Chapter 9 + 10, Chapter 8, Server 2012 Exam 6 & 7

Max has been hired to take over the administration of an existing network. All servers run Windows Server 2012 R2 and all hosts run Windows 8.

Configure the TCP/IP properties for the seven servers and all clients to receive IP addresses from the DHCP server.

The large block corporation has a network with three subnets. Network clients use Windows 8. All servers run Windows Server 2012 R2. A DNS server provides name resolution. Stacy has been asked to implement a DHCP solution for her network.

Configure each host to Obtain DNS server address automatically. Configure each host to Obtain the IP address automatically.

You have a laptop that runs Windows 7. The laptop uses DHCP for IPv4 addressing information.

View the status for the network connection. Click the Details button. Run the netsh command.

You have a single router with three subnets as follows: SubnetA = 50 hosts

SubnetA = 255.255.255.192

You need to design a network that supports 275 hosts. You want to place all hosts in a single broadcast domain, and want to make sure you do not waste IP addresses.

Place all hosts on the same subnet. Use a mask of 255.255.254.0 .

You have a single router with three subnets as follows: Subnet A = 60 hosts

A = Subnet address 172.22.19.64 with mask of 255.255.255.192

You have a server connected to two networks: Subnet A uses a 26-bit mask.

Change the IP address assigned to Wrk2.

You have a small network as shown in the image. You are unable to ping Wrk2 from Wrk1. What should you do to fix the problem?

Change the subnet mask on Wrk1

you manager the network that is shown in the graphic. You have just added Host B to the network.

IP address- 192.168.1.193 SubnetMask- 255.255.255.224 Default gateway- 192.168.1.221 DNS Server- 192.168.1.189

You manage a Windows 7 computer connected to a business network using switches and multiple subnets. You connect a workstation to the 192.168.1.0/24 subnet.

Edit the IPv4 properties and change the default gateway.

You have a small network with three subnets as shown in the graphic. IP addresses for each router interface are also indicated.

Wrk1_A = 192.168.111.62 Wrk5_C = 10.155.64.97

You manage a company network with multiple subnets. As part of a recent upgrade, you have upgraded all servers to Windows Server 2012 R2. Client systems run Windows 8.

FC00 FD00

You manage a company network with multiple subnets. As part of a recent upgrade, you have upgraded all servers to Windows Server 2012 R2. Client systems currently run Windows 7 professional, with a few newer systems running Windows 8.

In the network connection properties on each client, client select Obtain an IPv6 address automatically. In the network connection properties on each client, select Obtain DNS server address automatically.

You manage a small private network with three subnets as shown in the image. The App1 server on SubnetC runs only IPv6 and because of your company policy, it cannot be congigured with an IPv4 address.

Configure Rtr1 as an ISATAP router.

You manage two small remote networks: one in portland and on in seattle. Both sites are connected to the Internet through a single Windows Server 2012 R2 server using NAT.

Manually configured tunneling 6to4 tunneling

You manage a small private network with two subnets as shown in the image. Both Wrk1 and Wrk2 run Windows 8 and have been configured with IPv6 addresses.

On the DNS server for the network, create an A record named ISATAP that point to Srv3

You manage the small network that is connected to the Internet as shown in the graphic. You add Host A to the network.

IP address- 10.0.0.97 Subnet Mask- 255.255.255.240 Default Gateway- 10.0.0.110

You have a laptop that runs Windows 8. The laptop uses IPv6. The network connection is configured to obtain an IPv6 address automatically.

Run the netsh command. View the status for the network connection. Click the details button.

You have a computer that runs Windows 7. Your company has started the migration of IPv6 on your network. Your network administration tells you that the network is using stateless autoconfiguration.

Edit the itnernet Protocol Version 6 (TCP/IPv6) properties for the network adapter. Select Obtain an IPv6 address automatically and use the following DNS server addresses.

You manage a network with all Windows 7 clients. As part of you IPv6 migration strategy, you have implemented ISATAP on your netowrk.

Ping the address beginning with FE80:

You manage a network with all Windows 7 clients. As part of your IPv6 migration strategy, you ahve implemented Teredo on your computer.

Ping address beginning with 2001:

You are the assistant systems manager for your company's network. There are 600 workstations running windows 7 and windows 8.

Delete all of the scopes and start over.

You are the administrator of what will become a large Windows Server 2012 network using the TCP/IP protocol. Currently the network consists of three Windows Server 2012 R2 computers, 25 windows 7 professional workstations and 25 windows 8 workstations as shown in the diagram.

Configure each workstation to use DHCP. Install a DHCP server and configure a single scope.

Alberto administers a single DHCP server for his network of three subnets.

Configure scope options for the server to deliver the DNS server value. Configure scope options for each scope to deliver the default gateway value.

You are installing DHCP in four subnets. Three of the subnets have Windows 7 desktop computers, and the fourth subnet has only Windows 7 latptop computers.

Set up one scope for each subnet, and set the lease period as a part of each scope's configuration.

Mark is the system administrator for a network with a single Active Directory domain.

Ask a member of the Enterprise Admins group to authorize the server.

You are the administrator for a large network. You have one location serving several thousand users. At present, your company has just finished an upgrade so, all 100 servers are running windows server 2012 R2.

Manually configure the IP address on the Web server. Create an exclusion on the DHCP server. Configure the Web server to use DHCP. Create a reservation on the DHCP server.

Serey is the network administrator for a single domain network with 15 servers running Windows Server 2012 R2, 200 Windows 8 clients, and 10 UNIX workstations.

Create a reservation for each UNIX workstation. Configure the workstations to receive IP addresses from DHCP.

You are the manager for the westsim.com domain. The network has a wingle subnet with five servers. all running windows server 2012 R2. The 100 Client computers all run Windows 8.

On the DHCP server, delete the exclusion range.

Nadine is the systems administrator for a network with a single subnet.

Authorize Srv-11

You are the administrator of a network with a single subnet. A single windows server 2012 R2 server on Subnet1 is the domain controller, DNS server, and DHCP server.

Enable BootP forwarding on the router connecting Subnet1 to Subnet2 On Srv2, add teh Remote Access role with routing. In routing and remote access, configure the relay agent protocol.

The image depicts the network layout of NorthSim corporation. Currently, the network uses static IP addressing.

Configure SRV2 as a relay agent

The network you manage has 200 workstations split into two network segments. Each segment has two servers, each running Windows Server 2012 R2.

In Routing and Remote access, change the IP address configured for the Relay agent protocol.

You are the network administrator of a network with 90 work stations on a single subnet.

On both servers, set the scope range to 194.172.64.10 to 194.172.64.254 . On SRV1, exclude addresses 194.172.64.206 to 192.172.64.254.

You are the network administrator for a single domain network with a single subnet. Server Prod2 is configured to provide DHCP services for the subnet.

On Prod2,exclude addresses 192.168.1.151 to 192.168.1.250. On Prod4, create a scope with address range 192.168.1.51 to 192.168.1.250. On Prod4, exclude addresses 192.168.1.51 to 192.168.1.150

You are the network administrator for a single domain network with a single subnet. Server Prod2 is configured to provide DHCP services for the subnet.

Configure an exclusion for addresses 192.168.1.51 to 192.168.1.210. Configure a scope with address range 192.168.1.51 to 192.168.1.250 .

You manage the westsim.com domain. All servers run the Windows Server 2012 R2 and all workstations run Windows 8. Salesmen issued laptops that the use to connect to the local network as well as dial in when they are on the road .

On each laptop, configure an alternate IP configuration.

You have just received a new laptop at work that you will use on your company network and at home. The company network uses dynamic addressing, while your home network uses static addressing.

Configure the alternate TCP/IP configuration.

You are the assistant systems manager of your small company's network, which includes about 2000 Windows 7 and Windows 8 workstations and five servers all running Windows Server 2012 R2. All workstations receive their IP assignments from a DHCP server.

Reboot the DHCP server

You are the server administrator for the network shown in the first image. SRV2 is a domain controller that hosts an Active Directory integrated zone for the network. SRV1 is an application server.

Enable BOOTP forwarding on the router.

You manage a Windows 7 computer connected business network using switches and multiple subnets. One day you find that the computer is unable to connect to the Internet,

Verify that the DHCP server is up and funtional.

You ahve a computer that runs Windows 7 connected to a domain network. One day you find that your computer cannot connect to any network resources.

Run the Ipconfig / release and Ipconfig / renew commands.

You are a domain administrator for a large, multi-domain network. There are approximately 2500 computers in your domain. Organizational Units (OUs) have been created for each department. Group Policy objects (GPOs) are linked to each OU to configure department-wide user and computer settings.

While you were on vacation, another 20 computers were added to the network. The computers appear to be functioning correctly with one exception: the computers do not seem to have the necessary GPO settings applied.

What should you do?

Move the computer accounts from their current location to the correct OUs.

Your network has a single Active Directory forest with two domains: eastsim.private and HQ.eastsim.private. Organizational units Accounting, Marketing, and Sales represent departments of the HQ domain. Additional OUs (not pictured) exist in both the eastsim.private and HQ.eastsim.private domains. All user and computer accounts for all departments company-wide are in their respective departmental OUs.

You are in the process of designing Group Policy for the network. You want to accomplish the following goals:
*You want to enforce strong passwords throughout the entire forest for all computers. All computers in both domains should use the same password settings.
* The Accounting department has a custom software application that needs to be installed on computers in that department.
* Computers in the Marketing and Sales departments need to use a custom background and prevent access to the Run command.

You create the following three GPOs with the appropriate settings: Password Settings, Accounting App, and Desktop Settings.

How should you link the GPOs to meet the design objectives? To answer, drag the label corresponding to the GPO to the appropriate boxes.

eastsim.private - password setting HQ.eastsim.private - password setting Accounting - Accounting app Marketing - Desktop Settings Sales - Desktop Settings

You are the administrator for the widgets.com domain. Organizational Units (OUs) have been created for each company department. User and computer accounts for each department have been moved into their respective department OUs.

From your workstation, you create a GPO that configures settings from a custom .admx file. You link the GPO to the sales OU.

You need to make some modifications to the GPO settings from the server console. However, when you open the GPO, the custom Administrative Template settings are not shown.

What should you do?

Enable the Administrative Templates central store in Active Directory. Copy the .admx file to the central store location

You are the administrator for the widgets.com domain. Organizational Units (OUs) have been created for each company department. User and computer accounts for each department have been moved into their respective department OUs.

As part of your security plan, you have analyzed the use of Internet Explorer in your organization. You have defined three different groups of users. Each group has different needs for using Internet Explorer. For example, one group needs ActiveX controls enabled, while you want to disable ActiveX for the other two groups.

You would like to create three templates that contain the necessary settings for each group. When you create a GPO, you'd apply the settings in the corresponding template rather than manually set the corresponding Administrative Template settings for Internet Explorer.

What should you do?

Create three starter GPOs with the necessary settings. When creating the GPOs, select the starter GPO with the desired settings.

You are the administrator for the widgets.com domain. Organizational Units (OUs) have been created for each company department. User and computer accounts for each department have been moved into their respective department OUs.

As you manage Group Policy objects (GPOs), you find that you often make similar user rights, security options, and Administrative Template settings in different GPOs. Rather than make these same settings each time, you would like to create some templates that contain your most common settings.

What should you do?

Create GPOs with the common settings. Take a backup of each GPO. After creating new GPOs, import the settings from one of the backed up GPOs. Create GPOs with the common settings. When creating new GPOs, copy one of the existing GPOs.

You are the network administrator for eastsim.com. The network consists of a single Active Directory domain. All the servers run Windows Server 2012 R2. All the clients run Windows 8.1. The company has a main office in New York and several international locations including facilities in Germany and France.

You have been asked to build a domain controller that will be deployed to the eastsim.com office in Germany. The network administrators in Germany plan to use Group Policy Administrative Templates to manage Group Policy in their location. You need to install the German version of the Group Policy Administrative Templates so they will be available when the new domain controller is deployed to Germany.

What should you do?

Copy the German .ADML files to the apporpriate directory int he SYSVOL on a local domain controller

You manage the branch office for your company network. The branch office has a single Active Directory domain, branch1.westsim.private. All computers in the branch office are members of the domain. All client computers run Windows 7.

The branch office consists of two subnets and 50 host computers. A single DHCP server on Subnet1 delivers IP address information to all clients. A single server on Subnet2 is both the domain controller and DNS server. Dynamic updates are enabled on the DNS zone.

You want to configure each client computer with consistent DNS server addresses and DNS search suffixes. You want to prevent users from modifying these settings.

What should you do?

Configure a GPO with the DNS server and search suffix settings

You are the network administrator for a large metropolitan hospital. The hospital must conform to several new regulations dealing with patient privacy

Add the mangers group to the GPO's discretionary access control list (DACL). Deny the Apply Group Policy and Read permissions to the managers group.

You are the security administrator for a large metropolitan school district. You are reviewing security standards with the network for the high school.

Configure the Computer configuration node of the computer center security GPO and restrict software to Internet Explorer only. Link the GPO to the domain and allow access to the computer center computers group only.

You are the Administrator for a network with a single active directory domain named widgets.local . The widgets.local domain has an Organizational Unit object for each major department in the company, including the Information Systems department.

On the Group Policy object's access control list, deny the Apply Group Policy permission for members of the Domain Admins group.

Your network consists of a single Active Directory domain. The OU structure of the domain consists of a parent OU named HW_West, and child OUs of research, HR, Finance, sales, and operations.

