MCSA: Windows Server 2012 70-412 exam dumps

MCSA: Windows Server 2012 can prove your mastery of the primary set of Windows Server 2012 skills required to reduce IT costs and deliver more business value. So how to get MCSA: Windows Server 2012 certification? Just answer 70-410, 70-411 and 70-412, the three exams to enhance yourselves. 70-412 exam tests the skills and knowledge necessary to administer a Windows Server 2012 infrastructure in an enterprise environment. We have updated 70-412 exam dumps to V19.02 to ensure you pass Configuring Advanced Windows Server 2012 Services exam.

Free 70-412 dumps online, check and test now

1. Your company recently deployed a new Active Directory forest named contoso.com. The first domain controller in the forest runs Windows Server 2012 R2.

You need to identify the time-to-live (TTL) value for domain referrals to the NETLOGON and SYSVOL shared folders.

Which tool should you use?

2. HOTSPOT

Your network contains an Active Directory forest named contoso.com that contains a single domain. The forest contains three sites named Site1, Site2, and Site3.

Domain controllers run either Windows Server 2008 R2 or Windows Server 2012 R2.

Each site contains two domain controllers. Site1 and Site2 contain a global catalog server.

You need to create a new site link between Site1 and Site2. The solution must ensure that the site link supports the replication of all the naming contexts.

From which node should you create the site link? To answer, select the appropriate node in the answer area.

3. Your network contains two Active Directory forests named contoso.com and adatum.com. Contoso.com contains one domain. Adatum.com contains a child domain named child.adatum.com.

Contoso.com has a one-way forest trust to adatum.com. Selective authentication is enabled on the forest trust.

Several user accounts are migrated from child.adatum.com to adatum.com. Users report that after the migration, they fail to access resources in contoso.com. The users successfully accessed the resources in contoso.com before the accounts were migrated.

You need to ensure that the migrated users can access the resources in contoso.com.

What should you do?

4. HOTSPOT

Your network contains an Active Directory domain named contoso.com. The domain contains domain controllers that run either Windows Server 2003, Windows Server 2008 R2, or Windows Server 2012 R2. You plan to implement a new Active Directory forest. The new forest will be used for testing and will be isolated from the production network. In the test network, you deploy a server named Server1 that runs Windows Server 2012 R2. You need to configure Server1 as a new domain controller in a new forest named contoso.test.

The solution must meet the following requirements:

• The functional level of the forest and of the domain must be the same as that of contoso.com.

• Server1 must provide name resolution services for contoso.test.

What should you do? To answer, configure the appropriate options in the answer area.

5. Your network contains an Active Directory forest named adatum.com. The forest contains a single domain. The domain contains four servers.

The servers are configured as shown in the following table.

You need to update the schema to support a domain controller that will run Windows Server 2012 R2.

On which server should you run adprep.exe?

6. HOTSPOT

Your network contains three Active Directory forests.

The forests are configured as shown in the following table.

A two-way forest trust exists between contoso.com and divisionl.contoso.com. A two-way forest trust also exists between contoso.com and division2.contoso.com.

You plan to create a one-way forest trust from divisionl.contoso.com to division2.contoso.com.

You need to ensure that any cross-forest authentication requests are sent to the domain controllers in the appropriate forest after the trust is created.

How should you configure the existing forest trust settings? In the table below, identify which configuration must be performed in each forest. Make only one selection in each column. Each correct selection is worth one point.

7. Your network contains an Active Directory forest named contoso.com. The forest contains three domains. All domain controllers run Windows Server 2012 R2.

The forest has a two-way realm trust to a Kerberos realm named adatum.com.

You discover that users in adatum.com can only access resources in the root domain of contoso.com.

You need to ensure that the adatum.com users can access the resources in all of the domains in the forest.

What should you do in the forest?

8. Your network contains an Active Directory forest named contoso.com. The forest contains two domains named contoso.com and childl.contoso.com. The domains contain three domain controllers.

The domain controllers are configured as shown in the following table.

You need to ensure that the KDC support for claims, compound authentication, and kerberos armoring setting is enforced in the child1.contoso.com domain.

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

9. Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. The domain contains two domain controllers.

The domain controllers are configured as shown in the following table.

You configure a user named User1 as a delegated administrator of DC10.

You need to ensure that User1 can log on to DC10 if the network link between the Main site and the Branch site fails.

What should you do?

10. Your company has offices in Montreal, New York, and Amsterdam.

The network contains an Active Directory forest named contoso.com. An Active Directory site exists for each office. All of the sites connect to each other by using the DEFAULTIPSITELINK site link.

You need to ensure that only between 20:00 and 08:00, the domain controllers in the Montreal office replicate the Active Directory changes to the domain controllers in the Amsterdam office.

The solution must ensure that the domain controllers in the Montreal and the New York offices can replicate the Active Directory changes any time of day.

What should you do?

11. HOTSPOT

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2.

Server1 and Server2 have the Network Load Balancing (NLB) feature installed. The servers are configured as nodes in an NLB cluster named Cluster1. Both servers connect to the same switch.

Cluster1 hosts a secure web Application named WebApp1. WebApp1 saves user state information in a central database.

You need to ensure that the connections to WebApp1 are distributed evenly between the nodes. The solution must minimize port flooding.

What should you configure? To answer, configure the appropriate affinity and the appropriate mode for Cluster1 in the answer area.

12. Your network contains two Web servers named Server1 and Server2. Both servers run Windows Server 2012 R2.

Server1 and Server2 are nodes in a Network Load Balancing (NLB) cluster. The NLB cluster contains an application named App1 that is accessed by using the URL http://app1.contoso.com. You plan to perform maintenance on Server1.

You need to ensure that all new connections to App1 are directed to Server2. The solution must not disconnect the existing connections to Server1.

What should you run?

13. Your network contains two servers named HV1 and HV2. Both servers run Windows Server 2012 R2 and have the Hyper-V server role installed. HV1 hosts 25 virtual machines. The virtual machine configuration files and the virtual hard disks are stored in D:VM. You shut down all of the virtual machines on HV1. You copy D:VM to D:VM on HV2. You need to start all of the virtual machines on HV2. You want to achieve this goal by using the minimum amount of administrative effort.

What should you do?

14. HOTSPOT

Your network contains two Hyper-V hosts that are configured as shown in the following table.

You create a virtual machine on Server1 named VM1. You plan to export VM1 from Server1 and import VM1 to Server2.

You need to ensure that you can start the imported copy of VM1 from snapshots.

What should you configure on VM1? To answer, select the appropriate node in the answer area.

15. DRAG DROP

Your network contains an Active Directory domain named contoso.com. The domain contains four member

servers named Server1, Server2, Servers, and Server4. All servers run Windows Server 2012 R2.

Server1 and Server2 are located in a site named Site1. Server3 and Server4 are located in a site named Site2. The servers are configured as nodes in a failover cluster named Cluster1. Cluster1 is configured to use the Node Majority quorum configuration. You need to ensure that Server1 is the only server in Site1 that can vote to maintain quorum.

What should you run from Windows PowerShell? To answer, drag the appropriate commands to the correct location. Each command may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

16. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2.

Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1. Cluster1 contains a cluster disk resource.

A developer creates an application named App1. App1 is NOT a cluster-aware application. App1 runs as a service. App1 stores data on the cluster disk resource.

You need to ensure that App1 runs in Cluster1. The solution must minimize development effort.

Which cmdlet should you run?

