Название: MCSA Windows Server 2012 R2 Complete Study Guide
Автор: Panek William
Издательство: Автор
Жанр: Зарубежная образовательная литература
isbn: 9781118859902
isbn:
C. Domain Controllers
D. Foreign Security Principals
35. Your manager has decided your organization needs to use an Active Directory application data partition. Which command can you use to create and manage application data partitions?
A. DCPromo.exe
B. NTDSUtil.exe
C. ADUtil.exe
D. ADSI.exe
36. Your network contains an Active Directory domain named Sybex.com. The domain contains a RADIUS server named Server1 that runs Windows Server 2012 R2. You add a VPN server named Server2 to the network. On Server1, you create several network policies. You need to configure Server1 to accept authentication requests from Server2. Which tool should you use on Server1?
A. Set-RemoteAccessRadius
B. CMAK
C. NPS
D. Routing and Remote Access
37. Your network contains an Active Directory domain named Sybex.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the following role services installed:
■ DirectAccess and VPN (RRAS)
■ Network Policy Server
Remote users have client computers that run Windows XP, Windows 7, or Windows 8. You need to ensure that only the client computers that run Windows 7 or Windows 8 can establish VPN connections to Server1. What should you configure on Server1?
A. A vendor-specific RADIUS attribute of a Network Policy Server (NPS) connection request policy
B. A condition of a Network Policy Server (NPS) network policy
C. A condition of a Network Policy Server (NPS) connection request policy
D. A constraint of a Network Policy Server (NPS) network policy
38. You are the network administrator for a large organization that contains an Active Directory domain named WillPanek.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Network Policy and Access Services server role installed. You plan to deploy 802.1x authentication to secure the wireless network. You need to identify which Network Policy Server (NPS) authentication method supports certificate-based mutual authentication for the 802.lx deployment. Which authentication method should you identify?
A. PEAP-MS-CHAP v2
B. MS-CHAP v2
C. EAP-TLS
D. MS-CHAP
39. You have an Active Directory domain named WillPanek.com. The domain contains a server named ServerA that runs Windows Server 2012 R2. ServerA has the Network Policy and Access Services server role installed. Your company’s security policy requires that certificate-based authentication must be used by some network services. You need to identify which Network Policy Server (NPS) authentication methods comply with the security policy. Which two authentication methods should you identify? Each correct answer presents part of the solution. (Choose two.)
A. MS-CHAP
B. PEAP-MS-CHAP v2
C. CHAP
D. EAP-TLS
E. MS-CHAP v2
40. You are the network administrator, and you have been asked to set up an accounting system so that each department is responsible for the cost of their use of network services. Your network contains a Network Policy Server (NPS) server named ServerA. The network contains a server named Database1 that has Microsoft SQL server installed. All servers run Windows Server 2012 R2. You configure NPS on ServerA to log accounting data to a database on Database1. You need to ensure that the accounting data is captured if Database1 fails. The solution must minimize cost. What should you do?
A. Implement Failover Clustering.
B. Implement database mirroring.
C. Run the Accounting Configuration Wizard.
D. Modify the SQL Server Logging properties.
41. In a secure environment, IPsec encryption should only be disabled for inter-node cluster communication (such as cluster heartbeat) under what circumstances?
A. Certificates use weak encryption methods such as DES
B. LowerQuorumPriorityNodeID is set on a node.
C. DatabaseReadWriteMode is set to 2
D. Group Policy Updates have a high processing latency
42. In Windows Server 2012 R2, Failover Clustering supports how many nodes?
A. 8000
B. 1024
C. 64
D. 1000
43. In Windows Server 2012 R2, what feature dynamically adjusts cluster node votes in order to maintain an odd vote count where no witness is being used?
A. Witness Dynamic Weighting
B. Tie Breaker for a 50 % Node Split
C. Lower Quorum Priority Node
D. Force quorum resiliency
44. What authentication mechanism does Active Directory–detached clusters utilize?
A. NTLM
B. MIT Kerberos Realms
C. AD Kerberos
D. SSL
45. Shared virtual hard disks can be utilized by SQL Server and Exchange Server for virtualized workloads.
A. True
B. False
46. What is the default TCP port for iSCSI?
A. 3389
B. 21
C. 1433
D. 3260
47. You are a server administrator, and you are trying to save hard drive space on your Windows Server 2012 R2 machine. Which feature can help you save hard disk space?
A. ADDS
B. HDSaver.exe
C. Features On Demand
D. WinRM
48. Your СКАЧАТЬ