Link DefaultSec to the HQ_West OU. Link HiSec to the HR and Research OUs. Configure password policies on a GPO linked to the domain.

You are the administrator of a network with a single Active Directory domain. Your domain contains two domain controllers. Your company's security policy requires that locked out accounts are unlocked by administrators only.

Configure the account lockout duration to 0.

You are the administrator of a network with a single Active Directory domain. Your domain contains three domain controllers and five member servers.

using active Directory users and computers, select Unlock Account for each account.

You are the network administrator for your network. You network consists of a single Active Directory domain. All servers run Windows Server 2012 R2. Your company recently mandated The following user account criteria:

Set Minimum password length to 12 Set account lockout duration to 0 Set account lockout threshold to 3

You are the network administrator of a small network consisting of three Windwos Server 2012 R2 computers, 50 Windows 7 professional workstations, and 100 Windows 8 workstations. Your network has a password policy in place with the following settings:

Enable the Minimum password age setting Enable the password must meet complexity requirements.

You manage a single domain named widgets.com . Organizational units have been created for each company department. User and computer accounts have been moved into their corresponding OUs. you define a password and account lockout policy for the domain.

Implement a granular password policy of the users in the Directors OU.

You manage a single domain named widgets.com . Organizational units have been created for each company department. User and computer accounts have been moved into their corresponding OUs. You define a password and account locout policy for the domain.

Create a granular password policy. Apply the policy to all users in the Directors OU.

You are consulting with the owner of a small network which has a Windows Server 2008 functioning as a workgroup server. There are six client desktop computers, each of which is running Windows XP Professional. There is no Internet connectivity.

Make sure the correct users and groups are listed in the Auditing properties of the files. Make sure Object Access auditing policy is configured for success and failure. Make sure the files to be audited are on NTFS partitions.

You are the server administrator for your network. Recently, the system time on several servers has been modified. You want to find out who has been making the change. You enable auditing for System events. After several days,

Filter the look for successful events. Look in the Security log.

You are the network administrator for your company. Your company uses Windows 7 Professional as its desktop operating system. All computers joined to a single Active directory domain. Several computers store sensitive information. You are configuring security settings that will distributed to all computers on your network. You want to identify attempts to break into a computer by having the computer that denies the authentication attempt note the failed attempt in its Security database.

Select failure for audit account logon events.

You are the network administrator for your company. Your company uses Windows 7 Professional as its desktop operating system. All computers joined to a single Active directory domain. Several computers store sensitive information. You are configuring security settings that will distributed to all computers on your network. You want to identify denied attempts to manipulate files on computers that have been secured through NTFS permissions.

Select failure for audit object access.

You are the network administrator for your company. Your company uses Windows 7 Professional as its desktop operating system. All computers joined to a single Active directory domain. Several computers store sensitive information. You are configuring security settings that will distributed to all computers on your network. You want to identify denied attempts to change user's group membership in a computer's local database.

Select failure for audit account management

You are the network administrator for your company. Your company uses Windows XP professional as its desktop operating system. Rodney, a user in the research department, shares a computer with two other users.

Edit the advanced security properties of the folder containing Rodney's documents. Configure an auditing entry for the Everyone group. Configure the entry to audit success of the Delete permission.

Your are the security administrator for your organization. Your multiple domain Active Directory forest uses Windows Server 2012 R2 for domain controllers and member servers. The computer accounts for your member servers are located in the Member Servers OU. Computer accounts for domain controllers are in the Domain Controllers OU. You are creating a security template that you plan to import into a GPO. You want to log all domain user accounts that connect to the member servers.

Enable the logging of Logon events Link the GPO to the Member Servers OU.

Your are the security administrator for your organization. Your multiple domain Active Directory forest uses Windows Server 2012 R2 for domain controllers and member servers. The computer accounts for your member servers are located in the Member Servers OU. Computer accounts for domain controllers are in the Domain Controllers OU. You are creating a security template that you plan to import into a GPO. You would like to log whenever a user is unable to log on to any computer using a domain user account.

Enable the logging of failed Account Logon events. Link the GPO to the domain controllers OU.

You are an administrator for a company that uses Windows 2008 for its server. In addition to active directory, you also provide file and print services, DHCP, DNS, and e-mail services .

Configure Object access auditing in a GPO and link it to the domain.

You are in charge of managing the servers in your network. Recently, you have noticed that many of the domain member servers are being shutdown. You would like to use auditing to track who performs these actions.

Audit successful system events. Create a GPO to configure auditing. Link the GPO to the domain.

You manage a single domain names widgets.com . Recently, you notice that there have been several unusual changes to objects in the Sales OU. You would like to use auditing to keep track of those charges. You enable successful auditing of directory service access events in a GPO, and link the GPO to the domain.

Edit the access list for the OU. Identify specific users and events to audit.

You manage a single domain names widgets.com . Recently, you notice that there have been several unusual changes to objects in the Sales OU. You would like to use auditing to keep track of those charges. You want to only enable auditing that shows you the old and new values of the changed objects.

Directory Service Changes

You manage a single domain names widgets.com . One day you notice that a trust relationship you have established with another forest has changed.

Policy change events

You are the administrator for the widgets.com domain. Organizational unit have been created for each company department. User and computer accounts for each department have been moved into their repective departmental OUs. You have two OUs that contain temporary users:

User Rights

Select the policy node you would choose to configure who is allowed to manage the auditing and security logs

User Rights Assignment

Click on the user right policy that is used to grant a user local access to the desktop of a Windows Server 2012 R2 system.

Allow log on locally

You are the administrator for the widgets.com domain. Organizational unit have been created for each company department. User and computer accounts for each department have been moved into their repective departmental OUs. You would like to configure all computers in the Sales OU to prevent the installation of unsigned drivers.

Security Options

You have several computer running Windows 8. You want to configure a GPO that will make the Windows 8 computers prompt for additional credentials whenever a sensitive action is taken.

Configure user account control (UAC) settings.

You manage 20 computers running Windows 7 in a domain network. You want to prevent the Sales team members from making system changes. Whenever a change is initiated, you want to allow only those who can enter administrator credentials to be able to make the change.

Configure the User Account Control: Behavior of the elevation prompt for standard users setting in Group Policy to Prompt for credentials.

You have been asked to troubleshoot a Windows 8 computer that is a member of a workgroup. The director who uses the machine said he is able to install anything he wants as well as change system settings on-demand.

Enable the Run all admin approval mode setting in the local security policy.

You have a computer running windows 8. Prior to installing some software, you turn off User account control, reboot the computer, and install the software. You turn UAC back on, but it does not prompt you before performing sensitive actions.

Reboot the machine

You manage a single domain running Windows Server 2012 R2. You have configured a Restricted Group policy as show in the image. When this policy is applied, which actions will occur? (select two)

Any other members of the Backup Operators group will be removed. the desktop Admins group will be made a member of the Backup Operators group.

You manage a single domain running Windows Server 2012 R2. You have configured a Restricted Group policy as show in the image. When this policy is applied, which actions will occur?

The backup operators group will be made a member of the Desktop Admins group.

You are the administrator for the westsim.com domain. Organizational Units (OUs) have been created for each company department. User and computer accounts for each department have been moved into their respective department OUs.

Computers in the Accounting department use a custom application. During installation, the application creates a local group named AcctMagic. The group is used to control access to the program. By default, the account used to install the application is made a member of the group.

You install the application on each computer in the Accounting department. All Accounting users must be able to run the application on any computer in the department. You need to add each user as a member of the AcctMagic group.

You create a domain group named Accounting and make each user a member of this group. You then create a GPO name Acct Software linked to the Accounting OU. You need to define the restricted group settings.

What should you do?

Create a restricted group named AcctMagic. Add the Accounting domain group as a member

You are the network administrator for westsim.com . The network consists of a single Active Directory domain. All the servers run Windows Server 2012 R2. All the clients run Windows 8. You have enabled outbound filtering for Public networks in the Windows Firewall with Advanced Security node of a Group Policy which applies to member servers.

Configure a custom outbound rule.

You are the network administrator for westsim.com . The network consists of a single Active Directory domain. All the servers run Windows Server 2012 R2. All the clients run Windows 8. There is one main office located in New York.

In windows firewall with advanced security, create a new isolation connection security rule and Require authentication for inbound and outbound connections.

You are the network administrator for westsim.com . The network consists of a single Active Directory domain. All the servers run Windows Server 2012 R2. All the clients run Windows 8. A server named App1 is running an application that uses a service named Custom App service.

You should create a custom rule using the windows firewall with advanced security.

You are the network administrator for westsim.com . The network consists of a single Active Directory domain. All the servers run Windows Server 2012 R2. All the clients run Windows 8. A member server named Web1 running the Web Server role is hosting an internal company web site.

On Web1 you should create a custom inbound firewall rule that allow HTTP traffic on Web1 from Domain Users. Add the TechContractors group as an exception to the rule.

You need to configure Windows Firewall with Advanced Security to allow traffic for an application that dynamically opens up multiple ports on an ass-needed basis.

Add a program rule

You are in charge of managing several servers. Your company requires many custom firewall rules in Windows Firewall with Advanced Security.

Configure firewall settings in group policy. Apply the GPO so that it applies to all applicable servers.

You run a custom application on a Windows Server 2012 R2 server. You want to configure the firewall to allow the application to use a specific port, but restrict access to specific users.

In windows firewall with advanced security, add an inbound rule. Require only secure connections for the rule, and add the users to the list of authorized users.

You run a custom application on a Windows Server 2012 R2 server. You want to configure the firewall to allow the application to use a specific port, but restrict access to only Wrk1 and Wrk2.

In windows firewall with advanced security, add an inbound rule. Require only secure connections for the rule, and add the computer to the list of authorized computers.

Management is concerned that users are spending time during the day playing games and have asked you to create a restriction that will prevent all users and administrators from running Games app on Windows 8 Workstations.

Packaged app rules

You are the network administrator for northsim.com . The network consists of a single active Directory domain. All the servers run Windows Server 2012 R2. All the clients run Windows 8. You want to prevent users from running a common game on their machines.

Create a hash rule

You are the network administrator for eastsim.com . The network consists of a single Active Directory domain. All the servers run Windows Server 2012 R2. All the clients run Windows 8. You would like to prevent users from running all software on the computer except for software that has been digitally signed.

Configure an executable rule in application control policies with a publisher condition.

You are the network administrator for eastsim.com . The network consists of a single Active Directory domain. All the servers run Windows Server 2012 R2. All the clients run Windows 7. Many of the client computers are used by several different users.

Create an executable rule with a publisher condition in application control policies.

You are the network administrator for southsim.com . The network consists of a single Active Directory domain. All the servers run Windows 2012 R2. All the clients run Windows 8. The clients are shared by multiple users at work.

Browse and select the executable file for the application. Modify the rule to include the product name information.

You are the network administrator for eastsim.com . The network consists of a single Active Directory domain. All the servers run Windows 2012 R2. All the clients run Windows 8. The clients are shared by multiple users at work. You want to allow only members of the Sales team to run the sales lead application.

Create an executable rule with a file hash condition in application control policies.

You are the network administrator for eastsim.com . The network consists of a single Active Directory domain. All the servers run Windows 2012 R2. All the clients run Windows 8. The clients are shared by multiple users at work. Recently, users have downloaded and installed two malware programs onto the computer.

In application control policies, create a Windows Installer rule with a file hash condition.

You are the network administrator for northsim.com . The network consists of a single active Directory domain. All the servers run Windows Server 2012 R2. All the clients run Windows 8. You want to prevent users from running any file with .bat or .vbs extension unless the file is digitally signed by your organization.

In application control policies, create a script rule with a publisher condition.

You are the network administrator for northsim.com . The network consists of a single active Directory domain. All the servers run Windows Server 2012 R2. All the clients run Windows 8. You want to find out who has been running a specific game on the client computers.

In application control policies, create an executable rule with a path condition that identifies the file. For example rules, configure audit only.

You manage several computers that run Windows 7. You would like to have better control over the applications that run on there computers, so you have decided to implement AppLocker..

Set the enforcement mode for executable rules to Enforce rules. Start the application identity service on the client.

You are the network Administrator for eastsim.com . The network consists of one Active Directory domain. All the servers run Windows Server 2012 R2. All of the clients still run Windows Vista. The domain functional level of the domain is set to Windows Server 2008.

Install the client-side extensions (CSEs) on all of the client computers.

You are the network Administrator for eastsim.com . The network consists of one Active Directory domain. All the servers run Windows Server 2012 R2. You have been instructed to map a drive to a department share for all users.

Configure a Drive Maps policy in a GPO linked to the domain

Select the policy node you would use to configure a user's Internet Explorer options.

Internet settings

Sally, a member of the sales department, is borrowing a laptop computer from her supervisor to do some work from home in the evenings. Sally contacts you and indicates that she cannot access the C:\Reports folder on the laptop. This folder contains documents that she needs to edit.

You log on to the laptop as a domain administrator to check the folder's access control list. You are denied access to view the permissions. You contact Sally's supervisor to verify that Sally should receive access to the folder. Sally's supervisor indicates that Sally should be able to read, change, and delete documents in the folder, but that only the supervisor should be able to configure permissions.
You need to grant Sally appropriate permissions to the C:\Reports folder. What should you do? (Choose two. Each correct choice is part of the solution.)

Take ownership of the C:\Reports folder Grant Sally the Allow Modify permission to the C:\Reports folder

An employee has quit under difficult circumstances. Unfortunately, the user had several files that are needed, and before the employee left, they assigned Deny Full Control permission to Domain Users to all the files and folders. All users, including you, are now blocked from accessing these important files.
You need to make these files available as quickly as possible.

