Pass Exam With Our PDF Dumps. Practice Exam PDF Using Our Exam Questions With Microsoft PDF Questions. Get free pdf dumps of First time i share the real and valid pdf guide with complete dumps. Microsoft PDF Questions Guaranteed Success in Installing and Configuring Windows Server Exam % Valid Exam Dumps Questions.
|Language:||English, Spanish, French|
|ePub File Size:||17.40 MB|
|PDF File Size:||15.21 MB|
|Distribution:||Free* [*Regsitration Required]|
Microsoft Dumps with Valid Exam. Questions PDF . The Microsoft Microsoft Installing and Configuring Windows Server Exam. Some exam questions are in a multiple-choice format, where answers are either right or wrong There is no reason to believe the exam will be different. Installing and configuring Windows. Server The following tables itemize changes to exam These changes will be made in January
You install a printer on Server1. Deploying servers, p. This is the reason why these Microsoft exam have always been such a great help for so Microsoft Installing and Configuring Windows Server exam preparation students. C Section: Share and Storage Management C. Download pdf.
Log In Sign Up. Microsoft PDF Questions. Sarah Braithwaite. There can be so many reasons why people need to go for the Microsoft exam questions to qualify for the certifications of Microsoft Installing and Configuring Windows Server exam. However, the basic need of these Microsoft exam pdf braindumps is in the field of IT management skills for the Microsoft exam dumps students, so that they can secure their future with better jobs and salaries.
Just because of these Microsoft Installing and Configuring Windows Server exam, the IT market is known as one of the most advance technology and this is the reason why so many people are attracted toward this Microsoft exam dumps pdf and vce.
Click here to learn about Microsoft exam preparation testcollections. Microsoft Installing and Configuring Windows Server exam students need to consider even before thinking of applying for the Microsoft exam braindumps pdf questions.
They should take help of the internet to prepare well for the exam of Microsoft exam pdf and vce practice test software, so that all the chances of failing in the Microsoft Installing and Configuring Windows Server exam are dropped out.
They should take help from a different kind of Microsoft exam vce practice test software that are available on the internet for the preparation of these Microsoft , so that appearing in the exams and passing them as well becomes really very easy for the students. Great help for so many people of Microsoft practice exam questions: Microsoft exam question and answers that are available online in the format of pdf and vce for helping the students.
Automatic Start Action I. Integration Services J.
Port mirroring K. I Section: Integration Services settings on virtual machines includes services such as operating system shutdown, time synchronization, data exchange, Heart beat, and Backup volume snapshot services. Thus you should disable the time synchronization using Integration Services.
Configure Hyper-V, Objective 3. Create and Configure virtual machine settings, p. You try to install the Microsoft.
NET Framework 3. You need to ensure that the feature can be installed on Server1. Connect Server1 to the Internet. Run the Add-AppxProvisionedPackagecmdlet. The files needed are no longer available on the local Hard drive.
We need to connect the server to the Internet. Important to note that when starting with Windows Server R2 and Windows 8, the feature files for. NET Framework 2. The files have been removed.
Files for features that have been removed in a Features on Demand configuration, along with feature files for. By default, if feature files are not available on the destination server that is running Windows Server R2 Preview or Windows Server R2, the installation process searches for the missing files by connecting to Windows Update. You can override the default behavior by configuring a Group Policy setting or specifying an alternate source path during installation, whether you are installing by using the Add Roles and Features Wizard GUI or a command line.
The disks on the server are configured as shown in the exhibit. You need to create a storage pool that contains Disk 1 and Disk 2. Create a volume on Disk 2 C. Convert Disk 1 and Disk 2 to dynamic disks D.
Delete volume E Correct Answer: Storage Pools use unallocated space thus you need to delete Volume E. You add an additional disk to Server1 as shown in the exhibit.
You need to ensure that users can access the additional disk from drive C. Convert Disk 0 to a dynamic disk and add a mirror. Create a simple volume on Disk 1 and mount the volume to a folder. Convert Disk 0 and Disk 1 to dynamic disks and extend a volume.
Convert Disk 1 to a dynamic disk and create a spanned volume. You review the installed features on Server1 as shown in the Features exhibit.
You need to install the Server Graphical Shell feature on Server1. Which two possible sources can you use to achieve this goal? Each correct answer presents a complete solution.
Index 1 B. Index 2 C. Index 3 Index 4 Correct Answer: The Server Core Installation option reduces the space required on disk, the potential attack surface, and especially the servicing requirements, so we recommend that you choose the Server Core installation unless you have a particular need for the additional user interface elements and graphical management tools that are included in the Server with a GUI option.
