Zacker book, Chapter 5

I had hoped to get through this one on the same day as the previous one but that doesn’t seem likely. Ended up having a busier day
than expected. However, I don’t think I have any thing going on tomorrow. Wednesday Ill be writing on the night shift (hopefully) after
going to see a Norwegian band. Which reminds me that I should save the PDF ive been referencing to a local drive or check the text
before I go out. Regardless of how the timing works out it should be a fun night. Really starting to enjoy coding, as long as I don’t
push my self to fatigue, some thing that seems ironic to a person that spend that past two summers doing lawn care, from typing and thinking
its actually a lot more enjoyable than I ever expected it to be. My impression as a young man was that it was almost mindless work but
yet I seemed to enjoy the results it yielded. A bit selfish or short sighted of me perhaps.

My apologize for the personal dialog, now on to the important part. I suppose I could also say that Im leaving a few questions to type out
later if im feeling so inclined after retesting (and most likely failing) again.

Please read the header for this post
regarding the answer key situation for these chapters.

1. Which of the following terms describes the software interface through which a computer communicates with a print device?

A. Printer

B. Print Server

C. Printer driver

D. Printer management Snap-in

Answer: A, a printer is the software interface. This is a confusing term as its used very flippantly in some documents but the official
use indicates that a print device is the hardware that actually prints out the product, the printer sends the document to the
print server which sends the document to the printer using code that it can understand provided by the client local driver.

2. What printing configuration makes the computer with the locally attached print device function as a print server?

A. Network attached printer sharing

B. Network attached printing

C. Locally attached printer sharing

D. Direct printing

Answer: C, there isnt a lot in the gospels of technet about this from a definitional standpoint but the answer is cross-referenceable
and it appears in the text. It seems to be kind of an older idea as most of the searchable articles are on XP.

3. When planning for additional disk space for the print server spooler consider extra storage for ____.

A. Overhead in case of several smaller print jobs

B. The print server page file

C. Older less efficient print drivers

D. Temporary print device outages

Answer: D, there really isnt much conversation to be had around this point. Just kind of is what it is.

4. Can you install 32-bit print drivers on a Windows Server 2012 system?

A. No because Windows Server 2012 is a 64-bit platform.

B. Yes, because Windows Server 2012 is a 64-bit platform which comes with 32 bit support.

C. No, but you can install the 32-bit driver from a computer running a 32-bit version of Windows.

D. No, but you can install the 32-bit driver from a computer running a 32-bit version of a Windows.

Answer: B, you can install 32-bit drivers because a 64 bit platform can support 32 bit drivers but the reverse is
not true. So you cant put 64-bit drivers on a 32 bit system. This was a “checkable” question.

5. What is the purpose of the Remote Desktop Easy Print driver?

A. Easy print allows remote clients to print to local print devices via a print re-director.

B. Easy print allows admins to configure printers for users connected remotely.

C. Easy print allows administrators to print to remote print devices via a print re-director.

D. Easy print allows remote configuration of all printers

Answer: B, this is true for RDP connections are terminal style usage. For more information check the Technet
article on terminal printing.
Dont forget to hit that search bar with easy print driver and check out a few other articles. I know its
powered by bing but on an intraweb database searching system it seems surprisingly effective. 🙂

6. For a user to print, pause, resume, restart and cancel documents they sent to the printer, the user must have the
basic _____ permission.

A. Take ownership

B. Manage this printer

C. Basic print

D. Manage documents

Answer: C, basic print permissions allows user to cancel “his or her” own documents. I found the book verbiage on this
question to be a little overly complicated when implying the idea of individually owned documents being sent to
a print device.

7. You are setting up a printer pool on a computer running Windows Server 2012. The printer pool contains three print
devices, all identical. You open the properties dialog box for the printer and select the Enable Printer Pooling
option on the Ports tab. What must you do next?

A. Configure the LPT1 port to support three printers.

B. Select or create the ports mapped to the three printers.

C. On the device settings tab, configure the installable options to support two additional print devices.

D. On the advanced tab, configure the priority for each print device so that printing is distributed among the
three print devices.

Answer: B, you need to configure the ports mapped to the three printers per the the book text and cross-referencing.

8. One of your print devices is not working properly and you want to temporarily prevent users from sending jobs to the printer serving
the device. What should you do?

A. Stop sharing the printer

B. Remove the printer from Active Directory

C. Change the printer port

D. Rename the share

Answer: A, stop sharing the printer is the best option per the book. Check this article
for more information on implementing that process.

9. You are administering a computer running Windows Server 2012 set up as a print server. Users in the marketing group
complain that they cannot print documents using a printer on the server. You view the permissions in the printer’s
properties. The Marketing group is allowed Manage Documents permission. Why cant the users send documents to the print
device?

A. The everyone group must be granted the Manage documents permissions.

B. The administrators group must be granted the manage printers permission.

C. The marketing group must be granted the print permission.

D. The marketing group must be granted the manage printers permission.

Answer: C, you cant print to a device without the basic print permission.

10. You are administering a print server running Windows Server 2012. You want to perform maintenance on a print device
physically connected to the print server. There are several documents in the print queue. You want to prevent the
documents from being printed to the printer but you don’t want users to have to resubmit the documents to the
printer. What is the best way to do this?

A. Open the printer’s properties dialog box, select the sharing tab and then select the Do Not Share This Printer option.

B. Open the printer’s properties dialog box and select a port that is not associated with a print device.

C. Open the printer’s queue window, select the first document, and then select pause from the documents window.

D. Open the printer’s queue window & select the pause printing option from the printer menu.

Answer: D, this one seems fairly obvious.

Zacker book, Chapter 4

On to chapter 4, did meet my established quota but ran into some thing unknown to me, I heard a robot once call it fatigued. Hopefully
that wont happen today but you never know. Maybe I can finish up the last two that I had planned to get out yesterday, today. Yeserday
possibly would have been better for me. Not sure why I feel that way.

Please read the header for this post
regarding the answer key situation for these chapters.

1. Which of the following is the best description of a security principle?

A. A person granting the permissions to network users.

B. The network resource receiving permissions.

C. A collection of individual special permissions.

D. An AD object that gets assigned permissions.

Answer: D, this one didnt have an answer and I thought the wording was poor but the general idea is the user thats being granted
the permissions per the book so I changed the wording of D around to better express this though. So not only does this book not have the answers
but im having to edit it too!!! OMG, what a turd haha

2. Which of the following statements about effective access is not true?

A. Inherited permissions take precedence over explicit permissions.

B. Deny permissions always override Allow permissions.

C. When a security principal receives Allow permissions from multiple groups the
permissions are combined to form the effective access permissions.