Take ownership of the files, and change the permissions.

On your Windows Server 2012 R2 computer,you share the D:\Apps folder using a sharename of Apps. You need to configure permissions to the share as follows:
• Members of the Appusers group should be able to open and view files in the shared folder.
• User JohnS should not have any access to files in the shared folder. JohnS is a member of the Appusers group.

You need to assign the necessary permissions without assigning extra permissions beyond what is required and without affecting other access that might already be configured on the computer. You need to complete the task using the least amount of effort possible.

Assign Allow Read permission to Appusers, and assign Deny Read permission to Johns.

The D:\ drive in your Windows Server 2012 R2 server is formatted with NTFS.

The Sales group on your computer has been given Allow Modify to the D:\Sales folder. The Mary user account is a member of the Sales group.
You want to accomplish the following:

• Mary should not be allowed access to the D:\Sales\2013sales.doc file.
• Mary should be able to read, write, and create new files in the D:\Sales folder.
• Your solution should not affect the abilities of other Sales group members to access files in the D:\Sales folder.

Edit the properties for the file; assign Mary the Deny Full Control permission.

You have a Windows Server 2012 R2 computer that is maintained by multiple administrators.

Sally wants to access a file in the Reports folder. A group named Sales has been granted the Full Control permission to the Reports folder and all subfolders and files.
You add Sally as a member of the Sales group, but she still cannot access the file that she needs.

You want to let Sally access the Reports folder. What should you do?

Remove Sally from any other groups that have been explicitly denied access to the Reports folder.

Your Windows Server 2012 R2 computer has two volumes: C: and D:.

For the D:\Reports\Finances.xls file, you explicitly grant the Mary user account the Allow Modify NTFS permissions.

You need to move the file from the existing folder to the C:\Reports2 folder. You want to keep the existing NTFS permissions on the file. You want to accomplish this with the least amount of effort possible.

Use the robocopy command to copy the file to the C:\Reports2 folder.

You manage a Windows Server 2012 R2 server.

For the D:\Reports\Finances.xls file, you explicitly grant the Mary user account the Allow Modify NTFS permissions.

You need to move the file from the existing folder to the D:\Confidential folder. You want to keep the existing NTFS permissions on the file. You want to accomplish this with the least amount of effort possible.

Move the file to the new folder.

A server administrator has just been fired, but not before he assigned Deny Full Control permission to Everyone to several key files and folders on the server.

All users, including you, are now blocked from accessing these important files.
You are the administrator and you need to make these files available as quickly as possible.

Take ownership of the files and change the permissions.

You are the owner of the D:\Reports folder.

Judith needs to be able to see the files and subfolders in the D:\Reports folder. Dalton needs to be able to do these same things, but also to delete folders.
You need to assign the necessary NTFS permissions to the D:\Reports folder.

Grant Read & Execute to Judith; Modify to Dalton

You need to control access to the D:\Reports folder as follows:

• Members of the Accounting group should be able to open and view all files but not modify them.
• Mary needs to be able to modify existing files in the folder, add new files to the folder, but should not be able to delete or rename files.

Mary is a member if the Accounting group. You want to assign NTFS permissions taking the least amount of actions possible.

Assign Allow Read & execute, List folder contents, and Read to the Accounting group. Assign Allow Write to Mary.

You need to control access to the D:\Reports folder as follows:

• Members of the Accounting group should be able to open and view all files, edit them, add new files, and rename and delete files.
• Mary needs to be able to open and view files, but should not be able to modify the files, rename files, or delete them.

Mary is a member if the Accounting group. You want to assign NTFS permissions taking the least amount of actions possible and affecting existing permissions as little as possible.

Remove Mary from the Accounting group. Assign Allow Read & execute, List folder contents, Read, and Modify to the Accounting group. Assign Allow Read & execute, List folder contents, and Read to Mary.

You need to control access to the D:\Reports folder as follows:

• Members of the Accounting group should be able to open and view all files, edit them, and add new files. They should not be able to delete or rename files.
• Mary needs to be able to open and view files, but should not be able to modify the files.

Mary is a member if the Accounting group. You want to assign NTFS permissions taking the least amount of actions possible and affecting existing permissions as little as possible.

Assign Allow Read & execute, List folder contents, Read, and Write to the Accounting group. For the Mary user account, Deny the Write permission.

You are the network administrator for westsim.com. The network consists of a single domain. All the servers run
Windows Server 2012 R2. All the clients run Windows 8.
The company has a file server named FSl that hosts a share named SalesData for the Sales department. You need to configure the SalesData share so that users will be allowed to view only the files and folders to which they have rights.

Use the Shares panel in Server Manager to enable Access Based Enumeration (ABE) on the SalesData share.

You are a technical consultant for many businesses in your community. One of your clients, a small law firm, has a single Active Directory domain. They have two servers running Windows Server 2012 R2. Both servers are configured as domain controllers while also serving as file and printer servers.
This client is calling you on a regular basis because users are deleting or damaging their files. You must visit the client's site and restore the files from backup. Your client has asked you to create an alternate solution.

Implement shadow copies on the relevant data.

You are the server administrator for the Srv12 server. This server is running the File Services role and is used for user home folders. Each user has a folder that they can use for storing personal files.
Management wants a solution that meet the following requirements:

• Allow only the specified user to save files in their home folder.
• User should not be allowed to view or edit files in other user's home folders.
• The list of files and folders that users can view should show only the files that they have rights to access.

Configure share and NTFS permissions with access-based enumeration.

You are the server administrator for the westsim.com domain. Client computers run Windows 7. All servers run Windows Server 2008 R2.
You have a server named FS12 that holds a shared folder named Reports. Within this folder, subfolders have been created for each company department. All company employees have Read access to the shared folder.
The Board of Directors uses a subfolder in the shared folder named BoardReports for their reports. They would like this subfolder to only be visible to members of the Board of Directors and specific people that they authorize to see the folder and its contents.

Enable access-based enumeration on the shared folder. Configure NTFS permissions on the BoardReports folder to control access.

You are the manager for Windows Servers at your company. You have just installed Windows Server 2012 R2 on a new server.

You have configured Windows Server Backup to take regular backups once a day and save those backups to an external disk.
You find that users working on a new project are constantly overwriting files and asking you to restore older versions of files that exist on backups from as far back as a week ago. You would like to implement a solution that allows users to restore files without an administrator's help.

Enable VSS on the volume that holds user data.

You need to share a folder that contains data used by your accounting department. You want Phil, the manager of the department, to be able to add and remove files. You want members of the department to be able to connect to the share and see the files it contains, but not make changes. Everyone else in the company should be blocked from connecting to the share.
There is a global group called Accounting, which contains all the accounting department users, including Phil. You need to configure permissions on the share.

Assign Allow Change permission for Phil, Allow Read for Accounting, and nothing else.

You are configuring access for a shared folder on Windows Server 2012 R2. There is a global group called Appusers who need read-only access. However, there is a member of Appusers, jsmith, who should not have any access at all.
You need to configure your share so that the members of Appusers have access, but jsmith does not, while creating the least disruption to your existing administrative structure.

Assign Allow Read permission to Appusers, and assign Deny Read permission to jsmith.

Mr. Yamashita needs to be able to modify the contents of the promo share, a shared folder on one of your Windows Server 2012 R2 servers. The share has been assigned the following permissions:
User/Group Permission Telesales global group Allow Read Training global group Deny Full Control Managers global group Allow Change
Mr. Yamashita user Allow Change

Mr. Yamashita is a member of each of these groups.

How should you modify the share permissions to allow the necessary access? (Choose three. Each choice is a complete solution.)

Change the Training group's permission to allow Read. Remove Mr. Ymashita's user account from the training group. Remove the Training group from the share

SRV03 is a Windows Server 2012 R2 server that holds the SalesDept folder. This folder contains documents specific to the sales department.
You create two user groups:

• The Sales group includes all members of the sales department.
• The SalesAdmin group includes about ten members of the sales department who manage sales-related documents.

You want the Sales group to have read-only access to the content in the SalesDept folder. Members of the SalesAdmin group should have all permissions to the folder. No other users should have access. All access will be through the network. You want to assign as few permissions as possible.

Share the SalesDept folder. Grant Read permission to the Sales group and Full Control permission to the SalesAdmin group. Remove the Everyone group.

You have decided to create a shared folder that will contain sensitive information about planned changes in the personnel structure. Most users will be denied access to the share, which is named REORG.
You have successfully created the share and set appropriate permissions. However, management feels the effect of having this share on the server, which denies access to most users is damaging morale. You need to keep the information available to the users who currently access it, but avoid having a share listed when users browse the network and shares for specific servers.

Remove the REORG share. Share the folder again as REORG$ with the same permissions as before.

On your Windows Server 2012 R2 computer, you share the D:\Promo folder using a share name of Promo.

The share has been assigned the following permissions:

User/Group Permission Telesales group Allow Read Training group Deny Full Control
Managers group Allow Change ..
Mary user Allow Change

The Mary user account is a member of the Training group. NTFS permissions allow all access.

Mary needs to be able to edit documents in the shared folder but cannot. You need to modify the share permissions to allow her the necessary access.
What should you do? (Choose two. Each choice is a possible solution.)

Remove the Mary user account from the Training group. Change the Training group permission to allow Read

Your Windows Server 2012 R2 computer has a folder named D:\SalesDept. The D: drive is formatted with FAT32. You need to allow network access to the folder as follows:
• Members of the Sales group should have read-only access to the content in the folder.
• Members of the SalesAdmin group should be able to open, edit, and add new files to the folder.
• No other users should have access.

Members of the SalesAdmin group are also members of the Sales group. You want to assign as few permissions as possible.

Share the SalesDept folder. Grant Read permission to the Sales group and Change permission to the SalesAdmin group. Remove Everyone from the access control list.

You need to use the New Share Wizard on a Windows Server 2012 R2 system to create a new share for the c:\shares\

WidgetProject folder. Users will connect to the share using Windows 7 and Windows 8 workstations.

Because this share will be used by many different users, you would like to enable quotas on the share as you create it to prevent users from using too much space at the expense of other users.
Click on the sharing profile you should use.

ISMS Share - Advanced I

You need to use the New Share Wizard on a Windows Server 2012 R2 system to create a new share for use with Hyper-V servers in the network.

Click on the sharing profile you should use.

ISMS Share - Appl ications I

You need to use the New Share Wizard on a Windows Server 2012 R2 system to create a new share for the C:\Shares
\WidgetProject folder. Users will connect to the share using Windows 7 and Windows 8 workstations.

On the Select the profile for this share screen, you select the SMB Share - Advanced sharing profile. However, when you do, the Next > button remains grayed-out and you can't proceed.

Install the File Server Resource Manager role on the server.

You need to use the New Share Wizard on a Windows Server 2012 R2 system to create a new share for the c:\shares\

WidgetProject folder. Sales reps for your organization will connect to the share using Windows 7 and Windows 8 notebook systems.

Because the users travel frequently, you want to make the contents of the share available to users even when they are disconnected from the network.
What option on the Other Settings screen should you enable?

Allow caching of share

You need to use the New Share Wizard on a Windows Server 2012 R2 system to create a new share for the C:\Shares\

WidgetProject folder. Sales reps for your organization will connect to the share using Windows 7 and Windows 8 notebook systems.
You want to configure the share such that, if a user does not have at least Read permissions to a file or folder, Windows will hide the file or folder from the user.
What option on the Other Settings screen should you enable?

Access-based enumeration

You are managing the WidgetProject share in Server Manager on a Windows Server 2012 R2 system.

You want to specify an email address users can contact for assistance if they are denied access to the folder. Click on the option in the share Properties screen you would use to do this.

fvjanagement Prop...l+

You are the network administrator for a small manufacturing company. You have ten regional sales people who travel extensively and have been provided Windows 7 laptop computers.

The mobile users have complained that, although they can take copies of important files with them into the field, occasionally they have been caught with out-of-date documents because no one told them the files had been updated. Additionally, some of these files need to be distributed to all the other sales staff.
You need to address this problem and easily provide the appropriate access to these shared files.

Configure Offline Files for the folder that contains these files.

You need to configure Work Folders on a Windows 8.1 notebook system to connect to a sync share on a Windows Server 2012 R2 system.
Click the option you would use in Control Panel to do this.

Select "System and Security"

Your organization employs many outside sales representatives who frequently travel to customer sites. While they are away, they frequently need to access data on the internal file server in your network. Currently, they e-mail files to themselves so they can access them on their notebooks.

To address this situation, you are planning a Work Folders deployment in your organization, which will allow users to synchronize shared file server data directly to their notebooks. Your plan details are as follows:
• Sync shares will be configured on CorpFS, which is a Windows Server 2012 R2 system.
• Work Folders will be configured on users' notebook systems, which currently run Windows Vista Business edition. These systems are not joined to your organization's domain.
• A server certificate from DigiCert will be used.
• The network firewall will be reconfigured to allow traffic from the Work Folders clients to the server.
• A publicly registered DNS host name will be assigned to the server.
• The Work Folders directory on clients will be set to C:\ Work Folders.

No, Work Folders can't be configured on Windows Vista systems.

Your organization employs many outside sales representatives who frequently travel to customer sites. While they are away, they frequently need to access data on the internal file server in your network. Currently, they e-mail files to themselves so they can access them on their mobile devices.

