Zacker Book, Chapter 8

Not entirely through with reading this chapter but I have made it about half way through this text from appearance and page number which I suppose makes sense
since im half way through the book chapter wise. Really happy with the progress ive made so far. Hopefully the answers are correct and the links are helpful
and appropriate. I get a little concerned when reaching any farther back than the start of 2012 but some times theres not really a better a option. This is also
a good time to take few days off from bogging so that I can finish reading the book. Im also moving this to a wordpress site as Im not convinced that Tumblr is
the best place to host some thing like this. Birthday present from the family. Excited to do more with the coding in the future. Having more fun with it than I
ever thought I would. Went the rout of an admin because I thought I hated coding so much. Took a similar route in art school. Who knows maybe Ill be a code monkey
in the future.

Edit: almost forgot to add this, still need to edit the first post with the “editor” text from chapter 3. Please read the header for this post
regarding the answer key situation for these chapters.

1. Which of the following statements about VHDX files is/are true?

A. VHDX files can be as large as 64 TB.

B. VHDX files can only be opened by computers running Windows Server 2012.

C. VHDX files support larger block sizes than VHD files.

D. VHDX files support 4kb logical sectors.

Answer: All of them are true. The book wording for the question is a bit sketchy however all of the above
statements are true about VHDX files according to the text and several google articles I just read through.

2. Which of the following must be true about a pass-through disk?

A. A pass-through disk must be offline in the guest OS that will access it.

B. A pass-through disk must be offline in the parent partition of the Hyper-V server.

C. A pass-through disk can only be connected to a SCSI controller.

D. A pass through disk must be added to a VM with the disk management snap in.

Answer: B, the pass-through disk must be available on the hyper V host and offline in order for the VM to be able to
access it for more information check out this TechNet Article

3. The merge function only appears in the Edit Virtual Hard Disk Wizard under which of the following conditions?

A. When you select a VHDX file for editing.

B. When you select two or more disks for editing.

C. When you select a disk with free space available in it.

D. When you select a differencing disk for editing

Answer: D, merge combines a differencing disk and a parent disk but you have to select the differencing disk first, this
one is available in the other text for reference checking. Any way, heres an older article for information on how to
create a merged differencing disk

4. Which of the following are valid reasons not to take snapshots of VMs? (choose all that apply)

A. Snapshots can consume a large amount of disk space.

B. Each snapshot requires a separate copy of the VMs memory allocation.

C. Each snapshot can take several hours to create.

D. The existence of snapshots slows down VM performance.

Answer: A, D according the the cross checked material. While deciding to google question 9 I found this answer listed there as well.

5. Which of the following is not required to add Fibre Channel adapter to Hyper-V?

A. You must create a Fibre Channel virtual SAN.

B. You must have a physical Fiber Channel adapter installed in the host computer.

C. You must have a Fibre Channel adapter driver that supports virtual networking.

D. You must have a SCSI cable connecting the Fibre Channel adapter to the storage devices.

Answer: D, SCSI cables are obviously not required for a for a Fiber Channel adapter.

6. What Server Manager tool allows you to create a new virtual hard disk (VHD)?

A. Hyper-V server

B. Active Directory Domain Services (AD DS) manageability

C. Hyper-V Manager

D. File and storage services

Answer: C, new VHDs are created in Hyper-V Manager

Here is a video on how to create a new VHD thats helpful for some of the previous questions, there is also this

7. When creating a new VHD what feature does Windows PowerShell offer that the graphical interface does not?

A. You can specify the block size and the logical sector size

B. You can decide between VHD and VHDX disk types

C. You can choose among Fixed, Dynamic or differencing.

D. You can specify the path.

Answer: A, if you’ve gotten proficient at reading Technet articles on PowerShell cmdlets this one on
new-vhd is helpful.

8. Can you modify an existing VHD file?

A. No, once created a VHD file is fixed

B. Yes, but you can only modify it using PowerShell

C. No, but you can change it into a VHDX file.

D. Yes, you can even modify it without mounting it to a VM.

Answer: D, you can compact, convert, expand and shrink an existing VHD file using the hypver-v manager console.

Here is a short video showing how to convert a VHD to a VHDX but thats part of the process to edit a VHD at all
so its part of C but the no answer is wrong.

I probably should cover some PowerShell cmdlets too shouldnt I? ok maybe that would be good

9. Do VMs ever directly access a physical hard disk?

A. No, VMs access only VHDs, areas of space on the physical hard disk.

B. Yes, VMs access a physical hard disk by way of a “pass through disk” a special
virtual disk that directly accesses the physical disk if it is made exclusively available
to the VM.

C. No, VMs access physical hardware only through the hypervisor.

D. Yes, VHDs correlate one to one with physical hard disks.

Answer: B, I actually decided to google this one and came across an interesting site that might be helpful
to those of us working against a clock with server 2012. This
site has some flash cards that may be useful. I would recommend studying the technologies more directly then learning
the chaotic logic associated with putting the words (in this case the ideas of the technologies) into sentences due to the
previously mentioned problem of ideas not exactly correlating 1-1 with questions due to the nature of real life server administration.

10. Creating a virtual SAN allows you to ______.

A. Eliminate the physical disk.

B. Have VHDs communicate with physical hard disks.

C. Make distant storage accessible to VMs.

D. Utilize the Fibre Channel adapters.

Answer: D, in order for you to use A virtual SAN you must use a Fibre Channel adapter communication protocol. For more information
on implementing this technology please check TechNet.

Zacker book, Chapter 7

I feel like we are starting to make progress. Give that its the first of the month I think I should possibly be able to get through this
text, go through measure up a few times and test again by the end of the month. We will see what it has in store for me this time.
I did actually find this chapter to be very helpful as it was full of illustrations and ideas I had not seen presented in other materials.
Well worth reading twice.

Please read the header for this post
regarding the answer key situation for these chapters.