D. Effective access includes both permissions inherited from parents and permissions
derived from group membership.

Answer: A, To quote another source “When a
security principal receives permissions by inheriting them from a parent or from group
memberships, you can override those permissions by explicitly assigning contradicting
permissions to the security principal itself.”

3. Which of the following statements is not true in reference to resource ownership?

A. One of the purposes for file and folder ownership is to calculate disk quotas.

B. Every file and folder on an NTFS drive(r?) has an owner

C. It is possible for any user possessing the Take Ownership special permission to assume the ownership of a file
or folder.

D. It is possible to lock out a file or folder by assigning a combination of permissions that permits access to no one
at all, including the owner of the file or folder.

Answer: B, every folder does not have to be assigned an owner. This two has no answer but im like 80% sure this is what
the chapter is indicating. If its wrong please hit my inbox.

4. Which of the following statements about permissions is true?

A. ACLs (access control lists) are composed of ACEs (access control entries)

B. Basic permissions are composed of advanced permissions

C. All permissions are stored as part of the protected resource.

D. All of the above.

Answer: A & B are verifiably true and C is questionable & and hard to verify. The term “protected resource” is hard to
verify in this context.

5. What is the maximum number of shadow copies that a Windows Server 2012 system can maintain for each volume?

A. 8

B. 16

C. 64

D. 128

Answer: C for more information see the TechNet article on Shadow Copies

6. Which of the following terms describes the process of granting users access to file server shares by reading their permissions?

A. Authentication

B. Authorization

C. Enumeration

D. Assignment

Answer: D, not much to say with this one.

7. Which of the following are tasks that you can perform using the quotas in the FSRM but you cant perform with NTFS quotas?

A. Send an email notification to an administrator when users exceed their limits.

B. Specify different storage limits for each user.

C. Prevent users from consuming any storage space on a volume beyond their allowed limit.

D. Generate warnings to users when they approach their allotted storage limit.

Answer: A, NTFS quotas do not allow you to send an email for auditing.

8. In the NTFS permissions system, combinations of advanced permissions are also known as _________ permissions.

A. Special

B. Basic

C. Share

D. Standard

Answer: B, this is not cross-reference-able however it is in the text. I also found this website to be a helpful source of
information

Zacker book, Chapter 3

On to chapter three. As previously mentioned, trying to get through typing out 3 of these chapters and two read. Again, not sure of the
legality of this situation but as Server 2012 will soon be a thing of the past and PDFs of similar books exist as free resources im not
entirely sure that I could get into any kind of trouble for this. Assuming there could be an issue and your a publisher/content creator, please e-mail me with any problems,
NickRbarnes@gmail.com. I suppose I could put that in the first chapter header. Maybe Ill go back and edit that.

If reading for reference please read the header for this post
regarding the answer key situation for these chapters.

In addition if any one knows why lower case S letters display so weird in this theme please use the aforementioned email address as I wish i knew, default font issue?

Select one or more correct answers for the following questions.

1. Which of the following statements are true of stripped volumes?

A. Striped volumes provide enhanced performance over simple volumes.

B. Striped volumes provide greater fault tolerance than simple volumes.

C. You can extend striped volumes after creation.

D. If a single physical disk in the striped volume fails, all of the data in the entire volume is lost.

Answer: A,D striped volumes provide excellent read write I/O numbers however they offer none of the resiliency that comes with
a RAID-5 or mirrored volume. The fault tolerance is no more or less than a simple volume as there is no parity data and you cannot extend them.

2. Which of the following are requirements for extending a volume on a dynamic disk?

A. If you want to extend a simple volume, you can use only the available space on the same disk, if the volume is to remain simple.

B. The volume must have a file system before you can extend a simple or spanned volume.

C. You can extend a simple or spanned volume if you formatted it using the FAT or FAT32 file system.

D. You can extend a simple volume across additional disks if it is not a system volume or a boot volume.

Answer: A, D, for more information check this TechNet article on the subject

3. Which of the following are not true in reference to converting a basic disk to a dynamic disk?

A. You cannot convert a basic disk to a dynamic disk if you need to dual boot the computer.

B. You cannot convert drives with volumes that use an allocation unit size greater than 512 bytes.

C. A boot partition or system partition on a basic disk cannot be extended into a striped or spanned volume, even
if you convert the disk to a dynamic disk.

D. The conversion will fail if the hard drive does not have at least 1 MB of free space at the end of the disk.

Answer: C, D this one doesn’t have a reference check answer but there is an older TechNet article.

4. Which of the following Server 2012 features enables users to access files that they have overwritten?

A. Offline files

B. Parity-based RAID

C. Windows Installer 4.0

D. Volume Shadow Copies

Answer: D, there’s no answer key for this one but that’s the only technology that allows you to revert back to previous versions and things like that

5. Which of the following RAID levels yields the largest percentage of usable disk space?

A. RAID 0

B. RAID 1

C. RAID 5

D. RAID 6

Answer: C, however 5 and 6 are similar. Here’s an article with good visuals concerning the topic of raid 5 vs raid 6

6. To use Shadow Copies you must enable the feature at which of the following levels?

A. the file level

B. The folder level

C. the volume level

Answer: C, check out this Shadow Copies article on TechNet which seems to say
the same thing as the book but there is no answer key for this one.

7. Which of the following are not true about differences between network attached storage (NAS) devices?

A. NAS devices provide a file system implementation; SAN devices do not

B. NAS devices must have their own processor and memory hardware; SAN devices do not require these components

C. NAS devices require a specialized protocol, such as Fibre Channel or iSCSI; SAN devices use standard networking protocols.

D. NAS devices must run their own operating system and typically provide a web interface for administrative access; SAN devices
do not have either one

Answer: C, I had a hard time with this one as the wording while studying for this amount of time in the day made my brain hurt.
Hoping its like working out and that it just makes you more able to think harder as time progresses so far thats proving to be true.
I also havent seen a question like this before so its essentially new material. regardless, lets go through what I know so far and save technet
links for a li at the end. Not sure about C, b is for sure true about NAS, not sure if its true about SAN devices. D is true about NAS. MAybe
I just dont know any thing about SAN devices. Maybe thats a good place to start. Ok after reading the listed below links, b is true for san so is A & D so
C is a pretty safe bet.

    SAN vs NAS

  • SAN
  • NAS
  • 8. Which of the following volume types supported by Server 2012 do not provide fault tolerance?