17. HOTSPOT

Your network contains an Active Directory domain named contoso.com. You have a failover cluster named Cluster1 that contains two nodes named Server1 and Server2. Both servers run Windows Server 2012 R2 and have the Hyper-V server role installed. You plan to create two virtual machines that will run an application named App1. App1 will store data on a virtual hard drive named App1data.vhdx. App1data.vhdx will be shared by both virtual machines.

The network contains the following shared folders:

• An SMB file share named Share1 that is hosted on a Scale-Out File Server.

• An SMB file share named Share2 that is hosted on a standalone file server.

• An NFS share named Share3 that is hosted on a standalone file server.

You need to ensure that both virtual machines can use App1data.vhdx simultaneously.

What should you do? To answer, select the appropriate configurations in the answer area.

18. HOTSPOT

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Active Directory Certificate Services server role installed and configured.

For all users, you are deploying smart cards for logon. You are using an enrollment agent to enroll the smart card certificates for the users.

You need to configure the Contoso Smartcard Logon certificate template to support the use of the enrollment agent.

Which setting should you modify? To answer, select the appropriate setting in the answer area.

19. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2.

The system properties of Server1 are shown in the exhibit. (Click the Exhibit button.)

You need to configure Server1 as an enterprise subordinate certification authority (CA).

What should you do first?

20. Your network contains a perimeter network and an internal network. The internal network contains an Active Directory Federation Services (AD FS) 2.1 infrastructure. The infrastructure uses Active Directory as the attribute store.

You plan to deploy a federation server proxy to a server named Server2 in the perimeter network. You need to identify which value must be included in the certificate that is deployed to Server2.

What should you identify?

21. Your network contains an Active directory forest named contoso.com. The forest contains two child domains named east.contoso.com and west.contoso.com.

You install an Active Directory Rights Management Services (AD RMS) cluster in each child domain.

You discover that all of the users in the contoso.com forest are directed to the AD RMS cluster in east.contoso.com.

You need to ensure that the users in west.contoso.com are directed to the AD RMS cluster in west.contoso.com and that the users in east.contoso.com are directed to the AD RMS cluster in east.contoso.com.

What should you do?

22. You have a server named Server1 that runs Windows Server 2012 R2. From Server Manager, you install the Active Directory Certificate Services server role on Server1. A domain administrator named Admin1 logs on to Server1.

When Admin1 runs the Certification Authority console, Admin1 receive the following error message.

You need to ensure that when Admin1 opens the Certification Authority console on Server1, the error message does not appear.

What should you do?

23. Your network contains an Active Directory domain named contoso.com.

A previous administrator implemented a Proof of Concept installation of Active Directory Rights Management Services (AD RMS).

After the proof of concept was complete, the Active Directory Rights Management Services server role was removed.

You attempt to deploy AD RMS.

During the configuration of AD RMS, you receive an error message indicating that an existing AD RMS Service Connection Point (SCP) was found.

You need to remove the existing AD RMS SCP.

Which tool should you use?

24. Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server1 that has the Active Directory Federation Services server role installed. All servers run Windows Server 2012.

You complete the Active Directory Federation Services Configuration Wizard on Server1.

You need to ensure that client devices on the internal network can use Workplace Join.

Which two actions should you perform on Server1? (Each correct answer presents part of the solution. Choose two.)

25. DRAG DROP

Your network contains an Active Directory domain named contoso.com.

You need to ensure that third-party devices can use Workplace Join to access domain resources on the Internet.

Which four actions should you perform in sequence? To answer, move the appropriate four actions from the list of actions to the answer area and arrange them in the correct order.

26. HOTSPOT

Your company has a primary data center and a disaster recovery data center. The network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 is located in the primary data center.

Server1 has an enterprise root certification authority (CA) for contoso.com.

You deploy another server named Server2 to the disaster recovery data center.

You plan to configure Server2 as a secondary certificate revocation list (CRL) distribution point.

You need to configure Server2 as a CRL distribution point (CDP).

Which tab should you use to configure the required CDP entry? To answer, select the appropriate tab in

the answer area.

27. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Active Directory Certificate Services server role installed and is configured as an enterprise certification authority (CA).

You need to ensure that all of the users in the domain are issued a certificate that can be used for the following purposes:

• Email security

• Client authentication

• Encrypting File System (EFS)

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

28. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server3 that runs Windows Server 2012 R2 and has the DHCP Server role installed.

DHCP is configured as shown in the exhibit. (Click the Exhibit button.)

Scope1, Scope2, and Scope3 are configured to assign the IP addresses of two DNS servers to DHCP clients. The remaining scopes are NOT configured to assign IP addresses of DNS servers to DHCP clients.

You need to ensure that only Scope1, Scope3, and Scope5 assign the same DNS servers to DHCP clients. The solution must minimize administrative effort.

What should you do?

29. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the DNS Server role installed. Server1 has a zone named contoso.com.

The zone is configured as shown in the exhibit. (Click the Exhibit button.)

You need to ensure that only Scope1, Scope3, and Scope5 assign the same DNS servers to DHCP clients. The solution must minimize administrative effort.

What should you do?

30. Your network contains an Active Directory domain named contoso.com. The domain contains a server

named Server1 that runs Windows Server 2012 R2 and has the DHCP Server role installed.

An administrator installs the IP Address Management (IPAM) Server feature on a server named Server2. The administrator configures IPAM by using Group Policy based provisioning and starts server discovery. You plan to create Group Policies for IPAM provisioning. You need to identify which Group Policy object (GPO) name prefix must be used for IPAM Group Policies.

What should you do on Server2?

31. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the DHCP Server server role installed.

You need to create an IPv6 scope on Server1. The scope must use an address space that is reserved for private networks. The addresses must be routable.

Which IPV6 scope prefix should you use?

32. Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2. DC1 has the DNS Server role installed.

The network contains client computers that run either Linux, Windows 7, or Windows 8.1.

You have a standard primary zone named adatum.com as shown in the exhibit. (Click the Exhibit button.)

You plan to configure Name Protection on all of the DHCP servers. You need to configure the adatum.com zone to support Name Protection.

Which two configurations should you perform from DNS Manager? (Each correct answer presents part of

the solution. Choose two.)

33. HOTSPOT

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2. All servers run Windows Server 2012 R2. You install the DHCP Server role on both servers.

On Server1, you have the DHCP scope configured as shown in the exhibit. (Click the Exhibit button.)

You need to configure the scope to be load-balanced across Server1 and Server2.

What Windows PowerShell cmdlet should you run on Server1? To answer, select the appropriate options in the answer area.

34. HOTSPOT

Your network contains an Active Directory domain named contoso.com. The domain contains two DHCP servers named Server1 and Server2. Both servers have multiple IPv4 scopes. Server1 and Server2 are used to assign IP addresses for the network IDs of 172.20.0.0/16 and 131.107.0.0/16.

You install the IP Address Management (IPAM) Server feature on a server named IPAM1 and configure IPAM1 to manage Server1 and Server2.

Some users from the 172.20.0.0 network report that they occasionally receive an IP address conflict error message.

You need to identify whether any scopes in the 172.20.0.0 network ID conflict with one another.

What Windows PowerShell cmdlet should you run? To answer, select the appropriate options in the answer area.

35. Your network contains two DNS servers named DNS1 and DNS2 that run Windows Server 2012 R2. DNS1 has a primary zone named contoso.com. DNS2 has a secondary copy of the contoso.com zone. You need to log the zone transfer packets sent between DNS1 and DNS2.

What should you configure?

36. Your network contains an Active Directory forest named contoso.com.

Users frequently access the website of an external partner company. The URL of the website is http:// partners.adatum.com. The partner company informs you that it will perform maintenance on its Web server and that the IP

addresses of the Web server will change.

