to the new server.
answer
b. Perform a non-authoritative restore.
question
4. For a failover cluster, what type of network would you use to communicate with an iSCSI device? a. private b. public c. public-and-private d. internal
answer
c. public-and-private
question
5. You are an administrator for the Contoso Corporation. You have a two-node failover cluster with a witness disk. You need to take one of the servers down for maintenance. What should you do? a. Stop the Cluster service. b. Unplug the network connections of the server before shutting down. c. Drain the roles for the server that you want to shut down. d. Add a new node and then remove the node that you need to take down for maintenance.
answer
c. Drain the roles for the server that you want to shut down.
question
1. Which do you configure to make a service or application highly available? a. role b. resource c. device d. storage
answer
a. role
question
2. Which type of role is designed to work with Windows Server 2012 failover cluster? a. generic clustered role b. available role c. cluster-aware clustered role d. clustered update role
answer
c. cluster-aware clustered role
question
3. Which of the following is a benefit of Server Message Block (SMB) 3.0? (Choose all that apply.) a. SMB Encryption b. SMB Multichannel c. SMB General Use File Services d. SMB Directory Leasing
answer
a. SMB Encryption b. SMB Multichannel d. SMB Directory Leasing
question
4. Which SMB feature allows multiple nodes to access a clustered disk at the same time? a. SMB Transparent Failover b. SMB Scale Out c. SMB Direct d. VSS for SMB file shares
answer
b. SMB Scale Out
question
5. Which type of file server resembles the file server used in Windows Server 2008 R2? a. General Use File Server b. Scale-Out File Server c. Highly Available CSV d. Direct Access File Server
answer
a. General Use File Server
question
6. Which type of volume should you use for highly available virtual machine? a. SAS b. GPT c. DEP d. CSV
answer
d. CSV
question
7. What do you configure if you want one node to be an active node while it is available? a. Failback partner b. Prioritized member c. Preferred owner d. Primary Active node
answer
c. Preferred owner
question
8. What Windows PowerShell cmdlet is used to enable VM Monitoring? a. Set-ClusterVMMonitoredItem b. Get-ClusterVMMonitoredItem c. Configure-ClusterVMMonitoredItem d. Add-ClusterVMMonitoredItem
answer
d. Add-ClusterVMMonitoredItem
question
9. Which type of application or services would you configure on a cluster for an application or service that was not made for a cluster? a. generic clustered role b. available role c. cluster-aware clustered role d. clustered update role
answer
a. generic clustered role
question
10. Which of the following is supported by a Scale-Out Server? (Choose all that apply.) a. NFS b. Data Deduplication c. SMB d. DFS Replication
answer
c. SMB
question
1. You are an administrator for contoso.com. You have two servers called Server1 and Server2 that run Windows Server 2012 and have the Failover Clustering feature installed. You decide to add two more nodes to the cluster. You have a folder that you want all the servers to provide service for. What should you configure? a. File server for general use b. Scale-Out File Server c. Preferred Server d. handling priority
answer
b. Scale-Out File Server
question
2. You are an administrator for contoso.com. You have two servers called Server1 and Server2 that run Windows Server 2012 and have the Failover Clustering feature installed. You have configured the application named APP1 on the cluster. You need to make sure that Server02 handles all requests for APP1. What should you configure? a. preferred owner b. possible owner c. host priority d. handling priority
answer
a. preferred owner
question
3. You are an administrator for contoso.com.You have two servers called Server1 and Server2 that run Windows Server 2012 and have the Failover Clustering feature installed. You want to make a highly available file server that supports DFS. What should you configure? a. File server for general use b. Scale-Out File Server c. Preferred Server d. handling priority
answer
a. File server for general use
question
4. You are an administrator for contoso.com. You have two servers called Server1 and Server2 that run Windows Server 2012 and have the Failover Clustering feature installed. You install a cluster that provides high availability for DHCP and a shared folder. You want to make sure that if two heartbeats are missed, the DHCP service is switched to another node on the cluster. What should you configure? a. preferred owner b. failover settings c. host priority d. handling priority
answer
b. failover settings
question
5. You are an administrator for contoso.com. You have two servers called Server1 and Server2 that run Windows Server 2012 and have the Failover Clustering feature installed. You configure the server to run a highly available virtual machine that is the DHCP server. What do you configure to monitor the DHCP service? a. Enable event forwarding b. Enable VM Monitoring c. Enable service monitoring d. Enable event subscriptions
answer
b. Enable VM Monitoring
question
1. Which of the following options are available when you select the Import Virtual Machine Wizard? (Choose two answers.) a. Copy the virtual machine. b. Move the virtual machine's data by selecting where to move the items. c. Register the virtual machine in place. d. Move the virtual machine's data automatically.
answer
a. Copy the virtual machine. c. Register the virtual machine in place.
question
2. Windows Server 2012 Hyper-V files are stored in what file types? (Choose two answers.) a. .NSF b. .HTM c. .VHD d. .VHDX
answer
c. .VHD d. .VHDX
question
3. Which of the following advanced options are available when you select where to move items during an LM? a. Copy the virtual machine. b. Move the virtual machine's data by selecting where to move the items. c. Register the virtual machine in place. d. Move the virtual machine's data automatically.
answer
b. Move the virtual machine's data by selecting where to move the items.