To address this situation, you are planning a Work Folders deployment in your organization that will allow users to synchronize shared file server data directly to their tablets. The details of your plan are as follows:
• Sync shares will be configured on CorpFS, which is a Windows Server 2012 system.
• Work Folders will be configured on users' Surface tablets, which currently run Windows RT 8.1. These systems are not joined to your organization's domain.
• A self-signed server certificate from an internal CA will be used.
• The network firewall will be reconfigured to allow traffic from the Work Folders clients to the server.
• A publicly-registered DNS host name will be assigned to the server.
• The Work Folders directory on clients will be set to C:\ Work Folders.

The server hosting sync shares must be running Windows Server 2012 R2. A server certificate from a public CA should be used.

The C:\Shares\WidgetProject folder on your Windows Server 2012 R2 system has been shared with network users. The server is a member of the westsim.com Active Directory domain.
The westsim.com\Users group has been granted the following Allow NTFS permissions:

• Read & execute
• List folder contents
• Read

In addition, the Everyone principle has been assigned the following Allow share permissions:

• Full Control
• Change
• Read

The ksanders user is a member of the westsim.com\Users group. She accesses data in the folder through the network share from her Windows 8 workstation.
What permissions does this user have to data in the folder?

Allow Read & execute, List folder contents, and Read

The C:\Shares\WidgetProject folder on your Windows Server 2012 R2 system has been shared with network users. The server is a member of the westsim.com Active Directory domain.
The westsim.com\Users group has been granted the following Allow NTFS permissions:

• Write
• Read & execute
• List folder contents
• Read

In addition, the Everyone principle has been assigned the Allow Read share permission.

The jmarshall user is a member of the westsim.com\Users group. She accesses data in the folder by using Remote Desktop to establish a remote access session on the server.
What permissions does this user have to data in the folder?

Allow Write, Read & execute, List folder contents, and Read

The C:\Shares\WidgetProject folder on your Windows Server 2012 R2 system has been shared with network users. The server is a member of the westsim.com Active Directory domain.
The westsim.com\Users group has been granted the following Allow NTFS permissions:

• Write
• Read & execute
• List folder contents
• Read

In addition,the Everyone principle has been assigned the Allow Read share permission.

The smarsden user is a member of the westsim.com\Users group. She accesses data in the folder through the network share from her Windows 8 workstation.
What permissions does this user have to data in the folder?

Allow Read

The C:\Shares\WidgetProject folder on your Windows Server 2012 R2 system has been shared with network users. The server is a member of the westsim.com Active Directory domain.
The westsim.com\Users group has been granted the following Allow NTFS permissions:

• Read & execute
• List folder contents
• Read

The westsim.com\Administrators group has been granted the Allow Full Control NTFS permission.In addition, the Everyone principle has been assigned the following Allow share permissions:
• Full Control
• Change
• Read

The vhammer user is a member of the westsim.com\Users and the westsim.com\Administrators group. She accesses data in the folder through the network share from her Windows 8 workstation.
What permissions does this user have to data in the folder?

Allow Full Control

The C:\Shares\WidgetProject folder on your Windows Server 2012 R2 system has been shared with network users. The server is a member of the westsim.com Active Directory domain.
The westsim.com\Users group has been granted the following Allow NTFS permissions:

• Read & execute
• List folder contents
• Read

The westsim.com\Research group has been granted the Allow Full Control NTFS permission.In addition, the Everyone principle has been assigned the Allow Read share permission.
The vhammer user accesses data in the folder through the network share from her Windows 8 workstation. She is a member of the westsim.com\Users and westsim.com\Research groups. The vhammer user has also been assigned the Deny Read NTFS permission to the folder.

What permissions does this user have to data in the folder?

Deny Read

You are the network administrator for your company. A Windows Server 2012 R2 member server named Srvl has a shared folder called SalesResearch that shares the F:\Sales\Research folder. This folder has three subfolders: Projects, Analysis, and Reports.

Permission inheritance is enabled on F:\Sales\Research and all subfolders and files. Only the Administrators group and one designated employee have permission to each subfolder.

Permissions are configured as follows:

Resource SalesResearch share F:\Sales\Research Type of Permission
Share NTFS Effective Permissions Everyone: Allow-Full Control Administrators: Allow-Full Control
F:\Sales\Research\Analysis NTFS Anne: Allow-Modify
Administrators: Allow-Full Control
F:\Sales\Research\Projects NTFS Billy: Allow-Modify
Administrators: Allow-Full Control
F:\Sales\Resea rch\Reports NTFS Gavin: Allow-Modify Administrators: Allow-Full Control

Stan needs to read all of the documents within the SalesResearch share and its subfolders. Stan does not need to make changes to these documents. You need to give Stan appropriate permissions without giving him unnecessary permissions.

Assign Stan the Allow Read NTFS permission to F:\Sales\Research

Sally is an employee in the Sales department.Important documents are stored in the D:\SalesDocs folder on a Windows Server 2012 R2 server. Sally is a member of the Domain Users and Sales groups. The SalesDocs folder has been shared and the following permissions are currently assigned to the SalesDocs folder:

NTFS permissions
Domain Users = Allow-Read Sales = Allow-Modify

Share permissions
Domain Users = Allow-Read Sales = Allow-Change

Sally needs to read and modify all files in the SalesDocs folder except StyleGuide.doc. Sally should be able to read StyleGuide.doc but not modify it.

What should you do?

Set Sally's NTFS permission for StyleGuide.doc to Deny Write.

SRV02 holds a shared folder named Forecast for the Managers group.

Maria is a member of the Managers group. You would like to grant the Managers group Full Control to the folder named Forecast, but limit Maria's access to Read only.
You have added the Managers group to the access list for the Forecast folder and granted Full Control access. You now need to limit Maria's access to the folder.
What should you do? (Choose two. Each choice is a complete solution.)

0 Remove Maria's account from the Managers group and grant Read access. 0 Add Maria to the NTFS permissions for the folder. Grant Read access.

You share a folder named Public and configure the following permissions.
Share permissions NTFS permissions
Everyone = Full Control Administrators = Full Control
Sales = Modify
Assistants = Deny Modify

You receive a phone call from Sally, a member of the Sales group and Assistants group, claiming that she cannot save a file to the Public shared folder.
You want to make sure that members of the Sales group (who are not members of the Assistants group) can save new files to the Public shared folder and access, update, and delete existing files in the Public share. You want to continue to ensure that members of the Assistants group cannot modify files in the Public shared folder,even if they are members of the Sales group. However, you also want to let Sally update files in the Public share.
What should you do?

Remove Sally from the Assistants group.

You are the network administrator for your company. You recently replaced the previous network administrator.

The sales manager, Jim, calls you and reports that he cannot update a file in the \\ACCTSRVl\Reports share which the previous network administrator created for him last Wednesday. Jim is a member of the Managers group, which should have full control of all files in the share.
You examine the Reports share and the D:\Data\Reports folder on the server. Following is a summary of the current configuration:

Folder

NTFS Permissions Share Permissions

D:\Data\Reports Shared as Reports

Administrators (Allow-Full Control) Managers (Allow-Full Control) Everyone (Allow-Read)

Everyone (Allow-Read)

You need to give Jim the permissions intended for the Managers group and let him update files in the Reports share. What should you do?

Change the Reports share permissions for the Everyone group to Allow Full Control.

You have a folder on your Windows Server 2012 R2 computer that you would like members of your development team to access.

You want to restrict network and local access to only specific users. All other users must not be able to view or modify the files in the folder.

What should you do? (Select two. Each choice is a required part of the solution.)

1. Configure both share and NTFS permissions. 2. Place the files on an NTFS partition

On your Windows Server 2012 R2 computer, you share the D:\Reports folder using a share name of Reports.

You need to configure permissions on the shared folder as follows:

• Members of the Accounting group should be able to view files, but not modify them.
• Phil, a member of the Accounting group, needs to be able to open and edit files in the shared folder.

You need to assign the necessary permissions without assigning extra permissions beyond what is required and without affecting other access that might already be configured on the computer. You need to complete the task using the least amount of effort possible.

What should you do?

Add the Accounting group and assign the Read permission. Add the Phil user account and assign Read/Write permission

You are the network administrator for eastsim.com. The network consists of a single domain. All the servers run Windows Server 2012 R2. All the clients run Windows 8.

The company has one main office. The main office has 200 Windows client computers, 20 Windows servers, and 50 Unix servers. There is one print server named PSl. You need to configure the print server to provide printing services to the Unix servers.

What should you do? (Select two. Each answer represents a complete solution.)

Install the Line Printer Daemon (LPD) services role on PSl. Install theInternet Printing services role on PSl.

You have connected a print device to your server and created a printer for it. You have shared the printer as Printer! and granted the Everyone group permission to print to it. The server is called Srvl and has a reserved P address of 192.168.1.27.

You want to manage printing to a network printer on your local subnet. The printer is connected directly to the network and uses anIP address of 192.168.1.14.

What should you do?

Open the Print Management console on Srvl and create a new TCP/IP printer using the 192.168.1.14IP address. Select the appropriate printer driver according to the make and model of the printer

You manage a Windows Server 2012 R2 server for a small company. This server is used as a file and print server.

One of the shared printers hosted by the server is heavily used. To optimize the printing process, you want to reconfigure the printer to start printing before each document is completely spooled.

Click the tab in the properties of the printer you would use to configure this.

Advanced

You manage a Windows Server 2012 R2 server for a small company. This server is used as a file and print server.

Several users have complained that when they try to connect to a shared printer, they receive an error message indicating that a driver isn't available for their operating system. Upon investigation, you discover they are using older hardware running a 32-bit version of Windows 8.1. You need to add a 32-bit driver to the shared printer.

Click the tab in the properties of the printer you would use to do this.

Sharing

You are the network administrator for eastsim.com.

The network consists of a single domain. All the servers run Windows Server 2012 R2. All the clients run Windows 8.
You support a print server named PSl that provides print services for 100 users. After installing a new printer on the print server, you observe that the print spooler needs to be restarted more frequently. You believe the problem is related to the new printer driver that has just been installed. However, investigation of the event logs is inconclusive. You need to determine if the driver for the new printer is the cause of the recent failures using the least amount of administrative effort. Your solution must not affect the ability of users to print to the new printer.

What should you do?

Configure the print driver isolation settings for the new driver.

You manage a Windows Server 2012 R2 server that has an attached printer that is used by the Sales department. The sales manager has asked you to restrict access to the printer as follows:
• Sally needs to connect to a printer, print documents, and pause and resume her own print jobs.
• Damien needs to pause and resume documents for all users, but does not need to change printer properties.

You want to assign the most restrictive permissions that meet the sales manager's requirements. What should you do? (Choose two. Each choice is part of the correct solution.)

Assign Sally the Print permission Assign Damien the Manage Documents permission

You are the administrator for a small network with several servers. All of your clients run Windows 8. There is only one printer, which is centrally located. Although indications are that this printer is over-utilized, there is neither space nor budget to add additional printers at this time.

There are often cases where a document is needed urgently, but when it is printed, it goes into the queue and is printed in the order received, not the order of the document's priority. You would like to allow Gladys, the administrative assistant, to have the ability to maintain the print queue. Specifically, you want her to be able to alter the order of printing for the documents waiting to be printed.
You need to permit Gladys to make this change without adding her to the local Administrators group or making significant changes to the way your office operates.

What should you do?

Assign Manage Documents permission for the printer to Gladys.

You have connected a print device to Srv6 which runs Windows Server 2012 R2. You have also shared the printer as Printerl and granted the Everyone group permission to print to it.
The department manager prints an important document. After waiting a few minutes for the document to print, he calls you to say it hasn't printed yet. You examine the print queue and notice two large documents ahead of his document in the queue. You increase the priority of his document so it will print as soon as possible.
You want to configure the printer so that the manager's documents print as quickly as possible in the future.

What should you do?

• Create a second printer called Printer2. • Configure permissions on Printer2 to allow only the manager to print. • Set the priority on Printerl to 1, and set the priority on Printer2 to 99.

You have connected a print device to the SRV12 server and created a printer for it. You have shared the printer as Printer! and granted the Everyone group permission to print to it.

Terry, the company vice-president, informs you that he just submitted a print job to your printer and needs it in 5 minutes. Upon checking the printer, you find that there are numerous print jobs ahead of Terry's.
You need to print Terry's print job without causing other users to lose their print jobs.

What should you do?

Set the priority of Terry's document to 99 and all others to 1.

You have connected a print device to the Srvll server created a printer for it. You have shared the printer as Printer! and granted the Everyone group permission to print to it.
A third-party technician is visiting your company today to clean the company's printers. You check the print queue and find numerous jobs in the queue. An identical print device is attached to SrvS. The printer on SrvS is shared as Printer2.
You want to let the technician clean the printer attached to Srvll while allowing the print jobs in queue to print.

What should you do?

Add a new local port and configure Printer! to print to it.

You have connected a print device to Srv3 and created a printer for it. You have shared the printer as Printerl and
granted the Everyone group permission to print to it.

Users in the art department frequently send multiple page graphics to the printer. The jobs often take a long time to print. Other users, whose jobs are typically short, must wait for a long time for their documents to print.
You want to prevent large print jobs from delaying the print jobs of non-art users. You want to accomplish this with least amount of administrative effort.

What should you do?

Configure the priority of Printerl to 1. Add a new printer and set the priority to 99. For the new printer, deny the Print permission for users in the art department.Instruct all users except those in the art department to use the new printer.

