What should you configure?
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server
role installed.
You need to configure storage for a virtual machine to meet the following requirements:
Support up to 3 TB of data on a single hard disk.
Allocate disk space as needed.
Use a portable storage format.
What should you configure?
You need to ensure that the Folder Redirection settings in GPO1 apply to the marketing users
Your network contains an Active Directory domain named contoso.com.
All user accounts in the marketing department reside in an organizational unit (OU) named OU1.
You have a Group Policy object (GPO) named GPO1. GPO1 contains Folder Redirection settings.
GPO1 has default permissions.
You discover that the Folder Redirection settings are not applied to the users in the marketing
department.
You open Group Policy Management as shown in the exhibit. (Click the Exhibit button.)
You need to ensure that the Folder Redirection settings in GPO1 apply to the marketing users.
What should you do?
Which Group Policy settings should you modify?
Your network contains an Active Directory domain named contoso.com. All domain controllers run
Windows Server 2012 R2.
You need to ensure that the local administrator account on all computers is renamed to L.Admin.
Which Group Policy settings should you modify?
Which two firewall rules should you create?
You install Windows Server 2012 R2 on a standalone server named Server1. You configure Server1 as
a VPN server.
You need to ensure that client computers can establish PPTP connections to Server1.
Which two firewall rules should you create? (Each correct answer presents part of the solution.
Choose two.)
You need to ensure that Server1 can communicate with the client computers on LAN2
Your network contains two subnets. The subnets are configured as shown in the following table.
You have a server named Server1 that runs Windows Server 2012 R2. Server1 is connected to LAN1.
You run the route print command as shown in the exhibit. (Click the Exhibit button.)
You need to ensure that Server1 can communicate with the client computers on LAN2.
What should you do?
Which user account should you use?
Your network contains an Active Directory forest named adatum.com. The forest contains a child
domain named asia.adatum.com. The asia.adatum.com child domain contains a server named
DHCP1 that runs Windows Server 2012 R2.
You install the DHCP Server server role on DHCP1.
You have access to the administrative accounts shown in the following table.
You need to authorize DHCP1.
Which user account should you use?
You need to upgrade Server1 to Windows Server 2012 R2 with the graphical user interface (GUI)
You have a server named Server1 that has a Server Core installation of Windows Server 2008 R2.
Server1 has the DHCP Server server role and the File Server server role installed.
You need to upgrade Server1 to Windows Server 2012 R2 with the graphical user interface (GUI).
The solution must meet the following requirements:
Preserve the server roles and their configurations.
Minimize administrative effort.
What should you do?
You need to ensure that when the users connect to Documents, they only see the files to which they have access
Your network contains an Active Directory domain named contoso.com. All servers run Windows
Server 2012 R2. The domain contains a member server named Server1. Server1 has the File Server
server role installed.
On Server1, you create a share named Documents. The Documents share will contain the files and
folders of all users.
You need to ensure that when the users connect to Documents, they only see the files to which they
have access.
What should you do?
What should you identify?
You have a server named Server1 that runs a Server Core installation of Windows Server 2012 R2
Standard. You establish a Remote Desktop session to Server1.
You need to identify which task can be performed on Server1 from within the Remote Desktop
session.
What should you identify?
Which authentication method should you configure in the connection security rule?
You have a server named Server1. Server1 runs Windows Server 2012 R2 and is located in a
perimeter network.
You need to configure a custom connection security rule on Server1. The rule must encrypt network
communications across the Internet to a computer at another company.
Which authentication method should you configure in the connection security rule?