For this reason, the Server Core installation is now the default. Because you can freely switch between these options at any time later, one approach might be to initially install the Server with a GUI option, use the graphical tools to configure the server, and then later switch to the Server Core Installation option. You download several signed Windows PowerShell scripts from the Internet. You need to run the PowerShell scripts on all of the servers and all of the client computers.
What should you modify first? The environment variables on all of the servers B. The execution policy on all of the servers C. The execution policy on all of the client computers D.
The environment variables on all client computers Correct Answer: Server1 has following storage spaces: You need to identify which storage space contains the new hard disk.
Which storage space contains the new disk? Primordial B. Data C. Users D. Backups The domain contains a member server named L0N-DC1. The network contains client computers and 50 IP phones. The computers and the phones are from the same vendor. You create an IPv4 scope that contains addresses from You need to ensure that the IP phones receive IP addresses in the range of The solution must minimize administrative effort.
What should you create? Server level policies B. Reservations C. Filters D. Scope level policies Correct Answer: The scope is already in place. Scope level policies are typically settings that only apply to that scope. They can also overwrite a setting that was set at the server level.
Network Administration, p.
The main office contains a server named Server1 that runs Windows Server R2. The IP configuration of each office is configured as shown in the following tablE. You need to add a single static route on Server1 to ensure that Server1 can communicate with the hosts on all of the subnets. Which command should you run? These parameters will allow communication with all the hosts. Exam Ref: Deploying and configuring core network services, Objective 4. Configure IPv4 and IPv6 addressing, p.
The network contains client computers that run Windows 8. All of the client computers connect to the Internet by using a web proxy. You deploy a server named Server1 that runs Windows Server R2. Server1 has the DNS Server server role installed. You configure all of the client computers to use Server1 as their primary DNS server. You need to prevent Server1 from attempting to resolve Internet host names for the client computers.
Create a primary zone named "root". Create a primary zone named "GlobalNames". Create a forwarder that points to Create a primary zone named ". Your network contains two Active Directory forests named contoso. Each forest contains one domain. A two-way forest trust exists between the forests.
The forests use the address spaces shown in the following table. From a computer in the contoso. From a computer in the adatum. You need to ensure that you can perform reverse lookups for the servers in the adatum. A trust point B. A GlobalNames zone C. A delegation D. A conditional forwarder Correct Answer: Conditional forwarders are DNS servers that only forward queries for specific domain names.
Instead of forwarding all queries it cannot resolve locally to a forwarder, a conditional forwarder is configured to forward a query to specific forwarders based on the domain name contained in the query.
Forwarding in terms of domain names improves conventional forwarding by adding a name-based condition to the forwarding process. Server1 has the Hyper-V server role installed. The disks on Server1 are configured as shown in the exhibit. You create a virtual machine on Server1. You need to ensure that you can configure a pass-through disk for the virtual machine. Convert Disk 1 to a GPT disk. Delete partition E. Convert Disk 1 to a dynamic disk. Take Disk 1 offline. Objective 3. Create and Configure virtual machine storage, Chapter 3: Installing and Configuring Server Objective 1.
Installing and Configuring servers, Chapter 1: Which tool should you use?
Share and Storage Management B. New-StoragePool C. New-VirtualDisk D. Diskpart Correct Answer: You open DNS Manager as shown in the exhibit. From the View menu, click Filter From the Action menu, click Properties. From the View menu, click Advanced. That will yield the DNS server cache. The temporary location experiences intermittent power failures. The file server will contain a dedicated volume for shared folders. You need to create a volume for the shared folders.
The solution must minimize the likelihood of file corruption if a power failure occurs. Which file system should you use? NFS B. FAT32 C. ReFS D. The ReFS file system allows for resiliency against corruptions with the option to salvage amongst many other key features like Metadata integrity with checksums, Integrity streams with optional user data integrity, and shared storage pools across machines for additional failure tolerance and load balancing, etc.
You want to achieve this goal by using the minimum amount of administrative effort. Which command should you run first? This command will mount the image before making any changes. You need to add a graphical user interface GUI to Server1. The Install-WindowsFeaturecmdlet B. The Install-Module cmdlet C. The Install-RoleServicecmdlet D.
The setup. Here is the syntax for DISM: Server2 establishes an IPSec connection to Server1. You need to view which authentication method was used to establish the initial IPSec connection. From Windows Firewall with Advanced Security, view the quick mode security association. From Windows Firewall with Advanced Security, view the main mode security association.
