Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Question 1 2 pts Select all that apply. Windows Server 2012 deployment method op

ID: 3574904 • Letter: Q

Question

Question 1 2 pts

Select all that apply. Windows Server 2012 deployment method options include:

Flag this Question

Question 2 2 pts

The last step in the process for performing an offline join is to restart the client computer.

Flag this Question

Question 3 2 pts

How many trees are there in a forest?

Flag this Question

Question 4 2 pts

The AD DS database holds all domain-based information in five partitions.

Flag this Question

Question 5 2 pts

Challenges to using standard user accounts for services include:

Flag this Question

Question 6 2 pts

The two Commands to configure a Group Managed Service Account are the following:

Flag this Question

Question 7 2 pts

Windows Server 2012 provides the following tools for performing RSoP analysis:

Flag this Question

Question 8 2 pts

Folder redirection is a feature that allows folders to be located on a network server, but appear as if they are located on the local drive.

Flag this Question

Question 9 2 pts

You cannot use scripts to perform many tasks, such as clearing page files or mapping drives, and clearing temp folders for users.

Flag this Question

Question 10 2 pts

Select all that apply.

Group Policy settings perform the following three:

Flag this Question

Question 11 2 pts

Select all that apply

You can manage the Remote Access role in Windows Server 2012 by using the following three:

Flag this Question

Question 12 2 pts

Select three

Direct Access server deployment options include:

Flag this Question

Question 13 2 pts

A computer certificate for IPSec authentication is needed for Direct Access clients running Windows 7.

Flag this Question

Question 14 2 pts

Tools used to manage NPS include:

Flag this Question

Question 15 2 pts

A RADIUS proxy receives connection attempts from RADIUS clients but do not forward them to the appropriate RADIUS server or another RADIUS proxy for further routing.

Flag this Question

Question 16 2 pts

With NPS, you use certificates for network access authentication because they:
• Provide for stronger security
• Eliminate the need for less secure, password-based authentication

Flag this Question

Question 17 2 pts

Select four

Quota notifications can do any of the following:

Flag this Question

Question 18 2 pts

Types of storage reports include:

Flag this Question

Question 19 2 pts

BitLocker is full drive encryption that has the following characteristics:
•BitLocker can be used to encrypt an entire hard drive or only the used
parts of a hard drive
•BitLocker can be combined with EFS
•BitLocker protects the integrity of the Windows boot process
•Some features of BitLocker are only usable when a Trusted Platform
Module (TPM) is available on the comput

Flag this Question

Question 20 2 pts

Group Policy offers approximately 440 settings to manage and configure BitLocker.

Flag this Question

Question 21 2 pts

Select all that apply:

Three types of image files in WDS are used as boot or install images

Flag this Question

Question 22 2 pts

Windows Deployment Services prerequisites include:

Flag this Question

Question 23 2 pts

In Windows Server 2012, WSUS also includes Windows PowerShell cmdlets for administration

Flag this Question

Question 24 2 pts

Event Viewer does not provides categorized lists of essential Windows log events, and log groupings for individual installed applications and specific Windows component categories

Flag this Question

Question 25 2 pts

Select three

Data collector sets can contain the following types of data collectors:

Flag this Question

Question 26 2 pts

You can manage virtual switches by using the same toolset that you use to manage physical switches

Flag this Question

Question 27 2 pts

Virtual Machine Queue delivers network traffic directly to the _______

Flag this Question

Question 28 2 pts

Some best practices for increasing security are:

Flag this Question

Question 29 2 pts

UAC is a security feature that prompts the user for an administrative user’s credentials if the task requires administrative permissions.

Flag this Question

Question 30 2 pts

Software Restriction Policies (SRPs) disallow administrators to identify which apps are allowed to run on client computers.

Flag this Question

Question 31 2 pts

Select two

A GPO is:

Flag this Question

Question 32 2 pts

GPOs can be linked to:
• Users
• Groups
• Computers
• System containers

Flag this Question

Question 33 2 pts

NTFS permissions control access for files and folders on NTFS-formatted storage volumes.

Flag this Question

Question 34 2 pts

When combining shared folder and NTFS permissions, the most restrictive permission is ________

Flag this Question

Question 35 2 pts

Offline file settings allow a client computer to cache network files locally for offline use when they are
____________ from the network

Flag this Question

Question 36 2 pts

Select three

Work Folders has the following limitations:

Flag this Question

Question 37 2 pts

Select three about Shadow Copies:

Flag this Question

Question 38 2 pts

A mount point is a reference to a location on a disk that enables Windows operating system access to disk resources

Flag this Question

Question 39 2 pts

Virtual hard disks are files that can be ________ just like physical hard disks

Flag this Question

Question 40 2 pts

To create a virtual disk, you need the following:

Flag this Question

Question 41 2 pts

External DNS servers host only records that are resolved from the outside (i.e. mail and web servers) and Internal DNS servers host domain computer records, but exclude mail and web servers in a perimeter subnet.

Flag this Question

Question 42 2 pts

A forwarder is a DNS server designated to resolve external or offsite DNS domain names.

Flag this Question

Question 43 2 pts

An APIPA address on an interface indicates that a ________ server could not be contacted

Flag this Question

Question 44 2 pts

You can use Microsoft Message Analyzer to perform the following network analysis tasks:

Flag this Question

Question 45 2 pts

A DHCP relay agent listens for DHCP broadcasts from DHCP clients and then relays them to DHCP servers in different subnets.

Flag this Question

Question 46 2 pts

Command-line tools disallow you to automate AD DS administration.

Flag this Question

Question 47 2 pts

Select three

You can perform bulk operations by using:

Flag this Question

Question 48 2 pts

OUs allow you to subdivide the Domain for management purposes and OUs are used for:
• Delegation of control
• Application of GPOs

Flag this Question

Question 49 2 pts

Select two

A Group Policy setting:

Flag this Question

Question 50 2 pts

Select two

Policies refresh manually by using:

Microsoft IT Academy

Explanation / Answer

Multiple question , answering one.

You cannot use scripts to perform many tasks, such as clearing page files or mapping drives, and clearing temp folders for users.

FALSE
You can actually use.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote