Question 1 2 pts Select all that apply. Windows Server 2012 deployment method op
ID: 3574915 • Letter: Q
Question
Question 1 2 pts
Select all that apply. Windows Server 2012 deployment method options include:
Flag this Question
Question 2 2 pts
The last step in the process for performing an offline join is to restart the client computer.
Flag this Question
Question 3 2 pts
How many trees are there in a forest?
Flag this Question
Question 4 2 pts
The AD DS database holds all domain-based information in five partitions.
Flag this Question
Question 5 2 pts
Challenges to using standard user accounts for services include:
Flag this Question
Question 6 2 pts
The two Commands to configure a Group Managed Service Account are the following:
Flag this Question
Question 7 2 pts
Windows Server 2012 provides the following tools for performing RSoP analysis:
Flag this Question
Question 8 2 pts
Folder redirection is a feature that allows folders to be located on a network server, but appear as if they are located on the local drive.
Flag this Question
Question 9 2 pts
You cannot use scripts to perform many tasks, such as clearing page files or mapping drives, and clearing temp folders for users.
Flag this Question
Question 10 2 pts
Select all that apply.
Group Policy settings perform the following three:
Flag this Question
Question 11 2 pts
Select all that apply
You can manage the Remote Access role in Windows Server 2012 by using the following three:
Flag this Question
Question 12 2 pts
Select three
Direct Access server deployment options include:
Flag this Question
Question 13 2 pts
A computer certificate for IPSec authentication is needed for Direct Access clients running Windows 7.
Flag this Question
Question 14 2 pts
Tools used to manage NPS include:
Flag this Question
Question 15 2 pts
A RADIUS proxy receives connection attempts from RADIUS clients but do not forward them to the appropriate RADIUS server or another RADIUS proxy for further routing.
Flag this Question
Question 16 2 pts
With NPS, you use certificates for network access authentication because they:
• Provide for stronger security
• Eliminate the need for less secure, password-based authentication
Flag this Question
Question 17 2 pts
Select four
Quota notifications can do any of the following:
Flag this Question
Question 18 2 pts
Types of storage reports include:
Flag this Question
Question 19 2 pts
BitLocker is full drive encryption that has the following characteristics:
•BitLocker can be used to encrypt an entire hard drive or only the used
parts of a hard drive
•BitLocker can be combined with EFS
•BitLocker protects the integrity of the Windows boot process
•Some features of BitLocker are only usable when a Trusted Platform
Module (TPM) is available on the comput
Flag this Question
Question 20 2 pts
Group Policy offers approximately 440 settings to manage and configure BitLocker.
Flag this Question
Question 21 2 pts
Select all that apply:
Three types of image files in WDS are used as boot or install images
Flag this Question
Question 22 2 pts
Windows Deployment Services prerequisites include:
Flag this Question
Question 23 2 pts
In Windows Server 2012, WSUS also includes Windows PowerShell cmdlets for administration
Flag this Question
Question 24 2 pts
Event Viewer does not provides categorized lists of essential Windows log events, and log groupings for individual installed applications and specific Windows component categories
Flag this Question
Question 25 2 pts
Select three
Data collector sets can contain the following types of data collectors:
Flag this Question
Question 26 2 pts
You can manage virtual switches by using the same toolset that you use to manage physical switches
Flag this Question
Question 27 2 pts
Virtual Machine Queue delivers network traffic directly to the _______
Flag this Question
Question 28 2 pts
Some best practices for increasing security are:
Flag this Question
Question 29 2 pts
UAC is a security feature that prompts the user for an administrative user’s credentials if the task requires administrative permissions.
Flag this Question
Question 30 2 pts
Software Restriction Policies (SRPs) disallow administrators to identify which apps are allowed to run on client computers.
Flag this Question
Question 31 2 pts
Select two
A GPO is:
Flag this Question
Question 32 2 pts
GPOs can be linked to:
• Users
• Groups
• Computers
• System containers
Flag this Question
Question 33 2 pts
NTFS permissions control access for files and folders on NTFS-formatted storage volumes.
Flag this Question
Question 34 2 pts
When combining shared folder and NTFS permissions, the most restrictive permission is ________
Flag this Question
Question 35 2 pts
Offline file settings allow a client computer to cache network files locally for offline use when they are
____________ from the network
Flag this Question
Question 36 2 pts
Select three
Work Folders has the following limitations:
Flag this Question
Question 37 2 pts
Select three about Shadow Copies:
Flag this Question
Question 38 2 pts
A mount point is a reference to a location on a disk that enables Windows operating system access to disk resources
Flag this Question
Question 39 2 pts
Virtual hard disks are files that can be ________ just like physical hard disks
Flag this Question
Question 40 2 pts
To create a virtual disk, you need the following:
Flag this Question
Question 41 2 pts
External DNS servers host only records that are resolved from the outside (i.e. mail and web servers) and Internal DNS servers host domain computer records, but exclude mail and web servers in a perimeter subnet.
Flag this Question
Question 42 2 pts
A forwarder is a DNS server designated to resolve external or offsite DNS domain names.
Flag this Question
Question 43 2 pts
An APIPA address on an interface indicates that a ________ server could not be contacted
Flag this Question
Question 44 2 pts
You can use Microsoft Message Analyzer to perform the following network analysis tasks:
Flag this Question
Question 45 2 pts
A DHCP relay agent listens for DHCP broadcasts from DHCP clients and then relays them to DHCP servers in different subnets.
Flag this Question
Question 46 2 pts
Command-line tools disallow you to automate AD DS administration.
Flag this Question
Question 47 2 pts
Select three
You can perform bulk operations by using:
Flag this Question
Question 48 2 pts
OUs allow you to subdivide the Domain for management purposes and OUs are used for:
• Delegation of control
• Application of GPOs
Flag this Question
Question 49 2 pts
Select two
A Group Policy setting:
Flag this Question
Question 50 2 pts
Select two
Policies refresh manually by using:
Microsoft IT AcademyExplanation / Answer
Answer:
1.Windows Server 2012 deployment method options include:Optical disk,USB flash drive.
2.True
3. 52
4.False
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.