Call
whatsapp
9447387064 | 9847003556
0471-2335855 | 8089080088 | 0471-2334855
9447387064 | 9847003556
0471-2335855 | 8089080088 | 0471-2334855
Cisco Training in Trivandrum, Trinity Technologies

No.1 Training Institute in Kerala

Windows Server 2012 R2 - QUESTIONS : PART 29

Your network contains an Active Directory domain named contoso.com.
You create a software restriction policy to allow an application named App1 by using a certificate rule.
You need to prevent the software restriction policy from applying to users that are members of the local Administrators group.
What should you do?

 

Modify the rule for App1

Modify the Enforcement Properties

Modify the Security Levels.

Modify the Trusted Publishers Properties

SHOW ANSWER

You have a server named Server1 that runs Windows Server 2012 R2.
You configure IPSec rules for connections to Server1.
On Server1, you plan to create an inbound firewall rule that contains the following settings:
Allows inbound connections to an application named App1.exe
Applies to the domain profile
Overrides any block rules
You need to identify the minimum information required to create the rule.
Which two pieces of information should you identify? Each correct answer presents part of the solution.

 

 the list of computers that are authorized to use the application

the list of Active Directory users who are authorized to use the application

the hash of the application

the name of the IPSec policies that apply to Server1

the local path of the application

SHOW ANSWER

Your network contains one Active Directory forest named contoso.com. The forest contains a single domain. All domain controllers run Windows Server 2012 R2.
You need to modify the membership of a group named Group1 to include two users named User1 and User2.
What command should you run? To answer, select the appropriate options in the answer area. Select three.

 

Use command Add-GroupMember

Use command Add-ADGroupMember}

As first parameter use Group1

As first parameter use User1, User2

As first parameter use {User1, User2}

As second parameter use Group1

As second parameter use User1, User2

1As second parameter use {User1, User2}

SHOW ANSWER

Your network contains one Active Directory domain named contoso.com. The domain contains 10 domain controllers and a read-only domain controller (RODC) named RODC01.
You plan to deploy a child domain for contoso.com in Microsoft Azure.
To the Azure subscription, you add several virtual machines that have a Server Core installation of Windows Server 2012 R2.
You need to create the new domain on one of the virtual machines.
Which tool should you use?

 

 the ntdsutil command

the Set-ADDomain cmdlet

the Install-ADDSDomain cmdlet

the dsadd command

the dsamain command

the dsmgmt command

the net user command

the Set-ADForest cmdlet

SHOW ANSWER

Your network contains one Active Directory domain named contoso.com. The domain contains 10 domain controllers and a read-only domain controller (RODC) named RODC01.
The domain contains an administrator account named Admin1.
You need to prevent Admin1 from creating more than 100 objects in the domain partition.
Which tool should you use?

 

the ntdsutil command

1the Set-ADDomain cmdlet

the Install-ADDSDomain cmdlet

1the dsadd command

the dsamain command

the dsmgmt command

 the net user command

the Set-ADForest cmdlet

SHOW ANSWER

Your network contains one Active Directory domain named contoso.com. The domain contains 10 domain controllers and a read-only domain controller (RODC) named RODC01.
You plan to replace a domain controller named DC1. DC1 has the schema operations master role.
You need to transfer the schema master role to another domain controller named DC10 before you remove Active Directory from DC1.
Which tool should you use?

 

the ntdsutil command

the Set-ADDomain cmdlet

the Install-ADDSDomain cmdlet

the dsadd command

the dsmgmt command

SHOW ANSWER

You have a Hyper-V host named Hyper1 that runs Windows Server 2012 R2.
Hyper1 hosts several virtual machines that run Windows 8.1.
Several developers connect to the virtual machines by using the Virtual Machine Connection tool.
You need to ensure that the devlopers can print to their local printers from within virtual machine sessions.
What should you configure?

 

a virtual switch on Hyper1

Remote Desktop Services (RDS) on Hyper1

enhanced session mode on Hyper1

1a virtual network adapter on the virtual machines

SHOW ANSWER

Your network contains one Active Directory domain named contoso.com. The domain contains 10 domain controllers and a read-only domain controller (RODC) named RODC01.
You need to add an RODC to the domain by using the Install From Media (IFM) option.
Which tool should you use to create the media?

the ntdsutil command

the Set-ADDomain cmdlet

the Install-ADDSDomain cmdlet

1the dsadd command

SHOW ANSWER

Your network contains one Active Directory domain named contoso.com. The domain contains 10 domain controllers and a read-only domain controller (RODC) named RODC01.
You need to ensure that when administrators create users in contoso.com, the default user principal name (UPN) suffix is litwareinc.com.
Which cmdlet should you use?

 

 the ntdsutil command

the Set-ADDomain cmdlet

the net user command

the dsmgmt command

the Set-ADForest cmdlet

SHOW ANSWER

Your network contains an Active Directory domain named adatum.com. The domain contains a server named Server1 that runs Windows Server 2012 R2.
On a server named Core1, you perform a Server Core Installation of Windows Server 2012 R2. You join Core1 to the adatum.com domain.
You need to ensure that you can use Event Viewer on Server1 to view the event logs on Core1.
What should you do on Core1?

 

Run the Enable-NetFirewallRule cmdlet.

Run the Disable-NetFirewallRule cmdlet.

Install Windows Management Framework.

Install Remote Server Administration Tools (RSAT).

SHOW ANSWER

You perform a Server Core Installation of Windows Server 2012 R2 on a server named Server1.
You need to add a graphical user interface (GUI) to Server1.
Which tool should you use?

The Install-WindowsFeature cmdlet

The Install-Module cmdlet

The Install-RoleService cmdlet

The setup.exe command

SHOW ANSWER

Your network contains a Hyper-V host named Server1 that runs Windows Server 2012 R2. Server1 hosts a virtual machine named VM1 that runs Windows Server 2012 R2.
You take a snapshot of VM1, and then you install an application on VM1.
You verify that the application runs properly.
You need to ensure that the current state of VM1 is contained in a single virtual hard disk file. The solution must minimize the amount of downtime on VM1.
What should you do?

 

From Hyper-V Manager, delete the snapshot.

From a command prompt, run dism.exe and specify the /commit-image parameter.

From a command prompt, run dism.exe and specify the /delete-image parameter.

From Hyper-V Manager, inspect the virtual hard disk.

SHOW ANSWER

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

 

Enable the Device Registration Service in Active Directory.

Publish the Device Registration Service by using a Web Application Proxy.

Configure Active Directory Federation Services (AD FS) for the Device Registration Service.

Install the Work Folders role service on Server2.

Create and configure a sync share on Server2.

SHOW ANSWER
BACK | NEXT
TRINITY SOFTWARE SOLUTIONS,IInd floor, Radheyam Towers, Gandhari Amman Kovil Road, Pulimood, Trivandrum - 1
0471-2334855 | 2335855 | 9447387064 | 9847003556 info@trinitytechnology.in