After the change is complete, the users on your internal network report that they fail to access the website.

However, some users who work from home report that they can access the website. You need to ensure that your DNS servers can resolve partners.adatum.com to the correct IP address

immediately.

What should you do?

37. You have a server named Server1. You install the IP Address Management (IPAM) Server feature on Server1. You need to provide a user named User1 with the ability to set the access scope of all the DHCP servers that are managed by IPAM. The solution must use the principle of least privilege.

Which user role should you assign to User1?

38. Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 and a member server named Server1. Server1 has the IP Address Management (IPAM) Server feature installed. On Dc1, you configure Windows Firewall to allow all of the necessary inbound ports for IPAM.

On Server1, you open Server Manager as shown in the exhibit. (Click the Exhibit button.)

You need to ensure that you can use IPAM on Server1 to manage DNS on DC1.

What should you do?

39. You have a server named SCI that runs a Server Core Installation of Windows Server 2012 R2. Shadow copies are enabled on all volumes.

You need to delete a specific shadow copy. The solution must minimize server downtime.

Which tool should you use?

40. You have 20 servers that run Windows Server 2012 R2.

You need to create a Windows PowerShell script that registers each server in Microsoft Azure Backup and sets an encryption passphrase.

Which two PowerShell cmdlets should you run in the script? (Each correct answer presents part of the solution. Choose two.)

41. You have 30 servers that run Windows Server 2012 R2.

All of the servers are backed up daily by using Windows Azure Backup.

You need to perform an immediate backup of all the servers to Windows Azure Backup.

Which Windows PowerShell cmdlets should you run on each server?

42. You have a server named Server1 that runs Windows Server 2012 R2 and is used for testing.

A developer at your company creates and installs an unsigned kernel-mode driver on Server1. The developer reports that Server1 will no longer start.

You need to ensure that the developer can test the new driver. The solution must minimize the amount of data loss.

Which Advanced Boot Option should you select?

43. You have a server named Server1 that runs Windows Server 2012 R2.

When you install a custom Application on Server1 and restart the server, you receive the following error message: "The Boot Configuration Data file is missing some required information.

File: BootBCD

Error code: 0x0000034."

You start Server1 by using Windows RE. You need to ensure that you can start Windows Server 2012 R2 on Server1.

Which tool should you use?

44. You have a server named Server1 that runs Windows Server 2012 R2. Server1 is backed up by using Windows Server Backup.

The backup configuration is shown in the exhibit. (Click the Exhibit button.)

You discover that only the last copy of the backup is maintained. You need to ensure that multiple backup copies are maintained.

What should you do?

45. Your network contains an Active Directory domain named contoso.com. The domain contains four servers named Server1, Server2, Server3, and Server4 that run Windows Server 2012 R2.

All servers have the Hyper-V server role and the Failover Clustering feature installed.

You need to replicate virtual machines from Cluster1 to Cluster2.

Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.)

46. You have a server named Server1 that runs Windows Server 2012 R2. Each day, Server1 is backed up fully to an external disk. On Server1, the disk that contains the operating system fails. You replace the failed disk. You need to perform a bare-metal recovery of Server1 by using the Windows Recovery Environment (Windows RE).

What should you do?

47. You have a virtual machine named VM1 that runs on a host named Host1. You configure VM1 to replicate to another host named Host2. Host2 is located in the same physical location as Host1.

You need to add an additional replica of VM1. The replica will be located in a different physical site.

What should you do?

48. Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2.

Both servers have the Hyper-V server role installed. Server1 and Server2 are located in different offices. The offices connect to each other by using a high-latency WAN link.

Server1 hosts a virtual machine named VM1.

You need to ensure that you can start VM1 on Server2 if Server1 fails. The solution must minimize hardware costs.

What should you do?

49. You have a Hyper-V host named Server1 that runs Windows Server 2012 R2. Server1 contains a virtual machine named VM1 that runs Windows Server 2012 R2. You fail to start VM1 and you suspect that the boot files on VM1 are corrupt. On Server1, you attach the virtual hard disk (VHD) of VM1 and you assign the VHD a drive letter of F. You need to repair the corrupt boot files on VM1.

What should you run?

50. DRAG DROP

Your network contains an Active Directory domain named contoso.com. The domain contains a file server named Server1. All servers run Windows Server 2012 R2.

All domain user accounts have the Division attribute automatically populated as part of the user provisioning process. The Support for Dynamic Access Control and Kerberos armoring policy is enabled for the domain.

You need to control access to the file shares on Server1 based on the values in the Division attribute and the Division resource property.

Which three actions should you perform in sequence?

51. You have a server named LON-DC1 that runs Windows Server 2012 R2.

An iSCSI virtual disk named VirtualiSCSI1.vhd exists on LON-DC1 as shown in the exhibit. (Click the Exhibit button.)

You create a new iSCSI virtual disk named VirtualiSCSI2.vhd by using the existing itgt iSCSI target. VirtualiSCSIl.vhd is removed from LON-DC1. You need to assign VirtualiSCSI2.vhd a logical unit value of 0.

What should you do?

52. HOTSPOT

You have a file server named Server1 that runs Windows Server 2012 R2. You need to ensure that you can use the NFS Share - Advanced option from the New Share Wizard in Server Manager.

Which two role services should you install? To answer, select the appropriate two role services in the answer area.

53. DRAG DROP

Your network contains an Active Directory domain named contoso.com. All file servers in the domain run Windows Server 2012 R2. The computer accounts of the file servers are in an organizational unit (OU) named OU1. A Group Policy object (GPO) named GPO1 is linked to OU1. You plan to modify the NTFS permissions for many folders on the file servers by using central access policies. You need to identify any users who will be denied access to resources that they can currently access once the new permissions are implemented.

In which order should you Perform the five actions?

54. Your network contains 20 iSCSI storage appliances that will provide storage for 50 Hyper-V hosts running Windows Server 2012 R2.

You need to configure the storage for the Hyper-V hosts. The solution must minimize administrative effort.

What should you do first?

55. Your network contains an Active Directory domain named contoso.com. The domain contains a file server named Server1 that runs Windows Server 2012 R2. All client computers run Windows 8. You need to configure a custom Access Denied message that will be displayed to users when they are denied access to folders or files on Server1.

What should you configure?

56. DRAG DROP

You have a server that runs Windows Server 2012 R2. You create a new work folder named Share1.

You need to configure Share1 to meet the following requirements:

• Ensure that all synchronized copies of Share1 are encrypted.

• Ensure that clients synchronize to Share1 every 30 minutes.

• Ensure that Share1 inherits the NTFS permissions of the parent folder.

Which cmdlet should you use to achieve each requirement? To answer, drag the appropriate cmdlets to the correct requirements. Each cmdlet may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

57. HOTSPOT

Your network contains an Active Directory domain named contoso.com. All client computers run Windows 8 Enterprise. You have a remote site that only contains client computers. All of the client computer accounts are located in an organizational unit (OU) named Remote1. A Group Policy object (GPO) named GPO1 is linked to the Remote1 OU. You need to configure BranchCache for the remote site.

Which two settings should you configure in GPO1? To answer, select the two appropriate settings in the answer area.

58. You have a server named Server1 that runs Windows Server 2012 R2.

The storage on Server1 is configured as shown in the following table.

You plan to implement Data Deduplication on Server1.

You need to identify on which drives you can enable Data Deduplication.

Which three drives should you identify? (Each correct answer presents part of the solution. Choose three.)

59. Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2.

You are creating a central access rule named TestFinance that will be used to audit members of the Authenticated Users group for access failure to shared folders in the finance department.

You need to ensure that access requests are unaffected when the rule is published.