    A. Striped

    B. Spanned

    C. Mirrored

    D. RAID-5

    Answer: A,B, neither of those have fault tolerance. See the RAID wikipedia and understand that A = raid 0, spanned is just one disk on
    more than one volume and raid 5 contains parity data. This is
    interesting and relevant as well.

    9. A JBOD drive array is an alternative to which of the following?

    A. SAN

    B. SCSI

    C. RAID

    D. iSCSI

    Answer: C, JBOD apparently means just a bunch of (unorganized) disks.

DHCP and DNS hangout pt 2

I was a little late to this one due to some confusing about scheduling and thinking it was getting rescheduled but I learned it wasnt rescheduled
but I still managed to learn some really good things about tombstoning and DNS record management. There are some confusing procedures and policy’s
around these technologies.

Any way heres the video, more chapter reviews coming today. Trying to get 3 chapters published today.

Heres some links as well:

Here is part one as well, in case you get really excited

Zacker book, Chapter 2

Moving on to chapter 2, Ive read about half this book but still find it really helpful to go through questions in this format. Its like
learning to paint and draw, the drawing helps you to paint and knowing where the paint goes helps you to make the line. When I first
started to paint and draw in realistic format I was awful but I knew it was some thing I had to do for my self. This seems similar only
maybe more important. So maybe by doing the html ref ill figure out where the color goes as opposed to just making sloppy line drawing
after sloppy line drawing. Then progressively my sloppy line drawings start to show that I understand line and value. Hopefully you have
a story that you can assimilate to that one.

Please read the header for this post
regarding the answer key situation for these chapters.

1.Which features must you remove from a full GUI installation of Server 2012 to convert it to a Server Core installation?
(choose all that apply)

A. Windows management instrumentation

B. Graphical Management Tools and infrastructure

C. Desktop Experience

D. Server Graphical Shell

Answer: B,D one thing you will see when this question comes up is the repetition of the fact that the windows “desktop experience”
in not installed by default and WMI has nothing to do with the gui as, from what I understand, it runs as a service so you can use server manager
from another computer to manage a server core installation. Please correct me if I am wrong.

2. Which of the following NIC teaming modes provides fault tolerance and bandwidth aggregation?

A. Hyper-v Live migration

B. Switch independent mode

C. Switch dependent mode

D. Server graphical shell

Answer: B, I found this to be a useful link with lots of back story as I was going through this. One thing that you will find
when prepping for this test is that if you start as a complete nub sauce on a fast track to failsville, like me, you need to probably triple
any book that you come across to even get a starting vantage point for understanding. Any way heres a link to a series of articles on
hyper-v networking.

YouTube is also a great place to search for information so heres a bit from youtube that google came up with, this can be really
informative “click-hole” to search through. This particular video is a little confusing if you have zero background in Hyper-v networking
but thats ok because every thing you read and watch will get you a little closer to understanding.

3. Which of the following command-line tools do you use to join a computer to a domain?

A. Net.exe

B. Netsh.exe

C. Netdom.exe

D. Ipconfig.exe

Answer: C, which should be apparent after checking the links.

4. Which of the following statements about Server Manager is not true?

A. Server manager can deploy roles to multiple servers at the same time

B. Server manager can deploy roles to VHDs while they are offline

C. Server manager can install roles and features at the same time

D. Server manager can install roles and features to any windows 2012 server on the network

Answer: A, however there may be some additional explanation on D, if your running R2 be sure that .NET 4.0 is installed. Check here for further explanation.

5. Which of the following operations can you not perform on a service using Server Manager? (apply for shoes….I mean choose all that apply, dare)

A. Stop a running service

B. Start a stopped service

C. Disable a service

D. Configure a service to start with the computer starts

Answer: C,D both of these can be done through services.msc or powershell

6. Name two methods to assign a static IP address to a computer using server core.

A. Server Manager & netdom.exe

B. netdom.exe and IPv4 properties sheet

C. The IPv4 properties sheet and the netsh.exe command

D. The netsh.exe command and WMI in powershell

Answer: D, also this command is helpful in this situation new-netipaddress
or for a more complicated approach try this WMI script

7. Before you can deploy roles to multiple remote servers, what must be done?

A. Perform an in-place upgrade to Server 2012

B. Ensure the remote servers are patched sufficiently

C. Add the remote servers to server manager

D. Perform a full backup

Answer: This was previously covered under another question but there is no “official” answer here but realistically given
that we dont know if these are 2012, 2012 R2 or even older machines the answer is B and C, if its a 2012 machine and so are all the others its just C, samee with R2
other wise .NET updates would be required.

8. What utility allows you to install components to multiple servers at once?

A. The Add Roles and Features Wizard only

B. Both Add roles and Features Wizard and Widows PowerShell

C. Windows PowerShell only

D. The Minimal Server Interface

Answer: C, only powershell scripts allow you hit multiple servers with roles and features in one shot

9. What method is available to install roles and features on another 2012 box using PowerShell?

A. Use the Install-WindowsFeature command and an exported config file (.ini?)

B. Use the Install-WindowsRole command and an exported config file (.ini?)

C. Use Server Manager and the proper tile

D. It is not possible using Windows PowerShell

Answer: A, I noted the .ini part as its not specified but im assuming thats what they are referring to. This is a grey area though
as i am completely new to the creation of and existence of these types of files.

10. What is the key principle to delegating server administrative tasks?

A. Granting users the tasks they feel most comfortable doing

B. Granting users only the permission they need to perform the task delegated to them by the organization

C. Assign the delegated tasks to the person most likely to benefit

D. Assigning enough permissions to do the delegated tasks as well as anticipated tasks

Answer: B seems obvious and I have yet to see this in any other test prep material.

Thats all for tonight, These arent taking as long as others so 2-3 of these a day shouldn’t be overly taxing given that my free time
maintains this state.

Zacker book, Chapter 1 questions

Moving on to the next book, I haven’t read this one yet so Ill be reading the chapters and doing this at the same time
im expecting it take 20-30 days then its ye old test time again. I need to get into contact with CED about my measure up
test prep questions because it says they are expired and I should have a little while left on them. Like 4 monthsish. Hopefully
that can be sorted out and im not pushing the clock too hard in this situation. Regardless, im believer that hard work pays off, I
mean I guess you have to be right? Any way on to the Zacker Server 2012 book. Two chapters a day would be nice and I think its doable
if I really push my self. These dont come with answers so you may not be able to trust me to fully come up with the right answer but
I will try to reference TechNet and check the chapters as much as possible.