You have connected two identical print devices to the Srv12 server and created two printers for them named Printerl and Printer2. You have shared both printers using their default names and granted the Everyone group permission to print to them.

Printerl receives the vast majority of print jobs submitted from users on the network. You want to distribute the printing load evenly between the two print devices. You want to do this while minimizing hardware costs.

What should you do?

Enable printer pooling for Printerl and configure it to print to both local printer ports in use by your print devices.

You have connected a print device to the Srv2 server and created a printer for it. You have shared the printer as Printer! and published it to Active Directory.
During the hours 11:00 a.m. to 2:00 p.m., you want to restrict access to the print device to members of the Help Desk Reports group. No other users should be able to print to your print device during those hours. During all other hours, all users in the company should have equal access to the print device.

What should you do?

Create a second printer for your print device and name it Printer2. Keep the default configuration for Printer!, except configure Printerl's availability to 2:00 p.m. to 11:00 a.m. For Printer2, remove permissions for the Everyone group and grant the Print permission to the Help Desk Reports group

You have connected a print device to Srv4 and created a printer for it. You have shared the printer as Printerl and published it to Active Directory.
You assign the Allow Print permission for the printer to the Help Desk Technicians domain local group. However, you discover that users who are not members of the Help Desk technicians group can print to the printer.
You want only members of the Help Desk Technicians group to print to Printerl.

What should you do?

Remove the Everyone group from the printer's access control list.

You have connected a print device to the Srv9 server and created a printer for it. You have shared the printer as Printerl and published it to Active Directory.

You are leaving on vacation and want to let Chad pause, restart, and delete print jobs on the printer while you are gone. Chad should not be allowed to delete the printer or change its properties. Chad is a member of the Help Desk Technicians domain local group. Currently, the Everyone group has the Allow Print permission to the printer.

What should you do?

Assign Chad the Allow Manage Documents permission to the printer.

You have a Windows Server 2008 R2 server named Printl that is the print server for 5 shared printers. You have configured a printer object for each printer, and shared each printer.
Your network has several hundred users. You would like users to be able to search for printers based on capabilities such as color,duplex, and other features, and to be able to select the printer that is appropriate for a specific task.

What should you do?

Right-click each printer and choose Listin Directory.

Members of the Accounting group use a set of special printers in a locked room for printing all print jobs. Accounting computers use Windows 7.
You want to make sure that these printers and any others you might add for the group are always available for any member of the Accounting group, regardless of the computer they are using.
You create a Group Policy Object (GPO) called AcctGroup that is linked to the Accounting OU. All computers and users in the Accounting department are in this OU.

What should you do?

Deploy the printers in the AcctGroup policy, adding the printers to the User Configuration section.

You have three shared printers that are used by the Sales team. To simplify administration, you use a Group Policy Object (GPO) to deploy these printers to all Sales team members.
You have received a new printer to replace one of the older printers. You install the printer and deploy it in the same GPO as the other printers. You check and find that the printer is automatically added to the Sales team member computers.

You need to remove the printer object for the older printer from all Sales team members' computers.

What should you do?

Edit the GPO and remove the specific deployed printer.

You have a Windows Server 2012 R2 server named Printl that is the print server for 5 shared printers. You have configured a printer object for each printer,and shared each printer.
Users start complaining that one of the printers, the FastPrint 6000, is missing parts of graphics when it prints. You check the manufacturer's website and find an updated printer driver that is supposed to fix the problem.
You need to update each client computer with the new driver. You need to do so as quickly as possible with the least amount of effort.

What should you do?

On the server, update the printer object with the new driver.

You are the network administrator for eastsim.com. The network consists of a single domain. All the servers run Windows Server 2012 R2. All the clients run Windows 8.
The company has one main office. The main office has 200 Windows client computers, 20 Windows servers, and 50 Unix servers. There is one print server named PSl. You need to configure the print server to provide printing services to the Unix servers.

What should you do?

(Select two. Each answer represents a complete solution.)

1. Install the Internet Printing services role on PSl 2. Install the Line Printer Daemon (LPD) services role on PSl.

You have connected a print device to your server and created a printer for it. You have shared the printer as Printer! and granted the Everyone group permission to print to it. The server is called Srvl and has a reserved P address of 192.168.1.27.

You want to manage printing to a network printer on your local subnet. The printer is connected directly to the network and uses anIP address of 192.168.1.14.

What should you do?

Open the Print Management console on Srvl and create a new TCP/IP printer using the 192.168.1.14IP address. Select the appropriate printer driver according to the make and model of the printer.

You manage a Windows Server 2012 R2 server for a small company. This server is used as a file and print server.

One of the shared printers hosted by the server is heavily used. To optimize the printing process, you want to reconfigure the printer to start printing before each document is completely spooled.

Click the tab in the properties of the printer you would use to configure this.

Advanced

You manage a Windows Server 2012 R2 server for a small company. This server is used as a file and print server.

Several users have complained that when they try to connect to a shared printer, they receive an error message indicating that a driver isn't available for their operating system. Upon investigation, you discover they are using older hardware running a 32-bit version of Windows 8.1. You need to add a 32-bit driver to the shared printer.

Click the tab in the properties of the printer you would use to do this.

Sharing

On a Windows Server 2012 R2 server, you share a folder named Public using the default share name and share permissions. Later you receive a phone call from Sally, a member of the Sales group, claiming that she cannot save a file to the Public shared folder.

You examine the NTFS permissions for the folder and see share and NTFS permissions shown in the Exhibits. No other permissions are granted or denied. Sally is not a member of any other groups.

You want to make sure Sally and other members of the Sales group can open, edit, save, and delete files to the Public shared folder. You want to make as few assignments as possible without affecting permissions for other users.

What should you do?

Grant Everyone the Change share permission. Grant the Sales group the Allow Modify NTFS permission

You have a folder on your Windows Server 2012 R2 system that you would like to share with members of your development team. Users should be able to view and edit any file in the shared folder.

You share the folder and give Everyone Full Control permission to the shared folder.

Users connect to the shared folder and report that they can open the files, but they cannot modify any of the files.

What should you do?

Modify the NTFS permissions on the folder.

Chapter 9 + 10, Chapter 8, Server 2012 Exam 6 & 7 - Subjecto.com

Chapter 9 + 10, Chapter 8, Server 2012 Exam 6 & 7

Your page rank:

Total word count: 13040
Pages: 47

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

Max has been hired to take over the administration of an existing network. All servers run Windows Server 2012 R2 and all hosts run Windows 8.

Configure the TCP/IP properties for the seven servers and all clients to receive IP addresses from the DHCP server.

The large block corporation has a network with three subnets. Network clients use Windows 8. All servers run Windows Server 2012 R2. A DNS server provides name resolution. Stacy has been asked to implement a DHCP solution for her network.

Configure each host to Obtain DNS server address automatically. Configure each host to Obtain the IP address automatically.

You have a laptop that runs Windows 7. The laptop uses DHCP for IPv4 addressing information.

View the status for the network connection. Click the Details button. Run the netsh command.

You have a single router with three subnets as follows: SubnetA = 50 hosts

SubnetA = 255.255.255.192

You need to design a network that supports 275 hosts. You want to place all hosts in a single broadcast domain, and want to make sure you do not waste IP addresses.

Place all hosts on the same subnet. Use a mask of 255.255.254.0 .

You have a single router with three subnets as follows: Subnet A = 60 hosts

A = Subnet address 172.22.19.64 with mask of 255.255.255.192

You have a server connected to two networks: Subnet A uses a 26-bit mask.

Change the IP address assigned to Wrk2.

You have a small network as shown in the image. You are unable to ping Wrk2 from Wrk1. What should you do to fix the problem?

Change the subnet mask on Wrk1

you manager the network that is shown in the graphic. You have just added Host B to the network.

IP address- 192.168.1.193 SubnetMask- 255.255.255.224 Default gateway- 192.168.1.221 DNS Server- 192.168.1.189

You manage a Windows 7 computer connected to a business network using switches and multiple subnets. You connect a workstation to the 192.168.1.0/24 subnet.

Edit the IPv4 properties and change the default gateway.

You have a small network with three subnets as shown in the graphic. IP addresses for each router interface are also indicated.

Wrk1_A = 192.168.111.62 Wrk5_C = 10.155.64.97

You manage a company network with multiple subnets. As part of a recent upgrade, you have upgraded all servers to Windows Server 2012 R2. Client systems run Windows 8.

FC00 FD00

You manage a company network with multiple subnets. As part of a recent upgrade, you have upgraded all servers to Windows Server 2012 R2. Client systems currently run Windows 7 professional, with a few newer systems running Windows 8.

In the network connection properties on each client, client select Obtain an IPv6 address automatically. In the network connection properties on each client, select Obtain DNS server address automatically.

You manage a small private network with three subnets as shown in the image. The App1 server on SubnetC runs only IPv6 and because of your company policy, it cannot be congigured with an IPv4 address.

Configure Rtr1 as an ISATAP router.

You manage two small remote networks: one in portland and on in seattle. Both sites are connected to the Internet through a single Windows Server 2012 R2 server using NAT.

Manually configured tunneling 6to4 tunneling

You manage a small private network with two subnets as shown in the image. Both Wrk1 and Wrk2 run Windows 8 and have been configured with IPv6 addresses.

On the DNS server for the network, create an A record named ISATAP that point to Srv3

You manage the small network that is connected to the Internet as shown in the graphic. You add Host A to the network.

IP address- 10.0.0.97 Subnet Mask- 255.255.255.240 Default Gateway- 10.0.0.110

You have a laptop that runs Windows 8. The laptop uses IPv6. The network connection is configured to obtain an IPv6 address automatically.

Run the netsh command. View the status for the network connection. Click the details button.

You have a computer that runs Windows 7. Your company has started the migration of IPv6 on your network. Your network administration tells you that the network is using stateless autoconfiguration.

Edit the itnernet Protocol Version 6 (TCP/IPv6) properties for the network adapter. Select Obtain an IPv6 address automatically and use the following DNS server addresses.

You manage a network with all Windows 7 clients. As part of you IPv6 migration strategy, you have implemented ISATAP on your netowrk.

Ping the address beginning with FE80:

You manage a network with all Windows 7 clients. As part of your IPv6 migration strategy, you ahve implemented Teredo on your computer.

Ping address beginning with 2001:

You are the assistant systems manager for your company’s network. There are 600 workstations running windows 7 and windows 8.

Delete all of the scopes and start over.

You are the administrator of what will become a large Windows Server 2012 network using the TCP/IP protocol. Currently the network consists of three Windows Server 2012 R2 computers, 25 windows 7 professional workstations and 25 windows 8 workstations as shown in the diagram.

Configure each workstation to use DHCP. Install a DHCP server and configure a single scope.

Alberto administers a single DHCP server for his network of three subnets.

Configure scope options for the server to deliver the DNS server value. Configure scope options for each scope to deliver the default gateway value.

You are installing DHCP in four subnets. Three of the subnets have Windows 7 desktop computers, and the fourth subnet has only Windows 7 latptop computers.

Set up one scope for each subnet, and set the lease period as a part of each scope’s configuration.

Mark is the system administrator for a network with a single Active Directory domain.

Ask a member of the Enterprise Admins group to authorize the server.

You are the administrator for a large network. You have one location serving several thousand users. At present, your company has just finished an upgrade so, all 100 servers are running windows server 2012 R2.

Manually configure the IP address on the Web server. Create an exclusion on the DHCP server. Configure the Web server to use DHCP. Create a reservation on the DHCP server.

Serey is the network administrator for a single domain network with 15 servers running Windows Server 2012 R2, 200 Windows 8 clients, and 10 UNIX workstations.

Create a reservation for each UNIX workstation. Configure the workstations to receive IP addresses from DHCP.

You are the manager for the westsim.com domain. The network has a wingle subnet with five servers. all running windows server 2012 R2. The 100 Client computers all run Windows 8.

On the DHCP server, delete the exclusion range.

Nadine is the systems administrator for a network with a single subnet.

Authorize Srv-11

You are the administrator of a network with a single subnet. A single windows server 2012 R2 server on Subnet1 is the domain controller, DNS server, and DHCP server.

Enable BootP forwarding on the router connecting Subnet1 to Subnet2 On Srv2, add teh Remote Access role with routing. In routing and remote access, configure the relay agent protocol.

The image depicts the network layout of NorthSim corporation. Currently, the network uses static IP addressing.

Configure SRV2 as a relay agent

The network you manage has 200 workstations split into two network segments. Each segment has two servers, each running Windows Server 2012 R2.

In Routing and Remote access, change the IP address configured for the Relay agent protocol.

You are the network administrator of a network with 90 work stations on a single subnet.

On both servers, set the scope range to 194.172.64.10 to 194.172.64.254 . On SRV1, exclude addresses 194.172.64.206 to 192.172.64.254.

You are the network administrator for a single domain network with a single subnet. Server Prod2 is configured to provide DHCP services for the subnet.

On Prod2,exclude addresses 192.168.1.151 to 192.168.1.250. On Prod4, create a scope with address range 192.168.1.51 to 192.168.1.250. On Prod4, exclude addresses 192.168.1.51 to 192.168.1.150

You are the network administrator for a single domain network with a single subnet. Server Prod2 is configured to provide DHCP services for the subnet.

Configure an exclusion for addresses 192.168.1.51 to 192.168.1.210. Configure a scope with address range 192.168.1.51 to 192.168.1.250 .

