Q211. - (Topic 3) 

You have an Active Directory domain named contoso.com. You have a domain controller named Server1 that is configured as a DNS server. Server1 hosts a standard primary zone for contoso.com. The DNS configuration of Server1 is shown in the exhibit. 

You discover that stale resource records are not automatically removed from the contoso.com zone. 

You need to ensure that the stale resource records are automatically removed from the contoso.com zone. 

What should you do? 

A. Set the scavenging period of Server1 to 0 days. 

B. Modify the Server Aging/Scavenging properties. 

C. Configure the aging properties for the contoso.com zone. 

D. Convert the contoso.com zone to an Active Directory-integrated zone. 

Answer:

Explanation: 

Scavenging or aging as it is also known as automates the deletion of old records. When scavenging is disabled, these records must be deleted manually or the size of the DNS database can become large and have an adverse effect on performance. In the exhibit it shows that scavenging is enabled on Server1, thus you should configure the aging properties for the zone. 


Q212. - (Topic 1) 

You have a Hyper-V host named Host1 that connects to a SAN by using a hardware Fibre Channel adapter. 

Host1 contains two virtual machines named VM1 and VM2. 

You need to provide VM1 with direct access to the SAN. VM2 must not require access to the SAN. 

Which two configurations should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. On VM1, configure a Fibre Channel adapter. 

B. On Host1, configure a new virtual switch. 

C. On VM1, add a network adapter. 

D. On Host1, configure a new Virtual Fibre Channel SAN. 

E. On Host1, modify the Hyper-V settings. 

Answer: A,D 

Explanation: 

Step 1: 

D. Building a Virtual SAN The process of setting up virtual Fibre Channel starts with building a virtual SAN. The easiest way to accomplish this is to open the Hyper-V Manager, right click on the listing for your Hyper-V server in the console tree, and then choose the Virtual SAN Manager command from the shortcut menu. Step 2: 

A. Once you have created a virtual SAN, the next step in the process is to link a virtual machine to the virtual SAN. To do so, right click on the virtual machine for which you want to provide Fibre Channel connectivity and select the Settings command from the resulting shortcut menu. Next, select the Add Hardware container, as shown in the figure above, and then select the Fibre Channel Adapter option from the list of available hardware. Etc. Note: 

* Virtual Fibre Channel for Hyper-V (also referred to as Synthetic Fibre Channel) provides VM guest operating systems with direct access to a Fibre Channel SAN by using a standard World Wide Name (WWN) associated with a virtual machine. 


Q213. HOTSPOT - (Topic 1) 

Your network contains an Active Directory domain named adatum.com. All domain controllers run Windows Server 2012 R2.All client computers run Windows 7. The computer accounts for all of the client computers are located in an organizational unit (OU) named OU1. 

An administrator links a Group Policy object (GPO) to OU1. The GPO contains several application control policies. 

You discover that the application control policies are not enforced on the client computers. 

You need to modify the GPO to ensure that the application control policies are enforced on the client computers. 

What should you configure in the GPO? 

To answer, select the appropriate service in the answer area. 

Answer: 


Q214. - (Topic 1) 

Your network contains an Active Directory domain named adatum.com. The domain contains a member server named Host1. Host1 runs Windows Server 2012 R2 and has the Hyper-V server role installed. 

Host1 hosts two virtual machines named VM5 and VM6. Both virtual machines connect to a virtual switch named Virtual1. 

On VM5, you install a network monitoring application named Monitor1. 

You need to capture all of the inbound and outbound traffic to VM6 by using Monitor1. 

Which two commands should you run from Windows PowerShell? (Each correct answer presents part of the solution. Choose two.) 

A. Get-VM “VM6 | Set-VMNetworkAdapter-IovWeight 1 

B. Get-VM “VM5 I Set-VMNetworkAdapter -IovWeight 0 

C. Get-VM “VM5 | Set-VMNetworkAdapter -PortMirroring Source 

D. Get-VM “VM6 | Set-VMNetworkAdapter -AllowTeaming On 

E. Get-VM “VM6 | Set-VMNetworkAdapter -PortMirroring Destination 

F. Get-VM “VM5 | Set-VMNetworkAdapter -AllowTeaming On 

Answer: C,E 

Explanation: 

-PortMirroring specifies the port mirroring mode for the network adapter. This can be set to None, Source, and Destination. . If set to Source, a copy of every network packet it sends or receives is forwarded to a virtual network adapter configured to receive the packets. . If set to Destination, it receives copied packets from the source virtual network adapter. 

In this scenario, VM5 is the destination which must receive a copy of the network packets from VM6, which s the source. 

Reference: http://technet.microsoft.com/en-us/library/hh848457.aspx 


Q215. - (Topic 2) 

Your network contains an Active Directory domain named adatum.com. The domain contains a member server named L0N-DC1. L0N-DC1 runs Windows Server 2012 R2 and has the DHCP Server server role installed. 

The network contains 100 client computers and 50 IP phones. The computers and the phones are from the same vendor. 

You create an IPv4 scope that contains addresses from 172.16.0.1 to 172.16.1.254. 