question
4. When using remote management tools to perform LM, what needs to be configured? a. CredSSP b. Kerberos c. OVF d. Constrained Delegation
answer
b. Kerberos
question
5. Which process takes an existing partially or completely configured VM and creates other VMs without having to perform the installation and configuration from scratch? a. Importing b. Exporting c. Copying d. Extracting e. Migrating
answer
b. Exporting
question
6. Which process takes an existing set of VM files and recreates the exact same VM? a. Importing b. Exporting c. Copying d. Extracting
answer
a. Importing
question
7. What is the name of the process for moving an entire VM or parts of a VM to another physical server without a cluster? a. Quick Migration b. Storage Migration c. Constrained Delegation d. Live Migration
answer
d. Live Migration
question
8. What is the name of the process for moving an entire VM or parts of a VM to another physical server using a cluster? a. Quick Migration b. Storage Migration c. Constrained Delegation d. Live Migration
answer
a. Quick Migration
question
9. In which file should all instances of the virtual hard disk file name be updated to reflect the converted file name? a. .VHD b. .NSF c. OVF XML d. .VHDX
answer
c. OVF XML
question
10. Which of the following tools do you need to perform V2V conversions? a. SCVMM b. VMMCA c. Disk2VHD d. Any VSS-aware application
answer
a. SCVMM
question
1. You need to migrate a physical computer to a Windows Server 2012 Hyper-VP server. You also need to capture all local user accounts in your migration. Which of the following tools should you use? a. XenServer b. Active Directory Users and Computers c. Disk2VHD d. OVF Import/Export Tool
answer
c. Disk2VHD
question
2. The server hosting your mission-critical email server is failing. The email server has been created in a VM that is not in a cluster; however, its storage is maintained on an SAN. You need move the VM to a new host and maintain server availability. How should you proceed? a. Power down and export and import the VM registering the VM in place with the existing unique ID. b. Power down and export and import the VM restoring the VM in place with the existing unique ID. c. Power down and export and import the VM copying the VM in place to create a new unique ID. d. Use Live Migration to move only the VM and keep the storage in place
answer
b. Power down and export and import the VM restoring the VM in place with the existing unique ID.
question
3. You need to perform a LM but are unable to. You are a member of the Hyper-V Administrators group on the source Hyper-V server and a member of the Domain Admins group on the destination sever. You are using the Hyper-V Remote Management Tools on your Windows 7 Workstation. What do you need to do to perform the LM? a. Have an Enterprise Admin add your account to the Hyper-V Administrators group on the destination server. b. Upgrade your workstation to Windows 8. c. Upgrade your Hyper-V Remote Management Tools to the latest version. d. Reconfigure Constrained Delegation and reboot both the source and destination severs.
answer
b. Upgrade your workstation to Windows 8. c. Upgrade your Hyper-V Remote Management Tools to the latest version.
question
4. You need to create a VM template to create 20 identical VMs. How do you do this? a. Run Sysprep on the VM, power it down, and export and import the VM registering the VM in place with the existing unique ID. b. Power down and export and import the VM restoring the VM in place with the existing unique ID. c. Run Sysprep on the VM, power it down, and export and import the VM copying the VM in place to create a new unique ID. d. Use Live Migration to move only the VM as many times as you want.
answer
c. Run Sysprep on the VM, power it down, and export and import the VM copying the VM in place to create a new unique ID.
question
5. You need to migrate a VM created in the VirtualBox hypervisor. You do not need to capture local user accounts in your migration. Which of the following tools do you use? a. XenServer b. Active Directory Users and Computers c. Disk2VHD d. OVF Import/Export Tool
answer
a. XenServer
question
1. What method of file sharing is used with UNIX and Linux machines? a. SMB b. CIFS c. NTFS d. NFS
answer
d. NFS
question
2. When using NFS, how do you connect to the shared folder? a. You mount the volume to a local folder. b. You mount the volume to a remote folder. c. You access the shared folder using a UNC. d. You access the shared folder using a URL.
answer
a. You mount the volume to a local folder.
question
3. What allows you to integrate Windows users into an existing UNIX or Linux environment? a. NFS snap-in b. UNIX translator c. Identity Management for UNIX d. UNIX plug-in
answer
c. Identity Management for UNIX
question
4. What command do you use to install Identity Management for UNIX? a. install.exe b. feature.exe c. dism.exe d. msiexec.exe
answer
c. dism.exe
question
5. When you define access to NFS, which two items must you include? (Choose two answers.) a. domain name b. GID c. admin access d. UID
answer
b. GID d. UID
question
6. What are the three requirements for the NFS Data Store? (Choose three answers.) a. File Services role b. Server for NFS role service c. Failover Clustering feature d. Identity Manage for UNIX
answer
a. File Services role b. Server for NFS role service c. Failover Clustering feature
question
7. Which Windows Server 2012 server acts as a WAN accelerator? a. NFS accelerator b. BranchCache c. File Server Resource Manager d. GPO Cache
answer
b. BranchCache
question
8. Which mode in BranchCache allows you to store the cache among multiple computers running Windows 7 or Windows 8? a. hosted cache mode b. distributed cache mode c. WSCache d. WideRanceCache
answer
b. distributed cache mode
question
9. Which primary tool is used when classifying files? a. File Administrator b. Server Manager c. Computer Management d. File Server Resource Manager
answer
d. File Server Resource Manager
question
10. What are the two items that you have to create when using file classification? a. classification property b. classification attribute c. classification syntax d. classification rule
answer
a. classification property d. classification rule
question
11. What are the two actions that need to be done when you need to audit whether a file is being read by a certain user? (Choose two answers.) a. You need to specify which folders and files to audit. b. You need to add a checksum to the file to be audited. c. You need to enable object auditing. d. You need to add an audit digital certificate to the system where the files reside.
answer
a. You need to specify which folders and files to audit. c. You need to enable object auditing.
question
2. What do you use to extend the Active Directory schema to store UNIX attributes? a. NFS Management console b. Server for NFS role c. Computer Management console d. Identity Management for UNIX
answer
b. Server for NFS role
question
3. At the corporate office, you have a file server called Server01. At a remote site, you installed BranchCache on Server02, which is acting as a BranchCache hosted cache server. To move things along, you decide to preload the data from the file shares on Server1 to the cache on Server02. What would generate the hashes for the file share on Server01? a. Use the Enable-BCCache PowerShell cmdlet. b. Use the Publish-BCCache PowerShell cmdlet. c. Use the Export-BCCachepackage PowerShell cmdlet. d. Use the Set-BCCache PowerShell cmdlet.
answer
c. Use the Export-BCCachepackage PowerShell cmdlet.