You manage the westsim.com domain. All servers run the Windows Server 2012 R2 and all workstations run Windows 8. Salesmen issued laptops that the use to connect to the local network as well as dial in when they are on the road .

On each laptop, configure an alternate IP configuration.

You have just received a new laptop at work that you will use on your company network and at home. The company network uses dynamic addressing, while your home network uses static addressing.

Configure the alternate TCP/IP configuration.

You are the assistant systems manager of your small company’s network, which includes about 2000 Windows 7 and Windows 8 workstations and five servers all running Windows Server 2012 R2. All workstations receive their IP assignments from a DHCP server.

Reboot the DHCP server

You are the server administrator for the network shown in the first image. SRV2 is a domain controller that hosts an Active Directory integrated zone for the network. SRV1 is an application server.

Enable BOOTP forwarding on the router.

You manage a Windows 7 computer connected business network using switches and multiple subnets. One day you find that the computer is unable to connect to the Internet,

Verify that the DHCP server is up and funtional.

You ahve a computer that runs Windows 7 connected to a domain network. One day you find that your computer cannot connect to any network resources.

Run the Ipconfig / release and Ipconfig / renew commands.

You are a domain administrator for a large, multi-domain network. There are approximately 2500 computers in your domain. Organizational Units (OUs) have been created for each department. Group Policy objects (GPOs) are linked to each OU to configure department-wide user and computer settings.

While you were on vacation, another 20 computers were added to the network. The computers appear to be functioning correctly with one exception: the computers do not seem to have the necessary GPO settings applied.

What should you do?

Move the computer accounts from their current location to the correct OUs.

Your network has a single Active Directory forest with two domains: eastsim.private and HQ.eastsim.private. Organizational units Accounting, Marketing, and Sales represent departments of the HQ domain. Additional OUs (not pictured) exist in both the eastsim.private and HQ.eastsim.private domains. All user and computer accounts for all departments company-wide are in their respective departmental OUs.

You are in the process of designing Group Policy for the network. You want to accomplish the following goals:
*You want to enforce strong passwords throughout the entire forest for all computers. All computers in both domains should use the same password settings.
* The Accounting department has a custom software application that needs to be installed on computers in that department.
* Computers in the Marketing and Sales departments need to use a custom background and prevent access to the Run command.

You create the following three GPOs with the appropriate settings: Password Settings, Accounting App, and Desktop Settings.

How should you link the GPOs to meet the design objectives? To answer, drag the label corresponding to the GPO to the appropriate boxes.

eastsim.private – password setting HQ.eastsim.private – password setting Accounting – Accounting app Marketing – Desktop Settings Sales – Desktop Settings

You are the administrator for the widgets.com domain. Organizational Units (OUs) have been created for each company department. User and computer accounts for each department have been moved into their respective department OUs.

From your workstation, you create a GPO that configures settings from a custom .admx file. You link the GPO to the sales OU.

You need to make some modifications to the GPO settings from the server console. However, when you open the GPO, the custom Administrative Template settings are not shown.

What should you do?

Enable the Administrative Templates central store in Active Directory. Copy the .admx file to the central store location

You are the administrator for the widgets.com domain. Organizational Units (OUs) have been created for each company department. User and computer accounts for each department have been moved into their respective department OUs.

As part of your security plan, you have analyzed the use of Internet Explorer in your organization. You have defined three different groups of users. Each group has different needs for using Internet Explorer. For example, one group needs ActiveX controls enabled, while you want to disable ActiveX for the other two groups.

You would like to create three templates that contain the necessary settings for each group. When you create a GPO, you’d apply the settings in the corresponding template rather than manually set the corresponding Administrative Template settings for Internet Explorer.

What should you do?

Create three starter GPOs with the necessary settings. When creating the GPOs, select the starter GPO with the desired settings.

You are the administrator for the widgets.com domain. Organizational Units (OUs) have been created for each company department. User and computer accounts for each department have been moved into their respective department OUs.

As you manage Group Policy objects (GPOs), you find that you often make similar user rights, security options, and Administrative Template settings in different GPOs. Rather than make these same settings each time, you would like to create some templates that contain your most common settings.

What should you do?

Create GPOs with the common settings. Take a backup of each GPO. After creating new GPOs, import the settings from one of the backed up GPOs. Create GPOs with the common settings. When creating new GPOs, copy one of the existing GPOs.

You are the network administrator for eastsim.com. The network consists of a single Active Directory domain. All the servers run Windows Server 2012 R2. All the clients run Windows 8.1. The company has a main office in New York and several international locations including facilities in Germany and France.

You have been asked to build a domain controller that will be deployed to the eastsim.com office in Germany. The network administrators in Germany plan to use Group Policy Administrative Templates to manage Group Policy in their location. You need to install the German version of the Group Policy Administrative Templates so they will be available when the new domain controller is deployed to Germany.

What should you do?

Copy the German .ADML files to the apporpriate directory int he SYSVOL on a local domain controller

You manage the branch office for your company network. The branch office has a single Active Directory domain, branch1.westsim.private. All computers in the branch office are members of the domain. All client computers run Windows 7.

The branch office consists of two subnets and 50 host computers. A single DHCP server on Subnet1 delivers IP address information to all clients. A single server on Subnet2 is both the domain controller and DNS server. Dynamic updates are enabled on the DNS zone.

You want to configure each client computer with consistent DNS server addresses and DNS search suffixes. You want to prevent users from modifying these settings.

What should you do?

Configure a GPO with the DNS server and search suffix settings

You are the network administrator for a large metropolitan hospital. The hospital must conform to several new regulations dealing with patient privacy

Add the mangers group to the GPO’s discretionary access control list (DACL). Deny the Apply Group Policy and Read permissions to the managers group.

You are the security administrator for a large metropolitan school district. You are reviewing security standards with the network for the high school.

Configure the Computer configuration node of the computer center security GPO and restrict software to Internet Explorer only. Link the GPO to the domain and allow access to the computer center computers group only.

You are the Administrator for a network with a single active directory domain named widgets.local . The widgets.local domain has an Organizational Unit object for each major department in the company, including the Information Systems department.

On the Group Policy object’s access control list, deny the Apply Group Policy permission for members of the Domain Admins group.

Your network consists of a single Active Directory domain. The OU structure of the domain consists of a parent OU named HW_West, and child OUs of research, HR, Finance, sales, and operations.

Link DefaultSec to the HQ_West OU. Link HiSec to the HR and Research OUs. Configure password policies on a GPO linked to the domain.

You are the administrator of a network with a single Active Directory domain. Your domain contains two domain controllers. Your company’s security policy requires that locked out accounts are unlocked by administrators only.

Configure the account lockout duration to 0.

You are the administrator of a network with a single Active Directory domain. Your domain contains three domain controllers and five member servers.

using active Directory users and computers, select Unlock Account for each account.

You are the network administrator for your network. You network consists of a single Active Directory domain. All servers run Windows Server 2012 R2. Your company recently mandated The following user account criteria:

Set Minimum password length to 12 Set account lockout duration to 0 Set account lockout threshold to 3

You are the network administrator of a small network consisting of three Windwos Server 2012 R2 computers, 50 Windows 7 professional workstations, and 100 Windows 8 workstations. Your network has a password policy in place with the following settings:

Enable the Minimum password age setting Enable the password must meet complexity requirements.

You manage a single domain named widgets.com . Organizational units have been created for each company department. User and computer accounts have been moved into their corresponding OUs. you define a password and account lockout policy for the domain.

Implement a granular password policy of the users in the Directors OU.

You manage a single domain named widgets.com . Organizational units have been created for each company department. User and computer accounts have been moved into their corresponding OUs. You define a password and account locout policy for the domain.

Create a granular password policy. Apply the policy to all users in the Directors OU.

You are consulting with the owner of a small network which has a Windows Server 2008 functioning as a workgroup server. There are six client desktop computers, each of which is running Windows XP Professional. There is no Internet connectivity.

Make sure the correct users and groups are listed in the Auditing properties of the files. Make sure Object Access auditing policy is configured for success and failure. Make sure the files to be audited are on NTFS partitions.

You are the server administrator for your network. Recently, the system time on several servers has been modified. You want to find out who has been making the change. You enable auditing for System events. After several days,

Filter the look for successful events. Look in the Security log.

You are the network administrator for your company. Your company uses Windows 7 Professional as its desktop operating system. All computers joined to a single Active directory domain. Several computers store sensitive information. You are configuring security settings that will distributed to all computers on your network. You want to identify attempts to break into a computer by having the computer that denies the authentication attempt note the failed attempt in its Security database.

Select failure for audit account logon events.

You are the network administrator for your company. Your company uses Windows 7 Professional as its desktop operating system. All computers joined to a single Active directory domain. Several computers store sensitive information. You are configuring security settings that will distributed to all computers on your network. You want to identify denied attempts to manipulate files on computers that have been secured through NTFS permissions.

Select failure for audit object access.

You are the network administrator for your company. Your company uses Windows 7 Professional as its desktop operating system. All computers joined to a single Active directory domain. Several computers store sensitive information. You are configuring security settings that will distributed to all computers on your network. You want to identify denied attempts to change user’s group membership in a computer’s local database.

Select failure for audit account management

You are the network administrator for your company. Your company uses Windows XP professional as its desktop operating system. Rodney, a user in the research department, shares a computer with two other users.

Edit the advanced security properties of the folder containing Rodney’s documents. Configure an auditing entry for the Everyone group. Configure the entry to audit success of the Delete permission.

Your are the security administrator for your organization. Your multiple domain Active Directory forest uses Windows Server 2012 R2 for domain controllers and member servers. The computer accounts for your member servers are located in the Member Servers OU. Computer accounts for domain controllers are in the Domain Controllers OU. You are creating a security template that you plan to import into a GPO. You want to log all domain user accounts that connect to the member servers.

Enable the logging of Logon events Link the GPO to the Member Servers OU.

Your are the security administrator for your organization. Your multiple domain Active Directory forest uses Windows Server 2012 R2 for domain controllers and member servers. The computer accounts for your member servers are located in the Member Servers OU. Computer accounts for domain controllers are in the Domain Controllers OU. You are creating a security template that you plan to import into a GPO. You would like to log whenever a user is unable to log on to any computer using a domain user account.

Enable the logging of failed Account Logon events. Link the GPO to the domain controllers OU.

You are an administrator for a company that uses Windows 2008 for its server. In addition to active directory, you also provide file and print services, DHCP, DNS, and e-mail services .

Configure Object access auditing in a GPO and link it to the domain.

You are in charge of managing the servers in your network. Recently, you have noticed that many of the domain member servers are being shutdown. You would like to use auditing to track who performs these actions.

Audit successful system events. Create a GPO to configure auditing. Link the GPO to the domain.

You manage a single domain names widgets.com . Recently, you notice that there have been several unusual changes to objects in the Sales OU. You would like to use auditing to keep track of those charges. You enable successful auditing of directory service access events in a GPO, and link the GPO to the domain.

Edit the access list for the OU. Identify specific users and events to audit.

You manage a single domain names widgets.com . Recently, you notice that there have been several unusual changes to objects in the Sales OU. You would like to use auditing to keep track of those charges. You want to only enable auditing that shows you the old and new values of the changed objects.

Directory Service Changes

You manage a single domain names widgets.com . One day you notice that a trust relationship you have established with another forest has changed.

Policy change events

You are the administrator for the widgets.com domain. Organizational unit have been created for each company department. User and computer accounts for each department have been moved into their repective departmental OUs. You have two OUs that contain temporary users:

User Rights

Select the policy node you would choose to configure who is allowed to manage the auditing and security logs

User Rights Assignment

Click on the user right policy that is used to grant a user local access to the desktop of a Windows Server 2012 R2 system.

Allow log on locally

You are the administrator for the widgets.com domain. Organizational unit have been created for each company department. User and computer accounts for each department have been moved into their repective departmental OUs. You would like to configure all computers in the Sales OU to prevent the installation of unsigned drivers.

Security Options

You have several computer running Windows 8. You want to configure a GPO that will make the Windows 8 computers prompt for additional credentials whenever a sensitive action is taken.

Configure user account control (UAC) settings.

You manage 20 computers running Windows 7 in a domain network. You want to prevent the Sales team members from making system changes. Whenever a change is initiated, you want to allow only those who can enter administrator credentials to be able to make the change.

Configure the User Account Control: Behavior of the elevation prompt for standard users setting in Group Policy to Prompt for credentials.

You have been asked to troubleshoot a Windows 8 computer that is a member of a workgroup. The director who uses the machine said he is able to install anything he wants as well as change system settings on-demand.

Enable the Run all admin approval mode setting in the local security policy.

You have a computer running windows 8. Prior to installing some software, you turn off User account control, reboot the computer, and install the software. You turn UAC back on, but it does not prompt you before performing sensitive actions.

Reboot the machine

You manage a single domain running Windows Server 2012 R2. You have configured a Restricted Group policy as show in the image. When this policy is applied, which actions will occur? (select two)

Any other members of the Backup Operators group will be removed. the desktop Admins group will be made a member of the Backup Operators group.

You manage a single domain running Windows Server 2012 R2. You have configured a Restricted Group policy as show in the image. When this policy is applied, which actions will occur?

The backup operators group will be made a member of the Desktop Admins group.

You are the administrator for the westsim.com domain. Organizational Units (OUs) have been created for each company department. User and computer accounts for each department have been moved into their respective department OUs.

Computers in the Accounting department use a custom application. During installation, the application creates a local group named AcctMagic. The group is used to control access to the program. By default, the account used to install the application is made a member of the group.