1. Which of the following statements about Type I and Type II virtualization are true?

A. In Type I Virtualization the Hypervisor runs on top of a Host OS.

B. In Type I Virtualization the Hypervisor runs directly on the computer hardware.

C. In Type II Virtualization, the Hypervisor runs on top of a host OS.

D. In Type II Virtualization, the Hypervisor runs directly on the computer hardware.

Answer: B, and C I found this bit of information interesting as I had not seen it other places but its basicly telling you how
Hyper-V interacts with the host operating system in a way thats superior to other virtualizatioon products.

Its also helpful to provide a definition here for these two products, so here is some thing found in the oline
PDF book

Hyper-V uses Type I virtualization, in which the hypervisor is an
abstraction layer that interacts directly with the computer’s physical hardware—that is, without
an intervening host OS. The term hypervisor is intended to represent the level beyond the term
supervisor, in regard to the responsibility for allocating a computer’s processor clock cycles.
The hypervisor creates individual environments called partitions, each of which has its
own OS installed and accesses the computer’s hardware via the hypervisor. Unlike Type II
virtualization, no host OS shares processor time with the hypervisor. Instead, the hypervisor
designates the first partition it creates as the parent partition and all subsequent partitions as
child partitions

This arrangement, in which the hypervisor runs on top of a host OS, is called Type II virtualization.
By using the Type II hypervisor, you create a virtual hardware environment for each
VM. You can specify how much memory to allocate to each VM, create virtual disk drives by
using space on the computer’s physical drives, and provide access to peripheral devices. You
then install a “guest” OS on each VM, just as if you were deploying a new computer. The host
OS then shares access to the computer’s processor with the hypervisor, with each taking the
clock cycles it needs and passing control of the processor back to the other

2. Which of the following types of server virtulization provides the best performance for high-traffic servers
in production environments?

A. Type I virtualization

B. Type II virtualization

C. Presentation virtualization

D. Remote App

Answer: A, if you read the previous explanation its fairly obvious.

3. Which of the following Microsoft operating systems includes a license that enables you to create and unlimited number of
virtual instances of Server 2012

A. Hyper-V Server 2012

B. Windows Server 2012 Datacenter

C. Windows Server 2012 Standard

D. Windows Server 2012 Foundation

Answer: B allows unlimited, C allows 2 and D allows for 0 virtualized instances. Having trouble finding a whole lot of useful
info for comparisons sake other than pdf shown on this blog

4. Which of the following Hyper-V features make it possible for a VM to function with a minimum Ram value
that is less than the start up value?

A. Smart paging

B. Dynamic memory

C. Memory weight

D. Guest integration services

Answer: B, given these choices which appear to be tricky answers as none of them are straight forward, again kind of
using crow wing logic from my illustration but the answer according to the text is that dynamic memory
is the technology that allows more fluid, so to speak, ram functions.

5. When you install the Hyper-V role on a server running Windows Server 2012, the instance of the OS on which you installed the role
is converted to which system element?

A. The hypervisor

B. The Virtual Machine Monitor

C. The parent partition

D. A child partition

Answer: C, the parent partition, hypervisor is the software and VMM has to do with VmWare

6. If an administrator wants to install additional roles along with Hyper-V what does Microsoft recommend the administrator do?

A. Microsoft recommends that you install other roles on one of the VMs you create with Hyper-V.

B. Microsoft recommends that you install only roles related to Hyper-V

C. Microsoft recommends you install only roles on the parent partition

D. There are no recommendations against roles installed with Hyper-V

Answer: A, according to the text you should install additional roles such as DHCP on a VM. It doesnt implicitly say this
but its implied that this is for performance reasons. Again I question the cost effectiveness of this but perhaps
if the question about how Hyper-V operates directly on the hardware instead of on top of the OS is true I assume its
effecent but even still the additional clock cycles of having the OS installed where Hyper-V is installed still make it
only efficient in terms of downtown for critical services and development.

7. What are the two files used for every VM?

A. A saved state file & a .vmc file in INF format

B. A .vmc file in INF format and virtual hard disk (.vhd or vhdx) files for the guest OS and data

C. A saved-state file and virtual hard disk (.vhd or .vhdx) files for the guest OS applications and data

D. A virtual machine configuration (.vmc) file in XML format and virtual hard disk (.vhd or .vhdx) files for the guest OS and data

Answer: D, every VM has a .vmc xml file and it has to have a VHD associated with it thats only used by that virtual machine.

8. When using the create a virtual machine wizard, how is the virtual hard disk created by default?

A. You set the maximum size and it starts at that size

B. It starts at 40 GB and warns the admin when close to full

C. It starts small and dynamically expands up to the maximum size you specify

D. It starts small and continually expands to fill the available storage

Answer: D, this is known as a dynamically expanding VHD. There is an older technet article about the subject available
here some of the terminology is older
however the ideas are correct, according to whats in the text.

9. What operating systems can an administrator install on a VM?

A. Windows Server 2008 and newer

B. Windows Server 2003 and newer

C. Any Microsoft windows edition

D. Several Microsoft products as well as Red Hat and SuSe Linux

Answer: D, you can install almost any thing on a VM

10. In some cases, certain Hyper-V guest OS features do not function properly using the OS’s own device drivers. What can an
administrator do?

A. Install and configure Guest Integration Services

B. Install Hyper-V manager

C. Reinstall Hyper-V

D. Try a different operating system

Answer: A, according to the test if native OS features do not function properly try integration services to get them up and
running.

Zacker book, Chapter 6

On to chapter 5, only 14 more question sets to go for this round. Leaving my self some room to go through the book again and possibly
go through the Panek book as well. Not sure if I will have time for that before my shots at exams are up but I dont imagine I would want
to quite studying even after those are over as Im sure the knowledge will transfer. However I did pick up a Network + book, I think I
mentioned that previously, as Ive found my fundamental/basic networking skills to be slightly lacking.

Edit: again, Please read the header for this post
regarding the answer key situation for these chapters.

1. Which of the following tasks must you perform before you can manage a remote server running Server 2012 using the
compmgmt.msc (computer management) snap in?