Main mode negotiation establishes a secure channel between two computers by determining a set of cryptographic protection suites, exchanging keying material to establish a shared secret key, and authenticating computer and user identities. A security association SA is the information maintained about that secure channel on the local computer so that it can use the information for future network traffic to the remote computer.
You can monitor main mode SAs for information like which peers are currently connected to this computer and which protection suite was used to form the SA. A member server named Server1 runs Windows Server R2. On Server1, you test a new set of AppLocker policy settings by using a local computer policy. Import the. From Server1, run the Set-ApplockerPolicycmdlet. From Server1, run the New-ApplockerPolicycmdlet. The merging of policies will remove rules with duplicate rule IDs, and the enforcement setting specified by the AppLocker policy in the target GPO will be preserved.
If the Merge parameter is not specified, then the new policy will overwrite the existing policy. Installing and configuring Windows Server R2, Chapter Implementing Group Policy, Lesson1: Planning, Implementing and managing Group Policy, p.
Server1 is connected to two identical print devices. The solution must ensure that if one print device fails, the print jobs will print automatically on the other print device.
Add two printers and configure the priority of each printer. Install the Failover Clustering feature, and then add one printer.
By adding one printer as the default printer you ensure that only that printer is used at a time, and creating a printing pool to automatically distribute print jobs to the next available printer will cover all the requirements stated in the question. A printing pool is one logical printer connected to multiple printers through multiple ports of the print server. The printer that is idle receives the next document sent to the logical printer.
This is useful in a network with a high volume of printing because it decreases the time users wait for their documents. A printing pool also simplifies administration because multiple printers can be managed from the same logical printer on a server.
Chapter 8: File Services and Storage, p. Server1 and Server2 are part of a workgroup. On Server1, you add Server2 to Server Manager. When you attempt to connect to Server2 from Server Manager, you receive the following error message: On Server 2, run the Configure-SmRemotingcmdlet.
On Server 1, run the Set-Item cmdlet. To enable Server Manager remote management by using Windows PowerShell On the computer that you want to manage remotely, do one of the following to open a Windows PowerShell session with elevated user rights. Type the following, and then press Enter to enable all required firewall rule exceptions.
Both servers are member servers. On Server2, you install all of the software required to ensure that Server2 can be managed remotely from Server Manager. Which two tasks should you perform on Server2? Run the systempropertiesremotE. Run the Fnable-PsRemotingcmdlet. Run the Enable-PsSessionConfigurationcmdlet. Run the Confiqure-SMRemoting. Run the Set-ExecutionPolicycmdlet. DE Section: The output of this command indicates whether Server Manager Remoting is enabled or disabled on the server.
To configure Server Manager remote management by using Windows PowerShell On the computer that you want to manage remotely, open a Windows PowerShell session with elevated user rights.
In the Windows PowerShell session, type the following, and then press Enter. The domain contains a domain controller named Server1 that runs Windows Server R2. On Server1, you create a work folder named Work1. A user named User1 connects to Work1 from a computer named Computer1.
You need to identify the last time the documents in Work1 were synchronized successfully from Computer1. From Server Manager, review the properties of Computer1. From Server Manager, review the properties of User1. On Server1, you create a printer named Printed. You share Printed and publish Printed in Active Directory.
You need to provide a group named Group1 with the ability to manage Printer1. From Print Management, configure the Sharing settings of Printer1. From Print Management, configure the Security settings of Printer1.
From Print Management, configure the Advanced settings of Printer1. If you navigate to the Security tab of the Print Server Properties you will find the Permissions that you can set to Allow which will provide Group1 with the ability to manage Printer1.
Set permissions for print servers 1.
Open Print Management. In the left pane, clickPrint Servers, right-click the applicable print server and then clickProperties. On theSecuritytab, underGroup or users names, click a user or group for which you want to set permissions.
To editSpecial permissions, clickAdvanceD. On thePermissionstab, click a user group, and then clickEdit. In thePermissionEntrydialog box, select theAlloworDenycheck boxes for the permissions that you want to edit. On Print1, you share a printer named Printer1. You need to ensure that only the members of the Server Operators group, the Administrators group, and the Print Operators group can send print jobs to Printer1.
Remove the permissions for the Creator Owner group. Assign the Print permission to the Server Operators group. Remove the permissions for the Everyone group. Assign the Print permission to the Administrators group.
By default Everyone can print. This permissions need to be removed. A network technician installs a new disk on Server1 and creates a new volume.