Whilst in the process of article creation I came across a PDF that shared many of the same questions and answers that was also written by
a mister C. Zacker. Assuming its the same guy so the answers should be more in the 90% correct range. Obviously you would think that I would
just reference the material as written but with situational questions that doesnt always work given that logic is involved. However I will do
my best to indicate cross reference answer checks and text answer checks so “grey” areas are apparent.

1. Which of the following roles implement (odd word choice to convey function as) what can be classified as infrastructure services? (choose all that apply)

A. DNS

B. Web Server (IIS)

C. DHCP

D. Remote desktop Services

Answer: A, C im assuming they mean infrastructure services to mean some thing that supports your network. This is possibly
not testable as its very loose term. Not cross check-able but it seems to be line with the previous chapters text.

2. Which of the following is a valid upgrade path to Server 2012 R2?

A. Server 2003 Standard to Server 2012 (regular edition? wtf does “Standard mean”)

B. 2008 to 2012

C. 2008 R2 32 bit to 2012 64 bit

D. windows 7 ultimate edition to 2012 essentials

Answer: B, the wording of this “Standard edition” is a little questionable but you can go from a client OS to server on an upgrade path
(upgrade paths are usually not the best way to go any how) you also cant change architecture types (this is mystifying to me).

3. Which feature must you add to a windows server 2012 server core installation to convert it to the minimal server interface?

A. Graphical management tools and infrastructure

B. Server graphical shell

C. PowerShell

D. MMC

Answer: A, if you clicked the link it kind of gave it away. Any way here’s a helpful, yet silent (I really hate that, plz narrate) video on the topic at hand.

]

4. What is the directory where windows stores all of the operations system modules it might need to install at a later time?

A. Windows

B. System32

C. Bin

D. WinSxS

Answer: D, this is kind of newer thing to have optional uninstalled windows feature that still take up disk space but it
stores them in the WinSxS dir starting with Vista.

5. Which of the following are valid reasons why administrators might want to install their 2012 servers using server core?
(choose all that apply)

A. A Server core installation can be converted to the full GUI without reinstalling the OS.

B. PS 3.0 in has way more commands than 2.0

C. The new Server manager in in 2012 makes in easier to admin remotely

D. A 2012 core license is cheaper

Answer:A,B There’s a lot of BS in here but the primary reason being the attack surface is smaller. Other than that its all true except
for D. However upon cross checking the other material indicates that B is not really a reason to install core over the full GUI which makes sense

6. Server 2012 requires what type of CPU architecture?

A. 64 bit only

B. 32 or 64 bit

C. any processor provided that its an actual physical processor

D. Minimum dual core

Answer: With any basic knowledge you can eliminate two answers with no product knowledge, c, d. I really like this
“explanation” about hardware requirements
which indicates that the answer is A

7. What is the minimum system requirements for memory to run all editions of Server 2012

A. 356 MB RAM

B. 512 MB RAM

C. 2 GB RAM (yes plz)

D. 4 GB RAM

Answer: Surprisingly its b, some thing tells me its better judgment if you plan on using the machine for much other than a paper
weight to add more ram than 512mb

8. What is the default installation that occurs when installing Server 2012?

A. Server Core

C. Start up GUI

D. PowerShell

Answer: A, obviously its not powershell nub.

9. What Windows server 2012 roles would install to provide network resources to remote users?

A. Network Policy and Access Services

B. (routing (word not used in book)) and Remote Access

C. WDS

D. Web Server (IIS)

Answer: B, without the routing word missing this is the only appropriate answer. Here is a prop
paper for small business owners on the topic and here is the RRS page.

10. What Server 2012 role enforces security policies for network users?

A. Network Policy and Access Services

B. (again)Remote Access

C. Active Directory Rights Management Service

D. Remote Desktop Services

Answer: A, this one doesnt cross reference and the wording is sketchy but A is the only one that deals with client health
and things of that nature.

Part 7 of questions from Q

Well we have almost reached the end of this round of questions. next step, read the next book, do the questions (that have no answers)
and take the test again. Most likely fail the test, then look for gaps in knowledge that are noted here, try some other sources for test
prep questions. Probably measure up, so long as they dont stay in the “expired status.” I asked about this before they became expired and I
was assured that it was ok and that I would still have use of them. Havent tried to actually use one yet but we will see how it goes. Not sure
at that this point that they are worth paying for by any means necessary. On to today’s breif study and then fixing the bolding text in the previous
questions.

61. You would like to review the default user rights for administering your ADDS
domain granted to the various built in groups in contained within Server 2012, you open the
GMPC
and then what should you do from there to view group rights assignments? (hoping I got the verbage
correct as thats indeed a re-write)

A. Right-click the Defualt Domain Policy GPO
& select edit. In the Group policy mangement editor (see previous link), navigate to the
computer configurationpolicieswindowsettingssecuritysettingslocal policiesuser rights assignment node and select this node.
View the default user rights in the details pane.

B. Right-click the Default Domain Policy GPO and select edit. In the Group Policy management editor, navigate to the
user configurationpolicieswindows settingssecurity settingslocal policiesuser rights assigment node, and select it. View the default
user rights in the dtails pane.

C. Right-click the default domain controllers policy GPO and select edit.. In the group policy management editor navagate to the
computer configurationpolicieswindows settingssecurity settingslocal policiesuser rigts assignment node & select ths node. View the
default user rights in the details pane.

D. right-click the default domain controllers policy GPO and elect Edit. In the GPME, navigate to
user configurationpolicieswindows settingssecurity settingslocal policiesuser rights assignment node, and select this node. View the
default user rights in the details pane.

Answer: C, So this is where I get conflicted about providing enough details to be through in question asking. Here
we are clearly providing enough material to be through but theres so much info it almost becomes confusing. Are the questions posed
perfect as is? certainly not and theres more than enough “red herring” material but the wise can eventually cut through the “B.S.”
it just seems to take longer. Im not sure that Ive found this to be the same case in testing scenarios however. Any way, the answer is
B given that they are talking about individual logins and not computer accounts which is some thing im assuming but again its not
entirely clear about that. Just reading between the lines again.