question
4. To fully use Identity Management for UNIX, what are the three components that you have to install? (Choose three answers.) a. nis b. adminui c. Unix-add d. psync
answer
a. nis b. adminui d. psync
question
5. Which two commands allow you to specify the cache size for BranchCache hosted cache server? a. netsh set cachsize command b. netsh set publicationcachezie command c. Set-BCCacheSize PowerShell cmdlet d. Set-BCCache PowerShell cmdlet
answer
a. netsh set cachsize command d. Set-BCCache PowerShell cmdlet
question
1. Which of the following uses a trusted identity provider to provide authentication? a. centralized access control b. physical-based access control c. password access control d. claims-based access control
answer
d. claims-based access control
question
2. Which digital identification is used by a user or computer? a. passport b. token c. SID d. GUID
answer
b. token
question
3. Which identity provider is in Windows Server 2012? a. Security Token Service b. Kerberos Key Generator c. Trust Replicator d. Rights Management Service (RMS
answer
a. Security Token Service
question
4. What is used to automatically label files based on content? a. token rules b. claim rules c. resource properties d. classification rules
answer
d. classification rules
question
5. What do you specify when you create a claim type? a. claim resource b. claim name c. claim token d. claim property
answer
b. claim name
question
6. What is used to grant permissions to those objects on multiple file servers within your domain? a. Classification Policy b. Central Access Policy c. Token Policy d. Distributed Access Policy
answer
b. Central Access Policy
question
7. How do you enable staging of Dynamic Access Control (DAC)? a. Use the netsh command. b. Use Active Directory Administrative Center. c. Use GPOs. d. Use the Dynamic Access Control console.
answer
c. Use GPOs.
question
8. Which log do you view when you enable staging when using DAC? a. Application b. Security c. System d. Forwarded
answer
b. Security
question
9. How can you test DAC changes before you implement the changes? a. Use the DAC emulator. b. Use the Dynamic Access Control console. c. Use the Computer Management console. d. Use staging.
answer
d. Use staging.
question
10. What is included with devices when using DAC? a. users b. files c. computers d. phones
answer
c. computers
question
1. What is the best way to enable Access-Denied Assistant for all of your file servers? a. Dynamic Access Control console b. File Server Resource Manager c. Active Directory Administrative Center d. Group Policy Objects
answer
d. Group Policy Objects
question
2. Which of the following can you perform when using DAC? (Choose all that apply.) a. Audit access by using an audit policy. b. Encrypt all files on a server. c. Classify and tag data. d. Provide Access-Denied Assistance when a user is denied access to a shared file. e. Allow connections from mobile phones to files protected by DAC.
answer
a. Audit access by using an audit policy. c. Classify and tag data. d. Provide Access-Denied Assistance when a user is denied access to a shared file.
question
3. Which of the following are required when using DAC? (Choose two answers.) a. Classification rules b. Resource properties c. Claim types d. Staging
answer
b. Resource properties c. Claim types
question
4. What would you use to perform targeted auditing? a. Staging b. Advanced logging c. Dynamic logging d. Global Object Access Auditing
answer
d. Global Object Access Auditing
question
5. How can you manually classify files in a folder? a. Folder properties b. File Server Resource Manager c. Dynamic Access Control console d. Active Directory Administrative Center
answer
b. File Server Resource Manager
question
1. What protocol allows a server to connect to a SAN by sending SCIS commands over TCP/IP network? a. Fibre Channel b. iSCSI c. SATA d. MPIO
answer
b. iSCSI
question
Which port does iSCSI use? a. 1080 b. 8080 c. 3260 d. 4800
answer
Port 3260
question
Which client connects to an iSCSI SAN? a. iSCSI target b. iSCSI source c. iSCSI receiver d. iSCSI initiator
answer
d. iSCSI initiator
question
What can be installed so that Windows Server 2012 can be used to present iSCSI volumes to Windows servers? a. iSCSI target b. iSCSI source c. iSCSI receiver d. iSCSI initiator
answer
a. iSCSI target
question
What is a unique identifier that is used to identify iSCSI initiators and targets? a. iSNS b. IQN c. MPIO d. MPC
answer
b. IQN
question
Which protocol is used for authentication for iSCSI? a. PAP b. CHAP c. MS-CHAPv2 d. SPAP
answer
b. CHAP
question
How do you install iSCSI Target on Windows Server 2012? a. You install the MMC snap-in b. You install an add-in program c. You install as a Windows feature d. You install as a Windows Server role
answer
d. You install as a Windows Server role
question
What can you use to encrypt iSCSI traffic? a. CHAP b. IPsec c. BitLocker d. EFS
answer
b. IPsec
question
Which two technologies can help make iSCSI highly available (Choose two answers) a. MCS b. EFS c. LUNX d. MPIO
answer
a. MCS d. MPIO
question
What is used to automatically discover, manage, and configure iSCSI devices? a. LUN b. IQN c. MPIP d. iSNS
answer
d. iSNS
question
Which tools do you have access to after installing the Windows Server Backup feature? (Select all that apply) a. Windows Server backup MMC snap-in b. wbadmin.exe c. Windows PowerShell cmdlets for Windows Server Backup d. RSAT
answer
a. Windows Server Backup MMC snap-in b. wbadmin.exe c. Windows PowerShell cmlets for Windows Server Backup
question
Which of the following are true statements regarding Windows Server Backup in Windows Server 2012? (Select all that apply) a. You can back up to tape drives and attached hard drives b. Applications can be backed up to a DVD drive. c. Applications can be backed up to a remote shared folder d. Backing up to folders on a local or remote volume supports only one copy of the backup. Subsequent backups overwrite the contents of the previous backup
answer
c. Applications can be backed up to a remote shared folder d. Backing up to folders on a local or remote volume supports only one copy of the backup. Subsequent backups overwrite the contents of previous backups
question
Which of the following types of backups will back up all of the files needed to recover Active Directory? (Select all that apply) a. system state b. full backup c. bare metal recovery d. system reserved
answer
a. system state b. full backup c. bare metal recovery
question
What is the name of the folder where your backups are stored? a. Windows Backup b. WindowsImageBackup c. WindowsBkup d. WindowsImageBkup
answer
b. WindowsImageBackup
question
Which of the following are true regarding Windows Online Backups? a. It's only available with Windows Server 2012 b. It supports bandwidth throttling c. It uses an agent that supports backing up BitLocker-enabled drives d. It supports backup of files and folders
answer
a. It's only available with Windows Server 2012
