Which of the following actions should you take?
You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain
have Windows Server 2012 R2 installed.
You have logged on to a server, named ENSUREPASS-SR07, and would like to obtain the IP configurations of a server, named ENSUREPASS-SR13.
Which of the following actions should you take?
Which tool should you use?
Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012. You pre-create a read-only domain
controller (P.QDC) account named RODC1. You export the settings of RODC1 to a file named Filel.txt. You need to promote RODC1 by using Filel.txt. Which tool
should you use?
Which of the following actions should you take?
You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain
have Windows Server 2012 R2 installed, while domain controllers have Windows Server 2008 R2 installed.
You are then tasked with deploying a new Windows Server 2012 R2 domain controller. You are preparing to install the DNS Server role, and enable the global
catalog server option.
Which of the following actions should you take?
You need to ensure that the new zone will be replicated…
Your network contains an Active Directory domain named adatum.com. The domain contains 10
domain controllers that run Windows Server 2012.
You plan to create a new Active Directory-integrated zone named contoso.com. You need to ensure that the new zone will be replicated to only four of the domain
controllers.
What should you do first?
Which of the following is the purpose of the djoin.exe …
You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com.
Contoso.com has a Windows Server 2012 R2 domain controller, named ENSUREPASS-DC01, which has the Domain Naming master and the Schema master
roles installed. Contoso.com also has a Windows Server 2008 R2 domain controller, named ENSUREPASS-DC02, which has the PDC Emulator, RID master, and
Infrastructure master roles installed.
You have deployed a new Windows Server 2012 server, which belongs to a workgroup, in Contoso.com’s perimeter network.
You then executed the djoin.exe command.
Which of the following is the purpose of the djoin.exe command?
Which performance object should you monitor on Server1?
Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server1. Server1 runs Windows Server
2012 and has the Hyper-V server role installed. Server1 hosts 10 virtual machines. A virtual machine named VM1 runs Windows Server 2012 and hosts a
processor-intensive application named Appl. Users report that App1 responds more slowly than expected. You need to monitor the processor usage on VM1 to
identify whether changes must be made to the hardware settings of VM1. Which performance object should you monitor on Server1?
Which of the following actions should you take?
You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain,
including domain controllers, have Windows Server 2012 R2 installed.
When you recently added new workstations to the Contoso.com manually, you found that that the computer accounts were created in the default container.
You want to make sure that the default container for newly created computers is redirected to a specified, target organizational unit (OU).
Which of the following actions should you take?
You need to ensure that the users can authenticate by u…
Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012. The domain contains two servers. The
servers are configured as shown in the following table.
Server1 and Server2 host a load-balanced website named Web1. Web1 runs by using an application pool named WebApp1. WebApp1 uses a group Managed
Service Account named gMSA1 as its identity. Domain users connect to Web1 by using either the name webl.contoso.com or the alias myweb.contoso.com. You
discover the following:
* When the users access Web1 by using webl.contoso.com, they authenticate by using Kerberos.
* When the users access Web1 by using myweb.contoso.com, they authenticate by using NTLM.
You need to ensure that the users can authenticate by using Kerberos when they connect by using myweb.contoso.com. What should you do?
Which of the following is TRUE with regards to using Si…
You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain,
including domain controllers, have Windows Server 2012 R2 installed.
Contoso.com has a Hyper-V server, named ENSUREPASS-SR13, which hosts multiple virtual machines.
You have enabled the use of Single-root I/O virtualization.
Which of the following is TRUE with regards to using Single-root I/O virtualization? (Choose all that apply.)
Which tool should you use?
Your network contains an Active Directory forest named contoso.com. All servers run Windows Server 2012. You need to create a custom Active Directory
application partition. Which tool should you use?