A. Enable WinRM on the remote server.

B. Enable the COM+ Network Access rule on the remote server.

C. Enable the Remote Event Log Management rules on the remote server.

D. Install RSAT on the remote server

Answer: B, this one was actually verifiable, its still probably good to read the RSAT tools link even though it has nothing to do
with firewall rules.

2. Which of the following PowerShell cmdlets can you use to list the existing Windows Firewall rules on a computer running Windows
Server 2012?

A. Get-NetFirewallRule

B. Set-NetFirewallRule

C. Show-NetFirewallRule

D. New-NetFirewallrule

Answer: A,C you could also specify certain parms to have them listed in an orginzed fashion. Like you could use the
Export-Csv

cmdlet to get them really organized
or there are a lot of them I would test the recursive function just to see if it changes the results. Not sure if it would or not
I suppose that would be easy enough to test in a MSFT lab. They do time out rather quickly though.

3. Which of the following updates must you install on a server running windows server 2008 before you can connect to it using Server 2008
before you can connect to it using Windows Server 2012 SrvMan?

A. .NET Framework 3.5

B. .NET Framework 4.0

C. Windows Management Framework 3.0

D. Windows Server 2008 R2

Answer: C and B specifics like this are always a little tricky for me. I suppose I could put some effort into remembering 4.0
In addition here is an article
on this particular subject. Pretty sure Ill remember this one now.

4. When you run Server Manager from a Windows 8 Workstation using Remote Server Admin tools, which of the following elements do
not appear in the default display?

A. The Dashboard

B. The local Server homepage

C. The All Servers homepage

D. The Welcome tile

Answer: B, the local server homepage clearly cant display as your not on a server.

5. Windows Firewall is enabled by default in Windows Server 2012. How are remote management tools affected?

A. Both MMC and WinRM are blocked. You must alter inbound Firewall rules on the remote server.

B. MMC is blocked. You must alter inbound Windows Firewall rules on the remote server.

C. WinRM is blocked. You must alter inbound Windows Firewall rules on the remote server.

D. Neither MMC not WinRM is blocked.

Answer: B is true but a brings up an interesting point, at least to me, is server manager considered part of WinRM? Im assuming its the
same thing and you should be able to add any server in your domain to your Server Manager console as long as its a 2012 sever
without any issues. If you had trouble with that check out this TechNet article
on the subject indicating that WinRM should allow you to add any server in your domain. As MMC is kind of an out of date technology
it is not enabled by default and requires firewall configuration even inside the domain. Powershell remote management is very similar
but as with adding a server to your server manager it to requires you to specify credentials when accessing, for more info on that
check here

Theres also a video on this topic however you dont see him specify any kind of domain credentials when he adds a server to server manager
so perhaps we should investigate further so we are certain about this process. Any way for starters heres that video which is helpful for
question 8 as well as this guy is running server manager from a desktop

Ok so if we check with Technet on adding servers to server manager
about a third of the way down the page it goes into the process of providing those and it seems like it would be an intuitive process after use
as it basically describes it as being similar to a UAC prompt only you are only asked the first time and they are cached. So dont leave your
machine unlocked! That said, I dont have the luxury of using server so hopefully I dont miss an overly complex scenario question on the subject.

6. How can you remotely configure the firewall on several servers at once?

A. Use the powershell command set-netfirewallrule -name -enabled true

B. Applying the configuration change to the applicable server grouping in Server Manager.

C. Creating a configuration file for Jr. Admins to configure servers in parallel.

D. Applying a Group Policy related to Windows Firewall to the servers.

Answer: A, D would both work for firewall management. The TechNet article on using GP to deploy firewall rules is fairly old
so im linking a newer article in this case.

7. The Server Manager interface accommodates several servers, tested at nearly 100. What did the text (Zacker says lesson) highlight
as an element that can easily degrade Server Manager performance, and how to resolve it?

A. The Event tile generates a large number of records. It is resolved by configuring the types ages and sources of events.

B. The hardware resources of the Server Manager computer can degrade Server Manager. It is resolved by adding additional server memory.

C. The server’s screen resolution is set too high. It is resolved by choosing a lower resolution.

D. The amount of data the sever sends to all remote servers can degrade Server Manager. It is resolved by NIC teaming.

Answer: B, Adding that many servers can really tie up network and processor bandwidth.

8. By default Server Manager does not connect with down-level servers (for example a 2012 box could not connect to an unpatched
08 box). What must be done to properly connect?

A. Remote manage the down-level server by MMC.

B. Disable the Windows Firewall on the down-level server.

C. Add WinRM 3.0 and .NET 4.0 to the down-level server to ensure its patched

D. Perform an in place upgrade to server 2012 to all 08 R2 machines and lower.

Answer: C, as previously mentioned in the links and texts above.

9. Server Manager is properly connecting and managing your down-level servers. What tool do you use to add roles and features
to theses computers?

A. Using the Add Roles and Features Wizard in Server Manager to install the role.

B. Using Windows PowerShell to install the role.

C. Using the MMC and the applicable snap-in.

D. You cannot add a role remotely to a down-level server.

Answer: You could use A or B but generally its easier to use A. Regardless I thought it might be helpful to watch a video on the
topic.

There’s also a useful Technet article
here.

10. PowerShell web access gateway allows ________

A. Users to remotely connect to their desktops.

B. administrators to remotely manage IIS servers.

C. Uses a command-line alternative to standard websites.

D. Administrators remote management of servers using commands.

Answer: D, this one is pretty straight forward. While we are on a role here why not put another video in here feature our buddy Rick Claus
he has a pretty decent twitter account if your into that sort of stuff. Its kind of sales demo but its still cool.

https://www.youtube.com/watch?v=Qn7P6eGRy9Q

Thats all for this round. I dont know if youve noticed the punctuation issue with some posts have periods and some dont. I hope you dont find that
weird as the text does that as well. Not sure why and I have mixed feelings as to if answers are complete sentences that would require punctuation.