question
Which of the following server roles should be backed up only in situations where you have static entries in the database? a. DHCP b. DNS c. RAS d. WINS
answer
d. WINS
question
Which Windows PowerShell command installs the Windows Server Backup Feature? a. PS C:Add-WindowsFeature Windows-Server-Backup b. PS C:Add-WindowsFeature WindowsServerBackup c. PS C:Install-WindowsFeature Windows-Server-Backup d. PS C:Install-WindowsFeature WindowsServerBackup
answer
a. PS C:Add-WindowsFeature Windows-Server-Backup
question
Which wbadmin command backs up the system state on a domain controller to a remote volume located on Server02 named SysState? a. wbadmin start backup -backuptarget: server02SysState b. wbadmin start backup -systemstate server02SysState c. wbadmin start backup -systemstate -backuptarget: server02SysState d. wbadmin start backup -sstemstate -target: server02SysState
answer
c. wbadmin start backup-systemstate-backuptarget:server02SysState
question
This Volume Shadow Copy Service (VSS) component is responsible for making sure the data is ready for the shadow copy to be created. a. VSS requester b. VSS provider c. VSS writer d. VSS Shadow Writer
answer
c. VSS writer
question
Which of the following are characteristics of Shared Copies for Shadow Volumes (SCSV)? a. It's enabled on a per-volume basis b. By default, shadow copies are taken at 7:00 AM and 12:00 AM (Monday-Friday). c. The volumes must be formatted using NTFS d. Mount points are supported
answer
a. It's enabled on a per-volume basis c. The volumes must be formatted using NTFS
question
When restoring files protected by SCSV, which of the following statements are true? a. Copying a file causes it to lose its original permission settings b. Copying a file allows it to retain its original permission settings c. Restoring a file causes it to lose its original permission settings d. Restoring a file allows it to retain its original permission settings
answer
a. Copying a file causes it to lose its original permission settings d. Restoring a file allows it to retain its original permission settings
question
What is the maximum number of shadow copies allowed per volume? a. 24 b. 128 c. 64 d. unlimited
answer
c. 64
question
Which of the following statements is incorrect regarding restoring a system volume? a. The server's hardware must not have changed and your data volumes must still be operational b. The server's current system volume will be erased c. If there are any data volumes on the same disk that contains the system volumes, they are erased as part of the restore process d. If there are any data volumes on the same disk that contains the system volumes, they will not be erased as part of the restore process
answer
d. If there are any data volumes on the same disk that contains the system volumes, they will not be erased as part of the restore process
question
You would like to recover the system state for a member server from a backup. Which backup types include them by default? (Select all that apply) a. full backups b. system state backups c. bare metal backups d. simple volume backups
answer
a. full backups b. system state backups c. bare metal backups
question
Which command can be used to boot into a special mode that allows you to repair and recover Active Directory? a. bcdedit /set safeboot dsrepair b. bcdedit /set safeboot dsrm c. bcdedit /set safeboot ad repair d. bcdedit /set safeboot repair DS
answer
a. bcdedit /set safeboot dsrepair
question
Someone accidentally deleted an organizational unit (OU) in Active Directory. What type of restore do you need to perform if you do not have Active Directory Recycle Bin enabled? a. non-authorative restore b. ntdsutil.exe restore c. authoritative restore d. ntdsutil.exe auth restore
answer
c. authoritative restore
question
What is the maximum number of days you can fully recover an Active Directory-deleted object and all of its attributes if you have Active Directory Recycle Bin enabled a. 60 days b. 180 days c. 30 days d. 360 days
answer
d. 360 days (book answer) (Correct answer would actually be b. 180 days as the question asks for the restoration of ALL attributes)
question
Which of the following are inaccurate statements regarding performing a bare metal recovery restore? a. You can restore cross architecture b. You can recover to a server that has the different hardware c. You will include the system state, system reserved, and critical volumes by default d. If you are restoring from a backup that is no the server's locally attached disk, that disk will be excluded automatically from being formatted if you select Format and repartition disk
answer
a. You can restore cross architecture
question
Which of the following command-line tools can be used to display the boot loader/applications configured on a server? a. bcdedit.exe b. bootrec c. sfc /verify d. diskpart
answer
a. bcdedit.exe
question
Which of the following would you select, withing Hyper-V Manager, to return a virtual machine (VM) to the last snapshot that was taken after selecting the VM in the console? a. Action Menu > Apply b. Action Menu > Return c. Action Menu > Revert d. Action Menu > Undo
answer
c. Action Menu > Revert
question
What allows you to place an offline copy of a VM that is regularly updated? a. Data Duplication b. DFS replication c. Cluster replication d. Hyper-V replica
answer
d. Hyper-V replica
question
Which component of the Hyper-V replica performs the replication of VM's? a. Replication Engine b. Change Tracker c. Network Module d. Change Manager
answer
a. Replication Engine
question
How is the data replicated when replicating to a Hyper-V replica? a. HTTP b. Telnet c. FTP d. TFTP
answer
a. HTTP
question
What program is normally used to enable Hyper-V replication? a. Hyper-V Manager b. Hyper-V Replica c. Failover Cluster Manager d. Hyper-V Replica Broker
answer
a. Hyper-V Manager
question
When a VM is replicated as a Hyper-V replica, what is the replicated VM considered? a. cold server b. warm server c. hot server d. dynamic server
answer
a. cold server
question
What type of quorum is recommended for multi-site clusters consisting of two nodes on the primary site and two nodes on the backup site? a. Node Majority with File Sharing Majority b. Node Majority with Disk Witness c. No Majority d. Node Majority
answer
a. Node Majority with File Share Majority
question
You have a total of five cluster nodes that are used by a multi-site cluster. Which type of quorum should you use? a. Node Majority with File Share Majority b. Node Majority with Disk Witness c. No Majority d. Node Majority
answer
d. Node Majority
question
What provides encryption for Hyper-V replication over the network? a. HTTPS b. SSH c. SFTP d. TFTP
answer
a. HTTPS
question
What is the advantage of using synchronous replication? a. It keeps the source and target storage devices the same b. It's faster c. It accommodates high latency d. It accommodates low bandwidth
answer
a. It keeps the source and target storage devices the same
