Zacker Book, Chapter 8

Not entirely through with reading this chapter but I have made it about half way through this text from appearance and page number which I suppose makes sense
since im half way through the book chapter wise. Really happy with the progress ive made so far. Hopefully the answers are correct and the links are helpful
and appropriate. I get a little concerned when reaching any farther back than the start of 2012 but some times theres not really a better a option. This is also
a good time to take few days off from bogging so that I can finish reading the book. Im also moving this to a wordpress site as Im not convinced that Tumblr is
the best place to host some thing like this. Birthday present from the family. Excited to do more with the coding in the future. Having more fun with it than I
ever thought I would. Went the rout of an admin because I thought I hated coding so much. Took a similar route in art school. Who knows maybe Ill be a code monkey
in the future.

Edit: almost forgot to add this, still need to edit the first post with the “editor” text from chapter 3. Please read the header for this post
regarding the answer key situation for these chapters.

1. Which of the following statements about VHDX files is/are true?

A. VHDX files can be as large as 64 TB.

B. VHDX files can only be opened by computers running Windows Server 2012.

C. VHDX files support larger block sizes than VHD files.

D. VHDX files support 4kb logical sectors.

Answer: All of them are true. The book wording for the question is a bit sketchy however all of the above
statements are true about VHDX files according to the text and several google articles I just read through.

2. Which of the following must be true about a pass-through disk?

A. A pass-through disk must be offline in the guest OS that will access it.

B. A pass-through disk must be offline in the parent partition of the Hyper-V server.

C. A pass-through disk can only be connected to a SCSI controller.

D. A pass through disk must be added to a VM with the disk management snap in.

Answer: B, the pass-through disk must be available on the hyper V host and offline in order for the VM to be able to
access it for more information check out this TechNet Article

3. The merge function only appears in the Edit Virtual Hard Disk Wizard under which of the following conditions?

A. When you select a VHDX file for editing.

B. When you select two or more disks for editing.

C. When you select a disk with free space available in it.

D. When you select a differencing disk for editing

Answer: D, merge combines a differencing disk and a parent disk but you have to select the differencing disk first, this
one is available in the other text for reference checking. Any way, heres an older article for information on how to
create a merged differencing disk

4. Which of the following are valid reasons not to take snapshots of VMs? (choose all that apply)

A. Snapshots can consume a large amount of disk space.

B. Each snapshot requires a separate copy of the VMs memory allocation.

C. Each snapshot can take several hours to create.

D. The existence of snapshots slows down VM performance.

Answer: A, D according the the cross checked material. While deciding to google question 9 I found this answer listed there as well.

5. Which of the following is not required to add Fibre Channel adapter to Hyper-V?

A. You must create a Fibre Channel virtual SAN.

B. You must have a physical Fiber Channel adapter installed in the host computer.

C. You must have a Fibre Channel adapter driver that supports virtual networking.

D. You must have a SCSI cable connecting the Fibre Channel adapter to the storage devices.

Answer: D, SCSI cables are obviously not required for a for a Fiber Channel adapter.

6. What Server Manager tool allows you to create a new virtual hard disk (VHD)?

A. Hyper-V server

B. Active Directory Domain Services (AD DS) manageability

C. Hyper-V Manager

D. File and storage services

Answer: C, new VHDs are created in Hyper-V Manager

Here is a video on how to create a new VHD thats helpful for some of the previous questions, there is also this

7. When creating a new VHD what feature does Windows PowerShell offer that the graphical interface does not?

A. You can specify the block size and the logical sector size

B. You can decide between VHD and VHDX disk types

C. You can choose among Fixed, Dynamic or differencing.

D. You can specify the path.

Answer: A, if you’ve gotten proficient at reading Technet articles on PowerShell cmdlets this one on
new-vhd is helpful.

8. Can you modify an existing VHD file?

A. No, once created a VHD file is fixed

B. Yes, but you can only modify it using PowerShell

C. No, but you can change it into a VHDX file.

D. Yes, you can even modify it without mounting it to a VM.

Answer: D, you can compact, convert, expand and shrink an existing VHD file using the hypver-v manager console.

Here is a short video showing how to convert a VHD to a VHDX but thats part of the process to edit a VHD at all
so its part of C but the no answer is wrong.

