What command should you run?
HOTSPOT
Yournetwork contains two Web servers named Server1 and Server2. Both servers run Windows
Server 2012 R2.
Server1 and Server2 are nodes in a Network Load Balancing (NLB) cluster.The NLB cluster contains
an application named App1 that is accessed by using the URL http://app1.contoso.com.
Youdeploy a new server named Server3 that runs Windows Server 2012 R2. The contoso.com DNS
zone contains the records shown in the following table.
Youneed to add Server3 to the NLB cluster.
What command should you run?
To answer, select the appropriate options in the answer area.
What should you run from Windows PowerShell?
DRAG DROP
Yournetwork contains an Active Directory domain named contoso.com. The domain contains four
member servers named Server1, Server2, Server3, and Server4. All servers run Windows Server
2012 R2.
Server1 and Server3 are located in a site named Site1. Server2 and Server4 are located in a site
named Site2. The servers are configured as nodes in a failover cluster named Cluster1.
Dynamic quorum management is disabled.
Cluster1 is configured to use the Node Majority quorum configuration.
Youneed to ensure that users in Site2 can access Cluster1 if the network connection between the
two sites becomes unavailable.
What should you run from Windows PowerShell?
Toanswer, drag the appropriate commands to the correct location. Each command may be used
once, more than once, or not at all. Youmay need to drag the split bar between panes or scroll to
view content.
What should you configure?
Yournetwork contains an Active Directory domain named contoso.com. The domain contains two
member servers named Server1 and Server2. All servers run Windows Server 2012 R2.
Server1 and Server2 have the Network Load Balancing (NLB) feature installed. The servers are
configured as nodes in an NLB cluster named Cluster1.
Port rules are configured for all clustered Applications.
You need to ensure that Server2 handles all client requests to the cluster that are NOT covered by a
port rule.
What should you configure?
What should you configure?
Your network contains an Active Directory domain named contoso.com. The domain contains two
member servers named Server1 and Server2. All servers run Windows Server 2012 R2.
Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as
nodes in a failover cluster named Cluster1.
Cluster1 hosts an Application named App1.
Youneed to ensure that Server2 handles all of the client requests to the cluster for App1. The
solution must ensure that if Server2 fails, Server1 becomes the active node for App1.
What should you configure?
What should you configure?
Yournetwork contains an Active Directory domain named contoso.com. The domain contains two
member servers named Server1 and Server2. All servers run Windows Server 2012 R2.
Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as
nodes in a failover cluster named Cluster1.
You add two additional nodes to Cluster1.
You have a folder named Folder1 on Server1 that contains Application data.
You plan to provide continuously available access to Folder1.
You need to ensure that all of the nodes in Cluster1 can actively respond to the client requests for
Folder1.
What should you configure?
You need to configure the adatum.com zone to support Name Protection
Your network contains an Active Directory domain named contoso.com. The domain contains a
domain controller named DC1 that runs Windows Server 2012 R2. DC1 has the DNS Server server
role installed.
The network contains client computers that run either Linux, Windows 7, or Windows 8.
You have a zone named adatum.com as shown in the exhibit. (Click the Exhibit button.)
You plan to configure Name Protection on all of the DHCP servers.
You need to configure the adatum.com zone to support Name Protection.
What should you do?
Which two settings should you configure?
HOTSPOT
Yournetwork contains an Active Directory domain named contoso.com. All domain controllers run
Windows Server 2012 R2.
The network has the physical sites and TCP/IP subnets configured as shown in the following table.
You have a web application named App1 that is hosted on six separate Web servers. DNS has the
host names and IP addresses registered as shown in the following table.
You discover that when users connect to appl.contoso.com, they are connected frequently to a
server that is not on their local subnet.
You need to ensure that when the users connect to appl.contoso.com, they connect to a server on
their local subnet. The connections must be distributed across the servers that host
appl.contoso.com on their subnet.
Which two settings should you configure?
To answer, select the appropriate two settings in the answer area.
What should you do?
You have a server named Server1 that runs Windows Server 2012 R2. Server1 is located in the
perimeter network and has the DNS Server server role installed.
Server1 has a zone named contoso.com.
You App1y a security template to Server1.
After you App1y the template, users report that they can no longer resolve names from
contoso.com.
On Server1, you open DNS Manager as shown in the DNS exhibit. (Click the Exhibit button.)
On Server1, you open Windows Firewall with Advanced Security as shown in the Firewall exhibit.
(Click the Exhibit button.)
Youneed to ensure that users can resolve contoso.com names.
What should you do?
which server should you install IPAM?
Yournetwork contains an Active Directory forest named contoso.com. All servers run Windows
Server 2012 R2.
The domain contains four servers. The servers are configured as shown in the following table.
You need to deploy IP Address Management (IPAM) to manage DNS and DHCP.
On which server should you install IPAM?
Which two actions should you perform?
Your network contains an Active Directory domain named contoso.com. The domain contains two
member servers named Server1 and Server2.
You install the DHCP Server server role on Server1 and Server2. You install the IP Address
Management (IPAM) Server feature on Server1.
You notice that you cannot discover Server1 or Server2 in IPAM.
You need to ensure that you can use IPAM to discover the DHCP infrastructure.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose
two.)