What should you do?

60. You create a new virtual disk in a storage pool by using the New Virtual Disk Wizard. You discover that the new virtual disk has a write-back cache of 1 GB.

You need to ensure that the virtual disk has a write-back cache of 5 GB.

What should you do?

61. Your company recently deployed a new Active Directory forest named contoso.com. The first domain controller in the forest runs Windows Server 2012 R2.

You need to identify the time-to-live (TTL) value for domain referrals to the NETLOGON and SYSVOL shared folders.

Which tool should you use?

62. HOTSPOT

Your network contains an Active Directory forest named contoso.com that contains a single domain. The forest contains three sites named Site1, Site2, and Site3.

Domain controllers run either Windows Server 2008 R2 or Windows Server 2012 R2.

Each site contains two domain controllers. Site1 and Site2 contain a global catalog server.

You need to create a new site link between Site1 and Site2. The solution must ensure that the site link supports the replication of all the naming contexts.

From which node should you create the site link? To answer, select the appropriate node in the answer area.

63. Your network contains two Active Directory forests named contoso.com and adatum.com. Contoso.com contains one domain. Adatum.com contains a child domain named child.adatum.com.

Contoso.com has a one-way forest trust to adatum.com. Selective authentication is enabled on the forest trust.

Several user accounts are migrated from child.adatum.com to adatum.com. Users report that after the migration, they fail to access resources in contoso.com. The users successfully accessed the resources in contoso.com before the accounts were migrated.

You need to ensure that the migrated users can access the resources in contoso.com.

What should you do?

64. HOTSPOT

Your network contains an Active Directory domain named contoso.com. The domain contains domain controllers that run either Windows Server 2003, Windows Server 2008 R2, or Windows Server 2012 R2. You plan to implement a new Active Directory forest. The new forest will be used for testing and will be isolated from the production network. In the test network, you deploy a server named Server1 that runs Windows Server 2012 R2. You need to configure Server1 as a new domain controller in a new forest named contoso.test.

The solution must meet the following requirements:

• The functional level of the forest and of the domain must be the same as that of contoso.com.

• Server1 must provide name resolution services for contoso.test.

What should you do? To answer, configure the appropriate options in the answer area.

65. Your network contains an Active Directory forest named adatum.com. The forest contains a single domain. The domain contains four servers.

The servers are configured as shown in the following table.

You need to update the schema to support a domain controller that will run Windows Server 2012 R2.

On which server should you run adprep.exe?

66. HOTSPOT

Your network contains three Active Directory forests.

The forests are configured as shown in the following table.

A two-way forest trust exists between contoso.com and divisionl.contoso.com. A two-way forest trust also exists between contoso.com and division2.contoso.com.

You plan to create a one-way forest trust from divisionl.contoso.com to division2.contoso.com.

You need to ensure that any cross-forest authentication requests are sent to the domain controllers in the appropriate forest after the trust is created.

How should you configure the existing forest trust settings? In the table below, identify which configuration must be performed in each forest. Make only one selection in each column. Each correct selection is worth one point.

67. Your network contains an Active Directory forest named contoso.com. The forest contains three domains. All domain controllers run Windows Server 2012 R2.

The forest has a two-way realm trust to a Kerberos realm named adatum.com.

You discover that users in adatum.com can only access resources in the root domain of contoso.com.

You need to ensure that the adatum.com users can access the resources in all of the domains in the forest.

What should you do in the forest?

68. Your network contains an Active Directory forest named contoso.com. The forest contains two domains named contoso.com and childl.contoso.com. The domains contain three domain controllers.

The domain controllers are configured as shown in the following table.

You need to ensure that the KDC support for claims, compound authentication, and kerberos armoring setting is enforced in the child1.contoso.com domain.

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

69. Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. The domain contains two domain controllers.

The domain controllers are configured as shown in the following table.

You configure a user named User1 as a delegated administrator of DC10.

You need to ensure that User1 can log on to DC10 if the network link between the Main site and the Branch site fails.

What should you do?

70. Your company has offices in Montreal, New York, and Amsterdam.

The network contains an Active Directory forest named contoso.com. An Active Directory site exists for each office. All of the sites connect to each other by using the DEFAULTIPSITELINK site link.

You need to ensure that only between 20:00 and 08:00, the domain controllers in the Montreal office replicate the Active Directory changes to the domain controllers in the Amsterdam office.

The solution must ensure that the domain controllers in the Montreal and the New York offices can replicate the Active Directory changes any time of day.

What should you do?

71. HOTSPOT

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2.

Server1 and Server2 have the Network Load Balancing (NLB) feature installed. The servers are configured as nodes in an NLB cluster named Cluster1. Both servers connect to the same switch.

Cluster1 hosts a secure web Application named WebApp1. WebApp1 saves user state information in a central database.

You need to ensure that the connections to WebApp1 are distributed evenly between the nodes. The solution must minimize port flooding.

What should you configure? To answer, configure the appropriate affinity and the appropriate mode for Cluster1 in the answer area.

72. Your network contains two Web servers named Server1 and Server2. Both servers run Windows Server 2012 R2.

Server1 and Server2 are nodes in a Network Load Balancing (NLB) cluster. The NLB cluster contains an application named App1 that is accessed by using the URL http://app1.contoso.com. You plan to perform maintenance on Server1.

You need to ensure that all new connections to App1 are directed to Server2. The solution must not disconnect the existing connections to Server1.

What should you run?

73. Your network contains two servers named HV1 and HV2. Both servers run Windows Server 2012 R2 and have the Hyper-V server role installed. HV1 hosts 25 virtual machines. The virtual machine configuration files and the virtual hard disks are stored in D:VM. You shut down all of the virtual machines on HV1. You copy D:VM to D:VM on HV2. You need to start all of the virtual machines on HV2. You want to achieve this goal by using the minimum amount of administrative effort.

What should you do?

74. HOTSPOT

Your network contains two Hyper-V hosts that are configured as shown in the following table.

You create a virtual machine on Server1 named VM1. You plan to export VM1 from Server1 and import VM1 to Server2.

You need to ensure that you can start the imported copy of VM1 from snapshots.

What should you configure on VM1? To answer, select the appropriate node in the answer area.

75. DRAG DROP

Your network contains an Active Directory domain named contoso.com. The domain contains four member

servers named Server1, Server2, Servers, and Server4. All servers run Windows Server 2012 R2.

Server1 and Server2 are located in a site named Site1. Server3 and Server4 are located in a site named Site2. The servers are configured as nodes in a failover cluster named Cluster1. Cluster1 is configured to use the Node Majority quorum configuration. You need to ensure that Server1 is the only server in Site1 that can vote to maintain quorum.

What should you run from Windows PowerShell? To answer, drag the appropriate commands to the correct location. Each command may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

76. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2.

Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1. Cluster1 contains a cluster disk resource.

A developer creates an application named App1. App1 is NOT a cluster-aware application. App1 runs as a service. App1 stores data on the cluster disk resource.

You need to ensure that App1 runs in Cluster1. The solution must minimize development effort.

Which cmdlet should you run?

77. HOTSPOT

Your network contains an Active Directory domain named contoso.com. You have a failover cluster named Cluster1 that contains two nodes named Server1 and Server2. Both servers run Windows Server 2012 R2 and have the Hyper-V server role installed. You plan to create two virtual machines that will run an application named App1. App1 will store data on a virtual hard drive named App1data.vhdx. App1data.vhdx will be shared by both virtual machines.

The network contains the following shared folders:

• An SMB file share named Share1 that is hosted on a Scale-Out File Server.