question
10. If you have a secondary site to be used as a backup site, what basic network services will you need? (Choose all that apply) a. SMTP b. SQL Server c. AD DS d. DNS
answer
c. AD DS d. DNS
question
What is used to enable Hyper-V replica if you have a failover cluster installed on a server where you have Hyper-V installed? a. Hyper-V Manager b. Hyper-V Replica c. Failover Cluster Manager d. Hyper-V Replia Broker
answer
a. Hyper-V Manager
question
You have two servers, Server1 and Server2, running Windows Server 2012. Both servers have the Hyper-V server role installed. Server1 is in the primary site and Server2 is in the secondary site, which are connected over a slow WAN link. Server1 is running a VM. If Server1 fails, how can you start a copy of the VM on Server2, while keeping the cost low? a. Install MPIO on Server1 and modify the storage locations of the VM b. Install MPIO on Server1 and modify the storage locations of the VM c. On Server1. modify the Replication Configuration settings and enable the replication of VM d. On Server2. modify the Replication Configuration settings, and enable the replication of the VM
answer
c. On Server1, modify the Replication Configuration settings and enable the replication of VM
question
You have two servers, Server1 and Server2. Both are running Windows Server 2012 and the Hyper-V server role. You need to replicate VMs between Server1 and Server2. You need to use encryption with SSL. Of course, you need a digital certificate for SSL. What two intended purposes of the certificate would you need? a. client authentication b. server authentication c. IP security d. KDC authentication
answer
a. client authentication b. serer authentication
question
You have three physical hosts called Server1, Server2, and Server3, all of which are running Windows Server 2012. Server1 and Server2 make up the failover cluster Cluster1. Cluster1 has the Hyper-V Replica Broker installed and is hosting several VMs. What tools do you need to use to configure the VMs to replicate to Server3? a. Hyper-V Manager console connected to Server3 b. Hyper-V Manager console connected to Cluster1 c. Failover Cluster Manager console connected to Cluster1 d. Failover Cluster Manager console connected to Server3
answer
a. Hyper-V Manager console connected to Server3 c. Failover Cluster Manager console connected to Cluster1
question
What is desirable when you purchase a WAN link to connect two sites? (Choose two answers) a. low latency b. low bandwidth c. high latency d. high bandwidth
answer
a. low latency d. high bandwidth
question
You have a scope called Scope1 (192.168.3.0/24) that is running out of addresses. What can you do to expand the number of addresses? a. Create a 192.168.4.0 scope and create a superscope b. Create an IPv6 scope c. Reassign the scope to 172.24.3.0/16 d. Create a multicast scope
answer
a. Create a 192.168.4.0 scope and create a superscope
question
Which type of communication sends a single set of packets to multiple hosts at the same time? a. unicast b. broadcast c. multicast d. anycast
answer
c. multicast
question
What type of IPv6 address mechanism is used to generate link-local addresses using the MAC address? a. stateless b. stateful c. prefix-based d. multicast
answer
a. stateless
question
What is the default DHCP failover mode? a. Stateless b. Stateful c. Load Sharing d. Hot Standby
answer
c. Load Sharing
question
What is used to prevent non-Windows to overwrite DNS information for you systems that use static addresses? a. Dynamic Protection b. Stateful Protection c. Stateless Protection d. DHCP Name Protection
answer
a. Dynamic Protection
question
What ports are required for DHCP failover? a. 20-21 b. 67-68 c. 101-102 d. 140-141
answer
b. 67-68
question
When you add a DHCP reservation for a printer, what two components should you include in the reservation? (Choose two answers) a. the MAC address b. the Default gateway c. the printer server name d. the IP address
answer
a. the MAC address d. the IP address
question
You have two DHCP servers, Server1 and Server2, running Windows Server 2012. You create a scope called Scope1. Server1 is your primary DHCP server. What is the easiest way to assign 80 percent of the addresses to Server1 and 20 percent to Server2? a. on Scope1, run the Split-Scope Wizard b. Create a multicast scope c. Create a DHCP policy d. Create a superscope
answer
a. On Scope1, run the Split-Scope Wizard
question
You have just installed a new DHCP server. You try to start the DHCP service, but it will not start. What should you do? a. Restart the server b. Configure a scope c. Activate the scope d. Authorize the server in Active Directory
answer
d. Authorize the server in Active Directory
question
You replaced your DHCP server due to hardware failure. You restore the server from a backup. You need to ensure that DHCP clients do not receive IP address that are currently in use on the network. What should you do? a. Set the Conflict Detection value to 2 b. Add the DHCP server option 60 c. Add the DHCP server option 44 d. Enable the Retry option
answer
a. Set the Conflict Detection value to 2
question
You have a server running Windows Server 2012. You want to assign the same IP address from the DHCP server to the server every time. What do you need to do? a. Create a DHCP policy b. Create an exclusion policy c. Create a single scope with the specified address d. Create a reservation
answer
d. Create a reservation
question
You have a 192.168.1.0/24 subnet. Using DHCP, you want IP phones to be assigned addresses between 192.168.1.51-100 and desktop computer assigned to addresses between 192.168.1.101-155. How should you proceed while keeping the administrative effort to a minimum? a. Create a multicast scope b. Create a superscope c. Use DHCP policies d. Create multiple standard scopes
answer
c. Use DHCP policies
question
You have the following DHCP scope: 192.168.1.0/24. You need to migrate the clients to 172.24.1.0/16. What type of scope should you create to perform the migration? a. a multicast scope b. a superscope c. a split-scope d. an IPv6 scope
answer
b. a superscope
question
You are an administrator for the Contoso Corporation. Your primary office is in Sacramento and your data recovery site is in Las Vegas. You want to install a DHCP server at both locations to provide high availability. Which configuration should you use? a. NLB cluster b. Failover over cluster c. Load Sharing mode failover partner d. Hot Standby mode failover partner
answer
d. Hot Standby mode failover partner
question
You have a server running Windows Server 2012 with five networks. You create two teams, each with two NICs. You want to use reservations to always assign the same iP addresses to the interfaces. how many reservations do you need on the DHCP server? a. 2 b. 3 c. 4 d. 5
answer
b. 3
question
Which of the following actions secures a DNS zone using a public key infrastructure? a. Sign the zone b. Lock the cache c. Increase the socket pool d. Create a Global Names zone