I probably should cover some PowerShell cmdlets too shouldnt I? ok maybe that would be good

9. Do VMs ever directly access a physical hard disk?

A. No, VMs access only VHDs, areas of space on the physical hard disk.

B. Yes, VMs access a physical hard disk by way of a “pass through disk” a special
virtual disk that directly accesses the physical disk if it is made exclusively available
to the VM.

C. No, VMs access physical hardware only through the hypervisor.

D. Yes, VHDs correlate one to one with physical hard disks.

Answer: B, I actually decided to google this one and came across an interesting site that might be helpful
to those of us working against a clock with server 2012. This
site has some flash cards that may be useful. I would recommend studying the technologies more directly then learning
the chaotic logic associated with putting the words (in this case the ideas of the technologies) into sentences due to the
previously mentioned problem of ideas not exactly correlating 1-1 with questions due to the nature of real life server administration.

10. Creating a virtual SAN allows you to ______.

A. Eliminate the physical disk.

B. Have VHDs communicate with physical hard disks.

C. Make distant storage accessible to VMs.

D. Utilize the Fibre Channel adapters.

Answer: D, in order for you to use A virtual SAN you must use a Fibre Channel adapter communication protocol. For more information
on implementing this technology please check TechNet.

Zacker book, Chapter 7

I feel like we are starting to make progress. Give that its the first of the month I think I should possibly be able to get through this
text, go through measure up a few times and test again by the end of the month. We will see what it has in store for me this time.
I did actually find this chapter to be very helpful as it was full of illustrations and ideas I had not seen presented in other materials.
Well worth reading twice.

Please read the header for this post
regarding the answer key situation for these chapters.

1. Which of the following statements about Type I and Type II virtualization are true?

A. In Type I Virtualization the Hypervisor runs on top of a Host OS.

B. In Type I Virtualization the Hypervisor runs directly on the computer hardware.

C. In Type II Virtualization, the Hypervisor runs on top of a host OS.

D. In Type II Virtualization, the Hypervisor runs directly on the computer hardware.

Answer: B, and C I found this bit of information interesting as I had not seen it other places but its basicly telling you how
Hyper-V interacts with the host operating system in a way thats superior to other virtualizatioon products.

Its also helpful to provide a definition here for these two products, so here is some thing found in the oline
PDF book

Hyper-V uses Type I virtualization, in which the hypervisor is an
abstraction layer that interacts directly with the computer’s physical hardware—that is, without
an intervening host OS. The term hypervisor is intended to represent the level beyond the term
supervisor, in regard to the responsibility for allocating a computer’s processor clock cycles.
The hypervisor creates individual environments called partitions, each of which has its
own OS installed and accesses the computer’s hardware via the hypervisor. Unlike Type II
virtualization, no host OS shares processor time with the hypervisor. Instead, the hypervisor
designates the first partition it creates as the parent partition and all subsequent partitions as
child partitions

This arrangement, in which the hypervisor runs on top of a host OS, is called Type II virtualization.
By using the Type II hypervisor, you create a virtual hardware environment for each
VM. You can specify how much memory to allocate to each VM, create virtual disk drives by
using space on the computer’s physical drives, and provide access to peripheral devices. You
then install a “guest” OS on each VM, just as if you were deploying a new computer. The host
OS then shares access to the computer’s processor with the hypervisor, with each taking the
clock cycles it needs and passing control of the processor back to the other

2. Which of the following types of server virtulization provides the best performance for high-traffic servers
in production environments?

A. Type I virtualization

B. Type II virtualization

C. Presentation virtualization

D. Remote App

Answer: A, if you read the previous explanation its fairly obvious.

3. Which of the following Microsoft operating systems includes a license that enables you to create and unlimited number of
virtual instances of Server 2012

A. Hyper-V Server 2012

B. Windows Server 2012 Datacenter

C. Windows Server 2012 Standard

D. Windows Server 2012 Foundation

Answer: B allows unlimited, C allows 2 and D allows for 0 virtualized instances. Having trouble finding a whole lot of useful
info for comparisons sake other than pdf shown on this blog

4. Which of the following Hyper-V features make it possible for a VM to function with a minimum Ram value
that is less than the start up value?