• An SMB file share named Share2 that is hosted on a standalone file server.

• An NFS share named Share3 that is hosted on a standalone file server.

You need to ensure that both virtual machines can use App1data.vhdx simultaneously.

What should you do? To answer, select the appropriate configurations in the answer area.

78. HOTSPOT

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Active Directory Certificate Services server role installed and configured.

For all users, you are deploying smart cards for logon. You are using an enrollment agent to enroll the smart card certificates for the users.

You need to configure the Contoso Smartcard Logon certificate template to support the use of the enrollment agent.

Which setting should you modify? To answer, select the appropriate setting in the answer area.

79. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2.

The system properties of Server1 are shown in the exhibit. (Click the Exhibit button.)

You need to configure Server1 as an enterprise subordinate certification authority (CA).

What should you do first?

80. Your network contains a perimeter network and an internal network. The internal network contains an Active Directory Federation Services (AD FS) 2.1 infrastructure. The infrastructure uses Active Directory as the attribute store.

You plan to deploy a federation server proxy to a server named Server2 in the perimeter network. You need to identify which value must be included in the certificate that is deployed to Server2.

What should you identify?

81. Your network contains an Active directory forest named contoso.com. The forest contains two child domains named east.contoso.com and west.contoso.com.

You install an Active Directory Rights Management Services (AD RMS) cluster in each child domain.

You discover that all of the users in the contoso.com forest are directed to the AD RMS cluster in east.contoso.com.

You need to ensure that the users in west.contoso.com are directed to the AD RMS cluster in west.contoso.com and that the users in east.contoso.com are directed to the AD RMS cluster in east.contoso.com.

What should you do?

82. You have a server named Server1 that runs Windows Server 2012 R2. From Server Manager, you install the Active Directory Certificate Services server role on Server1. A domain administrator named Admin1 logs on to Server1.

When Admin1 runs the Certification Authority console, Admin1 receive the following error message.

You need to ensure that when Admin1 opens the Certification Authority console on Server1, the error message does not appear.

What should you do?

83. Your network contains an Active Directory domain named contoso.com.

A previous administrator implemented a Proof of Concept installation of Active Directory Rights Management Services (AD RMS).

After the proof of concept was complete, the Active Directory Rights Management Services server role was removed.

You attempt to deploy AD RMS.

During the configuration of AD RMS, you receive an error message indicating that an existing AD RMS Service Connection Point (SCP) was found.

You need to remove the existing AD RMS SCP.

Which tool should you use?

84. Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server1 that has the Active Directory Federation Services server role installed. All servers run Windows Server 2012.

You complete the Active Directory Federation Services Configuration Wizard on Server1.

You need to ensure that client devices on the internal network can use Workplace Join.

Which two actions should you perform on Server1? (Each correct answer presents part of the solution. Choose two.)

85. DRAG DROP

Your network contains an Active Directory domain named contoso.com.

You need to ensure that third-party devices can use Workplace Join to access domain resources on the Internet.

Which four actions should you perform in sequence? To answer, move the appropriate four actions from the list of actions to the answer area and arrange them in the correct order.

86. HOTSPOT

Your company has a primary data center and a disaster recovery data center. The network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 is located in the primary data center.

Server1 has an enterprise root certification authority (CA) for contoso.com.

You deploy another server named Server2 to the disaster recovery data center.

You plan to configure Server2 as a secondary certificate revocation list (CRL) distribution point.

You need to configure Server2 as a CRL distribution point (CDP).

Which tab should you use to configure the required CDP entry? To answer, select the appropriate tab in

the answer area.

87. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Active Directory Certificate Services server role installed and is configured as an enterprise certification authority (CA).

You need to ensure that all of the users in the domain are issued a certificate that can be used for the following purposes:

• Email security

• Client authentication

• Encrypting File System (EFS)

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

88. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server3 that runs Windows Server 2012 R2 and has the DHCP Server role installed.

DHCP is configured as shown in the exhibit. (Click the Exhibit button.)

Scope1, Scope2, and Scope3 are configured to assign the IP addresses of two DNS servers to DHCP clients. The remaining scopes are NOT configured to assign IP addresses of DNS servers to DHCP clients.

You need to ensure that only Scope1, Scope3, and Scope5 assign the same DNS servers to DHCP clients. The solution must minimize administrative effort.

What should you do?

89. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the DNS Server role installed. Server1 has a zone named contoso.com.

The zone is configured as shown in the exhibit. (Click the Exhibit button.)

You need to assign a user named User1 permission to add and delete records from the contoso.com zone only.

What should you do first?

90. Your network contains an Active Directory domain named contoso.com. The domain contains a server

named Server1 that runs Windows Server 2012 R2 and has the DHCP Server role installed.

An administrator installs the IP Address Management (IPAM) Server feature on a server named Server2. The administrator configures IPAM by using Group Policy based provisioning and starts server discovery. You plan to create Group Policies for IPAM provisioning. You need to identify which Group Policy object (GPO) name prefix must be used for IPAM Group Policies.

What should you do on Server2?

91. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the DHCP Server server role installed.

You need to create an IPv6 scope on Server1. The scope must use an address space that is reserved for private networks. The addresses must be routable.

Which IPV6 scope prefix should you use?

92. Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2. DC1 has the DNS Server role installed.

The network contains client computers that run either Linux, Windows 7, or Windows 8.1.

You have a standard primary zone named adatum.com as shown in the exhibit. (Click the Exhibit button.)

You plan to configure Name Protection on all of the DHCP servers. You need to configure the adatum.com zone to support Name Protection.

Which two configurations should you perform from DNS Manager? (Each correct answer presents part of

the solution. Choose two.)

93. HOTSPOT

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2. All servers run Windows Server 2012 R2. You install the DHCP Server role on both servers.

On Server1, you have the DHCP scope configured as shown in the exhibit. (Click the Exhibit button.)

You need to configure the scope to be load-balanced across Server1 and Server2.

What Windows PowerShell cmdlet should you run on Server1? To answer, select the appropriate options in the answer area.

94. HOTSPOT

Your network contains an Active Directory domain named contoso.com. The domain contains two DHCP servers named Server1 and Server2. Both servers have multiple IPv4 scopes. Server1 and Server2 are used to assign IP addresses for the network IDs of 172.20.0.0/16 and 131.107.0.0/16.

You install the IP Address Management (IPAM) Server feature on a server named IPAM1 and configure IPAM1 to manage Server1 and Server2.

Some users from the 172.20.0.0 network report that they occasionally receive an IP address conflict error message.

You need to identify whether any scopes in the 172.20.0.0 network ID conflict with one another.

What Windows PowerShell cmdlet should you run? To answer, select the appropriate options in the answer area.

95. Your network contains two DNS servers named DNS1 and DNS2 that run Windows Server 2012 R2. DNS1 has a primary zone named contoso.com. DNS2 has a secondary copy of the contoso.com zone. You need to log the zone transfer packets sent between DNS1 and DNS2.

What should you configure?

96. Your network contains an Active Directory forest named contoso.com.

Users frequently access the website of an external partner company. The URL of the website is http:// partners.adatum.com. The partner company informs you that it will perform maintenance on its Web server and that the IP

addresses of the Web server will change.

After the change is complete, the users on your internal network report that they fail to access the website.

However, some users who work from home report that they can access the website. You need to ensure that your DNS servers can resolve partners.adatum.com to the correct IP address

immediately.

What should you do?

97. You have a server named Server1. You install the IP Address Management (IPAM) Server feature on Server1. You need to provide a user named User1 with the ability to set the access scope of all the DHCP servers that are managed by IPAM. The solution must use the principle of least privilege.

