Which file system should you use?
You plan to deploy a file server to a temporary location.
The temporary location experiences intermittent power failures.The file server will contain a dedicated volume for shared folders.
You need to create a volume for the shared folders. The solution must minimize the likelihood of file
corruption if a power failure occurs.
Which file system should you use?
The settings for a virtual machine named VM2 are configured as shown in the VM2 exhibit.
HOTSPOT
The settings for a virtual machine named VM2 are configured as shown in the VM2 exhibit.(Click the
Exhibit button.)
The settings for Disk1.vhdx are configured as shown in the Disk1.vhdx exhibit. (Click the Exhibit button.)
The settings for Disk2.vhdx are configured as shown in the Disk2.vhdx exhibit.(Click the Exhibit button.)
Select Yes if the statement can be shown to be true based on the available information; otherwise select
No.Each correct selection is worth one point.
You need to ensure that you can connect to Network1 from Windows Server 2012 R2
You have a laptop named Computer 1. Computer1 runs Windows 8 Enterprise.
Computer1 has a wired network adapter and a wireless network adapter. Computer1 connects to a
wireless network named Network1.
For testing purposes, you install Windows Server 2012 R2 on Computer1 as a second operating system.
You install the drivers for the wireless network adapter.
You need to ensure that you can connect to Network1 from Windows Server 2012 R2.
What should you do?
What command should you run?
HOTSPOT
Your network contains an Active Directory domain named contoso.com. The domain contains a DNS
server named Server1. Server1 is configured to resolve single-label names for DNS clients.
You need to view the number of queries for single-label names that are resolved by Server1.
What command should you run?
To answer, select the appropriate options in the answer area.
identify what can be migrated by using the Windows Server Migration Tools.
HOTSPOT
You have a Hyper-V host named Server1 that runs Windows Server 2008 R2.All of the virtual machines
on Server1 use VHDs.
You install the Hyper-V server role on a server named Server2 that runs Windows Server 2012
R2.Server2 has the same hardware configurations as Server1.
You plan to migrate the Hyper-V host from Server1 to Server2 by using the Windows Server Migration
Tools.
In the table below, identify what can be migrated by using the Windows Server Migration Tools. Make
only one selection in each row. Each correct selection is worth one point.
Which cmdlet should you run on each server?
HOTSPOT
Your network contains an Active Directory domain named contoso.com. The domain contains a domain
controller named DC1 and a server named Server1. Both servers run Windows Server 2012 R2.
You configure the classification of a share on Server1 as shown in the Share1 Properties exhibit. (Click
the Exhibit button.)
You configure the resource properties in Active Directory as shown in the Resource Properties exhibit.
(Click the Exhibit button.)
You need to ensure that the Impact classification can be assigned to Share1 immediately.
Which cmdlet should you run on each server?
To answer, select the appropriate cmdlet for each server in the answer area.
Your user account is assigned the certificate manager role and the auditor role on the contoso.com C
Your network contains an Active Directory domain named contoso.com. The domain contains a server
named Server1 that runs Windows Server 2012 R2. Server1 is an enterprise root certification authority
(CA) for contoso.com.
Your user account is assigned the certificate manager role and the auditor role on the contoso.com CA.
Your account is a member of the local Administrators group on Server1.
You enable CA role separation on Server1.You need to ensure that you can manage the certificates on the CA.
What should you do?
You need to ensure that a user named User1 can decrypt private keys archived in the Active Directory Certifica
Your network contains an Active Directory domain named adatum.com. The domain contains a server
named CA1 that runs Windows Server 2012 R2. CA1 has the Active Directory Certificate Services server
role installed and is configured to support key archival and recovery.
You need to ensure that a user named User1 can decrypt private keys archived in the Active Directory
Certificate Services (AD CS) database. The solution must prevent User1 from retrieving the private keys
from the AD CS database.
What should you do?
Which type of trust policy should you create?
Your network contains an Active Directory forest named adatum.com. The forest contains an Active
Directory Rights Management Services (AD RMS) cluster.
A partner company has an Active Directory forest named litwareinc.com. The partner company does not
have AD RMS deployed.
You need to ensure that users in litwareinc.com can consume rights-protected content from
adatum.com.
Which type of trust policy should you create?
You need to verily whether the replica of VMS on Server1 is functional
Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2.
Server1 and Server2 have the Hyper-V server role installed. Server1 and Server2 are configured as
Hyper-V replicas of each other.Server2 hosts a virtual machine named VM5. VM5 is replicated to Server1.
You need to verily whether the replica of VMS on Server1 is functional. The solution must ensure that
VMS remains accessible to clients.
What should you do from Hyper-V Manager?