answer
a. Sign the zone
question
Which of the following allows a DNS server to act as a key master? a. KSK b. ZSK c. Locked Cache d. AD CS Certificate Authority
answer
a. KSK
question
Which DNS Resource Record provides a validated denial of existence? a. DNSKEY a. AAAA c. SRV d. NSEC3
answer
d. NSEC3
question
Which dnscmd command-line parameter sets the capability to resolve non FQDN names? a. /Socketpoolsize b. /Cachelockingpercent c. /Enableglobalnamessupport d. /enumzones
answer
c. /Enableglobalnamessupport
question
Which of the following actions can you not record or perform using DNS debug logging? (Choose all that apply) a. Zone transfers b. Start / Stop DNS service c. Log file size d. Query request packets
answer
a. Zone transfer b. Start / Stop DNS Service
question
Which security group has DNS administration privileges across the forest? (Choose all that apply) a. Enterprise Admins b. Domain Admins c. Local administrators d. DNS Admins
answer
a. Enterprise Admins
question
Which LocalPriorityNet setting masks a Class A IP address? a. 0x000000ff b. 0x0000ffff c. 0x0000003f d. 0x00ffffff
answer
a. 0x000000ff
question
Which of the following statements about the GlobalNames zones in Windows Server 2012 DNS Server role are true? a. GlobalNames zone is domain-specific b. GlobalNames zones require dynamic updates disable c. GlobalNames zones are useful in multi-DNS domain systems d. GlobalNames zones are enabled by default
answer
c. GlobalNames zones are useful in multi-DNS domain system
question
Disabling Server recursion has which of the following effects? a. Speeds up client queries b. Increases the server workload c. Restricts a DNS server to its own database d. Disables access to the Internet
answer
c. Restricts a DNS server to its own database
question
Which built-in Domain Local Security group allows full control of the DNS server functions within a single domain? a. DNS Users b. Power Users c. DNS Admins d. Enterprise Admins
answer
c. DNS Admins
question
Which IPAM Security Group allows access to IP address tracking information but not full administration of an IPAM server? a. IPAM Users b. IPAM ASM Administrators c. IPAM Audit Administrators d. IPAM Administrators
answer
c. IPAM Audit Administrators
question
IPAM servers should be installed on which Windows Server 2012? a. domain controller b. non-domain joined c. DNS server d. domain-joined sole purpose
answer
d. domain-joined sole purpose
question
Which of the following functions does IPAM not carry out? a. planning b. auditing c. tracking d. monitoring
answer
d. monitoring
question
IPAM can be administered from which operating system? a. Windows 7 b. Windows Server 2008 R2 SP1 c. Windows 8 d. Windows Server 2008 SP2
answer
c. Windows 8
question
Which of the following GPOs is not created when IPAM is provisioned using the automatic Group Policy method? a. IPAM1_DHCP b. IPAM1_DNS c. IPAM1_NPS d. IPAM1_DC_NPS
answer
c. IPAM1_NPS
question
How many DNS servers can be managed from a single IPAM server? a. 25 b. 500 c. 250 d. 50
answer
b. 500
question
How much RAM is required to install an IPAM server? a. 1 GB b. 2 GB c. 4 GB d. 8 GB
answer
c. 4 GB
question
Which Windows PowerShell cmdlet commences the automatic Group Policy provisioning on an IPAM server? a. Invoke-IpamGpoProvisioning b. Start-IpamGpoProvisioning c. Start-IpamAutoGpoProvisioning d. Invoke-IpamAutoGpoProvisioning
answer
a. Invoke-IpamGpoProvisioning
question
Which of the following devices will IPAM manage? (Choose all that apply) a. Windows Server 2008 R2 DNS server b. Windows Server 2003 DHCP server c. Cisco DHCP device d. Windows Server 2012 NPS server
answer
a. Windows Server 2008 R2 DNS Server d. Windows Server 2012 NPS server
question
Which of the following are IPAM collection tasks? (Choose all that apply) a. AddressExpiry b. Audit c. Service Monitoring d. ServerConfiguration
answer
b. Audit c. Service Monitoring d. ServerConfiguration
question
Which IPAM local security group should you use to provide IP auditing permissions? a. IPAM Audit Administrators b. IPAM Administrators c. IPAM Users d. IPAM ASM Administrators
answer
a. IPAM Audit Administrators
question
ON which Windows Server should you install the IPAM feature? a. Windows Server 2008 R2 Domain Controller b. Windows Server 2012 DHCP Server c. Windows Server 2012 Domain Controller d. Windows Server 2012 File Server
answer
d. Windows Server 2012 File Server
question
Which of the following IPAM provisioning methods should you use? a. Manual b. Group Policy c. Automatic Group Policy d. Active Directory
answer
c. Automatic Group Policy
question
To alter a DHCP scope using IPAM, which method should you use? a. DHCP Scopes console in Server Manager b. Directly on the DHCP console on the DHCP server c. Directly via Windows Powershell on the DHCP server d. Remotely via Windows PowerShell
answer
a. DHCP Scopes console in Server Manager
question
What should be used to reflect the organizational structure of your organization? a. domain b. forest c. trees d. OU
answer
d. OU
question
Which of the following uses non-contiguous namespace? a. domain b. forest c. trees d. OU
answer
b. forest
question
Which partition are used by Active Directory? (Choose all that apply) a. configuration partition b. domain partition c. forest partition d. schema partition
answer
a. configuration partition b. domain partition d. schema partition
question
What utility do you use to update the domain function level? a. Active Directory Users and Computers b. Active Directory Domains and Trusts c. Active Directory Sites and Services d. DNS
answer
a. Active Directory Users and Computers
question
What is the minimum domain function level to support fine-grained password policies? a. Windows Server 2003 b. Windows Server 2008 c. Windows Server 2008 R2 d. Windows Server 2012
answer
b. Windows Server 2008
question
What is the minimum domain functional level to support read-only domain controller? a. Windows Server 2003 b. Windows Server 2008 c. Windows Server 2008 R2 d. Windows Server 2012
answer
b. Windows Server 2008
question
After using the Active Directory Migration tool to migrate users to your new domain, what concerns should you have when creating a new external trust or forest trust? a. you will not be able to create new trusts b. Recently migrated accounts will have a new Security Identifier (SID) and an updated SID History c. Elevated privileges will not cross the trust d. The RID Master role must be seized
answer
b. Recently migrated accounts will have a new Security Identifier (SID) and an updated SID History
question
Users in a UNIX Realm need to access resources in a Windows Server 2012 domain. What type of trust will you create? a. external trust b. forest trust c. shortcut trust d. none of the above
answer
d. none of the above
question
You have two domains in a single internal forest. What type of trust should you create so that all users can log into computers in both domains? a. external trust b. forest trust c. shortcut trust d. none - automatic trust
