PrepAway - Latest Free Exam Questions & Answers

You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named C

You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 installed, and all workstations have Windows 8 insta

lled.

You are running a training exercise for junior administrators. You are currently discussing the Always Offline Mode.

Which of the following is TRUE with regards to the Always Offline Mode? (Choose all that apply.)

A. It allows for swifter access t

o cached files and redirected folders.

B. To enable Always Offline Mode, you have to satisfy the forest and domain functional-level requirements, as well as schema requirements

C. It allows for lower bandwidth usage due to users are always working offline.

D. To enable Always Offline Mode, you must have workstations running Windows 7 or Windows Server 2008 R2.

Explanation:

There are no domain/forest/schema requirements, but clients must be running Windows 8/Windows Server 2012 or later.

Offline

Files have four modes of operation:

Online

Slow link

Auto offline

Manual offline

Offline Files transition between the three modes online, slow link and auto offline depending on connection speed. The user can always override the automatic mode selection b

y manually switching to manual offline mode.

To determine the connection speed two pings with default packet size are sent to the file server. If the average round-trip time is below 80 ms (Windows 7) or 35 ms (Windows 8), the connection is put into online

mode, otherwise into slow link mode. The latency value of 35/80 ms is configurable through the Group Policy setting Configure slow-link mode.

Reads, Writes and Synchronization

In online mode, changes to files are made on the file server as well as in the

local cache (this induces a performance hit – see this article for details). Reads are satisfied from the local cache (if in sync).

In slow link mode, changes to files are made in the local cache. The local cache is background-synchronized with the file se

rver every 6 hours (Windows 7) or 2 hours (Windows 8), by default. This can be changed through the Group Policy setting Configure Background Sync. . In auto offline mode, all reads and writes go to the local cache. No synchronization occurs. . In manual of

fline mode, all reads and writes go to the local cache.

No synchronization occurs by default, but background synchronization can be enabled through the Group Policy setting Configure Background Sync.


Leave a Reply

PrepAway - Latest Free Exam Questions & Answers

You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named C

You work as a senior

administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed.

You are running a training exercise for junior administrators. You are curre

ntly discussing what happens when you run the

Remove-NetLbfoTeam

Windows PowerShell cmdlet.

Which of the following describes the results of running this cmdlet?

A. It removes one or more network adapters from a specified NIC team.

B. It removes a team in

terface from a NIC team.

C. It removes a specified NIC team from the host.

D. It removes a network adapter member from a switch team.

Explanation:

Remove-NetLbfoTeam removes the specified NIC team from the host.

The Remove-NetLbfoTeam cmdlet rem

oves the specified NIC team from the host. This cmdlet disconnects all associated team members and providers from the team. You can specify the team to remove by using either a team object retrieved by Get-NetLbfoTeam, or by specifying a team name.

You can

use Remove-NetLbfoTeamto removeall NIC teams from the server.

You need administrator privileges to use Remove-NetLbfoTeam.


Leave a Reply

PrepAway - Latest Free Exam Questions & Answers

You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named C

You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed, and all workstations have Windows 8 in

stalled.

You are running a training exercise for junior administrators. You are currently discussing a Windows PowerShell cmdlet that activates previously de-activated firewall rules.

Which of the following is the cmdlet being discussed?

A.

Set-NetFirew

allRule

B.

Enable-NetFirewallRule

C.

Set-NetIPsecRule

D.

Enable-NetIPsecRule

Explanation:

Enable-NetFirewallRule – Enables a previously disabled firewall rule.


Leave a Reply

PrepAway - Latest Free Exam Questions & Answers

You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named C

You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012

installed.

You are running a training exercise for junior administrators. You are currently discussing Storage Spaces.

Which of the following is TRUE with regards to Storage Spaces?

A. Mirroring and parity are optional resilient storage modes of Storage

Spaces.

B. Failover clustering is not supported by Storage Spaces.

C. Storage spaces are virtual disks with associated attributes such as a preferred level of resiliency, and thin or fixed provisioning.

D. Storage spaces are a collection of physical disks

with associated attributes such as a preferred level of resiliency, and thin or fixed provisioning.


Leave a Reply

PrepAway - Latest Free Exam Questions & Answers

You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named C

You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 installed.

You are running a training exercise for junior administrators. You are currently discussing spanned volumes.

Which of the following is TRUE with regards to spanned volumes? (Choose all that apply.)

A. Spanned volumes do not provide fault tolerance.

B.

Spanned volumes are a fault tolerant solution.

C. You can extend a spanned volume onto a maximum of 16 dynamic disks.

D. You cannot create a spanned volume using a system volume or boot volume.

Explanation:

A spanned volume is a dynamic volum

e consisting of disk space on more than one physical disk. If a simple volume is not a system volume or boot volume, you can extend it across additional disks (up to 32 total) to create a spanned volume, or you can create a spanned volume in unallocated sp

ace on a dynamic disk.

You need at least two dynamic disks in addition to the startup disk to create a spanned volume. You can extend a spanned volume onto a maximum of 32 dynamic disks.

Spanned volumes are not fault tolerant.


Leave a Reply

PrepAway - Latest Free Exam Questions & Answers

You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named C

You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed.

You are running a training

exercise for junior administrators. You are currently discussing connection security rules.

Which of the following is TRUE with regards to connection security rules? (Choose all that apply.)

A. Connection security rules allows for traffic to be secured v

ia IPsec.

B. Connection security rules do not allow the traffic through the firewall.

C. Connection security rules are applied to programs or services.

D. Connection security rules are applied between two computers.

Explanation:

Connection s

ecurity involves the authentication of two computers before they begin communications and the securing of information sent between two computers. Windows Firewall with Advanced Security uses Internet Protocol security (IPsec) to achieve connection security

by using key exchange, authentication, data integrity, and, optionally, data encryption.

How firewall rules and connection security rules are related

Firewall rules allow traffic through the firewall, but do not secure that traffic. To secure traffic with

IPsec, you can create Computer Connection Security rules. However, the creation of a connection security rule does not allow the traffic through the firewall. You must create a firewall rule to do this, if the traffic is not allowed by the default behavio

r of the firewall. Connection security rules are not applied to programs or services; they are applied between the computers that make up the two endpoints.


Leave a Reply