Installing and Configuring Windows Server 2012
Question No: 181 – (Topic 2)
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Print and Document Services server role installed.
Server1 is connected to two identical print devices.
The solution must ensure that if one print device fails, the print jobs will print automatically on the other print device.
What should you do on Server1?
Add two printers and configure the priority of each printer.
Add one printer and configure printer pooling.
Install the Network Load Balancing (NLB) feature, and then add one printer.
Install the Failover Clustering feature, and then add one printer
Answer: B Explanation:
expedite documents that need to be printed immediately
A printing pool is one logical printer connected to multiple printers through multiple ports of the print server.
The printer that is idle receives the next document sent to the logical printer. When printing to a printer pool, the spooler will send waiting jobs to alternate ports. If the original or alternate ports are not available
NLB for printing is not supported
Would need 2 nodes
A printing pool is one logical printer connected to multiple printers through multiple ports of
the print server. The printer that is idle receives the next document sent to the logical printer. This is useful in a network with a high volume of printing because it decreases the time users wait for their documents.
A printing pool also simplifies administration because multiple printers can be managed from the same logical printer on a server. If one device within a pool stops printing, the current document is held at that device.
The succeeding documents print to other devices in the pool, while the delayed document waits until the nonfunctioning printer is fixed. Efficient printer pools have the following characteristics:
All printers in the pool are the same model.
Printer ports can be of the same type or mixed (parallel, serial, and network). It is recommended that all printers be in one location. Because it is impossible to predict which printer will receive the document, keep all printers in a pool in a single location. Otherwise, users might have a hard time finding their printed document. http://technet.microsoft.com/en-us/library/cc757086(v=ws.10).aspx http://technet.microsoft.com/en-us/library/
cc784619(v=ws.10).aspx http://technet.microsoft.com/en-us/library/cc958172.aspx You can create a printing pool to automatically distribute print jobs to the next available
printer. A printing pool is one logical printer connected to multiple printers through multiple ports of the print server. The printer that isidle receives the next document sent to the logical printer.
Question No: 182 HOTSPOT – (Topic 2)
Your network contains an Active Directory domain named contoso.com. The domain contains servers named Server1 and Server2 that run Windows Server 2012 R2.
You create a windows PowerShell script named Scriptl.psl that contains the following configuration:
You need to apply the configuration to Server1. The solution must ensure that the configuration on Server1 can be updated by modifying a MOF file on Server2.
Which actions should you perform on each server?
To answer, select the appropriate server on which to perform each action in the answer area.
Question No: 183 – (Topic 2)
You have a server that runs Windows Server 2012 R2.
You need to create a volume that will remain online if two disks in the volume fail.
The solution must minimize the number of disks used to create the volume. Which three actions should you perform in sequence?
Add five physical disks
Create a storage space and set the disk allocation of one of the disks to quot;Hot Sparequot;
Create a virtual disk
Create a storage space by using the default disk allocation
Add three physical disks
Answer: A,C,D Explanation:
A storage space with three-way mirroring can tolerate two disk failures but requires a minimum of five disks.
http://technet.microsoft.com/en-us/library/hh831739.aspx http://technet.microsoft.com/en-us/library/jj822938.aspx http://technet.microsoft.com/en-us/library/jj899886.aspx http://technet.microsoft.com/en-us/library/5de72fb5-e1e3-43a7-a176-d17cdf4d312e
Question No: 184 – (Topic 2)
You have a Hyper-V host named Server1 that runs Windows Server 2012 R2. Server1 hosts a virtual machine named VM1 that runs Windows Server 2012 R2. VM1 has several snapshots.
You need to modify the snapshot file location of VM1. What should you do?
Delete the existing snapshots, and then modify the settings of VM1.
Right-click VM1, and then click Move.
Right-click VM1, and then click Export.
PauseVM1, and then modify the settings of VM1.
Answer: A Explanation:
You will need to navigate to the Hyper-V Management snap-in (C:\ProgramData\Microsoft\Windows\Hyper-V) and from there access the Snapshot file Location tab where you can change the settings for the VM1 snapshot file location.
However, since there are already several snapshots in existence, you will need to delete them first because you will not be able to change the location of the snapshot file while there is an existing snapshot.
You need to modify the snapshot file location of VM1.
Question No: 185 – (Topic 2)
Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2012 R2.
The domain contains a user named User1 and a global security group named Group1.
You need to ensure that User1 can manage the group membership of Group1. The solution must minimize the number of permissions assigned to User1.
Which cmdlet should you run?
Answer: G Explanation:
The Set-ADGroup cmdlet modifies the properties of an Active Directory group. You can modify commonly used property values by using the cmdlet parameters. For example, the
-ManagedBy parameter allows you to specify a user or group of users who can manage the specified AD group.