You need to ensure that the IP phones receive IP addresses in the range of 172.16.1.100 to 172.16.1.200. The solution must minimize administrative effort. 

What should you create? 

A. Server level policies 

B. Reservations 

C. Filters 

D. Scope level policies 

Answer:

Explanation: 

The scope is already in place. 

Scope level policies are typically settings that only apply to that scope. They can also 

overwrite a setting that was set at the server level. 

When a client matches the conditions of a policy, the DHCP server responds to the clients 

based on the settings of a policy. 

Settings associated to a policy can be an IP address range and/or options. 

An administrator could configure the policy to provide an IP address from a specified sub-range within the overall IP address range of the scope. 

You can also provide different option values for clients satisfying this policy. 

Policies can be defined server wide or for a specific scope. 

A server wide policy – on the same lines as server wide option values – is applicable to all 

scopes on the DHCP server. 

A server wide policy however cannot have an IP address range associated with it. 

There a couple of ways to segregate clients based on the type of device. One way to do 

this is by using vendor class/identifier. 

This string sent in option 60 by most DHCP clients identify the vendor and thereby the type 

of the device. 

Another way to segregate clients based on device type is by using the MAC address prefix. 

The first three bytes of a MAC address is called OUI and identify the vendor or 

manufacturer of the device. 

By creating DHCP policies with conditions based on Vendor Class or MAC address prefix, 

you can now segregate the clients in your subnet in such a way, that devices of a specific 

type get an IP address only from a specified IP address range within the scope. You can 

also give different set of options to these clients. 

In conclusion, DHCP policies in Windows Server 2012 R2 enables grouping of 

clients/devices using the different criteria and delivering targeted network configuration to 

them. 

Policy based assignment in Windows Server 2012 R2 DHCP allows you to create simple 

yet powerful rules to administer DHCP on your network. 

References: Training Guide: Installing and Configuring Windows Server 2012 R2, Chapter 6: Network Administration, p.253 


Q216. - (Topic 1) 

Your network contains an Active Directory forest named contoso.com. All domain controllers currently run Windows Server 2008 R2. 

You plan to install a new domain controller named DC4 that runs Windows Server 2012 R2. 

The new domain controller will have the following configurations: 

Schema master 

Global catalog server 

DNS Server server role 

Active Directory Certificate Services server role 

You need to identify which configurations cannot be fulfilled by using the Active Directory Domain Services Configuration Wizard. 

Which two configurations should you identify? (Each correct answer presents part of the solution. Choose two.) 

A. Install the DNS Server role. 

B. Enable the global catalog server. 

C. Install the Active Directory Certificate Services role. 

D. Transfer the schema master. 

Answer: C,D 

Explanation: 

Installation Wizard will automatically install DNS and allows for the option to set it as a global catalog server. ADCS and schema must be done separately. 


Q217. HOTSPOT - (Topic 1) 

Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. 

You need to add a user named User1 to a group named ServerAdmins. 

What command should you run? To answer, select the appropriate options in the answer area. 

Answer: 


Q218. - (Topic 2) 

Your network contains a server named Server1 and 10 Web servers. All servers run 

Windows Server 2012 R2. 

You create a Windows PowerShell Desired State Configuration (DSC) to push the settings 

from Server1 to all of the Web servers. 

On Server1, you modify the file set for the Web servers. 

You need to ensure that all of the Web servers have the latest configurations. 

Which cmdlet should you run on Server1? 

A. Get-DcsConfiguration 

B. Restore-DcsConfiguration 

C. Set-DcsLocalConfigurationManager 

D. Start-DcsConfiguration 

Answer:


Q219. - (Topic 3) 

Your network contains an Active Directory forest named contoso.com. The forest contains a child domain named corp.contoso.com. 

The network has Microsoft Exchange Server 2010 deployed. 

You need to create a mail-enabled distribution group. 

Which type of group should you create? 

A. Global 

B. Local 

C. Domain local 

D. Universal 

Answer:

Explanation: 

Universal groups Groups that are used to grant permissions on a wide scale throughout a 

domain tree or forest. Members of global groups include accounts and groups from any 

domain in the domain tree or forest. 

Microsoft Exchange Server 2007: Implementation and Administration. By Jim McBee, 

Benjamin Craig page 248: Only universal groups should be used as mail-enabled groups. 


Q220. - (Topic 3) 

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. 

The domain contains a server named Server1 that runs Windows Server 2012 R2. 

You need to ensure that when users log on to Server1, their user account is added automatically to a local group named Group1 during the log on process. 

Which Group Policy settings should you modify? 

A. User Rights Assignment 

B. Preferences 

C. Security Options 

D. Restricted Groups 

Answer:

Explanation: 

With Preferences, local and domain accounts can be added to a local group without affecting the existing members of the group 

References: Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 8: File Services and Storage, p. 361 

http://technet.microsoft.com/en-us/library/cc785631(v=ws.10).aspx http://www.grouppolicy.biz/2010/01/how-to-use-group-policy-preferences-to-secure-local-administrator-groups/ 

http://technet.microsoft.com/en-us/library/cc780182(v=ws.10).aspx http://technet.microsoft.com/en-us/library/hh831424.aspx