Название | MCSA Windows Server 2012 R2 Complete Study Guide |
---|---|
Автор произведения | Panek William |
Жанр | Зарубежная образовательная литература |
Серия | |
Издательство | Зарубежная образовательная литература |
Год выпуска | 0 |
isbn | 9781118859902 |
C. The tracert tool
D. The ipconfig tool
18. Which of the following is true about the time to live (TTL) attached to a DNS record?
A. A resolver cannot use it; only servers making recursive queries can use it.
B. Only resolvers use it.
C. It is used to determine how long to cache retrieved results.
D. It is refreshed each time the record is modified.
19. Which of the following statements about Windows Server 2012 Dynamic DNS (DDNS) is true?
A. DDNS requires a Microsoft DHCP server to work.
B. The Windows Server 2012 DDNS server can interoperate with recent versions of BIND.
C. DDNS clients may not register their own addresses.
D. DDNS works only with Microsoft clients and servers.
20. You have been given a server that contains three HBAs. Each card can access the storage over a separate path. The application that runs on the server can exceed the usage of a single path. Which of the following MPIO options should be selected to provide the needed bandwidth as well as minimal redundancy?
A. Failover
B. Dynamic Least Queue Depth
C. Weighted path
D. Round robin
21. You need to stop an application from running in Task Manager. Which tab would you use to stop an application from running?
A. Performance
B. Users
C. Options
D. Details
22. As a network administrator, you are responsible for all client computers at the central corporate location. Your company has asked you to make sure that all of the client computers are secure. You need to use MBSA to scan your client computers, based on IP addresses, for possible security violations but you need to use the command-line version. Which of the following command-line commands would you use?
A. mdsacli.exe /hf – i xxxx.xxxx.xxxx.xxxx
B. mdsacli.exe /ip xxxx.xxxx.xxxx.xxxx
C. mbsa.exe /hf – ip xxxx.xxxx.xxxx.xxxx
D. mbsa.exe /ip xxxx.xxxx.xxxx.xxxx
23. You are the administrator of a new Windows Server 2012 R2 machine. You need to install DNS and create a primary zone. Which MMC snap-in would you use to install DNS?
A. Add/Remove Programs
B. Programs
C. Server Manager
D. Administrative Tools
24. You are the administrator for a large company that has purchased a new multifunction printer. You want to publish the printer to Active Directory. Where would you click in order to accomplish this task?
A. The Sharing tab
B. The Advanced tab
C. The Device Settings tab
D. The Printing Preferences button
25. Isabel is a system administrator for an Active Directory environment that is running in Native mode. Recently, several managers have reported suspicions about user activities and have asked her to increase security in the environment. Specifically, the requirements are as follows:
■ The accessing of certain sensitive files must be logged.
■ Modifications to certain sensitive files must be logged.
■ System administrators must be able to provide information about which users accessed sensitive files and when they were accessed.
■ All logon attempts for specific shared machines must be recorded.
Which of the following steps should Isabel take to meet these requirements? (Choose all that apply.)
A. Enable auditing with the Computer Management tool.
B. Enable auditing with Group Policy Objects.
C. Enable auditing with the Active Directory Domains and Trusts tool.
D. Enable auditing with the Event Viewer tool.
E. View the audit log using the Event Viewer tool.
F. View auditing information using the Computer Management tool.
G. Enable failure and success auditing settings for specific files stored on NTFS volumes.
H. Enable failure and success auditing settings for logon events on specific computer accounts.
26. You are the network administrator for a large widget distributor. Your company’s network has 20 Windows 2012 R2 servers, and all of the clients are running either Windows 8 or Windows 7. All of your end users use laptops to do their work, and many of them work away from the office. What should you configure to help them work on documents when away from the office?
A. Online file access
B. Offline file access
C. Share permissions
D. NTFS permissions
27. Your company has decided to implement an external hard drive. The company IT manager before you always used FAT32 as the system partition. Your company wants to know whether it should move to NTFS. Which of the following are some advantages of NTFS? (Choose all that apply.)
A. Security
B. Quotas
C. Compression
D. Encryption
28. You have been hired by a small company to implement new Windows Server 2012 R2 systems. The company wants you to set up a server for users’ home folder locations. What type of server would you be setting up?
A. PDC server
B. Web server
C. Exchange server
D. File server
29. GPOs assigned at which of the following level(s) will override GPO settings at the domain level?
A. OU
B. Site
C. Domain
D. Both OU and site
30. A system administrator wants to ensure that only the GPOs set at the OU level affect the Group Policy settings for objects within the OU. Which option can they use to do this (assuming that all other GPO settings are the defaults)?
A. The Enforced option
B. The Block Policy Inheritance option
C. The Disable option
D. The Deny permission
31. Mateo, a system administrator, is planning to implement Group Policy objects in a new Windows Server 2012 R2 Active Directory environment. To meet the needs of the organization, he decides to implement a hierarchical system of Group Policy settings. At which of the following levels is he able to assign Group Policy settings? (Choose all that apply.)
A. Sites
B. Domains
C. Organizational units
D. Local system
32. Ann is a system administrator for a medium-sized Active Directory environment. She has determined that several new applications that will be deployed throughout the organization use registry-based settings. She would like to do the following:
■ Control these registry settings using Group Policy.
■ Create a standard set of options for these applications and allow other system administrators to modify them using the standard Active Directory tools.
Which