You install the application on each computer in the Accounting department. All Accounting users must be able to run the application on any computer in the department. You need to add each user as a member of the AcctMagic group.

You create a domain group named Accounting and make each user a member of this group. You then create a GPO name Acct Software linked to the Accounting OU. You need to define the restricted group settings.

What should you do?

Create a restricted group named AcctMagic. Add the Accounting domain group as a member

You are the network administrator for westsim.com . The network consists of a single Active Directory domain. All the servers run Windows Server 2012 R2. All the clients run Windows 8. You have enabled outbound filtering for Public networks in the Windows Firewall with Advanced Security node of a Group Policy which applies to member servers.

Configure a custom outbound rule.

You are the network administrator for westsim.com . The network consists of a single Active Directory domain. All the servers run Windows Server 2012 R2. All the clients run Windows 8. There is one main office located in New York.

In windows firewall with advanced security, create a new isolation connection security rule and Require authentication for inbound and outbound connections.

You are the network administrator for westsim.com . The network consists of a single Active Directory domain. All the servers run Windows Server 2012 R2. All the clients run Windows 8. A server named App1 is running an application that uses a service named Custom App service.

You should create a custom rule using the windows firewall with advanced security.

You are the network administrator for westsim.com . The network consists of a single Active Directory domain. All the servers run Windows Server 2012 R2. All the clients run Windows 8. A member server named Web1 running the Web Server role is hosting an internal company web site.

On Web1 you should create a custom inbound firewall rule that allow HTTP traffic on Web1 from Domain Users. Add the TechContractors group as an exception to the rule.

You need to configure Windows Firewall with Advanced Security to allow traffic for an application that dynamically opens up multiple ports on an ass-needed basis.

Add a program rule

You are in charge of managing several servers. Your company requires many custom firewall rules in Windows Firewall with Advanced Security.

Configure firewall settings in group policy. Apply the GPO so that it applies to all applicable servers.

You run a custom application on a Windows Server 2012 R2 server. You want to configure the firewall to allow the application to use a specific port, but restrict access to specific users.

In windows firewall with advanced security, add an inbound rule. Require only secure connections for the rule, and add the users to the list of authorized users.

You run a custom application on a Windows Server 2012 R2 server. You want to configure the firewall to allow the application to use a specific port, but restrict access to only Wrk1 and Wrk2.

In windows firewall with advanced security, add an inbound rule. Require only secure connections for the rule, and add the computer to the list of authorized computers.

Management is concerned that users are spending time during the day playing games and have asked you to create a restriction that will prevent all users and administrators from running Games app on Windows 8 Workstations.

Packaged app rules

You are the network administrator for northsim.com . The network consists of a single active Directory domain. All the servers run Windows Server 2012 R2. All the clients run Windows 8. You want to prevent users from running a common game on their machines.

Create a hash rule

You are the network administrator for eastsim.com . The network consists of a single Active Directory domain. All the servers run Windows Server 2012 R2. All the clients run Windows 8. You would like to prevent users from running all software on the computer except for software that has been digitally signed.

Configure an executable rule in application control policies with a publisher condition.

You are the network administrator for eastsim.com . The network consists of a single Active Directory domain. All the servers run Windows Server 2012 R2. All the clients run Windows 7. Many of the client computers are used by several different users.

Create an executable rule with a publisher condition in application control policies.

You are the network administrator for southsim.com . The network consists of a single Active Directory domain. All the servers run Windows 2012 R2. All the clients run Windows 8. The clients are shared by multiple users at work.

Browse and select the executable file for the application. Modify the rule to include the product name information.

You are the network administrator for eastsim.com . The network consists of a single Active Directory domain. All the servers run Windows 2012 R2. All the clients run Windows 8. The clients are shared by multiple users at work. You want to allow only members of the Sales team to run the sales lead application.

Create an executable rule with a file hash condition in application control policies.

You are the network administrator for eastsim.com . The network consists of a single Active Directory domain. All the servers run Windows 2012 R2. All the clients run Windows 8. The clients are shared by multiple users at work. Recently, users have downloaded and installed two malware programs onto the computer.

In application control policies, create a Windows Installer rule with a file hash condition.

You are the network administrator for northsim.com . The network consists of a single active Directory domain. All the servers run Windows Server 2012 R2. All the clients run Windows 8. You want to prevent users from running any file with .bat or .vbs extension unless the file is digitally signed by your organization.

In application control policies, create a script rule with a publisher condition.

You are the network administrator for northsim.com . The network consists of a single active Directory domain. All the servers run Windows Server 2012 R2. All the clients run Windows 8. You want to find out who has been running a specific game on the client computers.

In application control policies, create an executable rule with a path condition that identifies the file. For example rules, configure audit only.

You manage several computers that run Windows 7. You would like to have better control over the applications that run on there computers, so you have decided to implement AppLocker..

Set the enforcement mode for executable rules to Enforce rules. Start the application identity service on the client.

You are the network Administrator for eastsim.com . The network consists of one Active Directory domain. All the servers run Windows Server 2012 R2. All of the clients still run Windows Vista. The domain functional level of the domain is set to Windows Server 2008.

Install the client-side extensions (CSEs) on all of the client computers.

You are the network Administrator for eastsim.com . The network consists of one Active Directory domain. All the servers run Windows Server 2012 R2. You have been instructed to map a drive to a department share for all users.

Configure a Drive Maps policy in a GPO linked to the domain

Select the policy node you would use to configure a user’s Internet Explorer options.

Internet settings

Sally, a member of the sales department, is borrowing a laptop computer from her supervisor to do some work from home in the evenings. Sally contacts you and indicates that she cannot access the C:\Reports folder on the laptop. This folder contains documents that she needs to edit.

You log on to the laptop as a domain administrator to check the folder’s access control list. You are denied access to view the permissions. You contact Sally’s supervisor to verify that Sally should receive access to the folder. Sally’s supervisor indicates that Sally should be able to read, change, and delete documents in the folder, but that only the supervisor should be able to configure permissions.
You need to grant Sally appropriate permissions to the C:\Reports folder. What should you do? (Choose two. Each correct choice is part of the solution.)

Take ownership of the C:\Reports folder Grant Sally the Allow Modify permission to the C:\Reports folder

An employee has quit under difficult circumstances. Unfortunately, the user had several files that are needed, and before the employee left, they assigned Deny Full Control permission to Domain Users to all the files and folders. All users, including you, are now blocked from accessing these important files.
You need to make these files available as quickly as possible.

Take ownership of the files, and change the permissions.

On your Windows Server 2012 R2 computer,you share the D:\Apps folder using a sharename of Apps. You need to configure permissions to the share as follows:
• Members of the Appusers group should be able to open and view files in the shared folder.
• User JohnS should not have any access to files in the shared folder. JohnS is a member of the Appusers group.

You need to assign the necessary permissions without assigning extra permissions beyond what is required and without affecting other access that might already be configured on the computer. You need to complete the task using the least amount of effort possible.

Assign Allow Read permission to Appusers, and assign Deny Read permission to Johns.

The D:\ drive in your Windows Server 2012 R2 server is formatted with NTFS.

The Sales group on your computer has been given Allow Modify to the D:\Sales folder. The Mary user account is a member of the Sales group.
You want to accomplish the following:

• Mary should not be allowed access to the D:\Sales\2013sales.doc file.
• Mary should be able to read, write, and create new files in the D:\Sales folder.
• Your solution should not affect the abilities of other Sales group members to access files in the D:\Sales folder.

Edit the properties for the file; assign Mary the Deny Full Control permission.

You have a Windows Server 2012 R2 computer that is maintained by multiple administrators.

Sally wants to access a file in the Reports folder. A group named Sales has been granted the Full Control permission to the Reports folder and all subfolders and files.
You add Sally as a member of the Sales group, but she still cannot access the file that she needs.

You want to let Sally access the Reports folder. What should you do?

Remove Sally from any other groups that have been explicitly denied access to the Reports folder.

Your Windows Server 2012 R2 computer has two volumes: C: and D:.

For the D:\Reports\Finances.xls file, you explicitly grant the Mary user account the Allow Modify NTFS permissions.

You need to move the file from the existing folder to the C:\Reports2 folder. You want to keep the existing NTFS permissions on the file. You want to accomplish this with the least amount of effort possible.

Use the robocopy command to copy the file to the C:\Reports2 folder.

You manage a Windows Server 2012 R2 server.

For the D:\Reports\Finances.xls file, you explicitly grant the Mary user account the Allow Modify NTFS permissions.

You need to move the file from the existing folder to the D:\Confidential folder. You want to keep the existing NTFS permissions on the file. You want to accomplish this with the least amount of effort possible.

Move the file to the new folder.

A server administrator has just been fired, but not before he assigned Deny Full Control permission to Everyone to several key files and folders on the server.

All users, including you, are now blocked from accessing these important files.
You are the administrator and you need to make these files available as quickly as possible.

Take ownership of the files and change the permissions.

You are the owner of the D:\Reports folder.

Judith needs to be able to see the files and subfolders in the D:\Reports folder. Dalton needs to be able to do these same things, but also to delete folders.
You need to assign the necessary NTFS permissions to the D:\Reports folder.

Grant Read & Execute to Judith; Modify to Dalton

You need to control access to the D:\Reports folder as follows:

• Members of the Accounting group should be able to open and view all files but not modify them.
• Mary needs to be able to modify existing files in the folder, add new files to the folder, but should not be able to delete or rename files.

Mary is a member if the Accounting group. You want to assign NTFS permissions taking the least amount of actions possible.

Assign Allow Read & execute, List folder contents, and Read to the Accounting group. Assign Allow Write to Mary.

You need to control access to the D:\Reports folder as follows:

• Members of the Accounting group should be able to open and view all files, edit them, add new files, and rename and delete files.
• Mary needs to be able to open and view files, but should not be able to modify the files, rename files, or delete them.

Mary is a member if the Accounting group. You want to assign NTFS permissions taking the least amount of actions possible and affecting existing permissions as little as possible.

Remove Mary from the Accounting group. Assign Allow Read & execute, List folder contents, Read, and Modify to the Accounting group. Assign Allow Read & execute, List folder contents, and Read to Mary.

You need to control access to the D:\Reports folder as follows:

• Members of the Accounting group should be able to open and view all files, edit them, and add new files. They should not be able to delete or rename files.
• Mary needs to be able to open and view files, but should not be able to modify the files.

Mary is a member if the Accounting group. You want to assign NTFS permissions taking the least amount of actions possible and affecting existing permissions as little as possible.

Assign Allow Read & execute, List folder contents, Read, and Write to the Accounting group. For the Mary user account, Deny the Write permission.

You are the network administrator for westsim.com. The network consists of a single domain. All the servers run
Windows Server 2012 R2. All the clients run Windows 8.
The company has a file server named FSl that hosts a share named SalesData for the Sales department. You need to configure the SalesData share so that users will be allowed to view only the files and folders to which they have rights.

Use the Shares panel in Server Manager to enable Access Based Enumeration (ABE) on the SalesData share.

You are a technical consultant for many businesses in your community. One of your clients, a small law firm, has a single Active Directory domain. They have two servers running Windows Server 2012 R2. Both servers are configured as domain controllers while also serving as file and printer servers.
This client is calling you on a regular basis because users are deleting or damaging their files. You must visit the client’s site and restore the files from backup. Your client has asked you to create an alternate solution.

Implement shadow copies on the relevant data.

You are the server administrator for the Srv12 server. This server is running the File Services role and is used for user home folders. Each user has a folder that they can use for storing personal files.
Management wants a solution that meet the following requirements:

• Allow only the specified user to save files in their home folder.
• User should not be allowed to view or edit files in other user’s home folders.
• The list of files and folders that users can view should show only the files that they have rights to access.

Configure share and NTFS permissions with access-based enumeration.

You are the server administrator for the westsim.com domain. Client computers run Windows 7. All servers run Windows Server 2008 R2.
You have a server named FS12 that holds a shared folder named Reports. Within this folder, subfolders have been created for each company department. All company employees have Read access to the shared folder.
The Board of Directors uses a subfolder in the shared folder named BoardReports for their reports. They would like this subfolder to only be visible to members of the Board of Directors and specific people that they authorize to see the folder and its contents.

Enable access-based enumeration on the shared folder. Configure NTFS permissions on the BoardReports folder to control access.

You are the manager for Windows Servers at your company. You have just installed Windows Server 2012 R2 on a new server.

You have configured Windows Server Backup to take regular backups once a day and save those backups to an external disk.
You find that users working on a new project are constantly overwriting files and asking you to restore older versions of files that exist on backups from as far back as a week ago. You would like to implement a solution that allows users to restore files without an administrator’s help.

Enable VSS on the volume that holds user data.

You need to share a folder that contains data used by your accounting department. You want Phil, the manager of the department, to be able to add and remove files. You want members of the department to be able to connect to the share and see the files it contains, but not make changes. Everyone else in the company should be blocked from connecting to the share.
There is a global group called Accounting, which contains all the accounting department users, including Phil. You need to configure permissions on the share.

Assign Allow Change permission for Phil, Allow Read for Accounting, and nothing else.

You are configuring access for a shared folder on Windows Server 2012 R2. There is a global group called Appusers who need read-only access. However, there is a member of Appusers, jsmith, who should not have any access at all.
You need to configure your share so that the members of Appusers have access, but jsmith does not, while creating the least disruption to your existing administrative structure.

Assign Allow Read permission to Appusers, and assign Deny Read permission to jsmith.

