What should you do?
You have a server named Server1 that runs Windows Server 2012 R2. Server1 is located in the perimeter network and has the DNS Server role installed. Server1 has a zone named contoso.com. You App1y a security template to Server1. After you App1y the template, users report that they can no...
Which two tools should you use?
Your network contains an Active Directory domain named contoso.com. The domain contains three servers named Server1, Server2, and Server3 that run Windows Server 2012 R2. All three servers have the Hyper-V server role installed and the Failover Clustering feature installed. Server1 and Server2 are nodes in a failover cluster named...
Which cmdlet should you run?
Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1. Cluster1 contains a...
Which two configurations should you perform from DNS Manager?
Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2. DC1 has the DNS Server role installed. The network contains client computers that run either Linux, Windows 7, or Windows 8. You have a standard primary zone...
You have a server that runs Windows Server 2012 R2 and has the iSCSI Target Server role service installed
HOTSPOT You have a server that runs Windows Server 2012 R2 and has the iSCSI Target Server role service installed. You run the New-IscsiVirtualDisk cmdlet as shown in the New-IscsiVirtualDisk exhibit. (Click the Exhibit button.) To answer, complete each statement according to the information presented in the exhibits. Each correct...
Which cmdlet should you run?
Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1. Cluster1 contains a...
You have a server that runs Windows Server 2012 R2 and has the iSCSI Target Server role service installed
HOTSPOT You have a server that runs Windows Server 2012 R2 and has the iSCSI Target Server role service installed. You run the New-IscsiVirtualDisk cmdlet as shown in the New-IscsiVirtualDisk exhibit. (Click the Exhibit button.) To answer, complete each statement according to the information presented in the exhibits. Each correct...
What should you do?
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. You are creating a central access rule named TestFinance that will be used to grant members of the Authenticated users group access to a folder stored on a Microsoft SharePoint Server 2013 server. You...
To which server and by which method should you move VM1?
You have a datacenter that contains six servers. Each server has the Hyper-V server role installed and runs Windows Server 2012 R2. The servers are configured as shown in the following table. Host4 and Host5 are part of a cluster named Cluster1. Cluster1 hosts a virtual machine named VM1. You...
What should you do?
You create a new virtual disk in a storage pool by using the New Virtual Disk Wizard. You discover that the new virtual disk has a write-back cache of 1 GB. You need to ensure that the virtual disk has a write-back cache of 5 GB. What should you do?A...