Which user role should you assign to User1?

98. Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 and a member server named Server1. Server1 has the IP Address Management (IPAM) Server feature installed. On Dc1, you configure Windows Firewall to allow all of the necessary inbound ports for IPAM.

On Server1, you open Server Manager as shown in the exhibit. (Click the Exhibit button.)

You need to ensure that you can use IPAM on Server1 to manage DNS on DC1.

What should you do?

99. You have a server named SCI that runs a Server Core Installation of Windows Server 2012 R2. Shadow copies are enabled on all volumes.

You need to delete a specific shadow copy. The solution must minimize server downtime.

Which tool should you use?

100. You have 20 servers that run Windows Server 2012 R2.

You need to create a Windows PowerShell script that registers each server in Microsoft Azure Backup and sets an encryption passphrase.

Which two PowerShell cmdlets should you run in the script? (Each correct answer presents part of the solution. Choose two.)

101. You have 30 servers that run Windows Server 2012 R2.

All of the servers are backed up daily by using Windows Azure Backup.

You need to perform an immediate backup of all the servers to Windows Azure Backup.

Which Windows PowerShell cmdlets should you run on each server?

102. You have a server named Server1 that runs Windows Server 2012 R2 and is used for testing.

A developer at your company creates and installs an unsigned kernel-mode driver on Server1. The developer reports that Server1 will no longer start.

You need to ensure that the developer can test the new driver. The solution must minimize the amount of data loss.

Which Advanced Boot Option should you select?

103. You have a server named Server1 that runs Windows Server 2012 R2.

When you install a custom Application on Server1 and restart the server, you receive the following error message: "The Boot Configuration Data file is missing some required information.

File: BootBCD

Error code: 0x0000034."

You start Server1 by using Windows RE. You need to ensure that you can start Windows Server 2012 R2 on Server1.

Which tool should you use?

104. You have a server named Server1 that runs Windows Server 2012 R2. Server1 is backed up by using Windows Server Backup.

The backup configuration is shown in the exhibit. (Click the Exhibit button.)

You discover that only the last copy of the backup is maintained. You need to ensure that multiple backup copies are maintained.

What should you do?

105. Your network contains an Active Directory domain named contoso.com. The domain contains four servers named Server1, Server2, Server3, and Server4 that run Windows Server 2012 R2.

All servers have the Hyper-V server role and the Failover Clustering feature installed.

You need to replicate virtual machines from Cluster1 to Cluster2.

Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.)

106. You have a server named Server1 that runs Windows Server 2012 R2. Each day, Server1 is backed up fully to an external disk. On Server1, the disk that contains the operating system fails. You replace the failed disk. You need to perform a bare-metal recovery of Server1 by using the Windows Recovery Environment (Windows RE).

What should you do?

107. You have a virtual machine named VM1 that runs on a host named Host1. You configure VM1 to replicate to another host named Host2. Host2 is located in the same physical location as Host1.

You need to add an additional replica of VM1. The replica will be located in a different physical site.

What should you do?

108. Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2.

Both servers have the Hyper-V server role installed. Server1 and Server2 are located in different offices. The offices connect to each other by using a high-latency WAN link.

Server1 hosts a virtual machine named VM1.

You need to ensure that you can start VM1 on Server2 if Server1 fails. The solution must minimize hardware costs.

What should you do?

109. You have a Hyper-V host named Server1 that runs Windows Server 2012 R2. Server1 contains a virtual machine named VM1 that runs Windows Server 2012 R2. You fail to start VM1 and you suspect that the boot files on VM1 are corrupt. On Server1, you attach the virtual hard disk (VHD) of VM1 and you assign the VHD a drive letter of F. You need to repair the corrupt boot files on VM1.

What should you run?

110. DRAG DROP

Your network contains an Active Directory domain named contoso.com. The domain contains a file server named Server1. All servers run Windows Server 2012 R2.

All domain user accounts have the Division attribute automatically populated as part of the user provisioning process. The Support for Dynamic Access Control and Kerberos armoring policy is enabled for the domain.

You need to control access to the file shares on Server1 based on the values in the Division attribute and the Division resource property.

Which three actions should you perform in sequence?

111. You have a server named LON-DC1 that runs Windows Server 2012 R2.

An iSCSI virtual disk named VirtualiSCSI1.vhd exists on LON-DC1 as shown in the exhibit. (Click the Exhibit button.)

You create a new iSCSI virtual disk named VirtualiSCSI2.vhd by using the existing itgt iSCSI target. VirtualiSCSIl.vhd is removed from LON-DC1. You need to assign VirtualiSCSI2.vhd a logical unit value of 0.

What should you do?

112. HOTSPOT

You have a file server named Server1 that runs Windows Server 2012 R2. You need to ensure that you can use the NFS Share - Advanced option from the New Share Wizard in Server Manager.

Which two role services should you install? To answer, select the appropriate two role services in the answer area.

113. DRAG DROP

Your network contains an Active Directory domain named contoso.com. All file servers in the domain run Windows Server 2012 R2. The computer accounts of the file servers are in an organizational unit (OU) named OU1. A Group Policy object (GPO) named GPO1 is linked to OU1. You plan to modify the NTFS permissions for many folders on the file servers by using central access policies. You need to identify any users who will be denied access to resources that they can currently access once the new permissions are implemented.

In which order should you Perform the five actions?

114. Your network contains 20 iSCSI storage appliances that will provide storage for 50 Hyper-V hosts running Windows Server 2012 R2.

You need to configure the storage for the Hyper-V hosts. The solution must minimize administrative effort.

What should you do first?

115. Your network contains an Active Directory domain named contoso.com. The domain contains a file server named Server1 that runs Windows Server 2012 R2. All client computers run Windows 8. You need to configure a custom Access Denied message that will be displayed to users when they are denied access to folders or files on Server1.

What should you configure?

116. DRAG DROP

You have a server that runs Windows Server 2012 R2. You create a new work folder named Share1.

You need to configure Share1 to meet the following requirements:

• Ensure that all synchronized copies of Share1 are encrypted.

• Ensure that clients synchronize to Share1 every 30 minutes.

• Ensure that Share1 inherits the NTFS permissions of the parent folder.

Which cmdlet should you use to achieve each requirement? To answer, drag the appropriate cmdlets to the correct requirements. Each cmdlet may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

117. HOTSPOT

Your network contains an Active Directory domain named contoso.com. All client computers run Windows 8 Enterprise. You have a remote site that only contains client computers. All of the client computer accounts are located in an organizational unit (OU) named Remote1. A Group Policy object (GPO) named GPO1 is linked to the Remote1 OU. You need to configure BranchCache for the remote site.

Which two settings should you configure in GPO1? To answer, select the two appropriate settings in the answer area.

118. You have a server named Server1 that runs Windows Server 2012 R2.

The storage on Server1 is configured as shown in the following table.

You plan to implement Data Deduplication on Server1.

You need to identify on which drives you can enable Data Deduplication.

Which three drives should you identify? (Each correct answer presents part of the solution. Choose three.)

119. Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2.

You are creating a central access rule named TestFinance that will be used to audit members of the Authenticated Users group for access failure to shared folders in the finance department.

You need to ensure that access requests are unaffected when the rule is published.

What should you do?

120. You create a new virtual disk in a storage pool by using the New Virtual Disk Wizard. You discover that the new virtual disk has a write-back cache of 1 GB.

You need to ensure that the virtual disk has a write-back cache of 5 GB.

What should you do?

121. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2.

Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1.

You configure File Services and DHCP as clustered resources for Cluster1. Server1 is the active node for both clustered resources.

