ТОП просматриваемых книг сайта:
MCSA Windows Server 2012 R2 Complete Study Guide. Panek William
Читать онлайн.Название MCSA Windows Server 2012 R2 Complete Study Guide
Год выпуска 0
isbn 9781118859902
Автор произведения Panek William
Жанр Зарубежная образовательная литература
Издательство Автор
A. ADDS
B. HDSaver.exe
C. Features On Demand
D. WinRM
48. Your company is headquartered in Colorado Springs and has a remote site location in Tampa. The Colorado Spring office has a file server named FS01. FS01 has the BranchCache for Network Files role service installed. Your Tampa Office has a file server named FS02. FS02 has been configured as a BranchCache-hosted cache server. You need to preload the data from the file shares on FS01 to the cache on FS02. You have already generated hashes for the file shares on FS01. Which cmdlet should you run next?
A. Set-BCCache
B. Publish-BCFileContent
C. Export-BCCachePackage
D. Add-BCDataCacheExtension
49. What command would be used to register an iSCSI initiator manually to an iSNS server?
A. iscsicli addisnsserver server_name
B. iscsicli listisnsservers server_name
C. iscsicli removeisnsserver server_name
D. iscsicli refreshisnsserver server_name
50. You have a Windows Server 2012 R2 file server named FS01. FS01 has the File Server Resource Manager role service installed. You attempt to delete a classification property, and you receive the error message “The classification property is in use and cannot be deleted.” You need to delete the Contains Personal Information classification property. What should you do?
A. Clear the Contains Personal Information classification property value for all files.
B. Set files that have a Contains Personal Information classification property value of Yes to No.
C. Disable the classification rule that is assigned the Contains Personal Information classification property.
D. Delete the classification rule that is assigned the Contains Personal Information classification property.
51. After you update multiple drivers on your Windows Server 2012 R2 machine, the machine hangs at the logon screen, and you can’t log into the machine. You need to get this computer up and running as quickly as possible. Which of the following repair strategies should you try first to correct your problem?
A. Restore your computer’s configuration with your last backup.
B. Boot your computer with the Last Known Good Configuration option.
C. Boot your computer with the Safe Mode option.
D. Boot your computer to the Recovery Console and manually copy the old driver back to the computer.
52. You enable the Boot Logging option on the Advanced Boot Options menu. Where can you find the log file that is created?
A. \Windows\ntbtlog.txt
B. \Windows\System32\netlog.txt
C. \Windows\netlog.txt
D. \Windows\System32\netboot.log
53. You need to ensure that you can recover your Windows Server 2012 R2 configuration and data if the computer’s hard drive fails. What should you do?
A. Create a system restore point.
B. Create a backup of all file categories.
C. Perform an Automated System Recovery (ASR) backup.
D. Create a complete PC Backup and Restore image.
54. You have a file server named FS01 that is running on a server core installation of Windows Server 2012 R2. You need to make sure that your users can access previous versions of files that are shared on FS01 using the Previous Versions tab. Which tool should you use?
A. Wbadmin
B. Vssadmin
C. Ntsdutil.exe
D. ADSI Editor
55. You are unable to boot your Windows Server 2012 R2 computer, so you decide to boot the computer to Safe Mode. Which of the following statements regarding Safe Mode is false?
A. When the computer is booted to Safe Mode, there is no network access.
B. Safe Mode loads all of the drivers for the hardware that is installed on the computer.
C. When you run Safe Mode, boot logging is automatically enabled.
D. When you run Safe Mode, the screen resolution is set to 800×600.
56. You are the network administrator for Stellacon Corporation. Stellacon has two trees in its Active Directory forest, stellacon.com and abc.com. Company policy does not allow DNS zone transfers between the two trees. You need to make sure that when anyone in abc.com tries to access the stellacon.com domain, all names are resolved from the stellacon.com DNS server. What should you do?
A. Create a new secondary zone in abc.com for stellacon.com.
B. Create a new secondary zone in stellacon.com for abc.com.
C. Configure conditional forwarding on the abc.com DNS server for stellacon.com.
D. Configure conditional forwarding on the stellacon.com DNS server for abc.com.
57. Your IT team has been informed by the compliance team that they need copies of the DNS Active Directory Integrated zones for security reasons. You need to give the Compliance department a copy of the DNS zone. How should you accomplish this goal?
A. Run dnscmd /zonecopy.
B. Run dnscmd /zoneinfo.
C. Run dnscmd /zonefile.
D. Run dnscmd /zoneexport.
58. You administer a network that assigns IP addresses via DHCP. You want to make sure that one of the clients always receives the same IP address from the DHCP server. You create an exclusion for that address, but you find that the computer isn’t being properly configured at bootup. What’s the problem?
A. You excluded the wrong IP address.
B. You must configure the client manually. You cannot assign the address via the DHCP server.
C. You need to create a superscope for the address.
D. You need to make a reservation for the client that ties the IP address to the computer’s MAC address. Delete the exclusion.
59. You are the network administrator for a small company with two DNS servers: DNS1 and DNS2. Both DNS servers reside on domain controllers. DNS1 is set up as a standard primary zone, and DNS2 is set up as a secondary zone. A new security policy was written stating that all DNS zone transfers must be encrypted. How can you implement the new security policy?
A. Enable the Secure Only setting on DNS1.
B. Enable the Secure Only setting on DNS2.
C. Configure Secure Only on the Zone Transfers tab for both servers.
D. Delete the secondary zone on DNS2. Convert both DNS servers to use Active Directory Integrated zones.
60. You are the network administrator for a midsize computer company. You have a single Active Directory forest, and your DNS servers are configured as Active Directory Integrated zones. When you look at the DNS records in Active Directory, you notice that there are many records for computers that do not exist on your domain. You want to make sure that only domain computers register with your DNS servers. What should you do to resolve this issue?
A. Set dynamic updates to None.
B. Set dynamic updates to Nonsecure And Secure.
C. Set dynamic updates to Secure Only.
D. Set dynamic updates to Domain Users Only.
61. Which of the following does not need to be created manually when you are setting up a replication scenario involving three domains and three