Zacker book, Chapter 5

I had hoped to get through this one on the same day as the previous one but that doesn’t seem likely. Ended up having a busier day
than expected. However, I don’t think I have any thing going on tomorrow. Wednesday Ill be writing on the night shift (hopefully) after
going to see a Norwegian band. Which reminds me that I should save the PDF ive been referencing to a local drive or check the text
before I go out. Regardless of how the timing works out it should be a fun night. Really starting to enjoy coding, as long as I don’t
push my self to fatigue, some thing that seems ironic to a person that spend that past two summers doing lawn care, from typing and thinking
its actually a lot more enjoyable than I ever expected it to be. My impression as a young man was that it was almost mindless work but
yet I seemed to enjoy the results it yielded. A bit selfish or short sighted of me perhaps.

My apologize for the personal dialog, now on to the important part. I suppose I could also say that Im leaving a few questions to type out
later if im feeling so inclined after retesting (and most likely failing) again.

Please read the header for this post
regarding the answer key situation for these chapters.

1. Which of the following terms describes the software interface through which a computer communicates with a print device?

A. Printer

B. Print Server

C. Printer driver

D. Printer management Snap-in

Answer: A, a printer is the software interface. This is a confusing term as its used very flippantly in some documents but the official
use indicates that a print device is the hardware that actually prints out the product, the printer sends the document to the
print server which sends the document to the printer using code that it can understand provided by the client local driver.

2. What printing configuration makes the computer with the locally attached print device function as a print server?

A. Network attached printer sharing

B. Network attached printing

C. Locally attached printer sharing

D. Direct printing

Answer: C, there isnt a lot in the gospels of technet about this from a definitional standpoint but the answer is cross-referenceable
and it appears in the text. It seems to be kind of an older idea as most of the searchable articles are on XP.

3. When planning for additional disk space for the print server spooler consider extra storage for ____.

A. Overhead in case of several smaller print jobs

B. The print server page file

C. Older less efficient print drivers

D. Temporary print device outages

Answer: D, there really isnt much conversation to be had around this point. Just kind of is what it is.

4. Can you install 32-bit print drivers on a Windows Server 2012 system?

A. No because Windows Server 2012 is a 64-bit platform.

B. Yes, because Windows Server 2012 is a 64-bit platform which comes with 32 bit support.

C. No, but you can install the 32-bit driver from a computer running a 32-bit version of Windows.

D. No, but you can install the 32-bit driver from a computer running a 32-bit version of a Windows.

Answer: B, you can install 32-bit drivers because a 64 bit platform can support 32 bit drivers but the reverse is
not true. So you cant put 64-bit drivers on a 32 bit system. This was a “checkable” question.

5. What is the purpose of the Remote Desktop Easy Print driver?

A. Easy print allows remote clients to print to local print devices via a print re-director.

B. Easy print allows admins to configure printers for users connected remotely.

C. Easy print allows administrators to print to remote print devices via a print re-director.

D. Easy print allows remote configuration of all printers

Answer: B, this is true for RDP connections are terminal style usage. For more information check the Technet
article on terminal printing.
Dont forget to hit that search bar with easy print driver and check out a few other articles. I know its
powered by bing but on an intraweb database searching system it seems surprisingly effective. 🙂

6. For a user to print, pause, resume, restart and cancel documents they sent to the printer, the user must have the
basic _____ permission.

A. Take ownership

B. Manage this printer

C. Basic print

D. Manage documents

Answer: C, basic print permissions allows user to cancel “his or her” own documents. I found the book verbiage on this
question to be a little overly complicated when implying the idea of individually owned documents being sent to
a print device.

7. You are setting up a printer pool on a computer running Windows Server 2012. The printer pool contains three print
devices, all identical. You open the properties dialog box for the printer and select the Enable Printer Pooling
option on the Ports tab. What must you do next?

A. Configure the LPT1 port to support three printers.

B. Select or create the ports mapped to the three printers.

C. On the device settings tab, configure the installable options to support two additional print devices.

D. On the advanced tab, configure the priority for each print device so that printing is distributed among the
three print devices.

Answer: B, you need to configure the ports mapped to the three printers per the the book text and cross-referencing.

8. One of your print devices is not working properly and you want to temporarily prevent users from sending jobs to the printer serving
the device. What should you do?

A. Stop sharing the printer

B. Remove the printer from Active Directory

C. Change the printer port

D. Rename the share

Answer: A, stop sharing the printer is the best option per the book. Check this article
for more information on implementing that process.

9. You are administering a computer running Windows Server 2012 set up as a print server. Users in the marketing group
complain that they cannot print documents using a printer on the server. You view the permissions in the printer’s
properties. The Marketing group is allowed Manage Documents permission. Why cant the users send documents to the print
device?

A. The everyone group must be granted the Manage documents permissions.

B. The administrators group must be granted the manage printers permission.

C. The marketing group must be granted the print permission.

D. The marketing group must be granted the manage printers permission.

Answer: C, you cant print to a device without the basic print permission.

10. You are administering a print server running Windows Server 2012. You want to perform maintenance on a print device
physically connected to the print server. There are several documents in the print queue. You want to prevent the
documents from being printed to the printer but you don’t want users to have to resubmit the documents to the
printer. What is the best way to do this?

A. Open the printer’s properties dialog box, select the sharing tab and then select the Do Not Share This Printer option.

B. Open the printer’s properties dialog box and select a port that is not associated with a print device.

C. Open the printer’s queue window, select the first document, and then select pause from the documents window.

D. Open the printer’s queue window & select the pause printing option from the printer menu.

Answer: D, this one seems fairly obvious.

Zacker book, Chapter 4

On to chapter 4, did meet my established quota but ran into some thing unknown to me, I heard a robot once call it fatigued. Hopefully
that wont happen today but you never know. Maybe I can finish up the last two that I had planned to get out yesterday, today. Yeserday
possibly would have been better for me. Not sure why I feel that way.

Please read the header for this post
regarding the answer key situation for these chapters.