You need to ensure that if two consecutive heartbeat messages are missed between Server1 and Server2, Server2 will begin responding to DHCP requests. The solution must ensure that Server1 remains the active node for the File Services clustered resource for up to five missed heartbeat messages.

What should you configure?

122. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2.

Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1. You add two additional nodes to Cluster1. You need to ensure that Cluster1 stops running if three nodes fail.

What should you configure?

123. Information and details provided in a question App1y only to that question.

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. Server1 and Server2 have the Network Load Balancing (NLB) feature installed. The servers are configured as nodes in an NLB cluster named Cluster1.

Cluster1 hosts a secure web Application named WebApp1. WebApp1 saves user state information locally on each node.

You need to ensure that when users connect to WebApp1, their session state is maintained.

What should you configure?

124. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1. You add two additional nodes in Cluster1. You have a folder named Folder1 on Server1 that hosts Application data. Folder1 is a folder target in a Distributed File System (DFS) namespace. You need to provide highly available access to Folder1. The solution must support DFS Replication to Folder1.

What should you configure?

125. Your network contains an Active Directory domain named contoso.com. The domain contains three servers named Server1, Server2, and Server3 that run Windows Server 2012 R2. All three servers have the Hyper-V server role installed and the Failover Clustering feature installed.

Server1 and Server2 are nodes in a failover cluster named Cluster1. Several highly available virtual machines run on Cluster1. Cluster1 has the Hyper-V Replica Broker role installed. The Hyper-V Replica Broker currently runs on Server1.

Server3 currently has no virtual machines.

You need to configure Cluster1 to be a replica server for Server3 and Server3 to be a replica server for Cluster1.

Which two tools should you use? (Each correct answer presents part of the solution. Choose two.)

126. Your network contains an Active Directory domain named contoso.com. The domain contains a file server named File1 that runs a Server Core Installation of Windows Server 2012 R2. File1 has a volume named D that contains home folders. File1 creates a shadow copy of volume D twice a day. You discover that volume D is almost full.

You add a new volume named H to File1.

You need to ensure that the shadow copies of volume D are stored on volume H.

Which command should you run?

127. You have a server named Server1 that runs Windows Server 2012 R2.

Server1 has a single volume that is encrypted by using BitLocker Drive Encryption (BitLocker).

BitLocker is configured to save encryption keys to a Trusted Platform Module (TPM). Server1 is configured to perform a daily system image backup.

The motherboard on Server1 is upgraded.

After the upgrade, Windows Server 2012 R2 on Server1 fails to start.

You need to start the operating system on Server1 as soon as possible.

What should you do?

128. Your network contains two servers that run Windows Server 2012 R2 named Server1 and Server2. Both servers have the File Server role service installed. On Server2, you create a share named Backups. From Windows Server Backup on Server1, you schedule a full backup to run every night. You set the backup destination to Server2 Backups. After several weeks, you discover that Server2Backups only contains the last backup that completed on Server1.

You need to ensure that multiple backups of Server1 are maintained.

What should you do?

129. Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 and Server2 have the Hyper-V server role installed. Server1 and Server2 are configured as Hyper­ V replicas of each other. Server2 hosts a virtual machine named VM5. VM5 is replicated to Server1. You need to verify whether the replica of VM5 on Server1 is functional. The solution must ensure that VM5

remains accessible to clients.

What should you do from Hyper-V Manager?

130. HOTSPOT

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2012 R2. The servers have the Hyper-V server role installed. A certification authority (CA) is available on the network. A virtual machine named vml.contoso.com is replicated from Server1 to Server2. A virtual machine named vm2.contoso.com is replicated from Server2 to Server1. You need to configure Hyper-V to encrypt the replication of the virtual machines.

Which common name should you use for the certificates on each server? To answer, configure the appropriate common name for the certificate on each server in the answer area.

131. DRAG DROP

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2.

You plan to install the Active Directory Federation Services server role on Server1 to allow for Workplace Join.

You run nslookup enterprise registration and you receive the following results:

You need to create a certificate request for Server1 to support the Active Directory Federation Services (AD FS) installation.

How should you configure the certificate request? To answer, drag the appropriate names to the correct locations. Each name may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

132. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 is an enterprise root certification authority (CA) for contoso.com.

Your user account is assigned the certificate manager role and the auditor role on the contoso.com CA. Your account is a member of the local Administrators group on Server1. You enable CA role separation on Server1. You need to ensure that you can manage the certificates on the CA.

What should you do?

133. Your network contains an Active Directory domain named contoso.com. The domain contains servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 has the Active Directory Federation Services server role installed. Server2 is a file server.

Your company introduces a Bring Your Own Device (BYOD) policy.

You need to ensure that users can use a personal device to access domain resources by using Single Sign-On (SSO) while they are connected to the internal network.

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

134. Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. The domain contains a domain controller named DC1 that is configured as an enterprise root certification authority (CA). All users in the domain are issued a smart card and are required to log on to their domain-joined client computer by using their smart card.

A user named User1 resigned and started to work for a competing company.

You need to prevent User1 immediately from logging on to any computer in the domain.

The solution must not prevent other users from logging on to the domain.

Which tool should you use?

135. DRAG DROP

Your network contains two Active Directory forests named contoso.com and adatum.com. All domain controllers run Windows Server 2012 R2. A federated trust exists between adatum.com and contoso.com. The trust provides adatum.com users with access to contoso.com resources. You need to configure Active Directory Federation Services (AD FS) claim rules for the federated trust.

The solution must meet the following requirements:

• In contoso.com, replace an incoming claim type named Group with an outgoing claim type named Role.

• In adatum.com, allow users to receive their tokens for the relying party by using their Active Directory group membership as the claim type.

The AD FS claim rules must use predefined templates.

Which rule types should you configure on each side of the federated trust? To answer, drag the appropriate rule types to the correct location or locations. Each rule type may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

136. You have a datacenter that contains six servers. Each server has the Hyper-V server role installed and runs Windows Server 2012 R2.

The servers are configured as shown in the following table.

Host4 and Host5 are part of a cluster named Cluster1. Cluster1 hosts a virtual machine named VM1.

You need to move VM1 to another Hyper-V host. The solution must minimize the downtime of VM1.

To which server and by which method should you move VM1?

137. DRAG DROP

You have two failover clusters named Cluster1 and Cluster2. All of the nodes in both of the clusters run Windows Server 2012 R2.

Cluster1 hosts two virtual machines named VM1 and VM2.

You plan to configure VM1 and VM2 as nodes in a new failover cluster named Cluster3.

You need to configure the witness disk for Cluster3 to be hosted on Cluster2.

Which three actions should you perform in sequence? To answer, move the appropriate three actions from the list of actions to the answer area and arrange them in the correct order.

138. Your network contains four Active Directory forests. Each forest contains an Active Directory Rights Management Services (AD RMS) root cluster.

All of the users in all of the forests must be able to access protected content from any of the forests.

You need to identify the minimum number of AD RMS trusts required.

How many trusts should you identify?

139. HOTSPOT

Your network contains two Web servers named Server1 and Server2. Both servers run Windows Server 2012 R2.

Server1 and Server2 are nodes in a Network Load Balancing (NLB) cluster. The NLB cluster contains an application named App1 that is accessed by using the URL http://app1.contoso.com.

You deploy a new server named Server3 that runs Windows Server 2012 R2.

The contoso.com DNS zone contains the records shown in the following table.

You run the Windows PowerShell command: Import-Module NetworkLoadBalancingClusters You need to add Server3 to the NLB cluster.

What command should you run? To answer, select the appropriate options in the answer area.