The properties of the new volume are shown in the exhibit. You need to ensure that you can restore files on volume D by using the Previous Versions tab What should you do first? Install the File Server Resource Manager role service. Run the convert. Format volume D. Shadow Copies for Shared Folders is activated at the volume level. A Shadow copy is essentially a copy of the disk at a specific moment in time, and this has to be set up do that you can have a Previous Version that can be used to restore files.
However, prior to any action taken to set up shadow copies, you need to format the disk first since it is mentioned that it is a NEW volume that was created.
The domain contains a server named Server1 that runs Windows Server R2. You join Server2 to the contoso. You need to ensure that you can manage Server2 by using the Computer Management console on Server1. What should you do on Server2? Install Windows Management Framework. Run sconfig.
You must be a member of the Administrators group to use the tool. Deploying servers, p. You connect three new hard disks to Server1. You need to create a storage space that contains the three disks.
Provide fault tolerance if a single disk fails. Maximize the amount of files that can be stored in the storage space. A mirrored space B. A spanned volume C. A parity space D. A simple space Correct Answer: Fault tolerant and better space ratio.
The data on volumes created on this type of virtual disk, together with parity information that can be used to facilitate automatic reconstruction of data in the event of a physical disk failure, is striped across all physical disks in the pool.
Your network contains an Active Directory domain named contoso. Client computers run either Windows 7 or Windows 8. All of the computer accounts of the client computers reside in an organizational unit OU named Clients. All of the client computers use a DNS server named Server1. Deploying domain controllers, Lesson 4: The corporate network administrator allocates the You need to identify the maximum number of IPv6 subnets you can create. How many IPv6 subnets should you identify?
IPv6 has bit byte source and destination IP addresses. Although bits can express over 3. You create a checkpoint of VM1, and then you install an application on VM1. You verify that the application runs properly. You need to ensure that the current state of VM1 is contained in a single virtual hard disk file.
The solution must minimize the amount of downtime on VM1. From a command prompt, run dism. From Hyper-V Manager, delete the checkpoint.
From Hyper-V Manager, inspect the virtual hard disk. Server1 has a virtual switch named RDS Virtual. On each virtual machine, modify the Advanced Features settings of the network adapter.
Modify the settings of the RDS Virtual virtual switch. On each virtual machine, modify the BIOS settings. Delete, and then recreate the RDS Virtual virtual switch. On each virtual machine, modify the Hardware Acceleration settings of the network adapter.
The first step when allowing a virtual machine to have connectivity to a physical network is to create an external virtual switch using Virtual Switch Manager in Hyper-V Manager. The additional step that is necessary when using SR-IOV is to ensure the checkbox is checked when the virtual switch is being created. The choice must be made a switch creation time. Thus you should first delete the existing virtual switch and then recreate it.
Once a virtual switch has been created, the next step is to configure a virtual machine. We have rearranged the settings for a virtual machine to introduce sub-nodes under a network adapter, one of which is the hardware acceleration node. Server1 is located in an isolated network that cannot access the Internet. On Server1, you install a new virtual machine named VM1.
After 30 days, you discover that VM1 shuts down every 60 minutes. You need to resolve the issue that causes VM1 to shut down every 60 minutes. OnVM1, run slmgr. OnServer1, run slmgr. Create a new internal virtual network and attach VM1 to the new virtual network. A trust relationship does not exist between the forests.
In the contoso. You transfer the backup of GPO1 to a domain controller in the contoso. You need to create a GPO in contoso. You must achieve this goal by using the minimum amount of administrative effort. An organizational unit OU named OU1 contains the computer accounts for laptops and desktop computers.
You need to ensure that the configuration settings in GP1 are applied only to a user named User1. Modify the security settings of OU1.
Modify the security settings of GP1. Chapter Implementing Group Policy, p. All domain controllers run Windows Server R2. You create and enforce the default AppLocker executable rules.
Users report that they can no longer execute a legacy application installed in the root of drive C. You need to ensure that the users can execute the legacy application.
Create a new rule. Delete an existing rule. Modify the action of the existing rules. Add an exception to the existing rules. You need to ensure that User1 can manage the group membership of Group1.
The solution must minimize the number of permissions assigned to User1. Rename AdOh G Section: You can modify commonly used property values by using the cmdlet parameters. ManagedBySpecifies the user or group that manages the object by providing one of the following property values.
The identifier in parentheses is the LDAP display name for the property. Distinguished Name Example: The password policy for the domain is set to require a minimum password length of 10 characters.