62. Your domain contains 6 Server 2012R2 member servers and 80 8.1 workstations. Users preform
their work using an in-house application App1.exe. App1 is updated on a monthly basis. Corporate policy states
that all users must use the latest version of app1exe. How can you enforce this rule? (choose two)

A. Create a software restriction policy using an application executable rule.

B. Create a windows installer rule.

C. Create an AppLocker rule to restrict older versions of the application.

D. Use group policy to publish all instances of the application.

Answer: A and C, im assuming they dont reinstall the app once a month. There are some tricky
verbiage words regarding software restriction policies regarding if its a hash rule or an executable rule
that are worth reviewing. That info is on TechNet here &
here as well as few other places
but its for sure worth understanding the practical differences between the different types of rules. Applocker
policy’s are a little more straight forward.

63. David Doss has used Windows firewall with Ad Sec on a Server 2012 R2 computer named Server3 to configure
several custom outbound and inbound rules. He would like to copy these rules to another computer named Server4
which also runs Windows Server 2012 R2. What should he do to accomplish this task with the least amount of administrative
effort?

A. Use the netsh advfirewall dump command at Server3 to copy the windows Firewall
with advanced security rules. Then use the netsh advfirewall reset command on Server4 to restore the rules
on this computer.

B. Use the wbadmin util on Server3 to back up the firewall rules

C. in the MMC open win firewall with ad sec snap-in on Server3, right-click inbound rules
and select export policy. After saving the export file, go to Server4 right-click inbound rules, and
select import policy. Click yes, specify the name of the policy file to be imported, and then click open. Then
repeat this procedure with the Outbound Rules node.

D. In the windows firewall w/ ad sec snap-in on Server3, right click the windows firewall with ad sec and
select export policy. After saving the export file, go to Server4 right-click windows firewall with ad sec and select import
policy. Click yes, specify the name of the policy to be imported then click open.

Answer:So heres a helpful link to some firewall PS commands but
they stil dont exactly answer this question however upon further reading into the TechNet links im feeling pretty confident that
the answer is D.

64. You have recently installed a new 2012 R2 file sever, Server1. You attempt to ping Server1 but receive a
“Request Timed out” message. You log on locally to Server1 & confirm that all IP address information
is correct. You can successfully ping your default gateway from Server1. You also verify that you can
access the web and other local network resources. What should you check?

A. Verify that the latest service pack is enabled on Server1.

B. Verify that the windows remote access service is started.

C. Verify that the appropriate inbound firewall rule is enabled for Echo Request ICMP.

D. Verify that the appropriate inbound firewall is enabled for Remote Access.

Answer: In ping is failing the answer is C given that there are no other scenarios that im missing while following this logic
train. Q confirms C

65. You are the administrator for StevieBsChickinALaKingALaCarte.com. Your network consists of 150
150 windows 8.1 client computers and 5 Server 2012 R2 member servers. Your development team creates a new application that you need to host on
AppServer1, one of the Windows Server 2012 R2 member servers. The Application installs a new service that listens on TCP port 5432.
Client computers use this service to interact with the application. AppServer1 also sends regular alerts toa
monitoring server using TCP port 4567. You notice that clients are unable to access the application hosted on AppServer1.
The alerting function is working properly. You realize that you didnt configure the Firewall rule on App Server1.
What do you need to configure?

A. An inbound rule to allow connection to TCP port 5432

B. An inbound rule to allow connections to TCP port 4567

C. An outbound rule to allow connections to TCP port 4567

D. An outbound rule to allow connection to TCP port 5432

Answer: A, these are kind outside of my understanding as im not exactly class room trained and Ive found few
technet articles demonstrating the line of thought necessary for understanding these types of scenarios.

66. You are a systems administrator for StevieBsChickinALaKingALaCarte.com. You configure
a new Server 2012R2 member server named Server1. You need to configure a windows firewall rule to allow inbound access for a PPTP VPN.
Which Ports should you enable? Each answer is part of the solution.

A. 1701

B. 1723

C. 47

D. 80

Answer: B,C, I dont know ports from a whole in the ground so this is also a tuff question that to me
seems like it would be a good candidate for googization of an answer. I hope thats proper english haha

Part 5 of 7?…..more questions from Bazze…i mean Q

On to part 5, part 4 went mostly well. Currently reading another book
that has test prep questions but doesnt have the answers. I might try to tackle these in this format at some point in the future. However as the release candidates for 2016 are upon us im not sure of
the validity or usefulness of this process. Thats kind of irrelevant to the point of learning html and server though. Not to delve too far into the personal zone but I had a job interview
of sorts that went fairly well. Im pretty sure I was interviewed by a dementor but I actually appreciate playing hardball
and asking real questions that demand real answers. Its not easy to explain the reasons for having large resume gaps or that you functioned as a tattooer previously while trying to couple that
with very relevant small business skills that translate fairly well into large scale deployments. Regardless, more test prep questions and TechNet articles.

41. Lucrecita is the systems admin for StevieBsChickenALaKingALaCarte.com which is currently established as a single domain. All the servers run either 2012 or 2012R2. Recently she notices that the
hard disk on DHCP server named Server6 has failed. She installs a new harddisk performs a bare metal restore from a recent backup. Lucrecita must ensure that DHCP clients do not receive IP addresses that have
already been leased to other DHCP clients what option should she configure?

A. Set the DHCP server option 47 to 0

B. Set the DHCP server option 47 to 1

C. Set the Conflict Detection value to 0.

D. Set the Conflict Detection value to 1.

Answer: D, enabling conflict detection ensures that an ip is only leased to one client. Q goes on to inform us that DHCP uses the
ping command to verify that address is not currently in use

42. Your network consists of two subnets. Users on Subnet1 complain that they are unable to access any resources outside of their subnet. No other users from any other subnet are experiencing the issue.
You review the DHCP configuration for Subnet1 and notice that the Router option does not exist. Which option allows you to specify the ip address of the
router or default gateway?

A. 044 WINS/NBNS servers

B. 003 Router

C. 066 Boot Server Host Name

D. 030 Router

Answer:Per Q the answer is B, personally I honestly have no idea, I understand the concept but for all practical purposes once you understood the concept
couldnt you Google the answer? Or is that me being lazy from the prospect of memorization?

43. The StevieBsChickenALaKingALaCarte.com (why cant I just say contoso?) network contains a single forest. Sauce.StevieBsChickenALaKingALaCarte.com, chicken.StevieBsChickenALaKingALaCarte.com and noodles.StevieBsChickenALaKingALaCarte.com
are child domains. Mike is the admin of Sauce.StevieBsChickenALaKingALaCarte.com and Bob is the admin for Chicken.StevieBsChickenALaKingALaCarte.com. Mike needs to
authorize a DHCP server for his domain. What does Mike need to do to authorize his server?