1. Which of the following is the best description of a security principle?

A. A person granting the permissions to network users.

B. The network resource receiving permissions.

C. A collection of individual special permissions.

D. An AD object that gets assigned permissions.

Answer: D, this one didnt have an answer and I thought the wording was poor but the general idea is the user thats being granted
the permissions per the book so I changed the wording of D around to better express this though. So not only does this book not have the answers
but im having to edit it too!!! OMG, what a turd haha

2. Which of the following statements about effective access is not true?

A. Inherited permissions take precedence over explicit permissions.

B. Deny permissions always override Allow permissions.

C. When a security principal receives Allow permissions from multiple groups the
permissions are combined to form the effective access permissions.

D. Effective access includes both permissions inherited from parents and permissions
derived from group membership.

Answer: A, To quote another source “When a
security principal receives permissions by inheriting them from a parent or from group
memberships, you can override those permissions by explicitly assigning contradicting
permissions to the security principal itself.”

3. Which of the following statements is not true in reference to resource ownership?

A. One of the purposes for file and folder ownership is to calculate disk quotas.

B. Every file and folder on an NTFS drive(r?) has an owner

C. It is possible for any user possessing the Take Ownership special permission to assume the ownership of a file
or folder.

D. It is possible to lock out a file or folder by assigning a combination of permissions that permits access to no one
at all, including the owner of the file or folder.

Answer: B, every folder does not have to be assigned an owner. This two has no answer but im like 80% sure this is what
the chapter is indicating. If its wrong please hit my inbox.

4. Which of the following statements about permissions is true?

A. ACLs (access control lists) are composed of ACEs (access control entries)

B. Basic permissions are composed of advanced permissions

C. All permissions are stored as part of the protected resource.

D. All of the above.

Answer: A & B are verifiably true and C is questionable & and hard to verify. The term “protected resource” is hard to
verify in this context.

5. What is the maximum number of shadow copies that a Windows Server 2012 system can maintain for each volume?

A. 8

B. 16

C. 64

D. 128

Answer: C for more information see the TechNet article on Shadow Copies

6. Which of the following terms describes the process of granting users access to file server shares by reading their permissions?

A. Authentication

B. Authorization

C. Enumeration

D. Assignment

Answer: D, not much to say with this one.

7. Which of the following are tasks that you can perform using the quotas in the FSRM but you cant perform with NTFS quotas?

A. Send an email notification to an administrator when users exceed their limits.

B. Specify different storage limits for each user.

C. Prevent users from consuming any storage space on a volume beyond their allowed limit.

D. Generate warnings to users when they approach their allotted storage limit.

Answer: A, NTFS quotas do not allow you to send an email for auditing.

8. In the NTFS permissions system, combinations of advanced permissions are also known as _________ permissions.

A. Special

B. Basic

C. Share

D. Standard

Answer: B, this is not cross-reference-able however it is in the text. I also found this website to be a helpful source of
information

Zacker book, Chapter 3

On to chapter three. As previously mentioned, trying to get through typing out 3 of these chapters and two read. Again, not sure of the
legality of this situation but as Server 2012 will soon be a thing of the past and PDFs of similar books exist as free resources im not
entirely sure that I could get into any kind of trouble for this. Assuming there could be an issue and your a publisher/content creator, please e-mail me with any problems,
NickRbarnes@gmail.com. I suppose I could put that in the first chapter header. Maybe Ill go back and edit that.

If reading for reference please read the header for this post
regarding the answer key situation for these chapters.

In addition if any one knows why lower case S letters display so weird in this theme please use the aforementioned email address as I wish i knew, default font issue?

Select one or more correct answers for the following questions.

1. Which of the following statements are true of stripped volumes?

A. Striped volumes provide enhanced performance over simple volumes.

B. Striped volumes provide greater fault tolerance than simple volumes.

C. You can extend striped volumes after creation.

D. If a single physical disk in the striped volume fails, all of the data in the entire volume is lost.

Answer: A,D striped volumes provide excellent read write I/O numbers however they offer none of the resiliency that comes with
a RAID-5 or mirrored volume. The fault tolerance is no more or less than a simple volume as there is no parity data and you cannot extend them.

2. Which of the following are requirements for extending a volume on a dynamic disk?

A. If you want to extend a simple volume, you can use only the available space on the same disk, if the volume is to remain simple.

B. The volume must have a file system before you can extend a simple or spanned volume.

C. You can extend a simple or spanned volume if you formatted it using the FAT or FAT32 file system.

D. You can extend a simple volume across additional disks if it is not a system volume or a boot volume.

Answer: A, D, for more information check this TechNet article on the subject

3. Which of the following are not true in reference to converting a basic disk to a dynamic disk?

A. You cannot convert a basic disk to a dynamic disk if you need to dual boot the computer.

B. You cannot convert drives with volumes that use an allocation unit size greater than 512 bytes.

C. A boot partition or system partition on a basic disk cannot be extended into a striped or spanned volume, even
if you convert the disk to a dynamic disk.

D. The conversion will fail if the hard drive does not have at least 1 MB of free space at the end of the disk.

Answer: C, D this one doesn’t have a reference check answer but there is an older TechNet article.

4. Which of the following Server 2012 features enables users to access files that they have overwritten?

A. Offline files

B. Parity-based RAID

C. Windows Installer 4.0

D. Volume Shadow Copies

Answer: D, there’s no answer key for this one but that’s the only technology that allows you to revert back to previous versions and things like that

5. Which of the following RAID levels yields the largest percentage of usable disk space?

A. RAID 0

B. RAID 1

C. RAID 5

D. RAID 6

Answer: C, however 5 and 6 are similar. Here’s an article with good visuals concerning the topic of raid 5 vs raid 6

6. To use Shadow Copies you must enable the feature at which of the following levels?

A. the file level

B. The folder level

C. the volume level

Answer: C, check out this Shadow Copies article on TechNet which seems to say
the same thing as the book but there is no answer key for this one.

