Course Implementation Plan

  1. Install Windows Server 2012 R2
    • Lab 1 : Install Windows Server 2012 R2
  2. Configure Network Services
    • Lab 2: Configure Network Services
  3. Plan and Install Active Directory
    • Lab 3: Install Active Directory
  4. Configure Windows Server 2012 R2
    • Lab 4: Configure Windows Server 2012 R2
  5. Administer Active Directory
    • Lab 5: Managing OU and Active Directory objects
  6. Manage GPOs
    • Lab 6: Implementing and managing Group Policy
  7. Manage Security
    • Lab 7: Managing security and implementing an Audit policy
  8. Configure TCP/IP
    • Lab 8: Configure TCP/IP
  9. Use Virtualization in Windows Server 2012

  10. Manage and Maintain Servers

  11. Manage File Services

  12. File Server Resource Manager & Audit Policy

  13. Configure DNS
    • Lab 9: Configure DNS
  14. Configure Routing and Remote Access

  15. Configure a Network Policy Server Infrastructure

  16. Configure and Manage Active Directory

  17. Configure and Manage Group Policy
    • Lab 10: Configure and Manage Group Policy
  18. Mobile Devices

Book

  • William Panek, MCSA Windows Server 2012 R2 Complete Study Guide (Exams 70-410, 70-411, 70-412, and 70-417), Sybex © 2015 (1264 pages).
  • Mike Meyers. CompTIA A+ Guide to Managing and Troubleshooting PCs Lab Manual, Fifth Edition (Exams 220-901 & 220-902), 5th Edition.

Midterm Test

Windows Server and Ubuntu Intergration

Review

  1. Which of the following will reduce the potential attack surface and servicing requirements between two types of installing Windows Server 2012: Server Core Installation and Server with a GUI?
    a. Server Core
    b. Server with a GUI
    c. Both
    d. None of these

  2. Which of the following is command line tool for the importing objects into Active Directory?
    a. CSVDE
    b. DSGET
    c. DSIMP
    d. FSUTIL

  3. Which of the following is the correct name of the Active Directory database file?
    a. NTDS.dit
    b. NTDS.db
    c. NTDS.msi
    d. NTDS.dba

  4. Which of the following is special identity group contains all authenticated users and domain guests?
    a. Everyone
    b. Power Users
    c. Administrator
    d. Domain admin

  5. Which of the following is the option for the installation of Active Directory domain controllers will provide enhancements in the areas of security, reliability, and performance?
    a.RODC
    b.DC
    c.DHCP
    d.DNS

  6. Which of the following should be checked when a user is not able to ping a server by the FQDN (NAME) but can by the IP address?
    a. Ensure that the DNS is configured
    b. Ensure that the IP address is correct
    c. Ensure that WINS is configured
    d. Ensure that DHCP is enabled

  7. Which of the following is correct with loopback address: it is used to send a packet from the __ to __.
    a. none of the mentioned
    b. host; all other hosts
    c. router; all other hosts
    d. host; a specific host

  8. Which of the following is type of zone is necessary for computer hostname-to-IP address mappings, that are used for name resolution by a variety of services?
    a. Forward lookup
    b. Primary lookup
    c. Secondary lookup
    d. Reverse lookup

  9. Which of the following is the class of this IP address: 229.1.2.3?
    a. class D
    b. class A
    c. class B
    d. none of the above

  10. Which one of the following groups has permission to shut down a domain controller?
    a. All of these
    b. Backup Operators
    c. Print Operators
    d. Server Operators

  11. DHCP client and servers on the same subnet communicate via
    a. UDP broadcast
    b. UDP unicast
    c. TCP broadcast
    d. TCP unicast

  12. Which of the following is the record type is used to map a domain name such as.www.google.com to an IP address?
    a. A
    b. CNAME
    c. MX
    d. PTR

  13. Which of the following is item(s) of DNS database?
    a. all of the mentioned
    b. name server records
    c. hostname-to-address records
    d. hostname aliases

  14. Is the following about Hyper-V true or false? Hyper-V live migration and failover clustering is possible without shared storage. a. False
    b. True

  15. Is the following about Hyper-V true or false? Hyper-V does not support wireless networks
    a. True
    b. False

  16. Which of the following is the default value of the Lease Time DHCP server?
    a. 72 hours
    b. 24 hours
    c. 48 hours
    d. 96 hours

  17. Which of the following is an example of a MAC address?
    a. 00:08:38:05:B5:F4
    b. 131.44.32.255
    c. 05:14:K9:07:B2:M4
    d. AB.34.AG.23.0F

  18. Which of the following is the default port number for WSUS synchronization?
    a. 8530
    b. 5830
    c. 3085
    d. 8503

  19. Which of the following is the easiest way to add a new Windows 2012 domain controller to your existing environment?
    a. Server Manager
    b. Setup
    c. DC tool
    d. AD tool

  20. Which of the following default roles in Windows Server 2012 will provide the ability to set up a server to provide IP addresses to client computers?
    a. DHCP
    b. DNS
    c. ARP
    d. RARP

  21. Which of the following Operations Master Role is responsible for creating attribute?
    a. Schema master
    b. PDC Emulator
    c. Infrastructure master
    d. Domain Naming Master

  22. Which of the following can configure Internet Explorer to display the banner “Hello World”?
    a. Within group policy
    b. Through Windows SUS
    c. Using Computer Management of the domain server
    d. This is not feasible

