You need to ensure that users can resolve contoso.com names
You have a server named Server1 that runs Windows Server 2012 R2. Server1 is located in the perimeter
network and has the DNS Server server role installed.
Server1 has a zone named contoso.com.You apply a security template to Server1.
After you apply the template, users report that they can no longer resolve names from contoso.com.
On Server1, you open DNS Manager as shown in the DNS exhibit. (Click the Exhibit button.)
On Server1, you open Windows Firewall with Advanced Security as shown in the Firewall exhibit. (Click the
Exhibit button.)
You need to ensure that users can resolve contoso.com names.
What should you do?
Which service should you start?
Your network contains an Active Directory domain named contoso.com. The domain contains a member server
named Server 1. Server1 has the IP Address Management (IPAM) Server feature installed.
A technician performs maintenance on Server1.
After the maintenance is complete, you discover that you cannot connect to the IPAM server on Server1.
You open the Services console as shown in the exhibit. (Click the Exhibit button.)
Exhibit:You need to ensure that you can connect to the IPAM server.
Which service should you start?
Which type of DNS record should you modify?
You have a DNS server named DNS1 that runs Windows Server 2012 R2.
On DNS1, you create a standard primary DNS zone named adatum.com.
You need to change the frequency that secondary name servers will replicate the zone from DNS1.
Which type of DNS record should you modify?
Which two actions should you perform?
Your network contains an Active Directory domain named contoso.com. The domain contains three servers.
The servers are configured as shown in the following table.
You need to ensure that end-to-end encryption is used between clients and Server2 when the clients connect to
the network by using DirectAccess.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
What should you modify?
HOTSPOT
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Remote Access server
role installed.
You need to configure the ports on Server1 to ensure that client computers can establish VPN connections to
Server1 by using TCP port 443.
What should you modify? To answer, select the appropriate object in the answer area.
Hot Area:
You need to ensure that the Administrative Templates ap…
Your network contains an Active Directory domain named adatum.com.
A network administrator creates a Group Policy central store.
After the central store is created, you discover that when you create new Group Policy objects (GPOs), the
GPOs do not contain any Administrative Templates.
You need to ensure that the Administrative Templates appear in new GPOs.
What should you do?
What should you configure next on Server2?
HOTSPOT
Your network contains a RADIUS server named Admin1.
You install a new server named Server2 that runs Windows Server 2012 R2 and has Network Policy Server
(NPS) installed.
You need to ensure that all accounting requests for Server2 are forwarded to Admin1.
On Server2, you create a new remote RADIUS server group named Group1 that contains Admin1.
What should you configure next on Server2?
To answer, select the appropriate node in the answer area.
Hot Area:
Which two actions should you perform?
Your network contains an Active Directory domain named contoso.com. The domain contains a member server
named Server 1. All servers run Windows Server 2012 R2.
You need to collect the error events from all of the servers on Server1. The solution must ensure that when new
servers are added to the domain, their error events are collected automatically on Server1.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
which tab should you perform the configuration?
HOTSPOT
Your network contains an Active Directory domain named contoso.com. The domain contains a member server
named Server1. Server1 runs Windows Server 2012 R2.
You enable the EventLog-Application event trace session.You need to set the maximum size of the log file used by the trace session to 10 MB.
From which tab should you perform the configuration? To answer, select the appropriate tab in the answer
area.
Hot Area:
What should you configure?
You have a server named Server1 that runs Windows Server 2012 R2.
On Server1, you configure a custom Data Collector Set (DCS) named DCS1. DCS1 is configured to store
performance log data in C:\\Logs.
You need to ensure that the contents of C:\\Logs are deleted automatically when the folder reaches 100 MB in
size.
What should you configure?