Ensurepass

QUESTION 141

Your network contains an Active Directory domain named contoso.com. An organizational unit (OU) named OU1 contains the user accounts and the computer accounts for laptops and desktop computers. A Group Policy object (GPO) named GP1 is linked to OU1. You need to ensure that the configuration settings in GP1 are applied only to the laptops in OU1. The solution must ensure that GP1 is applied automatically to new laptops that are added to OU1. What should you do?

 

A.      Modify the GPO Status of GP1.

B.      Configure the WMI Filter of GP1.

C.      Modify the security settings of GP1.

D.      Modify the security settings of OU1.

 

Correct Answer: B

 

 

QUESTION 142

Your network contains an Active Directory domain named contoso.com. All client computer accounts are in an organizational unit (OU) named AllComputers. Client computers run either Windows 7 or Windows 8. You create a Group Policy object (GPO) named GP1. You link GP1 to the AllComputers OU. You need to ensure that GP1 applies only to computers that have more than 8 GB of memory. What should you configure?

 

A.      The Security settings of AllComputers

B.      The Security settings of GP1

C.      The WMI filter for GP1

D.      The Block Inheritance option for AllComputers

 

Correct Answer: C

 

 

QUESTION 143

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2. Server1 runs Windows Server 2012. Server2 runs Windows Server 2008 R2 Service Pack 1 (SP1) and has the DHCP Server role installed. You need to manage DHCP on Server2 by using the DHCP console on Server1. What should you do first?

 

A.      From Windows Firewall with Advanced Security on Server2, create an inbound rule.

B.      From Internet Explorer on Server2, download and install Windows Management Framework 3.0.

C.      From Server Manager on Server1, install a feature.

D.      From Windows PowerShell on Server2, run Enable PSRemoting.

 

Correct Answer: D

 

 

QUESTION 144

Your network contains an Active Directory domain named contoso.com. The domain contains a member server named HVServer1. HVServer1 runs Windows Server 2012 and has the Hyper-V server role installed. HVServer1 hosts 10 virtual machines. All of the virtual machines connect to a virtual switch named Switch1. Switch1 is configured as a private network. All of the virtual machines have the DHCP guard and the router guard settings enabled. You install the DHCP server role on a virtual machine named Server 1. You authorize Server1 as a DHCP server in contoso.com. You create an IP scope. You discover that the virtual machines connected to Switch1 do not receive IP settings from Server1. You need to ensure that the virtual machines can use Server1 as a DHCP server. What should you do?

 

A.      Enable MAC address spoofing on Server1.

B.      Disable the DHCP guard on all of the virtual machines that are DHCP clients.

C.      Disable the DHCP guard on Server1.

D.      Enable single-root I/O virtualization (SR-IOV) on Server1.

 

Correct Answer: D

 

 

QUESTION 145

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012. Server1 has the Hyper- V server role installed. Server1 has a virtual switch named RDS Virtual. You replace all of the network adapters on Server1 with new network adapters that support single-root I/O virtualization (SR-IOV). You need to enable SR-IOV for all of the virtual machines on Server1. Which two actions should you perform? (Each correct answer presents part of the solution.

Choose two.)

 

A.      On each virtual machine, modify the Advanced Features settings of the network adapter.

B.      Modify the settings of the RDS Virtual virtual switch.

C.      On each virtual machine, modify the BIOS settings.

D.      Delete, and then recreate the RDS Virtual virtual switch.

E.       On each virtual machine, modify the Hardware Acceleration settings of the network adapter.

 

Correct Answer: DE

 

 

QUESTION 146

You have a server named Server1 that runs a Server Core Installation of Windows Server 2012. You attach a 4-TB disk to Server1. The disk is configured as an MBR disk. You need to ensure that you can create a 4-TB volume on the disk. Which Diskpart command should you use?

 

A.      Automount

B.      Convert

C.      Expand

D.      Attach

 

Correct Answer: B

 

 

QUESTION 147

HOTSPOT

Your network contains an Active Directory domain named adatum.com. You create an account for a temporary employee named User1. You need to ensure that User1 can log on to the domain only between 08:00 and 18:00 from a client computer named Computer1. From which tab should you perform the configuration?

 

To answer, select the appropriate tab in the answer area.

 

Hot Area:

clip_image001

 

Correct Answer:

clip_image002

 

 

QUESTION 148

HOTSPOT

You have a server named Server1. Server1 runs Windows Server 2012 and has the Windows Deployment Services (WDS) server role installed. You install the DHCP Server role on Server1. You need to ensure that Server1 can respond to DHCP clients and WDS clients. What should you configure for the DHCP service and the WDS service?

 

To answer, configure the appropriate options in the answer area.

 

Hot Area:

clip_image003

clip_image004

 

Correct Answer:

clip_image005

 

 

QUESTION 149

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012. You need to create 3-TB virtual hard disk (VHD) on Server1. Which tool should you use?

 

A.      Server Manager

B.      Diskpart

C.      New-StoragePool

D.      New-VirtualDisk

 

Correct Answer: D

 

 

QUESTION 150

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012. You create and enforce the default AppLocker executable rules. Users report that they can no longer execute a legacy application installed in the root of drive C. You need to ensure that the users can execute the legacy application. What should you do?

 

A.      Modify the action of the existing rules.

B.      Create a new rule.

C.      Add an exception to the existing rules.

D.      Delete an existing rule.

 

Correct Answer: B

 

 

Comments are closed.