Which tool should you use?
You have a server named Server1 that runs Windows Server 2012 R2.
Server1 fails.
You identify that the master boot record (MBR) is corrupt.
You need to repair the MBR.
Which tool should you use?
You need to ensure that VM1 remains available from HV1 while drive E is being replaced
Your network contains three servers named HV1, HV2, and Server1 that run Windows
Server 2012 R2. HV1 and HV2 have the Hyper-V server role installed. Server1 is a file
server that contains 3 TB of free disk space.
HV1 hosts a virtual machine named VM1. The virtual machine configuration file for VM1 is
stored in D:\VM and the virtual hard disk file is stored in E:\VHD.
You plan to replace drive E with a larger volume.
You need to ensure that VM1 remains available from HV1 while drive E is being replaced.
You want to achieve this goal by using the minimum amount of administrative effort.
What should you do?
Which tool should you use?
You have a failover cluster named Cluster1 that contains four nodes. All of the nodes run
Windows Server 2012 R2.
You need to force every node in Cluster1 to contact immediately the Windows Server
Update Services (WSUS) server on your network for updates.
Which tool should you use?
HOTSPOT
Your network contains two Web servers named Server1 and Server2. Both servers run
Windows Server 2012 R2.
Server1 and 5erver2 are nodes in a Network Load Balancing (NLB) cluster. The NLB cluster
contains an application named App1 that is accessed by using the name appl.contoso.com.
The NLB cluster has the port rules configured as shown in the exhibit. (Click the Exhibit button.)
To answer, complete each statement according to the information presented in the exhibit.
Each correct selection is worth one point.
What command should you run first?
HOTSPOT
Your network contains an Active Directory domain named contoso.com.
You install the IP Address Management (IPAM) Server feature on a server named Server1
and select Manual as the provisioning method.
The IPAM database is located on a server named SQL1.
You need to configure IPAM to use Group Policy Based provisioning.
What command should you run first?
To answer, select the appropriate options in the answer area.
Which cmdlet should you run?
Your network contains an Active Directory domain named contoso.com. The domain
contains an IP Address Management (IPAM) server that uses a Windows Internal Database.
You install a Microsoft SQL Server 2012 instance on a new server.
You need to migrate the IPAM database to the SQL Server instance.
Which cmdlet should you run?
Which type of trust policy should you create?
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the
Active Directory Rights Management Services server role installed.
Your company works with a partner organization that does not have its own Active Directory
Rights Management Services (AD RMS) implementation.
You need to create a trust policy for the partner organization.
The solution must meet the following requirements:
Grant users in the partner organization access to protected content.
Provide users in the partner organization with the ability to create protected content.
Which type of trust policy should you create?
Which two actions should you perform?
Your network contains an Active Directory domain named contoso.com. The domain
contains a certification authority (CA).
You suspect that a certificate issued to a Web server is compromised.
You need to minimize the likelihood that users will trust the compromised certificate.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)
You need to ensure that a user named User1 can decrypt private keys archived in the Active Directory Certifica
Your network contains an Active Directory domain named adatum.com. The domain
contains a server named CA1 that runs Windows Server 2012 R2. CA1 has the Active
Directory Certificate Services server role installed and is configured to support key archival
and recovery.
You need to ensure that a user named User1 can decrypt private keys archived in the Active
Directory Certificate Services (AD CS) database. The solution must prevent User1 from
retrieving the private keys from the AD CS database.
What should you do?
Which two actions should you perform?
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1 that runs Windows Server 2012 R2.
Server1 is an enterprise root certification authority (CA) for contoso.com.
You need to ensure that the members of a group named Group1 can request code signing
certificates. The certificates must be issued automatically to the members.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)