answer
d. automatic trust
question
You have just created a two way forest trust between Forest A and Forest B and are using forest-wide authentication. Some users complain that they cannot log into their domain-joined computers in the other forest. What should you do. a. Recreate the trust b. Have users log in with a generic domain user account c. Have users log in with their email address d. Have users log in with a username local to the workstation
answer
c. Have users log in with their email address
question
You are the Domain Administrator for support.adatum.local and have been working with the Enterprise Administrator for contoso.local to create a one-way external trust between support.adatum.local and support.contoso.local. Your domain, support.adatum.local will be the trusted domain. The Contoso Enterprise Admins have created a one way incoming turst with your domain. What will you need to do? a. Create a one-way shortcut trust b. Create a two-way realm trust c. Ask the Contoso Enterprise Admins to remove the recently created trust and create a one-way outgoing trust d. Create a one-way outgoing trust with support.contoso.local
answer
c. Ask the Contoso Enterprise Admins to remove the recently created trust and create a one-way outgoing trust
question
You are attempting to create a trust between Adatum.local and Contoso.local, both Windows Server 2012 domains. You run the New Trust Wizard and enter in the domain name for Contoso.local. The next screen of the wizard says "The name you specified is not a valid Windows Domain name. Is the specified name a Kerberosv5 realm"? What do you do to resolve the problem? a. Configure DNS b. Configure DHCP Split-Scope c. Manually add contoso.local to the hosts file of the Adatum.local domain controllers. d. Configure selective authentication
answer
a. Configure DNS
question
You have recently installed a domain controller, but your clients are unable to authenticate against it. You notice the SRV records for the domain controller have not been populated in DNS. What will you do to re-register the SRV records in DNS? a. Modify NETLOGON.DNS b. Restart the NETLOGON service c. Restart the DNS Server Cervice d. Modify NETLOGON.LOG
answer
b. Restart the NETLOGON service
question
Clients at a remote site are complaining that it takes an unacceptable amount of time to log in to their computers when they come in every morning. You check the logs of the domain controllers and notice that the clients are authenticating with a domain controller at the headquarters office and not with the domain controller at the remote office. You verify that the domain controller at the remote office is configured and registering SRV records in DNS correctly. What must be done to ensure all clients in the remote site authenticate with the domain controller in the remote site? a. Create a new organizational unit and move the computers into it b. Require all users to log in with their e-mail address for the username c. Delete the NETLOGON.DNS file on the remote site domain controller d. Create a subnet in the Active Directory Sites and Services tool
answer
d. Create a subnet in the Active Directory Sites and Services tool
question
You have installed a Read Only Domain Controller (RODC) at a remote location. After looking through the logs, you notice that the Windows Server 2003 servers have automatically covered the remote site. What is the next step you need to take? a. Modify the SearchFlags attribute b. Open REGEDIT on the Windows Server 2003 domain controllers c. Install the Microsoft Assessment and Planning Toolkit d. Restart the NETLOGON service of the RODC
answer
d. Restart the NETLOGON service of the RODC
question
You have recently have a physical domain controller fail during a routing maintenance reboot. The drives have failed and you cannot purchase new drives. Luckily you have recently implemented a Hyper-V solution. Instead of restoring it from backup, you brought online a new virtual domain controller running Windows Server 2012 Once the new server is back up and replicating with other partners within its site you notice no replication is taking place between the sites. Why has replication stopped between sites? a. The failed domain controller was a manually configured bridgehead server b. The second site is not compatible with Windows Server 2012 c. The site link needs to be re-registered d. The Default-First-Site-Name still exists
answer
a. The failed domain controller was a manually configured bridgehead server
question
You have recently bought a new site online. During your planning stages, you set up two new domain controllers for the new site and you are ready to move them. What tool will you use to move the domain controllers to the remote site. a. Active Directory Domains and Trusts b. Active Directory Users and Computers c. Active Directory Sites and Services d. Active Directory Administrative Center
answer
c. Active Directory Sites and Services
question
You are working in an environment that has a non-Windows DNS server resolving all client requests. You are unable to use DNS Manager to view what records your Windows Server 2012 has registered with DNS. Where can you view the SRV records that the domain controller has created? a. NETLOGON.DNS b. DNS Manager c. HOSTS d. NETLOGON.LOG
answer
a. NETLOGON.DNS
question
Which of the following commands, run from command prompt, allows you to monitor, troubleshoot, and force replication on Windows Server 2012? a. REPLMON b. NETSH c. REPLSUM d. REPADMIN
answer
d. REPADMIN
question
Which of the following replication topologies, by default, uses change notification? a. Knowledge Consistency Checker (KCC) b. Intersite Topology Generator c. Intrasite Replication d. Intersite Replication
answer
c. Intrasite Replication
question
Which of the following Domain Functional Levels is the minimum requirement to securely implement Filtered Attribute Sets? a. Windows Server 2003 b. Windows Server 2008 c. Windows Server 2008 R2 d. Windows Server 2012
answer
b. Windows Server 2008
question
You have configured a user group on the Managed by tab of an RODC. You receive a call from a member of the group indicating he is not able to log in to the RODC at the remote location. When the Wan link goes down. What do you need to do? a. Add the group to the Domain Admins Group b. Add the group to the Enterprise Admins Group c. Add the group to the Allowed RODC Password Replication Group d. Add the group to the Authenticated Users Group
answer
c. Add the group to the Allowed RODC Password Replication Group
question
When replicating a single object between domain controllers, what will you use to specify the object name? a. Distinguished Name (DN) b. Relative Distinguished Name (RDN) c. Security Account Manager ID (SAM ID) d. Common Name (CN)
answer
a. Distinguished Name (DN)
question