A user named User1 and a user named User2 work for the sales department. User1 is forced to create a domain password that has a minimum of 12 characters. User2 is forced to create a domain password that has a minimum of eight characters. You need to identify what forces the two users to have different password lengths.
Group Policy Management B. Credential Manager C. Active Directory Administrative Center D. In Windows Server , you can use fine-grained password policies to specify multiple password policies and apply different password restrictions and account lockout policies to different sets of users within a single domain. For example, to increase the security of privileged accounts, you can apply stricter settings to the privileged accounts and then apply less strict settings to the accounts of other users.
Or in some cases, you may want to apply a special password policy for accounts whose passwords are synchronized with other data sources. This is found in the Active Directory Administrative Center.
Create new user accounts or manage existing user accounts Create new groups or manage existing groups Create new computer accounts or manage existing computer accounts Create new organizational units OUs and containers or manage existing OUs Connect to one or several domains or domain controllers in the same instance of Active Directory Administrative Center, and view or manage the directory information for those domains or domain controllers Filter Active Directory data by using query-building search References: An organizational unit OU named OU1 contains user accounts and computer accounts.
You need to prevent the User Configuration settings in GP1 from being applied to users. The solution must ensure that the Computer Configuration settings in GP1 are applied to all client computers. The Block Inheritance feature C.
The Group Policy loopback processing mode D. The Enforced setting Correct Answer: A loopback with merge option needs to be used. You need to ensure that you can use the script to promote Server1 to a domain controller. Which file extension should you use to save the script? From http: This enables you to use the Server Manager graphical interface as a Windows PowerShell deployment studio. Use the Active Directory Domain Services Configuration Wizard to configure options, export the configuration, and then cancel the wizard.
This process creates a valid and syntactically correct sample for further modification or direct use. Your network contains an Active Directory forest named contoso. The forest contains five domains. The contoso. You need to ensure that Admin1 and Admin2 can configure hardware and services on all of the member servers in the forest.
The solution must minimize the number of privileges granted to Admin1 and Admin2. Which built-in groups should you use? Administrators local groups B. Administrators domain local groups C. Domain Admins global groups D. Server Operators global groups Correct Answer: An administrator provides you with a file that contains the information to create user accounts for temporary employees. The file is shown in the exhibit. You need to automate the creation of the user accounts.
Ldifde B. Dsadd D. Net user Correct Answer: This would be the least amount of administrative effort in this case. Chapter 5: Install and administer Active Directory, Objective 5. Metrics collected for each virtual machine using resource metering: Average CPU usage, measured in megahertz over a period of time.
Average physical memory usage, measured in megabytes. Minimum memory usage lowest amount of physical memory. Maximum memory usage highest amount of physical memory. Maximum amount of disk space allocated to a virtual machine.
Total incoming network traffic, measured in megabytes, for a virtual network adapter. Total outgoing network traffic, measured in megabytes, for a virtual network adapter References: You need to enable access-based enumeration for a file share on Server1.
Share and Storage Management C. Server Manager D. File Explorer Correct Answer: The domain contains a standalone server named Server2 that is located in a perimeter network.
Both servers run Windows Server R2. You need to manage Server2 remotely from Server1. From Server1, run the Enable-PsRemotingcmdlet. From Server2, run the winrm command. From Server1, run the winrm command. Corel has the Hyper-V server role installed. Corel has two network adapters from different third- party hardware vendors.
You need to configure network traffic failover to prevent connectivity loss if a network adapter fails. What should you use? New-NetSwitchTeam B. Install-Feature C. On Server1, you modify the file set for the Web servers. You need to ensure that all of the Web servers have the latest configurations. Which cmdlet should you run on Server1? Get-DcsConfiguration B. Restore-DcsConfiguration C. Start-DcsConfiguration Correct Answer: You add a 4-TB disk named Disk 5 to Server1.
You need to ensure that you can create a 3-TB volume on Disk 5. File Services and Storage, Lesson 2: Provisioning and managing shared storage, p. The domain contains a virtual machine named VM1. A developer wants to attach a debugger to VM1. You need to ensure that the developer can connect to VM1 by using a named pipe.
Which virtual machine setting should you configure? BIOS B. Network Adapter C. COM 1 D. Processor Correct Answer: Named pipes can be used to connect to a virtual machine by configuring COM 1.
From Sconfig. Run the sc. This cmdlet statically adds DNS server addresses to the interface. The servers are configured as shown in the following table. Server3 is configured to obtain an IP address automatically. You need to prevent Server3 from receiving an IP address from Server1. What should you create on Server1? An exclusion B.