A. Smart paging

B. Dynamic memory

C. Memory weight

D. Guest integration services

Answer: B, given these choices which appear to be tricky answers as none of them are straight forward, again kind of
using crow wing logic from my illustration but the answer according to the text is that dynamic memory
is the technology that allows more fluid, so to speak, ram functions.

5. When you install the Hyper-V role on a server running Windows Server 2012, the instance of the OS on which you installed the role
is converted to which system element?

A. The hypervisor

B. The Virtual Machine Monitor

C. The parent partition

D. A child partition

Answer: C, the parent partition, hypervisor is the software and VMM has to do with VmWare

6. If an administrator wants to install additional roles along with Hyper-V what does Microsoft recommend the administrator do?

A. Microsoft recommends that you install other roles on one of the VMs you create with Hyper-V.

B. Microsoft recommends that you install only roles related to Hyper-V

C. Microsoft recommends you install only roles on the parent partition

D. There are no recommendations against roles installed with Hyper-V

Answer: A, according to the text you should install additional roles such as DHCP on a VM. It doesnt implicitly say this
but its implied that this is for performance reasons. Again I question the cost effectiveness of this but perhaps
if the question about how Hyper-V operates directly on the hardware instead of on top of the OS is true I assume its
effecent but even still the additional clock cycles of having the OS installed where Hyper-V is installed still make it
only efficient in terms of downtown for critical services and development.

7. What are the two files used for every VM?

A. A saved state file & a .vmc file in INF format

B. A .vmc file in INF format and virtual hard disk (.vhd or vhdx) files for the guest OS and data

C. A saved-state file and virtual hard disk (.vhd or .vhdx) files for the guest OS applications and data

D. A virtual machine configuration (.vmc) file in XML format and virtual hard disk (.vhd or .vhdx) files for the guest OS and data

Answer: D, every VM has a .vmc xml file and it has to have a VHD associated with it thats only used by that virtual machine.

8. When using the create a virtual machine wizard, how is the virtual hard disk created by default?

A. You set the maximum size and it starts at that size

B. It starts at 40 GB and warns the admin when close to full

C. It starts small and dynamically expands up to the maximum size you specify

D. It starts small and continually expands to fill the available storage

Answer: D, this is known as a dynamically expanding VHD. There is an older technet article about the subject available
here some of the terminology is older
however the ideas are correct, according to whats in the text.

9. What operating systems can an administrator install on a VM?

A. Windows Server 2008 and newer

B. Windows Server 2003 and newer

C. Any Microsoft windows edition

D. Several Microsoft products as well as Red Hat and SuSe Linux

Answer: D, you can install almost any thing on a VM

10. In some cases, certain Hyper-V guest OS features do not function properly using the OS’s own device drivers. What can an
administrator do?

A. Install and configure Guest Integration Services

B. Install Hyper-V manager

C. Reinstall Hyper-V

D. Try a different operating system

Answer: A, according to the test if native OS features do not function properly try integration services to get them up and

Zacker book, Chapter 5

I had hoped to get through this one on the same day as the previous one but that doesn’t seem likely. Ended up having a busier day
than expected. However, I don’t think I have any thing going on tomorrow. Wednesday Ill be writing on the night shift (hopefully) after
going to see a Norwegian band. Which reminds me that I should save the PDF ive been referencing to a local drive or check the text
before I go out. Regardless of how the timing works out it should be a fun night. Really starting to enjoy coding, as long as I don’t
push my self to fatigue, some thing that seems ironic to a person that spend that past two summers doing lawn care, from typing and thinking
its actually a lot more enjoyable than I ever expected it to be. My impression as a young man was that it was almost mindless work but
yet I seemed to enjoy the results it yielded. A bit selfish or short sighted of me perhaps.

My apologize for the personal dialog, now on to the important part. I suppose I could also say that Im leaving a few questions to type out
later if im feeling so inclined after retesting (and most likely failing) again.

Please read the header for this post
regarding the answer key situation for these chapters.

1. Which of the following terms describes the software interface through which a computer communicates with a print device?

A. Printer

B. Print Server

C. Printer driver

D. Printer management Snap-in

Answer: A, a printer is the software interface. This is a confusing term as its used very flippantly in some documents but the official
use indicates that a print device is the hardware that actually prints out the product, the printer sends the document to the
print server which sends the document to the printer using code that it can understand provided by the client local driver.