  23. Which of the following is the range of first octets in a class A IP address?
    a. 1 - 126
    b. 1 - 128
    c. 1 - 256
    d. 10 – 128

  24. Which of the following is the Active Directory component that defines all the objects and attributes that the directory service uses to store data?
    a. Schema
    b. Tree
    c. Domain
    d. Object

  25. Which of the following command can the administrator run to force the GPO to be applied when GPO containing new update settings has not yet applied to one of the computer on the network?
    a. gpupdate /force
    b. gpedit
    c. restart server
    d. gpresult

  26. Which of the following part of three-way handshake is used when the HTTP request message is sent?
    a. First
    b. Second
    c. Third
    d. None of the mentioned

  27. Which MMC snap-in on a Windows Server, is not there by default and needs user configuration to get it to show up in Add / remove snap Ins?
    a. Active Directory Schema
    b. Active Directory Domains and Trusts
    c. Active Directory Sties and Services
    d. ADSI Edit

  28. Which of the following is another way of referring to Operation Master Roles?
    a. FSMO
    b. netdom
    c. NTDS
    d. LDAP

  29. Which of the following setting will prevent policy settings from applying to all child objects at the current level and all subordinate levels?
    a. Block Policy Inheritance
    b. Block Policy Propagation
    c. Edit Policy Inheritance
    d. Rename Policy Propagation

  30. Which of the following type of group can be assigned permissions to a folder?
    a. Security Groups
    b. Distribution Groups
    c. NTFS Groups
    d. None

  31. Which of the following is correct about IPv4 network address 255.2555.255.255?
    a. A broadcast address
    b. A unicast address
    c. A multicast address
    d. A subnet mask

  32. Which of the following protocols is used to access files on a remote server?
    a. FTP
    b. NTP
    c. TSIP
    d. ARP

  33. Which of the folllowing contains the rules and definitions that are used for creating and modifying object classes and attributes within Active Directory?
    a. Schema NC
    b. Configuration NC
    c. Domain Name
    d. OU

  34. Which of the following is correct about Live Migration process with Hyper-V:
    a. moving VMs from one physical host to another
    b. reassigning user rights to different virtual machines
    c. moving physical servers to a different part of a data center
    d. upgrading the server OS on a host machine

  35. Which of the following is the same description of disk striping?
    a. RAID 0
    b. RAID 1
    c. RAID 2
    d. RAID 5

  36. Which of the following will forwards DHCPDiscover messages for subnets that do not have a DHCP server and that are not connected to a router that supports passing DHCP broadcast messages.
    a. DHCP relay agent
    b. DHCP discover
    c. Broadcast
    d. All

  37. Which of following is the correction action, in which administration of an organizational unit is tasked to a departmental supervisor or manager, thus allowing that person to manage day-to-day resource access as well as more mundane tasks, such as resetting passwords?
    a. Delegation
    b. Authorization
    c. Admin
    d. None

  38. Which of the following roles allow for faster desktop and application deployments to any device? a. Remote Desktop Service
    b. SSH
    c. TELNET
    d. VPN

  39. Which of the following Flexible Single Master Operations (FSMO) role must be available in a domain to ensure that you are able to create accounts in that domain without any errors?
    a. RID
    b. PDC
    c. Domain Naming
    d. Schema

  40. Which of the following is correct with a DHCP/BOOTP Relay Agent, when it relays the DHCPOFFER, the DHCPACK and the DHCPNACK from the server to the client?
    a. Broadcast
    b. Unicast
    c. Multicast
    d. None

  41. Which of the following will provide secure network access for remote clients over the Internet through the use of tunneling protocols?
    a. VPN
    b. FTP
    c. SSH
    d. Telnet

  42. Which of the following port number will be specified in the socket to identify RDP when trying to identify the port number that will be used to identify application layer protocol of Remote Desktop Protocol (RDP)?
    a. 3389
    b. 3398
    c. 9338
    d. 9833

  43. Which of the following is the fastest type of the RAID?
    a. RAID 0
    b. RAID 1
    c. RAID 5
    d. RAID 6

  44. Which of the following is the subnet address of given IP address 201.14.78.65 with subnet mask 255.255.255.224?
    a. 201.14.78.64
    b. 201.14.78.32
    c. 201.14.78.65
    d. none of the above

  45. How many bits are in an IPv6 address?
    a. 128
    b. 24
    c. 68
    d. 1024

  46. Which of the following can be used to add, delete, or modify objects in Active Directory, in addition to modifying the schema if necessary?
    a. LDIFDE
    b. NSLOOKUP
    c. Ping
    d. Telnet

  47. Which of the following is the minimum amount of disk needed for RAID 5?
    b. 3
    a. 5
    c. 4
    d. 2

  48. Which of the following will store information about every object within a forest?
    a. Global catalog
    b. Global master
    c. Schema master
    d. Master catalog

  49. Which of the following subnet mask can be used in order to subnet a Class B address into 14 subnets for use in your organization?
    a. 255.255.240.0
    b. 255.255.0.0
    c. 255.240.0.0
    d. 255.255.255.0

  50. Which of the following is the two parts of an IP address?
    a. Network and host (or node)
    b. Physical and logical
    c. Network and subnet
    d. Physical and emotional