7. Which of the following are not true about differences between network attached storage (NAS) devices?

A. NAS devices provide a file system implementation; SAN devices do not

B. NAS devices must have their own processor and memory hardware; SAN devices do not require these components

C. NAS devices require a specialized protocol, such as Fibre Channel or iSCSI; SAN devices use standard networking protocols.

D. NAS devices must run their own operating system and typically provide a web interface for administrative access; SAN devices
do not have either one

Answer: C, I had a hard time with this one as the wording while studying for this amount of time in the day made my brain hurt.
Hoping its like working out and that it just makes you more able to think harder as time progresses so far thats proving to be true.
I also havent seen a question like this before so its essentially new material. regardless, lets go through what I know so far and save technet
links for a li at the end. Not sure about C, b is for sure true about NAS, not sure if its true about SAN devices. D is true about NAS. MAybe
I just dont know any thing about SAN devices. Maybe thats a good place to start. Ok after reading the listed below links, b is true for san so is A & D so
C is a pretty safe bet.

    SAN vs NAS

  • SAN
  • NAS
  • 8. Which of the following volume types supported by Server 2012 do not provide fault tolerance?

    A. Striped

    B. Spanned

    C. Mirrored

    D. RAID-5

    Answer: A,B, neither of those have fault tolerance. See the RAID wikipedia and understand that A = raid 0, spanned is just one disk on
    more than one volume and raid 5 contains parity data. This is
    interesting and relevant as well.

    9. A JBOD drive array is an alternative to which of the following?

    A. SAN

    B. SCSI

    C. RAID

    D. iSCSI

    Answer: C, JBOD apparently means just a bunch of (unorganized) disks.

DHCP and DNS hangout pt 2

I was a little late to this one due to some confusing about scheduling and thinking it was getting rescheduled but I learned it wasnt rescheduled
but I still managed to learn some really good things about tombstoning and DNS record management. There are some confusing procedures and policy’s
around these technologies.

Any way heres the video, more chapter reviews coming today. Trying to get 3 chapters published today.

Heres some links as well:

Here is part one as well, in case you get really excited

Zacker book, Chapter 2

Moving on to chapter 2, Ive read about half this book but still find it really helpful to go through questions in this format. Its like
learning to paint and draw, the drawing helps you to paint and knowing where the paint goes helps you to make the line. When I first
started to paint and draw in realistic format I was awful but I knew it was some thing I had to do for my self. This seems similar only
maybe more important. So maybe by doing the html ref ill figure out where the color goes as opposed to just making sloppy line drawing
after sloppy line drawing. Then progressively my sloppy line drawings start to show that I understand line and value. Hopefully you have
a story that you can assimilate to that one.

Please read the header for this post
regarding the answer key situation for these chapters.

1.Which features must you remove from a full GUI installation of Server 2012 to convert it to a Server Core installation?
(choose all that apply)

A. Windows management instrumentation

B. Graphical Management Tools and infrastructure

C. Desktop Experience

D. Server Graphical Shell

Answer: B,D one thing you will see when this question comes up is the repetition of the fact that the windows “desktop experience”
in not installed by default and WMI has nothing to do with the gui as, from what I understand, it runs as a service so you can use server manager
from another computer to manage a server core installation. Please correct me if I am wrong.

2. Which of the following NIC teaming modes provides fault tolerance and bandwidth aggregation?

A. Hyper-v Live migration

B. Switch independent mode

C. Switch dependent mode

D. Server graphical shell

Answer: B, I found this to be a useful link with lots of back story as I was going through this. One thing that you will find
when prepping for this test is that if you start as a complete nub sauce on a fast track to failsville, like me, you need to probably triple
any book that you come across to even get a starting vantage point for understanding. Any way heres a link to a series of articles on
hyper-v networking.

YouTube is also a great place to search for information so heres a bit from youtube that google came up with, this can be really
informative “click-hole” to search through. This particular video is a little confusing if you have zero background in Hyper-v networking
but thats ok because every thing you read and watch will get you a little closer to understanding.

3. Which of the following command-line tools do you use to join a computer to a domain?

A. Net.exe

B. Netsh.exe

C. Netdom.exe

D. Ipconfig.exe

Answer: C, which should be apparent after checking the links.

4. Which of the following statements about Server Manager is not true?

A. Server manager can deploy roles to multiple servers at the same time

B. Server manager can deploy roles to VHDs while they are offline

C. Server manager can install roles and features at the same time

D. Server manager can install roles and features to any windows 2012 server on the network

Answer: A, however there may be some additional explanation on D, if your running R2 be sure that .NET 4.0 is installed. Check here for further explanation.

5. Which of the following operations can you not perform on a service using Server Manager? (apply for shoes….I mean choose all that apply, dare)

A. Stop a running service

B. Start a stopped service

C. Disable a service

D. Configure a service to start with the computer starts

Answer: C,D both of these can be done through services.msc or powershell

6. Name two methods to assign a static IP address to a computer using server core.

A. Server Manager & netdom.exe

B. netdom.exe and IPv4 properties sheet

C. The IPv4 properties sheet and the netsh.exe command

D. The netsh.exe command and WMI in powershell

Answer: D, also this command is helpful in this situation new-netipaddress
or for a more complicated approach try this WMI script

7. Before you can deploy roles to multiple remote servers, what must be done?

A. Perform an in-place upgrade to Server 2012

B. Ensure the remote servers are patched sufficiently

C. Add the remote servers to server manager

D. Perform a full backup

Answer: This was previously covered under another question but there is no “official” answer here but realistically given
that we dont know if these are 2012, 2012 R2 or even older machines the answer is B and C, if its a 2012 machine and so are all the others its just C, samee with R2
other wise .NET updates would be required.