A. Authorize the server in the StevieBsChickenALaKingALaCarte.com parent domain

B. Authorize the server in Sauce.StevieBsChickenALaKingALaCarte.com

C. Authorize the server in all domains in the forest

D. Authorize the server in Chicken.StevieBsChickenALaKingALaCarte.com

Answer: obviously the answer to this is going to vary based on the scope/subnet that the server is supporting but given that
the question posed seems to be indicating that the server will be serving addresses to the sauce clients im going to assume that its B. However it could
be necessary to authorize the server globally in order for it to serve the sauce clients IP’s specifically but that doesnt seem overly
logical from a practical stand point as it could lead to some problems with conflicts and so forth. Q confirms the intent was B

44. Which of the following messages are exchanged between an IPv6 client computer and DHCPv6 server when requesting configuration
information? Choose all that apply and pick a proper sequence in which the messages are exchanged.

A. Discover

B. Offer

C. Advertise

D. Request

E. Solicit

F. Confirm

G. Reply

Answer: C, D, E, G I havent included images in these before but I think this one is helpful even though its for IPv4 because we should be aware of the differences right?
Im not exactly sure why the IPv4 DHCP process is so much simpler but its not horrible confusing by comparison. Subnetting on the other hand is awful.

 photo IC196966_zps3k6j9vt6.gif

45.You are the administrator for the StevieBsChickenALaKingALaCarte.com domain. You are installing a new development server named Server1. You need to make sure Server1 does not receive any
IP addresses from the DHCP server, Server2. What should you configure to accommodate this?

A. DHCP Exclusion

B. DHCP Reservation

C. DHCP Filter

D. DHCP Block Service

Answer: To block a specific client or device from obtaining a ip address from a DHCP server you would configure the mac address into an exclusion rule, A. I was way off, per Q its C

46. Tai is the systems administrator for a company that operates an ADDS network consisting of a single domain. The company has
been using a Windows 2000 server running WINS as a solution for DNS in the network. As part of a mve to decommission all older server and convert the
network to using Windows Server 2012 R2 servers exclusively, Tai needs to configure DNS to provide forest-wide single name resolution. What should she do?

A. Create a secondary zone named GloablNames. Add host (A) resource records for all computers that require single name resolution. Then create corresponding secondary zones on all other DNS
servers on the network.

B. Create an Active Directory-integrated zone named GlobalNames. Add A records for all computers that require
single name resolution.

C. Create SVR Records for all computers that require single name resolution.

D. Create CNAME records for all computers that require single name resolution.

Answer: B, I honestly had no idea on this one so I should study this technology more.

47. Server1 is a Windows Server 2012R2 server with the DNS role installed. You need to review the root hints for Server1. What steps should you take to accompish this (each answer is a complete solution and you need to
pick two)

A. Open the %systemroot%system32dnscache.dns file on Server1 using notepad.exe

B. Open the %systemroot%systemdnscache.dns file on Server1 using notepad.exe

C. Use the root hints tab of the DNS Server Properties dialog box.

D. Use the HLKMDNS registry hive.

Answer: So you clearly need to view the root hints by opening the cache file, now its a mater of location. My guess is
B but it is most assuredly a guess. The second answer, well any time i see the phrase “hive” I get a little nervous as they are talking about a collective
of programming entries and im not a programmer so in my ignorance I pick C or find a coder to as. Well per Q I was on the right track but its in the ~32 folder so A,C

48. Your network consists of a single Active directory domain named StevieBsChickenALaKingALaCarte.com The domain contains a domain controller named DC1 that hosts the primary DNS zone for the company. All of the 8.1 client machines are
configured to use DC1 as the primary DNS server. You need to configure DC1 as the primary DNS server. You need to configure DC1 to use your
ISP’s DNS server to resolve all name resolution requests that fall outside of StevieBsChickenALaKingALaCarte.com. What should you configure?

A. An AAAA Record containing your ISP’s DNS server.

B. A forwarder containing your ISP’s DNS server.

C. A forward lookup zone for your ISP.

D. A reverse lookup zone for your ISP

Answer: So with what little I know Im assuming this going to be some form of forwarder and after checking the links its for sure B & Q confirms

49. You are the admin for (you guessed it) suzuie wongs hous…StevieBsChickenALaKingALaCarte.com. You have just installed your first DC to create the domain and you need
to replace the configuration for DNS to send any unresolved DNS client queries and all external queries to your ISPs DNS server.
Which PowerShell cmdlet must you execute to accomplish this objective?

A. Add-DNSServerForwarder

B. Add-DNSServerPrimaryZone

C. Set-DNSServerforwarder

D. Set-DNSServerPrimaryZone

Answer: Well first you need to create a zone so you need to create a primary zone then you need to create a forwarder. Theres so many questions about configuration
with this one Q. Why so vague? Theres also a PS issue here because A will ad but not replace so to set you need to run C

50. We are going skip this question but spend some time on the one above, for now. Perhaps we will revisit but its a long table
describing DNS record types. I recommend Learn DNS as it has all the basic definitions, not a bad place to start

Volume 4 of the Q test prep dissection

Volume 4, here we go 31-40, only three more from our first donor candidate Q.

31. Server1 is a 2012R2 server hosting Hyper-V machines. You configure VM1 to support an
in-house application. You configure a legacy network adapter for VM1. You need to ensure that VM1 uses only
50% of the available bandwidth. How should you do this?

A. Add a second legacy network adapter to increase throughput.

B. Remove the legacy network adapter and add an “up to date” network adapter.

C. Configure a NIC team

D. Reinstall Hyper-V integration services.

Answer:B, the wording to all of these answers is nonsensical and confusing. Could we please get on a standard system
for jargonization of ideas? “up to date” network adapter is not on option in Hyper-V nor can you “reinstall” integration services
in any kind of traditional understanding of what it means to install a piece of software. Perhaps in the future software will just be
check boxes but why are we talking about the future while nubz are trying to learn about the now?[/endrant]

32. You are the administrator for Server1 a two-node Windows Server 2012 R2 Hyper-V cluster. You configure two new virtual
machines: VM1 and VM2. You need to ensure that these virtual machines are not able to communicate with rogue DHCP servers. What should you
configure?

A. MAC Address Spoofing (need to Ctrl+F get to the info on link)

B. Router Gaurd

C. Port mirroring

D. DHCP Guard

Answer:B, D is the right concept but the label is incorrect.

