Installing and Configuring Windows Server 2012 Exam

FREE MCSA: Installing & Configuring Windows Server 2012 Question and Answers

0%

There are numerous subnets in your network. You install a server named Server1 running Windows Server 2012 R2 on one of the subnets. On Server1, the DNS Server server role is installed, and then the contoso.com standard primary zone is created. Client computers must be able to translate single-label names into IP addresses.
What ought to you start with?

Correct! Wrong!

Explanation:
Single-label names must be resolved using a GlobalNames zone, but GNZs must be AD-integrated.
We must first integrate the primary zone into Active Directory because it is a conventional primary zone (as opposed to an ADDS primary zone).

Windows Server 2012 R2 is installed on a server you have named Server1. Network adapters total six on Server1. Three of the network adapters are connected to networks with the names LAN1, LAN2, and LAN3, while two of the network adapters are connected to a network with the name LAN4.
LAN3.
The two adapters linked to LAN1 are combined to form a network adapter team called Team1. The two adapters linked to LAN2 are combined to form a network adapter team called Team2.
All server IP addresses must be given using a reserved address via DHCP, according to a company policy.
You must determine the number of DHCP reservations that Server1 requires.
What number of reservations need you to mention?

Correct! Wrong!

Explanation:
There are four total IP addresses needed: two for each NIC team and one for each NIC that is not teamed.

An Active Directory domain with the name contoso.com is present on your network. There are two Windows Server-based servers in the domain called Server1 and Server2. 2012 R2. Using the security template snap-in, you build a security template with the name Template1. Apply Template1 to Server2 as necessary.
What instrument should you use?

Correct! Wrong!

Explanation:
A security policy is a collection of security options that influence a computer's security. On your local computer, you can update account policies and local policies using your local security policy. Prior to being imported into a Group Policy object or the Security Configuration and Analysis, security templates are dormant.

Windows Server 2012 R2 is installed on a server you have named Server1. The Hyper-V server role is set up on Server1. You establish a virtual machine called VM1 on Server1. There is an old network adapter in VM1. You must allocate VM1 a certain portion of the available network bandwidth.
What would you start with?

Correct! Wrong!

Explanation:
Put in a fresh network adaptor. There is no bandwidth management support for the legacy network adapter.

A server called Server1 in your network is running Windows Server 2012 R2. The server role for Print and Document Services is set up on Server1. You join the network with a fresh printing device. The print equipment will be used by the marketing and sales departments. Users from both departments must have access to the network print device in order to print. If there are several papers in the queue to print, the solution must make sure that the documents from the sales users print before the documents from the marketing users. On Server1, what should you do?

Correct! Wrong!

Explanation:
to assign various print priorities to certain groups
Open the fax and printers.
Click the Properties option from the printer's context menu, then select the Advanced tab. Click the up or down arrows in Priority, then click OK. Alternately, you can input a priority level—1 being the lowest and 99 being the highest—and then click OK. To add a second logical printer for the same physical printer, click Add Printer.

An Active Directory domain with the name contoso.com is present on your network. A computer called Server1 that runs Windows computer 2012 R2 is part of the domain. When using Windows Firewall with Advanced Security, you can add a new inbound rule. The rule must be set up to let Server1 to accept incoming packets that are not requested and are sent through a network address translation (NAT) device.
Which rule setting should you configure?

Correct! Wrong!

Explanation:
Edge traversal "" This lets you know if it's enabled (Yes) or disabled (No). The application, service, or port that the rule applies to is globally addressable and reachable from outside a network address translation (NAT) or edge device when edge traversal is enabled.
Choose one of the following choices from the list: "" Prevent programs from getting unsolicited traffic from the Internet using a Edge NAT device. Permit edge traversal to "" Permit apps to accept unsolicited traffic straight from the Internet through a NAT edge device. Allow user discretion "" When an application requests that unauthorized Internet traffic pass via a NAT edge device, let the user make that decision. Applying "" Allowing unwanted Internet traffic to pass through a NAT edge device is something that should be left up to each application.

You have an offline replica of a Windows system 2012 R2 system. On the server, Remote Desktop Services (RDS) must be enabled.
Which should you employ?

Correct! Wrong!

Explanation:
Execute the command Dism /Enable-Feature /FeatureName:Remote-Desktop-Services to enable the Remote-Desktop-Services feature in the offline image Services.