8. What utility allows you to install components to multiple servers at once?

A. The Add Roles and Features Wizard only

B. Both Add roles and Features Wizard and Widows PowerShell

C. Windows PowerShell only

D. The Minimal Server Interface

Answer: C, only powershell scripts allow you hit multiple servers with roles and features in one shot

9. What method is available to install roles and features on another 2012 box using PowerShell?

A. Use the Install-WindowsFeature command and an exported config file (.ini?)

B. Use the Install-WindowsRole command and an exported config file (.ini?)

C. Use Server Manager and the proper tile

D. It is not possible using Windows PowerShell

Answer: A, I noted the .ini part as its not specified but im assuming thats what they are referring to. This is a grey area though
as i am completely new to the creation of and existence of these types of files.

10. What is the key principle to delegating server administrative tasks?

A. Granting users the tasks they feel most comfortable doing

B. Granting users only the permission they need to perform the task delegated to them by the organization

C. Assign the delegated tasks to the person most likely to benefit

D. Assigning enough permissions to do the delegated tasks as well as anticipated tasks

Answer: B seems obvious and I have yet to see this in any other test prep material.

Thats all for tonight, These arent taking as long as others so 2-3 of these a day shouldn’t be overly taxing given that my free time
maintains this state.

Zacker book, Chapter 1 questions

Moving on to the next book, I haven’t read this one yet so Ill be reading the chapters and doing this at the same time
im expecting it take 20-30 days then its ye old test time again. I need to get into contact with CED about my measure up
test prep questions because it says they are expired and I should have a little while left on them. Like 4 monthsish. Hopefully
that can be sorted out and im not pushing the clock too hard in this situation. Regardless, im believer that hard work pays off, I
mean I guess you have to be right? Any way on to the Zacker Server 2012 book. Two chapters a day would be nice and I think its doable
if I really push my self. These dont come with answers so you may not be able to trust me to fully come up with the right answer but
I will try to reference TechNet and check the chapters as much as possible.

Whilst in the process of article creation I came across a PDF that shared many of the same questions and answers that was also written by
a mister C. Zacker. Assuming its the same guy so the answers should be more in the 90% correct range. Obviously you would think that I would
just reference the material as written but with situational questions that doesnt always work given that logic is involved. However I will do
my best to indicate cross reference answer checks and text answer checks so “grey” areas are apparent.

1. Which of the following roles implement (odd word choice to convey function as) what can be classified as infrastructure services? (choose all that apply)

A. DNS

B. Web Server (IIS)

C. DHCP

D. Remote desktop Services

Answer: A, C im assuming they mean infrastructure services to mean some thing that supports your network. This is possibly
not testable as its very loose term. Not cross check-able but it seems to be line with the previous chapters text.

2. Which of the following is a valid upgrade path to Server 2012 R2?

A. Server 2003 Standard to Server 2012 (regular edition? wtf does “Standard mean”)

B. 2008 to 2012

C. 2008 R2 32 bit to 2012 64 bit

D. windows 7 ultimate edition to 2012 essentials

Answer: B, the wording of this “Standard edition” is a little questionable but you can go from a client OS to server on an upgrade path
(upgrade paths are usually not the best way to go any how) you also cant change architecture types (this is mystifying to me).

3. Which feature must you add to a windows server 2012 server core installation to convert it to the minimal server interface?

A. Graphical management tools and infrastructure

B. Server graphical shell

C. PowerShell

D. MMC

Answer: A, if you clicked the link it kind of gave it away. Any way here’s a helpful, yet silent (I really hate that, plz narrate) video on the topic at hand.

]

4. What is the directory where windows stores all of the operations system modules it might need to install at a later time?

A. Windows

B. System32

C. Bin

D. WinSxS

Answer: D, this is kind of newer thing to have optional uninstalled windows feature that still take up disk space but it
stores them in the WinSxS dir starting with Vista.

5. Which of the following are valid reasons why administrators might want to install their 2012 servers using server core?
(choose all that apply)

A. A Server core installation can be converted to the full GUI without reinstalling the OS.

B. PS 3.0 in has way more commands than 2.0

C. The new Server manager in in 2012 makes in easier to admin remotely

D. A 2012 core license is cheaper

Answer:A,B There’s a lot of BS in here but the primary reason being the attack surface is smaller. Other than that its all true except
for D. However upon cross checking the other material indicates that B is not really a reason to install core over the full GUI which makes sense

6. Server 2012 requires what type of CPU architecture?

A. 64 bit only

B. 32 or 64 bit

C. any processor provided that its an actual physical processor

D. Minimum dual core

Answer: With any basic knowledge you can eliminate two answers with no product knowledge, c, d. I really like this
“explanation” about hardware requirements
which indicates that the answer is A

7. What is the minimum system requirements for memory to run all editions of Server 2012

A. 356 MB RAM

B. 512 MB RAM

C. 2 GB RAM (yes plz)

D. 4 GB RAM

Answer: Surprisingly its b, some thing tells me its better judgment if you plan on using the machine for much other than a paper
weight to add more ram than 512mb

8. What is the default installation that occurs when installing Server 2012?

A. Server Core

C. Start up GUI

D. PowerShell

Answer: A, obviously its not powershell nub.

9. What Windows server 2012 roles would install to provide network resources to remote users?

A. Network Policy and Access Services

B. (routing (word not used in book)) and Remote Access

C. WDS

D. Web Server (IIS)

Answer: B, without the routing word missing this is the only appropriate answer. Here is a prop
paper for small business owners on the topic and here is the RRS page.

10. What Server 2012 role enforces security policies for network users?

A. Network Policy and Access Services

B. (again)Remote Access

C. Active Directory Rights Management Service

D. Remote Desktop Services

Answer: A, this one doesnt cross reference and the wording is sketchy but A is the only one that deals with client health
and things of that nature.

Part 7 of questions from Q

Well we have almost reached the end of this round of questions. next step, read the next book, do the questions (that have no answers)
and take the test again. Most likely fail the test, then look for gaps in knowledge that are noted here, try some other sources for test
prep questions. Probably measure up, so long as they dont stay in the “expired status.” I asked about this before they became expired and I
was assured that it was ok and that I would still have use of them. Havent tried to actually use one yet but we will see how it goes. Not sure
at that this point that they are worth paying for by any means necessary. On to today’s breif study and then fixing the bolding text in the previous
questions.