2. What printing configuration makes the computer with the locally attached print device function as a print server?

A. Network attached printer sharing

B. Network attached printing

C. Locally attached printer sharing

D. Direct printing

Answer: C, there isnt a lot in the gospels of technet about this from a definitional standpoint but the answer is cross-referenceable
and it appears in the text. It seems to be kind of an older idea as most of the searchable articles are on XP.

3. When planning for additional disk space for the print server spooler consider extra storage for ____.

A. Overhead in case of several smaller print jobs

B. The print server page file

C. Older less efficient print drivers

D. Temporary print device outages

Answer: D, there really isnt much conversation to be had around this point. Just kind of is what it is.

4. Can you install 32-bit print drivers on a Windows Server 2012 system?

A. No because Windows Server 2012 is a 64-bit platform.

B. Yes, because Windows Server 2012 is a 64-bit platform which comes with 32 bit support.

C. No, but you can install the 32-bit driver from a computer running a 32-bit version of Windows.

D. No, but you can install the 32-bit driver from a computer running a 32-bit version of a Windows.

Answer: B, you can install 32-bit drivers because a 64 bit platform can support 32 bit drivers but the reverse is
not true. So you cant put 64-bit drivers on a 32 bit system. This was a “checkable” question.

5. What is the purpose of the Remote Desktop Easy Print driver?

A. Easy print allows remote clients to print to local print devices via a print re-director.

B. Easy print allows admins to configure printers for users connected remotely.

C. Easy print allows administrators to print to remote print devices via a print re-director.

D. Easy print allows remote configuration of all printers

Answer: B, this is true for RDP connections are terminal style usage. For more information check the Technet
article on terminal printing.
Dont forget to hit that search bar with easy print driver and check out a few other articles. I know its
powered by bing but on an intraweb database searching system it seems surprisingly effective. 🙂

6. For a user to print, pause, resume, restart and cancel documents they sent to the printer, the user must have the
basic _____ permission.

A. Take ownership

B. Manage this printer

C. Basic print

D. Manage documents

Answer: C, basic print permissions allows user to cancel “his or her” own documents. I found the book verbiage on this
question to be a little overly complicated when implying the idea of individually owned documents being sent to
a print device.

7. You are setting up a printer pool on a computer running Windows Server 2012. The printer pool contains three print
devices, all identical. You open the properties dialog box for the printer and select the Enable Printer Pooling
option on the Ports tab. What must you do next?

A. Configure the LPT1 port to support three printers.

B. Select or create the ports mapped to the three printers.

C. On the device settings tab, configure the installable options to support two additional print devices.

D. On the advanced tab, configure the priority for each print device so that printing is distributed among the
three print devices.

Answer: B, you need to configure the ports mapped to the three printers per the the book text and cross-referencing.

8. One of your print devices is not working properly and you want to temporarily prevent users from sending jobs to the printer serving
the device. What should you do?

A. Stop sharing the printer

B. Remove the printer from Active Directory

C. Change the printer port

D. Rename the share

Answer: A, stop sharing the printer is the best option per the book. Check this article
for more information on implementing that process.

9. You are administering a computer running Windows Server 2012 set up as a print server. Users in the marketing group
complain that they cannot print documents using a printer on the server. You view the permissions in the printer’s
properties. The Marketing group is allowed Manage Documents permission. Why cant the users send documents to the print

A. The everyone group must be granted the Manage documents permissions.

B. The administrators group must be granted the manage printers permission.

C. The marketing group must be granted the print permission.

D. The marketing group must be granted the manage printers permission.

Answer: C, you cant print to a device without the basic print permission.

10. You are administering a print server running Windows Server 2012. You want to perform maintenance on a print device
physically connected to the print server. There are several documents in the print queue. You want to prevent the
documents from being printed to the printer but you don’t want users to have to resubmit the documents to the
printer. What is the best way to do this?

A. Open the printer’s properties dialog box, select the sharing tab and then select the Do Not Share This Printer option.

B. Open the printer’s properties dialog box and select a port that is not associated with a print device.

C. Open the printer’s queue window, select the first document, and then select pause from the documents window.

D. Open the printer’s queue window & select the pause printing option from the printer menu.

Answer: D, this one seems fairly obvious.