33. You are the Hyper-V administrator for StevieBsChickenALaKingALaCarte.com.. You manage a Hyper-V
host named HyperV1. HyperV1 contains three 2008 VMs and 6 2012R2 machines. You have configured an external virtual switch within Hyper-V management console.
You need to ensure that the VMs are only able to communicate with hosted local VMs. What do you need to do?

A. Upgrade all 08 VMs to 2012 R2.

B. Add a second virtual switch. Move all 08 VMs to virtual switch 1 and all 2012 R2 VMs to the new switch labled
virtual switch 2.

C. Remove the virtual switch and re-create it using the private switch type.

D. Remove the virtual switch and re-create it using the public switch type (see previous link).

Answer:Based on the scenario Q gives we need to create a internal switch and delete the other switch but thats not one of the options. Again, I find
this confusing. Probably to newcomers and old hats a like. However, the answer is C per Q.

34. You are designing a multitenant Hyper-V infrastructure. You need to ensure that tenants are
unable to see each others resources. What should you configure?

A. Hyper-V virtual grid

B. Virtual Cloud Partitions (VCP)

C. Port Virtual Local Area Network (PVLAN)

D. MAC Address Isolation

Answer:C, not a whole lot of public facing information on this topic but network virtualization allows you to to specify port local per machine to
drill down to the specific level of security required for this scenario.

35.Amanda is configuring IP addressing for a company that has a head office in
midtown Manhattan and 11 branch offices in various locations through the New York metropolitan area. She
has decided that each office will correspond to a single subnet on the company’s WAN. The company itself
can use a single Class C network for this purpose. Which of the following subnet masks would provide the
most addresses for each host?

A. 255.255.255.192

B. 255.255.255.224

C. 255.255.255.240

D. 255.255.255.248

Answer: Logically you would think it would be A. C

36.Jim Goldberg functions as an admin for a single domain implementation of ADDS for his frim
He is assigned the task of maintaining his company’s DNS and DHCP servers. He decides that DHCP
clients running Win 8.1 should be configured to automatically select their primary DNS server.
Jim configures a 2012 R2 machine named Sever4 as a DNS server. In the DHCP server’s scope options for a subnet
containing 25 client computers, Neil configures Server4s IP address in the 006 DNS servers option.
He also ensure that DHCP reservation exists for Server4. Next, he restarts all the client machines on the
subnet. He discovers a client machine is still configured to use a DNS server that was taken off line before
Jim started making changes to the network. How can Jim correct this problem?

A. Execute the ipconfig /release and ipconfig /renew commands on each workstation

B. Configure both the 006 and the 015 options for the DNS server in DHCP Scope.

C. Use ipconfig /setclassid at each client computer to set DHCP class ID information.

D. Manually edit the TCP/IP properties on each client computer.

E. Isolate the subnet to eliminate the possibility that clients are receiving scope information from a
remote subnet.

Answer:D, this seems like too much work and like there should be another way around manual updates to a client but its what Q says. Are we
still in the early days of DNS on this?

37. Your Company uses Class B network ranges. You plan to configure the subnet mask for a branch site
containing 450 Win 8.1 client computers. Your company policy requires you to use 1 subnet per branch site.
You plan to add another 150 computers in the next year. You need to select a subnet mask that
satisfies the requirements for today and also the future growth. You want to limit
the amount of wasted addresses. Which subnet mask should you select?

A. 255.255.254.0

B. 255.255.252.0

C. 255.255.255.240

D. 255.255.255.0

Answer: I would say B but im not great with IPv4 but im going to hold my self accountable so even if im wrong
after checking Ill leave my wrong answer posted. Ok it is B after reading the whole question and the answer. For more information watch
Subnetting demystified as mentioned in a previous post.

38. You need to plan an IPv6 addressing scheme. You need to identify the addresses in the answers below
as one of the following 1:Global Unicast, 2:Link-Local unicast,
3: unique local IPv6 unicast, or 4: Multicast

A. Fe::

B. 2000::/3

C. Fc00::/7

D. Ff

E. Fe80::/64

Answer:Im terrible with Ipv6 so we for sure have to consult the answer column in
Q for this one or you could check the links and learn the ranges and perhaps an understanding of the ranges. Any way the answer is 1,B; 2,E; 3,C; 4,D.

39. Stevie B’s Chicken A La King A La Carte consists of a main site and two branch sites (we rae really
much larger but this is just a theoretical scenario). Each branch site is connected to the main via a WAN link. You need to configure a new
server for the main site. You need to configure an IPv6 address for the new server. You plan to use an IPv6 address clas
that is private to the organization but unique across all the organization’s sites. Which address meets this requirement?

A. Foo:3fff:64df:155c:dca7::81a4

B. Fe80::cc33:456a:3719:1234

C. 2003:414:ab86:741f::230:1:a5ab

D. fd12:cd36:1208:9::f92b

Answer:D, as im horrible with IPv6 I had no clue. I honestly havent put much stock into learning this technology yet as
it seems it would be immensely time consuming for some one such as my self and I have a lot of other stuff to learn.

40. You are the network engineer for a consulting firm. You have been tasked with desiging a subnet mask for a network that
will support up to 20,046 client computers. You must minimize the number of wasted addresses. Which subnet mask should you select?

A. 255.255.252.0

B. 255.255.248.0

C. 255.255.240.0

D. 255.255.128.0

Answer: D This requires a lot of math (at least a lot to me) but if you memorize the tables or at least the patterns of the tables and
write them out while testing its possibly faster than doing the round about math of 255-128=x X*255. I think thats a slightly less than
accurate but not completly failsauce way to calculate addresses in this case. Please correct me if your reading this and im wrong.

Part 3 of 6 of source Q test prep

Ok on to section 21-30. Feeling like we got a pretty style set here and like we are
getting into a groove on a format of writing these things with a slightly less than reverent perspective
with regards to “corporate culture” or perhaps im just inflecting my own personality which
may or may not be a good thing given my records of personal success. In addendum to that statement style wise I feel like I could perhaps [b] (sic) the numbers in previous posts.
I am feeling slightly “under the weather” as of late so I hope theres no spelling errors, logical failures or bad links. If you find any please let me know!

21. You are responsible for printers connected to printers (i feel like its good to get used to the
terminology of understanding a “printer” is a server and a “print device” is one of those giant monsters that the
images on paper come out of) running 2012 R2 in the StevieBsChickenALaKingALaCarte.com domain. You have installed
a print device that should be accessible to computers in the sauce department but not to
computers in other departments of the company. All resources in this department are located in the Sauce OU (organizational unit,
if you dont know this by now plz l2server/GP). What should you do?