61. You would like to review the default user rights for administering your ADDS
domain granted to the various built in groups in contained within Server 2012, you open the
GMPC
and then what should you do from there to view group rights assignments? (hoping I got the verbage
correct as thats indeed a re-write)

A. Right-click the Defualt Domain Policy GPO
& select edit. In the Group policy mangement editor (see previous link), navigate to the
computer configurationpolicieswindowsettingssecuritysettingslocal policiesuser rights assignment node and select this node.
View the default user rights in the details pane.

B. Right-click the Default Domain Policy GPO and select edit. In the Group Policy management editor, navigate to the
user configurationpolicieswindows settingssecurity settingslocal policiesuser rights assigment node, and select it. View the default
user rights in the dtails pane.

C. Right-click the default domain controllers policy GPO and select edit.. In the group policy management editor navagate to the
computer configurationpolicieswindows settingssecurity settingslocal policiesuser rigts assignment node & select ths node. View the
default user rights in the details pane.

D. right-click the default domain controllers policy GPO and elect Edit. In the GPME, navigate to
user configurationpolicieswindows settingssecurity settingslocal policiesuser rights assignment node, and select this node. View the
default user rights in the details pane.

Answer: C, So this is where I get conflicted about providing enough details to be through in question asking. Here
we are clearly providing enough material to be through but theres so much info it almost becomes confusing. Are the questions posed
perfect as is? certainly not and theres more than enough “red herring” material but the wise can eventually cut through the “B.S.”
it just seems to take longer. Im not sure that Ive found this to be the same case in testing scenarios however. Any way, the answer is
B given that they are talking about individual logins and not computer accounts which is some thing im assuming but again its not
entirely clear about that. Just reading between the lines again.

62. Your domain contains 6 Server 2012R2 member servers and 80 8.1 workstations. Users preform
their work using an in-house application App1.exe. App1 is updated on a monthly basis. Corporate policy states
that all users must use the latest version of app1exe. How can you enforce this rule? (choose two)

A. Create a software restriction policy using an application executable rule.

B. Create a windows installer rule.

C. Create an AppLocker rule to restrict older versions of the application.

D. Use group policy to publish all instances of the application.

Answer: A and C, im assuming they dont reinstall the app once a month. There are some tricky
verbiage words regarding software restriction policies regarding if its a hash rule or an executable rule
that are worth reviewing. That info is on TechNet here &
here as well as few other places
but its for sure worth understanding the practical differences between the different types of rules. Applocker
policy’s are a little more straight forward.

63. David Doss has used Windows firewall with Ad Sec on a Server 2012 R2 computer named Server3 to configure
several custom outbound and inbound rules. He would like to copy these rules to another computer named Server4
which also runs Windows Server 2012 R2. What should he do to accomplish this task with the least amount of administrative
effort?

A. Use the netsh advfirewall dump command at Server3 to copy the windows Firewall
with advanced security rules. Then use the netsh advfirewall reset command on Server4 to restore the rules
on this computer.

B. Use the wbadmin util on Server3 to back up the firewall rules

C. in the MMC open win firewall with ad sec snap-in on Server3, right-click inbound rules
and select export policy. After saving the export file, go to Server4 right-click inbound rules, and
select import policy. Click yes, specify the name of the policy file to be imported, and then click open. Then
repeat this procedure with the Outbound Rules node.

D. In the windows firewall w/ ad sec snap-in on Server3, right click the windows firewall with ad sec and
select export policy. After saving the export file, go to Server4 right-click windows firewall with ad sec and select import
policy. Click yes, specify the name of the policy to be imported then click open.

Answer:So heres a helpful link to some firewall PS commands but
they stil dont exactly answer this question however upon further reading into the TechNet links im feeling pretty confident that
the answer is D.

64. You have recently installed a new 2012 R2 file sever, Server1. You attempt to ping Server1 but receive a
“Request Timed out” message. You log on locally to Server1 & confirm that all IP address information
is correct. You can successfully ping your default gateway from Server1. You also verify that you can
access the web and other local network resources. What should you check?

A. Verify that the latest service pack is enabled on Server1.

B. Verify that the windows remote access service is started.

C. Verify that the appropriate inbound firewall rule is enabled for Echo Request ICMP.

D. Verify that the appropriate inbound firewall is enabled for Remote Access.

Answer: In ping is failing the answer is C given that there are no other scenarios that im missing while following this logic
train. Q confirms C

65. You are the administrator for StevieBsChickinALaKingALaCarte.com. Your network consists of 150
150 windows 8.1 client computers and 5 Server 2012 R2 member servers. Your development team creates a new application that you need to host on
AppServer1, one of the Windows Server 2012 R2 member servers. The Application installs a new service that listens on TCP port 5432.
Client computers use this service to interact with the application. AppServer1 also sends regular alerts toa
monitoring server using TCP port 4567. You notice that clients are unable to access the application hosted on AppServer1.
The alerting function is working properly. You realize that you didnt configure the Firewall rule on App Server1.
What do you need to configure?

A. An inbound rule to allow connection to TCP port 5432

B. An inbound rule to allow connections to TCP port 4567

C. An outbound rule to allow connections to TCP port 4567

D. An outbound rule to allow connection to TCP port 5432

Answer: A, these are kind outside of my understanding as im not exactly class room trained and Ive found few
technet articles demonstrating the line of thought necessary for understanding these types of scenarios.

66. You are a systems administrator for StevieBsChickinALaKingALaCarte.com. You configure
a new Server 2012R2 member server named Server1. You need to configure a windows firewall rule to allow inbound access for a PPTP VPN.
Which Ports should you enable? Each answer is part of the solution.

A. 1701

B. 1723

C. 47

D. 80

Answer: B,C, I dont know ports from a whole in the ground so this is also a tuff question that to me
seems like it would be a good candidate for googization of an answer. I hope thats proper english haha

Powered by WordPress.com.

Up ↑