Which tool should you use?
Your network contains an active directory domain named contoso.com. The domain contains a
domain controller named DCS. DCS has a server core installation of windows server 2012. You need
to uninstall Active Directory from DCS manually. Which tool should you use?
Which cmdlet should you run first?
You have a file server named Server1 that runs Windows Server 2012 R2. Server1 has following
hardware configurations:
– 16GB of RAM
– A single quad-core CPU
– Three network teams that have two network adapters each
You add additional CPUs and RAM to Server 1.
You repurpose Server1 as a virtualization host. You install the Hyper-V server role on Server1. You
need to create four external virtual switches in Hyper-V. Which cmdlet should you run first?
Which tool should you use?
Your network contains an Active Directory domain named contoso.com. The domain contains two
servers named Server1 and Server2 that run Windows Server 2012 R2.
You create a security template named Template1 by using the Security Templates snap-in.
You need to apply Template1 to Server2.
Which tool should you use?
How should you configure Service1?
Your network contains an Active Directory domain named contoso.com. The domain contains a
server named Server 2012. You create a group Managed Service Account named gservice1. You need
to configure a service named Service1 to run as the gservice1 account. How should you configure
Service1?
You need to ensure that when you right-click Server1, you see the option to run the DHCP console
Your network contains an Active Directory domain named adatum.com. The domain contains a
member server named Server1 and a domain controller named DC2. All servers run Windows Server
2012 R2. On DC2, you open Server Manager and you add Server1 as another server to manage. From
Server Manager on DC2, you right-click Server1 as shown in the exhibit. You need to ensure that
when you right-click Server1, you see the option to run the DHCP console.
What should you do?
What should you configure?
Your network contains an Active Directory domain named contoso.com. An organizational unit (OU)
named OU1 contains user accounts and computer accounts. A Group Policy object (GPO) named GP1
is linked to the domain. GP1 contains Computer Configuration settings and User Configuration
settings.
You need to prevent the User Configuration settings in GP1 from being applied to users. The solution
must ensure that the Computer Configuration settings in GP1 are applied to all client computers.
What should you configure?
You need to ensure that only the client computers in the Active Directory domain can register records in the c
Your network contains an Active Directory domain named contoso.com. The network contains a
member server named Server1 that runs Windows Server 2012 R2. Server1 has the DNS Server
server role installed and has a primary zone for contoso.com. The Active Directory domain contains
500 client computers. There are an additional 20 computers in a workgroup. You discover that every
client computer on the network can add its record to the contoso.com zone.
You need to ensure that only the client computers in the Active Directory domain can register
records in the contoso.com zone.
What should you do first?
Which subnet mask should you select?
Your company has a remote office that contains 1,600 client computers on a single subnet.
You need to select a subnet mask for the network that will support all of the client computers. The
solution must minimize the number of unused addresses. Which subnet mask should you select?
Which of the following is the cmdlet being discussed?
You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single
domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012
R2 installed, and all workstations have Windows 8 installed.
You are running a training exercise for junior administrators. You are currently discussing a Windows
PowerShell cmdlet that activates previously de-activated firewall rules.
Which of the following is the cmdlet being discussed?
Which rule should you enable?
Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 is located
on the same subnet as all of the client computers. A network technician reports that he receives a
“Request timed out” error message when he attempts to use the ping utility to connect to Server1
from his client computer. The network technician confirms that he can access resources on Server1
from his client computer.
You need to configure Windows Firewall with Advanced Security on Server1 to allow the ping utility
to connect.
Which rule should you enable?