A. Right-click this printer in the details pane of the print management snap-in & select
deploy with group policy. Choose
a GPO that is linked to the
Sauce OU. and select the option labeled “the computer that this GPO applies to (per machine).”

B. From the sharing tab of the “print device” printer’s properties dialog box, select the List in the directory
option.

C.Right-click the print device and in the details pane of the print management snap-in, and select the list in directory option.

D.Right-click the print device in the details pane of the print management snap in and select deploy with group policy. Choose a GPO
that is linked to the Sauce OU and select the option labeled “The uses this GPO applies to (per user)”

Answer:A, its kind of a long scenario but if you want the users to have the printer auto-installed A is the only option.
You could choose another option but it would require extra work from your Sauce friends, co-workers or whatever your preferred nomenclature is (i like to seem approachable and sociable).

22. Your network consists of two servers. Server1 is a 2012 box that functions as an application server. Server2 is a 08R2 file server. You need to ensure
that you can manage Server 1 from Server 2 using Server Manager. What do you need to do to ensure (that diet protein shakes taste better) that you can
manage Server 1?

A. Install WMF 4.0 on server 2

B. Install WMF 4.0 on server 1

C. Install .NET Framework 4.5 on Server 2

D. Install .NET Framework 4.5 on Server 1

Answer:A,C as Server 2 is not on 2012R2 you have to install .net from my understanding.

23.You are the systems administrator for StevieBsChickenALaKingALaCarte.com. Your network consists of
a single Active Directory domain containing 650 Windows 8.1 workstations and 30 2012R2 machines functioning on
member servers. You just finished configuring a new remote server named RemoteServer1. You have taken the necessary
steps to configure the WS Management listener service on the new server. You would like to confirm functionality before
releasing the server to production. Which command can you execute to confirm WinRM functionality?

A.Winrs -r:RemoteServer1 test

B.Psremote -exec RemoteServer1 test

C.Test-WSMan RemoteServer1

D.WinRM -test RemoteSetver1

Answer:C. Test-WsMAn does work for this according to our source (I didnt know this one)

24.Tony has recently installed a Hyper-V host with 64 GB of RAM and two quad-core processors.
He plans to install four virtual guest servers. He would like each guest to be able to use up to 16 GB
of memory. In the event of a host shutdown, Tony needs to be able to reserve a portion for startup memory
to allow him to bring up the host & all guest servers simultaneously. What should he configure on each virtual machine?

A.Windows Paging

B.Static Memory

C.Dynamic Memory

D.Fast Cache

Answer:C, and here is a thread

about this topic.

25.Server1 is a Windows Server 2012 R2 Hyper-V hose. Server1 contains VM1. You need to set VM1 up to PXE boot in the event of a restart.
Which virtual machine setting should you configure for VM1 to accomplish this?

A.Configure the standard network adapter setting to boot from PXE

B.Configure to Legacy Network (same link) Adapter to boot from PXE.

C.Configure the BIOS startup (best link I could grab, nothing direct) order

D.Disable Diskette Drive (no clue what this is unless we are just booting to DOOM II)

Answer:B as You must boot from a legacy network adapter to PXE boot but if you need a machine to PXE boot every time I feel like there
should be some additional steps to configure. Strange question, Q. And indeed upon checking Q claims the soul answer to be C.

26. You are the administrator for a two-node Windows Server 2012 R2 Hyper-V cluster. You configure two new virtual machines
in your node named VM1 & VM2. You need to ensure that all virtual machines are able to be backed
up via the host using a third-party backup application. What should you configure?

A.Network adapter

B.Router Guard

C.Guest integration services

D.Windows Backup (real convoluted terminology for Hyper-V)

Answer:C, this is a weird question though. It cant be any thing having to do with DHCP so B is out, A makes no sense and D is certianly not 3rd party
or hyper-v related.

27.You are the administrator for Server1 a Windows server 2012 Rs Hyper-V host you
configure two new virtual machines: VM1 and VM2. You need to ensure that you can track CPU, memory, disk spcae and network usage.
Which command do you configure?

A.Enable-gstintSvc

B.Enable-VMResourceMetering

C.Enable-VMResource Management

D.Enable-VmPerfMon

Answer:B, upon checking the links you will realize the truth of the situation.

28.You are preparing to deploy Hyper-V to your infrastructure. Server1 is a 2012 box
functioning as a dev Hyper-V server. you need to test the ability to use pass through disks for
a new VM. Your local disk configuration is as follows: disk 1 online 20 gig basic unallocated space,
Disk 2 same config 10 gb, disk 3 same config 5 gb. You need set up pass through on disk1, what do you need to do?

A. Take Disk 1 offline

B. Create a 20-GB volume on Disk 1

C. Create a new striped volume using the space in disks 1 and 2.

D. Upgrade to 2012 R2

Answer:A, I choose not to put links in this one because you see it in so many practice test and
the answer is so simple, pass through disk question=take the disk offline, every time.

29.You need to share the contents of a virtual hard disk between multiple guest virtual machines. What can you do

A.Establish a parent/child relationship, and configure the virtual hard disk containing the files as the parent disk.

B.Convert the Virtual hard disk to a fixed sized disk.

C.Establish a dynamically expanding disk relationship between the virtual machines.

D.Add a second virtual hard disk and configure a virtual mirror.

Answer:A, any time you have to share files you must have a parent/child disk situation.

30.Blackie Lawless is the network administrator for StevieBsChickenALaKingALaCarte.com. He plans to
configure a server a Hyper-V host. To reduce cost, Blackie has decided to repurpose an existing server. The server has 32 GB of RAM,
two quad-core CPUs, 4 TB of local storage, and four network adapters configured as a single NIC Team. Blackie upgrades the server to 256 GB of RAM
and installs the Hyper-V role. Blackie needs to create two virtual network switches. Half the virtual machines
will be configured as development servers connected to VirtualSwitch1, while the other half will be configured as
production servers connected to VirtualSwitch2. During the configuration Blackie realized that he is unable to split the VMs
between two virtual switches. What is the first thing Dave must do to accomplish this?

A.Upgrade the “hyper-V” integration services

B.Execute the remove-NetLbfoTeam cmdlet

C.Execute the set-netadapter cmdet to configure VLAN IDs

D.Add an available interface to the NIC Team using the Add-netlbfoTeamNic cmdlet

Answer:B, if you need to connect to two switches a NIC team cannot do that because its tied to traffic from one virtual switch.

Thats all for this round. Maybe I can get 10 more done tomorrow.

Powered by WordPress.com.

Up ↑