Zacker book, Chapter 4

On to chapter 4, did meet my established quota but ran into some thing unknown to me, I heard a robot once call it fatigued. Hopefully
that wont happen today but you never know. Maybe I can finish up the last two that I had planned to get out yesterday, today. Yeserday
possibly would have been better for me. Not sure why I feel that way.

Please read the header for this post
regarding the answer key situation for these chapters.

1. Which of the following is the best description of a security principle?

A. A person granting the permissions to network users.

B. The network resource receiving permissions.

C. A collection of individual special permissions.

D. An AD object that gets assigned permissions.

Answer: D, this one didnt have an answer and I thought the wording was poor but the general idea is the user thats being granted
the permissions per the book so I changed the wording of D around to better express this though. So not only does this book not have the answers
but im having to edit it too!!! OMG, what a turd haha

2. Which of the following statements about effective access is not true?

A. Inherited permissions take precedence over explicit permissions.

B. Deny permissions always override Allow permissions.

C. When a security principal receives Allow permissions from multiple groups the
permissions are combined to form the effective access permissions.

D. Effective access includes both permissions inherited from parents and permissions
derived from group membership.

Answer: A, To quote another source “When a
security principal receives permissions by inheriting them from a parent or from group
memberships, you can override those permissions by explicitly assigning contradicting
permissions to the security principal itself.”

3. Which of the following statements is not true in reference to resource ownership?

A. One of the purposes for file and folder ownership is to calculate disk quotas.

B. Every file and folder on an NTFS drive(r?) has an owner

C. It is possible for any user possessing the Take Ownership special permission to assume the ownership of a file
or folder.

D. It is possible to lock out a file or folder by assigning a combination of permissions that permits access to no one
at all, including the owner of the file or folder.

Answer: B, every folder does not have to be assigned an owner. This two has no answer but im like 80% sure this is what
the chapter is indicating. If its wrong please hit my inbox.

4. Which of the following statements about permissions is true?

A. ACLs (access control lists) are composed of ACEs (access control entries)

B. Basic permissions are composed of advanced permissions

C. All permissions are stored as part of the protected resource.

D. All of the above.

Answer: A & B are verifiably true and C is questionable & and hard to verify. The term “protected resource” is hard to
verify in this context.

5. What is the maximum number of shadow copies that a Windows Server 2012 system can maintain for each volume?

A. 8

B. 16

C. 64

D. 128

Answer: C for more information see the TechNet article on Shadow Copies

6. Which of the following terms describes the process of granting users access to file server shares by reading their permissions?

A. Authentication

B. Authorization

C. Enumeration

D. Assignment

Answer: D, not much to say with this one.

7. Which of the following are tasks that you can perform using the quotas in the FSRM but you cant perform with NTFS quotas?

A. Send an email notification to an administrator when users exceed their limits.

B. Specify different storage limits for each user.

C. Prevent users from consuming any storage space on a volume beyond their allowed limit.

D. Generate warnings to users when they approach their allotted storage limit.

Answer: A, NTFS quotas do not allow you to send an email for auditing.

8. In the NTFS permissions system, combinations of advanced permissions are also known as _________ permissions.

A. Special

B. Basic

C. Share

D. Standard

Answer: B, this is not cross-reference-able however it is in the text. I also found this website to be a helpful source of

Zacker book, Chapter 3

On to chapter three. As previously mentioned, trying to get through typing out 3 of these chapters and two read. Again, not sure of the
legality of this situation but as Server 2012 will soon be a thing of the past and PDFs of similar books exist as free resources im not
entirely sure that I could get into any kind of trouble for this. Assuming there could be an issue and your a publisher/content creator, please e-mail me with any problems, I suppose I could put that in the first chapter header. Maybe Ill go back and edit that.

If reading for reference please read the header for this post
regarding the answer key situation for these chapters.

In addition if any one knows why lower case S letters display so weird in this theme please use the aforementioned email address as I wish i knew, default font issue?

Select one or more correct answers for the following questions.