Question No: 186 – (Topic 2)
Your network contains an Active Directory domain named contoso.com. The domain contains hundreds of groups, many of which are nested in other groups.
The domain contains a user account named user1.User1 is a direct member of 15 groups.
You need to identify of which Active Directory groups User1 is a member, including the nested groups. The solution must minimize administrative effort.
Which tool should you use?
Active Directory Users and Computers
Question No: 187 – (Topic 2)
Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2012 R2.
Server2 establishes an IPSec connection to Server1.
You need to view which authentication method was used to establish the initial IPSec connection.
What should you do?
From Windows Firewall with Advanced Security, view the quick mode security association.
From Event Viewer, search the Application Log for events that have an ID of 1704.
From Event Viewer, search the Security Log for events that have an ID of 4672.
From Windows Firewall with Advanced Security, view the main mode security association.
Answer: D Explanation:
Main mode negotiation establishes a secure channel between two computers by determining a set of cryptographic protection suites, exchanging keying material to establish a shared secret key, and authenticating computer and user identities. A security association (SA) is the information maintained about that secure channel on the local computer so that it can use the information for future network traffic to the remote computer. You can monitor main mode SAs for information like which peers are currently connected to this computer and which protection suite was used to form the SA.
To get to this view
In the Windows Firewall with Advanced Security MMC snap-in, expand Monitoring, expand Security Associations, and then click Main Mode.
The following information is available in the table view of all main mode SAs. To see the information for a single main mode SA, double-click the SA in the list.
Main mode SA information
You can add, remove, reorder, and sort by these columns in the Results pane: Local Address: The local computer IP address.
Remote Address: The remote computer or peer IP address.
1st Authentication Method: The authentication method used to create the SA.
1st Authentication Local ID: The authenticated identity of the local computer used in first authentication.
1st Authentication Remote ID: The authenticated identity of the remote computer used in first authentication.
2nd Authentication Method: The authentication method used in the SA.
2nd Authentication Local ID: The authenticated identity of the local computer used in second authentication.
2nd Authentication Remote ID: The authenticated identity of the remote computer used in second authentication.
Encryption: The encryption method used by the SA to secure quick mode key exchanges. Integrity: The data integrity method used by the SA to secure quick mode key exchanges. Key Exchange: The Diffie-Hellman group used to create the main mode SA.
Question No: 188 – (Topic 2)
You have two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 has the DHCP Server server role installed.
You need to create an IPv6 reservation for Server2.
Which two values should you obtain from Server2? (Each correct answer presents part of the solution. Choose two.)
the hardware ID
the DHCPv6 unique identifier
the DHCPv6 identity association ID
the SMSBIOS GUID
the MAC address
Answer: B,C Explanation:
The Add-DhcpServerv6Reservation cmdlet reserves a specified IPv6 address for the client identified by the specified Dynamic Host Configuration Protocol (DHCP) v6 unique identifier (ID) (DUID) and identity association ID (IAID).
Question No: 189 – (Topic 2)
Your network contains an Active Directory domain named contoso.com.
An organizational unit (OU) named OU1 contains the computer accounts for laptops and desktop computers.
A Group Policy object (GPO) named GP1 is linked to OU1.
You need to ensure that the configuration settings in GP1 are applied only to a user named User1.
What should you do?
Modify the security settings of OU1.
Modify the GPO Status of GP1.
Modify the security settings of GP1.
Configure the WMI Filter of GP1.
Answer: C Explanation: References:
Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 10:
Implementing Group Policy, p. 470, 482 http://technet.microsoft.com/en-us/library/jj134176 WMI filtering using GPMC
Question No: 190 – (Topic 2)
You have a server named Data1 that runs a Server Core Installation of Windows Server 2012 R2 Standard.
You need to configure Data1 to run a Server Core Installation of Windows Server 2012 R2 Enterprise. You want to achieve this goal by using the minimum amount of administrative effort.
What should you perform?
a clean installation of Windows Server 2012
an offline servicing by using Dism
an online servicing by using Dism
an upgrade installation of Windows Server 2012
Answer: C Explanation: References:
Training Guide: Installing and Configuring Windows Server 2012 R2: Chapter 2: Deploying Servers, p. 44
Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2: Chapter 1: Installing and Configuring Servers, p. 19-22
100% Dumps4cert Free Download!
–Download Free Demo:70-767 Demo PDF
100% Dumps4cert Pass Guaranteed!
–Download 2018 Dumps4cert 70-767 Full Exam PDF and VCE
|Lowest Price Guarantee||Yes||No||No|
|Free VCE Simulator||Yes||No||No|