MCSA Windows Server 2012 R2 Complete Study Guide. Panek William
Чтение книги онлайн.
Читать онлайн книгу MCSA Windows Server 2012 R2 Complete Study Guide - Panek William страница 16
47. C. Windows Server 2012 R2 Features On Demand allows an administrator not only to disable a role or feature but also to remove the role or feature’s files completely from the hard drive.
48. C. After generating hashes on the Colorado Springs file server that will be preloading Tampa’s file server cache with file share data, the next logical step is to run the Export-BCCachePackage to get the data to FS02 from FS01.
49. A. The iscsicli addisnsserver server_name command manually registers the host server to an iSNS server. refreshisnsserver refreshes the list of available servers. removeisnsserver removes the host from the iSNS server. listisnsservers lists the available iSNS servers.
50. D. Since there is a classification rule that is currently configured and applied to company resources, you will be unable to delete the Contains Personal Information classification property manually because the classification rule controls the property. In this case, you have to delete the classification rule in order to be able to delete the classification property.
51. B. If you need to get a stalled computer up and running as quickly as possible, you should start with the Last Known Good Configuration option. This option is used when you’ve made changes to your computer’s hardware configuration and are having problems restarting but have not logged into the machine. The Last Known Good Configuration option will revert to the configuration used the last time the computer was successfully booted.
52. A. When you enable boot logging, the file created is \Windows\ntbtlog.txt. This log file is used to troubleshoot the boot process.
53. D. Using images allows you to back up and restore your entire Windows Server 2012 R2 machine instead of just certain parts of data.
54. B. Out of the tools listed, remember that Vssadmin gives you the ability to use Shadow Copies, which in turn provides backups and previous versions of shared data. Wbadmin is used for Windows Server Backups, Ntsdutil.exe is used for Active Directory maintenance, and the ADSI Editor is used for extended Active Directory attribute management.
55. B. When you run your computer in Safe Mode, you simplify your Windows Server 2012 R2 configuration. Only the drivers that are needed to get the computer up and running are loaded.
56. C. Conditional forwarding allows you to send a DNS query to different DNS servers based on the request. Conditional forwarding lets a DNS server on a network forward DNS queries according to the DNS domain name in the query.
57. D. The dnscmd /zoneexport command creates a file using the zone resource records. This file can then be given to the Compliance department as a copy.
58. D. An exclusion just marks addresses as excluded; the DHCP server doesn’t maintain any information about them. A reservation marks an address as reserved for a particular client.
59. D. Active Directory Integrated zones give you many benefits over using primary and secondary zones including less network traffic, secure dynamic updates, encryption, and reliability in the event of a DNS server going down. The Secure Only option is for dynamic updates to a DNS database.
60. C. The Secure Only option is for DNS servers that have an Active Directory Integrated zone. When a computer tries to register with DNS dynamically, the DNS server checks Active Directory to verify that the computer has an Active Directory account. If the computer that is trying to register has an account, DNS adds the host record. If the computer trying to register does not have an account, the record gets tossed away and the database is not updated.
61. D. By default, Connection objects are automatically created by the Active Directory replication engine. You can choose to override the default behavior of Active Directory replication topology by manually creating Connection objects, but this step is not required.
62. D. The NTDS settings for the site level are where you would activate and deactivate UGMC.
63. D. Remember that a shortcut trust is used to eliminate multiple hops to and from certain domains within a multiforest, multidomain infrastructure. By configuring a shortcut trust between the two domains, you will reduce the slowness and authentication latency between them.
64. A. The Directory Service event log contains error messages and information related to replication. These details can be useful when you are troubleshooting replication problems.
65. C. The Knowledge Consistency Checker (KCC) is responsible for establishing the replication topology and ensuring that all domain controllers are kept up-to-date.
66. A and B. Certutil – backup backs up the CA certificate including private key in the backup. Certutil – backupdb backs up only the certificate database and logs.
67. B and C. Under AD Sites and Services, navigate to Services ⇒ RightsManagementServices and remove the SCP object. This operation can also be done by using ADSI Edit.
68. D. The relying party is the organization that receives and processes claims from a resource partner. The resource partner issues claims-based security tokens that contains published web-based applications that users in the account partner can access. This is accomplished through a relying-party trust. See Chapter 22 for more details.
69. D. AD RMS contacts the global catalog through port 3268. See Chapter 22 for more details.
Part I
Exam 70-410: Installing and Configuring Windows Server 2012 R2
Chapter 1
Install Windows Server 2012 R2
✔ Install servers
■ Plan for a server installation
■ Plan for server roles
■ Plan for a server upgrade
■ Install Server Core
■ Optimize resource utilization by using Features on Demand
■ Migrate roles from previous versions of Windows Server
■ Configure Server Core
■ Add and remove features in offline images
■ Deploy roles on remote servers
■ Convert Server Core to/from full GUI
■ Configure NIC teaming
✔ Configure local storage
■ Design storage spaces
■ Configure basic and dynamic disks
■ Configure MBR and GPT disks
■ Manage volumes
■ Create and mount virtual hard disks
■ Configure storage pools and disk pools
This chapter covers the installation of Windows Server 2012 R2. It shows how to install both the full version of Windows Server 2012 R2 and the Server Core version. It also shows you how to use some PowerShell commands in Windows