Which of the following allows passwords to be cached on an RODC before users log in to the RODC? a. Change the user's password on the PDC emulator b. Disable and then re-enable the user account c. Allow Password Replication and configure "User must change password at next logon." d. Allow Password Replication and Password Prepopulation
answer
d. Allow Password Replication and Password Prepopulation
question
What allows a single sing-on when deploying an application for another organization on your network? a. Active Directory Domain Services (AD DS) b. Active Directory Rights Management Services (AD RMS) c. Active Directory Lightweight Directory Services (AD LDS) d. Active Directory Federation Services (AD FS)
answer
d. Active Directory Federation Services (AD FS)
question
What is a statement made by a trusted entity for a user that includes key information to identify the user? a. store b. delegated party c. proxy d. claims
answer
d. claims
question
What is the application that accepts claims from a claim provider? a. claims provider b. relying party c. attribute store d. federation server proxy
answer
b. relying party
question
What is the server that issues claims and authenticates users? a. claims provider b. relying party c. attribute store d. federation server proxy
answer
a. claims provider
question
What is a database that stores user information? a. claims provider b. relying party c. attribute store d. federation server proxy
answer
c. attribute store
question
What type of certificate is assigned to the AD FS website? a. server authentication b. token-signing c. token-decrypting d. web authentication
answer
a. server authentication
question
What kind of system are you creating when you install a certificate authority (CA) a. JIF b. SMB c. CIF d. PKI
answer
d. PKI
question
Which of the following role services allows you to validate and revoke certificates? a. Certificate Authority Policy Web Service b. CA Web Enrollment c. Online Responder d. Network Device Enrollment Service
answer
c. Online Responder
question
What is required to install enterprise CA? a. Active Directory b. multiple CAs c. Online Responder d. IIS
answer
a. Active Directory
question
Which of the following can be used to check the validity of a digital certificate? a. Online Responder b. CAPolicy c. NDES d. CRL
answer
a. Online Responder d. CRL
question
You have two servers called Server01 and Server02, which are running Windows Server 2012. you configured Server01 as an enterprise root CA. You install the Online responder role service on Server02. What do you need to do so that Server01 uses the Online Responder Services? a. Configure the CRL Distribution Point extension b. Configure the Authority Information Access (AIA) extension c. Add the Online Responder to Server01 and point to Server02 d. Import the enterprise root CA certificate and install on Server02
answer
b. Configure the Authority Information Access (AIA) extension
question
You have an Active Directory Domain. You install Active Directory Certificate Services (AD CS) role on a standalone server. However, when you install the AD CS role as an enterprise CA, the enterprise CA role option is not available. What should you do? a. Add the DNS server role b. Add the AD LDS role c. Join the server to the domain d. Load the AD CS Proxy role
answer
c. Join the server to the domain
question
You are replacing a web server and you need to retrieve the digital certificate used for your website so that you can import it to the new web server. What format should you export the certificate to? a. Base-64 encoded X.509 (.cer) b. Cryptographic Message Syntax Standard PKCS #7 (.p7b) c. DER encoded binary X.509 (.cer) d. Personal Information Exchange PKCS #12 (.pfx)
answer
d. Personal Information Exchange PKCS #12 (.pfx)
question
You have an enterprise certification authority for your company. You need to issue a certificate to all users for email security, client authentication, and Encrypting File System (EFS). What two actions do you need to perform to complete? a. Duplicate the User certificate template, and then publish the template b. Modify the properties of the User certificate template and publish the template c. Using a group policy, configure the Certificate Services Client - Autoentrollment settings d. Using group policies, configure the Certificate Services Client - Certificate Enrollment Policy settings
answer
a. Duplicate the User certificate template, and then publish the template c. Using a group policy, configure the Certificate Services Client - Autoentrollment settings
question
You have an enterprise certification authority for your company. Which console do you need to use to ensure that all members of the Sales group can enroll in the Sales certificate? a. Certification Authority b. Certificate Templates c. Authorization Manager d. Active Directory Administrative Center
answer
b. Certificate Templates
question
Which of the following is the minimum schema version for certificates that is required for auto-enrollment? a. v1 b. v2 c. v3 d. v4
answer
b. v2
question
Which of the following are ways you can deploy certificates? a. manual enrollment b. blackbox copy c. autoenrollment d. web enrollment
answer
a. manual enrollment c. autoenrollment d. web enrollment
question
Which of the following is the default URL for the CA Web enrollment? a. https:///enroll b. https:///certentroll c. https:///certsrv d. https:///webcert
answer
c. https:///certsrv
question
What do you need to configure to grant licenses to another forest within your organization? a. trusted publishing domain b. trusted user domains c. federation trust d. email server
answer
a. trusted publishing domain
question
By default, which group is the Super Users? a. Domain admins b. Enterprise admins c. RMS Admins d. It is disabled and not defined
answer
d. It is disabled and not defined
question
What is the default validity time for RAC? a. 7 days b. 30 days c. 365 days d. 90 days
answer
c. 365 days
question
Which certificate contains the public key that encrypts the content key in a publishing license? a. AD RMS machine certificate b. Client licensor certificate b. RAC d. SLC
answer
d. SLC
question
In addition to the AD RMS root cluster, what is needed before you can create the AD RMS root cluster? a. Failover cluster feature b. Network load balancing feature c. Microsoft SQL Server 2008 d. File Sharing Services Role
answer
c. Microsoft SQL Server 2008
question
You have two Active Directory forests with your company, contoso.com and litware.com. Each forest has an AD RMS deployment. How can you allow users from the litware.com forest access AD RMS protection content in the contoso forest? a. Create an external trust from liteware.com to contoso.com b. Install a remote access gateway c. Add a trusted user domain to the AD RMS cluster in the contoso.com domain d. Add a trusted user domain ot the AD RMS cluster in the litware.com domain
answer
c. Add a trusted user domain to the AD RMS cluster in the contoso.com domain
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New