Which tool should you use?
Your network contains an Active Directory domain named contoso.com. The domain contains a
server named Server1. Server1 runs Windows Server 2012 R2.
You need to create a 3-TB virtual hard disk (VHD) on Server1.
Which tool should you use?
What command should you run?
HOTSPOT
You have a Hyper-V host named Server1 that runs Windows Server 2012 R2. Server1 hosts 40 virtual
machines that run Windows Server 2008 R2. The virtual machines connect to a private virtual switch.
You have a file that you want to copy to all of the virtual machines.
You need to identify to which servers you can copy files by using the Copy-VmFile cmdlet.
What command should you run? To answer, select the appropriate options in the answer area.
You need to assign a specific amount of available network bandwidth to VM1
You have a server named Server1 that runs Windows Server 2012 R2.Server1 has the Hyper-V server
role installed. On Server1, you create a virtual machine named VM1.VM1 has a legacy network
adapter.
You need to assign a specific amount of available network bandwidth to VM1.
What should you do first?
You need to assign a specific amount of available network bandwidth to VM1
You have a server named Server1 that runs Windows Server 2012 R2.Server1 has the Hyper-V server
role installed. On Server1, you create a virtual machine named VM1.VM1 has a legacy network
adapter.
You need to assign a specific amount of available network bandwidth to VM1.
What should you do first?
Which setting in the rule should you configure?
Your network contains an Active Directory domain named contoso.com. The domain contains a
server named Server1 that runs Windows Server 2012 R2.
You create a new inbound rule by using Windows Firewall with Advanced Security.
You need to configure the rule to allow Server1 to accept unsolicited inbound packets that are
received through a network address translation (NAT) device on the network.
Which setting in the rule should you configure?
Which setting in the rule should you configure?
Your network contains an Active Directory domain named contoso.com. The domain contains a
server named Server1 that runs Windows Server 2012 R2.
You create a new inbound rule by using Windows Firewall with Advanced Security.
You need to configure the rule to allow Server1 to accept unsolicited inbound packets that are
received through a network address translation (NAT) device on the network.
Which setting in the rule should you configure?
You need to ensure that Server1 can respond to ping requests from computers that do not support IPSec
Your network contains an Active Directory domain named contoso.com. All servers run Windows
Server 2012 R2. A server named Server1 is configured to encrypt all traffic by using IPSec.
You need to ensure that Server1 can respond to ping requests from computers that do not support
IPSec.
What should you do?
complete each statement according to the information presented in the exhibit.
HOTSPOT
Your network contains an Active Directory domain named contoso.com. All domain controllers run
Windows Server 2012 R2.
All servers are configured to enforce AppLocker policies.
You install a server named Server1.
On Server1, you install an application named App1.exe in a folder located on C:\App1.
You have two domain groups named Group1 and Group2.A user named User1 is a member of
Group1 and Group2.
You create a Group Policy object (GPO) named GPO1. You link GPO1 to contoso.com.
You create the executable rules as shown in the exhibit by using the Create Executable Rules wizard.
(Click the Exhibit button.)
To answer, complete each statement according to the information presented in the exhibit. Each
correct selection is worth one point.
You need to ensure that Server1 can respond to ping requests from computers that do not support IPSec
Your network contains an Active Directory domain named contoso.com. All servers run Windows
Server 2012 R2. A server named Server1 is configured to encrypt all traffic by using IPSec.
You need to ensure that Server1 can respond to ping requests from computers that do not support
IPSec.
What should you do?
Which cmdlet should you use to perform each task?
DRAG DROP
You have a server named Server1 that runs Windows Server 2012 R2.
You need to perform the following storage configuration tasks on Server1:
Bring a disk named Disk1 online.
Defragment a volume named Volume1.
Remove a disk named Disk2 from a storage pool named Pool1.
Which cmdlet should you use to perform each task?
To answer, drag the appropriate cmdlets to the correct tasks. Each cmdlet may be used once, more
than once, or not at all. You may need to drag the split bar between panes or scroll to view content.