HOTSPOT -
You have a Hyper-V host named Server1 that runs Windows Server 2012 R2. Server1 hosts 40 virtual machines that run Windows Server 2008 R2 Service Pack
1 (SP1). The virtual machines connect to a private virtual switch.
You have a file that you want to copy to all of the virtual machines.
You need to identify to which servers you can copy files by using the Copy-VmFile cmdlet.
What command should you run? To answer, select the appropriate options in the answer area.
Hot Area:
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. On Server1, you create a virtual machine named VM1. VM1 has a legacy network adapter.
You need to assign a specific amount of available network bandwidth to VM1.
What should you do first?
Descargar archivo https://bltlly.com/2yPEEZ
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2.
You create a new inbound rule by using Windows Firewall with Advanced Security.
You need to configure the rule to allow Server1 to accept unsolicited inbound packets that are received through a network address translation (NAT) device on the network.
Which setting in the rule should you configure?
Explanation:
Edge traversal "" This indicates whether edge traversal is enabled (Yes) or disabled (No). When edge traversal is enabled, the application, service, or port to which the rule applies is globally addressable and accessible from outside a network address translation (NAT) or edge device.
Select one of the following options from the list: Block edge traversal (default) "" Prevent applications from receiving unsolicited traffic from the Internet through a
NAT edge device. Allow edge traversal "" Allow applications to receive unsolicited traffic directly from the Internet through a NAT edge device. Defer to user "" Let the user decide whether to allow unsolicited traffic from the Internet through a NAT edge device when an application requests it. Defer to application "" Let each application determine whether to allow unsolicited traffic from the Internet through a NAT edge device.
Reference:
-us/library/cc731927.aspx
HOTSPOT -
Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2.
All servers are configured to enforce AppLocker policies.
You install a server named Server1.
On Server1, you install an application named App1.exe in a folder located on C:\App1.
You have two domain groups named Group1 and Group2.A user named User1 is a member of Group1 and Group2.
You create a Group Policy object (GPO) named GPO1. You link GPO1 to contoso.com.
You create the executable rules as shown in the exhibit by using the Create Executable Rules wizard. (Click the Exhibit button.)
To answer, complete each statement according to the information presented in the exhibit. Each correct selection is worth one point.
Hot Area:
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. A server named Server1 is configured to encrypt all traffic by using IPSec.
You need to ensure that Server1 can respond to ping requests from computers that do not support IPSec.
What should you do?
DRAG DROP -
You have a server named Server1 that runs Windows Server 2012 R2.
You need to perform the following storage configuration tasks on Server1:
-> Bring a disk named Disk1 online.
-> Defragment a volume named Volume1.
-> Remove a disk named Disk2 from a storage pool named Pool1.
Which cmdlet should you use to perform each task?
To answer, drag the appropriate cmdlets to the correct tasks. Each cmdlet may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
Select and Place:
You have a server named Server1 that runs Windows Server 2012 R2. The network has two VLANs named VLAN 10 and VLAN 11.
Server1 has three physical network adapters named NIC1, NIC2, and NIC3.
On Server1, you create a NIC team named Team1 by using NIC1 and NIC2. You configure Team1 to accept network traffic on VLAN 10.
You need to ensure that Server1 can accept network traffic on VLAN 10 and VLAN 11. The solution must ensure that the network traffic can be received on both
VLANs if a network adapter fails.
What should you do?
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has six network adapters. Two of the network adapters are connected to a network named LAN1, two of the network adapters are connected to a network named LAN2, and two of the network adapters are connected to a network named
LAN3.
You create a network adapter team named Team1 from the two adapters connected to LAN1. You create a network adapter team named Team2 from the two adapters connected to LAN2.
A company policy states that all server IP addresses must be assigned by using a reserved address in DHCP.
You need to identify how many DHCP reservations you must create for Server1.
How many reservations should you identify?
You have a server named Server1. Server1 runs Windows Server 2012 R2.
Server1 has a thin provisioned disk named Disk1.
You need to expand Disk1.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
Explanation:
Step 1 (B): if required add physical disk capacity.
Step 2 (A): Dynamically extend the virtual disk (not volume).
The File and Storage Services role and the Storage Services role service are installed by default, but without any additional role services. This basic functionality enables you to use Server Manager or Windows PowerShell to manage the storage functionality of your servers.
Windows Server 2012 Storage Space subsystem now virtualizes storage by abstracting multiple physical disks into a logical construct with specified capacity.
The process is to group selected physical disks into a container, the so-called storage pool, such that the total capacity collectively presented by those associated physical disks can appear and become manageable as a single and seemingly continuous space. Subsequently storage administrator creates a virtual disk based on a storage pool, configure a storage layout which is essentially a RAID level, and expose the storage of the virtual disk as a drive letter or a mapped folder in
Windows Explorer.
The system administrator uses File and Storage Services in Server Manager or the Disk Management tool tore scan the disk, bring the disk online, and extend the disk size.
Your network contains an Active Directory domain named contoso.com.
You have a DHCP server named Server1 that runs Windows Server 2008.
You install Windows Server 2012 R2 on a server named Server2. You install the DHCP Server server role on Server2.
You need to migrate the DHCP services from Server1 to Server2. The solution must meet the following requirements:
-> Ensure that existing leases are migrated.
-> Prevent lease conflicts.
Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.)
Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Print and Document Services server role installed.
You connect a new print device to the network. The marketing department and the sales department will use the print device.
You need to provide users from both departments with the ability to print to the network print device. The solution must ensure that if there are multiple documents queued to print, the documents from the sales users print before the documents from the marketing users.
What should you do on Server1?
Explanation -
To set different print priority to different groups
Open Printers and Faxes.
Right-click the printer you want to set, click Properties, and then click the Advanced tab. In Priority, click the up or down arrows, and then click OK. Or, type a priority level, where 1 is the lowest level and 99 is the highest, and then click OK. Click Add Printer to add a second logical printer for the same physical printer.
For instructions, see Related Topics.
Click the Advanced tab.
In Priority, set a priority higher than that of the first logical printer. Instruct the regular group of users to use the first logical printer name and the group with higher priority to use the second logical printer name. Set the appropriate permissions for the different groups.
Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2 that run Windows
Server 2012 R2.
You log on to Server1.
You need to retrieve a list of the active TCP connections on Server2.
Which command should you run from Server1?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2016. The computer account for Server1 is in organizational unit (OU) named OU1.
You create a Group Policy object (GPO) named GPO1 and link GPO1 to OU1.
You need to add a domain user named User1 to the local Administrators group on Server1.
Solution: From the Computer Configuration node of GPO1, you configure the Account Policies settings.
Does this meet the goal?