1. Which of the following statements are true of stripped volumes?

A. Striped volumes provide enhanced performance over simple volumes.

B. Striped volumes provide greater fault tolerance than simple volumes.

C. You can extend striped volumes after creation.

D. If a single physical disk in the striped volume fails, all of the data in the entire volume is lost.

Answer: A,D striped volumes provide excellent read write I/O numbers however they offer none of the resiliency that comes with
a RAID-5 or mirrored volume. The fault tolerance is no more or less than a simple volume as there is no parity data and you cannot extend them.

2. Which of the following are requirements for extending a volume on a dynamic disk?

A. If you want to extend a simple volume, you can use only the available space on the same disk, if the volume is to remain simple.

B. The volume must have a file system before you can extend a simple or spanned volume.

C. You can extend a simple or spanned volume if you formatted it using the FAT or FAT32 file system.

D. You can extend a simple volume across additional disks if it is not a system volume or a boot volume.

Answer: A, D, for more information check this TechNet article on the subject

3. Which of the following are not true in reference to converting a basic disk to a dynamic disk?

A. You cannot convert a basic disk to a dynamic disk if you need to dual boot the computer.

B. You cannot convert drives with volumes that use an allocation unit size greater than 512 bytes.

C. A boot partition or system partition on a basic disk cannot be extended into a striped or spanned volume, even
if you convert the disk to a dynamic disk.

D. The conversion will fail if the hard drive does not have at least 1 MB of free space at the end of the disk.

Answer: C, D this one doesn’t have a reference check answer but there is an older TechNet article.

4. Which of the following Server 2012 features enables users to access files that they have overwritten?

A. Offline files

B. Parity-based RAID

C. Windows Installer 4.0

D. Volume Shadow Copies

Answer: D, there’s no answer key for this one but that’s the only technology that allows you to revert back to previous versions and things like that

5. Which of the following RAID levels yields the largest percentage of usable disk space?





Answer: C, however 5 and 6 are similar. Here’s an article with good visuals concerning the topic of raid 5 vs raid 6

6. To use Shadow Copies you must enable the feature at which of the following levels?

A. the file level

B. The folder level

C. the volume level

Answer: C, check out this Shadow Copies article on TechNet which seems to say
the same thing as the book but there is no answer key for this one.

7. Which of the following are not true about differences between network attached storage (NAS) devices?

A. NAS devices provide a file system implementation; SAN devices do not

B. NAS devices must have their own processor and memory hardware; SAN devices do not require these components

C. NAS devices require a specialized protocol, such as Fibre Channel or iSCSI; SAN devices use standard networking protocols.

D. NAS devices must run their own operating system and typically provide a web interface for administrative access; SAN devices
do not have either one

Answer: C, I had a hard time with this one as the wording while studying for this amount of time in the day made my brain hurt.
Hoping its like working out and that it just makes you more able to think harder as time progresses so far thats proving to be true.
I also havent seen a question like this before so its essentially new material. regardless, lets go through what I know so far and save technet
links for a li at the end. Not sure about C, b is for sure true about NAS, not sure if its true about SAN devices. D is true about NAS. MAybe
I just dont know any thing about SAN devices. Maybe thats a good place to start. Ok after reading the listed below links, b is true for san so is A & D so
C is a pretty safe bet.

    SAN vs NAS

  • SAN
  • NAS
  • 8. Which of the following volume types supported by Server 2012 do not provide fault tolerance?

    A. Striped

    B. Spanned

    C. Mirrored

    D. RAID-5

    Answer: A,B, neither of those have fault tolerance. See the RAID wikipedia and understand that A = raid 0, spanned is just one disk on
    more than one volume and raid 5 contains parity data. This is
    interesting and relevant as well.

    9. A JBOD drive array is an alternative to which of the following?

    A. SAN

    B. SCSI

    C. RAID

    D. iSCSI

    Answer: C, JBOD apparently means just a bunch of (unorganized) disks.

DHCP and DNS hangout pt 2

I was a little late to this one due to some confusing about scheduling and thinking it was getting rescheduled but I learned it wasnt rescheduled
but I still managed to learn some really good things about tombstoning and DNS record management. There are some confusing procedures and policy’s
around these technologies.

Any way heres the video, more chapter reviews coming today. Trying to get 3 chapters published today.

Heres some links as well:

Here is part one as well, in case you get really excited

Website Powered by

Up ↑