140. DRAG DROP

Your network contains an Active Directory domain named contoso.com. The domain contains four member servers named Server1, Server2, Server3, and Server4. All servers run Windows Server 2012 R2. Server1 and Server3 are located in a site named Site1. Server2 and Server4 are located in a site named Site2. The servers are configured as nodes in a failover cluster named Cluster1.

Dynamic quorum management is disabled.

Cluster1 is configured to use the Node Majority quorum configuration. You need to ensure that users in Site2 can access Cluster1 if the network connection between the two sites becomes unavailable.

What should you run from Windows PowerShell? To answer, drag the appropriate commands to the correct location. Each command may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

141. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2.

Server1 and Server2 have the Network Load Balancing (NLB) feature installed. The servers are configured as nodes in an NLB cluster named Cluster1. Port rules are configured for all clustered Applications. You need to ensure that Server2 handles all client requests to the cluster that are NOT covered by a port rule.

What should you configure?

142. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2.

Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1.

Cluster1 hosts an Application named App1.

You need to ensure that Server2 handles all of the client requests to the cluster for App1. The solution must ensure that if Server2 fails, Server1 becomes the active node for App1.

What should you configure?

143. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2.

Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1.

You add two additional nodes to Cluster1. You have a folder named Folder1 on Server1 that contains Application data.

You plan to provide continuously available access to Folder1.

You need to ensure that all of the nodes in Cluster1 can actively respond to the client requests for Folder1.

What should you configure?

144. DRAG DROP

Your network contains two Active Directory forests named contoso.com and adatum.com. Each forest contains an Active Directory Rights Management Services (AD RMS) root cluster. All servers run Windows Server 2012 R2.

You need to ensure that the rights account certificates issued in adatum.com are accepted by the AD RMS root cluster in contoso.com.

What should you do in each forest? To answer, drag the appropriate actions to the correct forests. Each action may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

145. HOTSPOT

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2.

The network has the physical sites and TCP/IP subnets configured as shown in the following table.

You have a web application named App1 that is hosted on six separate Web servers.

DNS has the host names and IP addresses registered as shown in the following table.

You discover that when users connect to appl.contoso.com, they are connected frequently to a server that is not on their local subnet. You need to ensure that when the users connect to appl.contoso.com, they connect to a server on their local subnet. The connections must be distributed across the servers that host appl.contoso.com on their subnet.

Which two settings should you configure? To answer, select the appropriate two settings in the answer area.

146. You have a server named Server1 that runs Windows Server 2012 R2. Server1 is located in the perimeter network and has the DNS Server role installed.

Server1 has a zone named contoso.com. You App1y a security template to Server1.

After you App1y the template, users report that they can no longer resolve names from contoso.com.

On Server1, you open DNS Manager as shown in the DNS exhibit. (Click the Exhibit button.)

On Server1, you open Windows Firewall with Advanced Security as shown in the Firewall exhibit. (Click the Exhibit button.)

You need to ensure that users can resolve contoso.com names.

What should you do?

147. Your network contains an Active Directory forest named contoso.com. All servers run Windows Server 2012 R2. The domain contains four servers.

The servers are configured as shown in the following table.

You need to deploy IP Address Management (IPAM) to manage DNS and DHCP.

On which server should you install IPAM?

148. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2.

You install the DHCP Server role on Server1 and Server2. You install the IP Address Management (IPAM) Server feature on Server1.

You notice that you cannot discover Server1 or Server2 in IPAM.

You need to ensure that you can use IPAM to discover the DHCP infrastructure.

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

149. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the DHCP Server server role installed. Server1 has an IPv6 scope named Scope1.

You implement an additional DHCP server named Server2 that runs Windows Server 2012 R2.

You need to provide high availability for Scope1. The solution must minimize administrative effort.

What should you do?

150. Your network contains two Active Directory forests named contoso.com and corp.contoso.com.

User1 is a member of the DnsAdmins domain local group in contoso.com.

User1 attempts to create a conditional forwarder to corp.contoso.com but receive an error message shown in the exhibit. (Click the Exhibit button.)

You need to configure bi-directional name resolution between the two forests.

What should you do first?

151. Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Active Directory Certificate Services server role installed and is configured as a standalone certification authority (CA).

You install a second server named Server2. You install the Online Responder role service on Server2.

You need to ensure that Server1 can issue an Online Certificate Status Protocol (OCSP) Response Signing certificate to Server2.

What should you run on Server1?

152. Your network contains two Active Directory forests named contoso.com and adatum.com. Each forest contains one domain. Contoso.com has a two-way forest trust to adatum.com. Selective authentication is enabled on the forest trust.

Contoso contains 10 servers that have the File Server role service installed. Users successfully access shared folders on the file servers by using permissions granted to the Authenticated Users group.

You migrate the file servers to adatum.com.

Contoso users report that after the migration, they are unable to access shared folders on the file servers.

You need to implement a temporary fix to ensure that the Contoso users can access the shared folders on the file servers.

What should you do?

153. Your network contains an Active Directory forest. The forest contains two domains named contoso.com and fabrikam.com. The functional level of the forest is Windows Server 2003.

You have a domain outside the forest named adatum.com.

You need to configure an access solution to meet the following requirements:

* Users in adatum.com must be able to access resources in contoso.com.

* Users in adatum.com must be prevented from accessing resources in fabrikam.com.

* Users in both contoso.com and fabrikam.com must be prevented from accessing resources in adatum.com.

What should you create?

154. Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The forest functional level is Windows Server 2012 R2. You have a domain controller named DC1.

On DC1, you create a new Group Policy object (GPO) named GPO1. You need to verify that GPO1 was replicated to all of the domain controllers.

Which tool should you use?

155. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs a Server Core installation of Windows Server 2012 R2.

You need to deploy a certification authority (CA) to Server1. The CA must support the auto-enrollment of certificates.

Which two cmdlets should you run? (Each correct answer presents part of the solution. Choose two.)

156. Your company recently deployed a new Active Directory forest named contoso.com. The forest contains two Active Directory sites named Site1 and Site2. The first domain controller in the forest runs Windows Server 2012 R2.

You need to force the replication of the SYSVOL folder from Site1 to Site2.

Which tool should you use?

157. Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The forest contains three Active Directory sites named SiteA, SiteB, and SiteC. The sites contain four domain controllers.

The domain controllers are configured as shown in the following table.

An IP site link exits between each site. You discover that the users in SiteC are authenticated by the domain controllers in SiteA and SiteB. You need to ensure that the SiteC users are authenticated by the domain controllers in SiteB, unless all of

the domain controllers in SiteB are unavailable.

What should you do?

158. Your network contains an Active Directory forest. The forest contains one domain named adatum.com. The domain contains four domain controllers.

The domain controllers are configured as shown in the following table.

DC2 has all of the domain-wide operations master roles. DC3 has all of the forest-wide operation master roles.

You need to ensure that you can use Password Settings objects (PSOs) in the domain.

What should you do first?

159. You have a server named FS1 that runs Windows Server 2012 R2.

You install the File and Storage Services server role on FS1.

From Windows Explorer, you view the properties of a shared folder named Share1 and you discover that the Classification tab is missing.

You need to ensure that you can assign classifications to Share1 from Windows Explorer manually.

What should you do?

160. Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2.

Server1 and Server2 are configured as shown in the following table.

You need to ensure that when new targets are added to Server1, the targets are registered on Server2 automatically.

What should you do on Server1?


 

Microsoft Azure Developer Associate AZ-203 Dumps Questions
Real Microsoft Azure Architect Technologies AZ-300 Dumps

Add a Comment

Your email address will not be published. Required fields are marked *