Mr. Yamashita needs to be able to modify the contents of the promo share, a shared folder on one of your Windows Server 2012 R2 servers. The share has been assigned the following permissions:
User/Group Permission Telesales global group Allow Read Training global group Deny Full Control Managers global group Allow Change
Mr. Yamashita user Allow Change

Mr. Yamashita is a member of each of these groups.

How should you modify the share permissions to allow the necessary access? (Choose three. Each choice is a complete solution.)

Change the Training group’s permission to allow Read. Remove Mr. Ymashita’s user account from the training group. Remove the Training group from the share

SRV03 is a Windows Server 2012 R2 server that holds the SalesDept folder. This folder contains documents specific to the sales department.
You create two user groups:

• The Sales group includes all members of the sales department.
• The SalesAdmin group includes about ten members of the sales department who manage sales-related documents.

You want the Sales group to have read-only access to the content in the SalesDept folder. Members of the SalesAdmin group should have all permissions to the folder. No other users should have access. All access will be through the network. You want to assign as few permissions as possible.

Share the SalesDept folder. Grant Read permission to the Sales group and Full Control permission to the SalesAdmin group. Remove the Everyone group.

You have decided to create a shared folder that will contain sensitive information about planned changes in the personnel structure. Most users will be denied access to the share, which is named REORG.
You have successfully created the share and set appropriate permissions. However, management feels the effect of having this share on the server, which denies access to most users is damaging morale. You need to keep the information available to the users who currently access it, but avoid having a share listed when users browse the network and shares for specific servers.

Remove the REORG share. Share the folder again as REORG$ with the same permissions as before.

On your Windows Server 2012 R2 computer, you share the D:\Promo folder using a share name of Promo.

The share has been assigned the following permissions:

User/Group Permission Telesales group Allow Read Training group Deny Full Control
Managers group Allow Change ..
Mary user Allow Change

The Mary user account is a member of the Training group. NTFS permissions allow all access.

Mary needs to be able to edit documents in the shared folder but cannot. You need to modify the share permissions to allow her the necessary access.
What should you do? (Choose two. Each choice is a possible solution.)

Remove the Mary user account from the Training group. Change the Training group permission to allow Read

Your Windows Server 2012 R2 computer has a folder named D:\SalesDept. The D: drive is formatted with FAT32. You need to allow network access to the folder as follows:
• Members of the Sales group should have read-only access to the content in the folder.
• Members of the SalesAdmin group should be able to open, edit, and add new files to the folder.
• No other users should have access.

Members of the SalesAdmin group are also members of the Sales group. You want to assign as few permissions as possible.

Share the SalesDept folder. Grant Read permission to the Sales group and Change permission to the SalesAdmin group. Remove Everyone from the access control list.

You need to use the New Share Wizard on a Windows Server 2012 R2 system to create a new share for the c:\shares\

WidgetProject folder. Users will connect to the share using Windows 7 and Windows 8 workstations.

Because this share will be used by many different users, you would like to enable quotas on the share as you create it to prevent users from using too much space at the expense of other users.
Click on the sharing profile you should use.

ISMS Share – Advanced I

You need to use the New Share Wizard on a Windows Server 2012 R2 system to create a new share for use with Hyper-V servers in the network.

Click on the sharing profile you should use.

ISMS Share – Appl ications I

You need to use the New Share Wizard on a Windows Server 2012 R2 system to create a new share for the C:\Shares
\WidgetProject folder. Users will connect to the share using Windows 7 and Windows 8 workstations.

On the Select the profile for this share screen, you select the SMB Share – Advanced sharing profile. However, when you do, the Next > button remains grayed-out and you can’t proceed.

Install the File Server Resource Manager role on the server.

You need to use the New Share Wizard on a Windows Server 2012 R2 system to create a new share for the c:\shares\

WidgetProject folder. Sales reps for your organization will connect to the share using Windows 7 and Windows 8 notebook systems.

Because the users travel frequently, you want to make the contents of the share available to users even when they are disconnected from the network.
What option on the Other Settings screen should you enable?

Allow caching of share

You need to use the New Share Wizard on a Windows Server 2012 R2 system to create a new share for the C:\Shares\

WidgetProject folder. Sales reps for your organization will connect to the share using Windows 7 and Windows 8 notebook systems.
You want to configure the share such that, if a user does not have at least Read permissions to a file or folder, Windows will hide the file or folder from the user.
What option on the Other Settings screen should you enable?

Access-based enumeration

You are managing the WidgetProject share in Server Manager on a Windows Server 2012 R2 system.

You want to specify an email address users can contact for assistance if they are denied access to the folder. Click on the option in the share Properties screen you would use to do this.

fvjanagement Prop…l+

You are the network administrator for a small manufacturing company. You have ten regional sales people who travel extensively and have been provided Windows 7 laptop computers.

The mobile users have complained that, although they can take copies of important files with them into the field, occasionally they have been caught with out-of-date documents because no one told them the files had been updated. Additionally, some of these files need to be distributed to all the other sales staff.
You need to address this problem and easily provide the appropriate access to these shared files.

Configure Offline Files for the folder that contains these files.

You need to configure Work Folders on a Windows 8.1 notebook system to connect to a sync share on a Windows Server 2012 R2 system.
Click the option you would use in Control Panel to do this.

Select "System and Security"

Your organization employs many outside sales representatives who frequently travel to customer sites. While they are away, they frequently need to access data on the internal file server in your network. Currently, they e-mail files to themselves so they can access them on their notebooks.

To address this situation, you are planning a Work Folders deployment in your organization, which will allow users to synchronize shared file server data directly to their notebooks. Your plan details are as follows:
• Sync shares will be configured on CorpFS, which is a Windows Server 2012 R2 system.
• Work Folders will be configured on users’ notebook systems, which currently run Windows Vista Business edition. These systems are not joined to your organization’s domain.
• A server certificate from DigiCert will be used.
• The network firewall will be reconfigured to allow traffic from the Work Folders clients to the server.
• A publicly registered DNS host name will be assigned to the server.
• The Work Folders directory on clients will be set to C:\ Work Folders.

No, Work Folders can’t be configured on Windows Vista systems.

Your organization employs many outside sales representatives who frequently travel to customer sites. While they are away, they frequently need to access data on the internal file server in your network. Currently, they e-mail files to themselves so they can access them on their mobile devices.

To address this situation, you are planning a Work Folders deployment in your organization that will allow users to synchronize shared file server data directly to their tablets. The details of your plan are as follows:
• Sync shares will be configured on CorpFS, which is a Windows Server 2012 system.
• Work Folders will be configured on users’ Surface tablets, which currently run Windows RT 8.1. These systems are not joined to your organization’s domain.
• A self-signed server certificate from an internal CA will be used.
• The network firewall will be reconfigured to allow traffic from the Work Folders clients to the server.
• A publicly-registered DNS host name will be assigned to the server.
• The Work Folders directory on clients will be set to C:\ Work Folders.

The server hosting sync shares must be running Windows Server 2012 R2. A server certificate from a public CA should be used.

The C:\Shares\WidgetProject folder on your Windows Server 2012 R2 system has been shared with network users. The server is a member of the westsim.com Active Directory domain.
The westsim.com\Users group has been granted the following Allow NTFS permissions:

• Read & execute
• List folder contents
• Read

In addition, the Everyone principle has been assigned the following Allow share permissions:

• Full Control
• Change
• Read

The ksanders user is a member of the westsim.com\Users group. She accesses data in the folder through the network share from her Windows 8 workstation.
What permissions does this user have to data in the folder?

Allow Read & execute, List folder contents, and Read

The C:\Shares\WidgetProject folder on your Windows Server 2012 R2 system has been shared with network users. The server is a member of the westsim.com Active Directory domain.
The westsim.com\Users group has been granted the following Allow NTFS permissions:

• Write
• Read & execute
• List folder contents
• Read

In addition, the Everyone principle has been assigned the Allow Read share permission.

The jmarshall user is a member of the westsim.com\Users group. She accesses data in the folder by using Remote Desktop to establish a remote access session on the server.
What permissions does this user have to data in the folder?

Allow Write, Read & execute, List folder contents, and Read

The C:\Shares\WidgetProject folder on your Windows Server 2012 R2 system has been shared with network users. The server is a member of the westsim.com Active Directory domain.
The westsim.com\Users group has been granted the following Allow NTFS permissions:

• Write
• Read & execute
• List folder contents
• Read

In addition,the Everyone principle has been assigned the Allow Read share permission.

The smarsden user is a member of the westsim.com\Users group. She accesses data in the folder through the network share from her Windows 8 workstation.
What permissions does this user have to data in the folder?

Allow Read

The C:\Shares\WidgetProject folder on your Windows Server 2012 R2 system has been shared with network users. The server is a member of the westsim.com Active Directory domain.
The westsim.com\Users group has been granted the following Allow NTFS permissions:

• Read & execute
• List folder contents
• Read

The westsim.com\Administrators group has been granted the Allow Full Control NTFS permission.In addition, the Everyone principle has been assigned the following Allow share permissions:
• Full Control
• Change
• Read

The vhammer user is a member of the westsim.com\Users and the westsim.com\Administrators group. She accesses data in the folder through the network share from her Windows 8 workstation.
What permissions does this user have to data in the folder?

Allow Full Control

The C:\Shares\WidgetProject folder on your Windows Server 2012 R2 system has been shared with network users. The server is a member of the westsim.com Active Directory domain.
The westsim.com\Users group has been granted the following Allow NTFS permissions:

• Read & execute
• List folder contents
• Read

The westsim.com\Research group has been granted the Allow Full Control NTFS permission.In addition, the Everyone principle has been assigned the Allow Read share permission.
The vhammer user accesses data in the folder through the network share from her Windows 8 workstation. She is a member of the westsim.com\Users and westsim.com\Research groups. The vhammer user has also been assigned the Deny Read NTFS permission to the folder.

What permissions does this user have to data in the folder?

Deny Read

You are the network administrator for your company. A Windows Server 2012 R2 member server named Srvl has a shared folder called SalesResearch that shares the F:\Sales\Research folder. This folder has three subfolders: Projects, Analysis, and Reports.

Permission inheritance is enabled on F:\Sales\Research and all subfolders and files. Only the Administrators group and one designated employee have permission to each subfolder.

Permissions are configured as follows:

Resource SalesResearch share F:\Sales\Research Type of Permission
Share NTFS Effective Permissions Everyone: Allow-Full Control Administrators: Allow-Full Control
F:\Sales\Research\Analysis NTFS Anne: Allow-Modify
Administrators: Allow-Full Control
F:\Sales\Research\Projects NTFS Billy: Allow-Modify
Administrators: Allow-Full Control
F:\Sales\Resea rch\Reports NTFS Gavin: Allow-Modify Administrators: Allow-Full Control

Stan needs to read all of the documents within the SalesResearch share and its subfolders. Stan does not need to make changes to these documents. You need to give Stan appropriate permissions without giving him unnecessary permissions.

Assign Stan the Allow Read NTFS permission to F:\Sales\Research

Sally is an employee in the Sales department.Important documents are stored in the D:\SalesDocs folder on a Windows Server 2012 R2 server. Sally is a member of the Domain Users and Sales groups. The SalesDocs folder has been shared and the following permissions are currently assigned to the SalesDocs folder:

NTFS permissions
Domain Users = Allow-Read Sales = Allow-Modify

Share permissions
Domain Users = Allow-Read Sales = Allow-Change

Sally needs to read and modify all files in the SalesDocs folder except StyleGuide.doc. Sally should be able to read StyleGuide.doc but not modify it.

What should you do?

Set Sally’s NTFS permission for StyleGuide.doc to Deny Write.

SRV02 holds a shared folder named Forecast for the Managers group.

Maria is a member of the Managers group. You would like to grant the Managers group Full Control to the folder named Forecast, but limit Maria’s access to Read only.
You have added the Managers group to the access list for the Forecast folder and granted Full Control access. You now need to limit Maria’s access to the folder.
What should you do? (Choose two. Each choice is a complete solution.)

0 Remove Maria’s account from the Managers group and grant Read access. 0 Add Maria to the NTFS permissions for the folder. Grant Read access.

You share a folder named Public and configure the following permissions.
Share permissions NTFS permissions
Everyone = Full Control Administrators = Full Control
Sales = Modify
Assistants = Deny Modify

You receive a phone call from Sally, a member of the Sales group and Assistants group, claiming that she cannot save a file to the Public shared folder.
You want to make sure that members of the Sales group (who are not members of the Assistants group) can save new files to the Public shared folder and access, update, and delete existing files in the Public share. You want to continue to ensure that members of the Assistants group cannot modify files in the Public shared folder,even if they are members of the Sales group. However, you also want to let Sally update files in the Public share.
What should you do?

Remove Sally from the Assistants group.

You are the network administrator for your company. You recently replaced the previous network administrator.

The sales manager, Jim, calls you and reports that he cannot update a file in the \\ACCTSRVl\Reports share which the previous network administrator created for him last Wednesday. Jim is a member of the Managers group, which should have full control of all files in the share.
You examine the Reports share and the D:\Data\Reports folder on the server. Following is a summary of the current configuration:

Folder

NTFS Permissions Share Permissions

D:\Data\Reports Shared as Reports

Administrators (Allow-Full Control) Managers (Allow-Full Control) Everyone (Allow-Read)

Everyone (Allow-Read)

You need to give Jim the permissions intended for the Managers group and let him update files in the Reports share. What should you do?

Change the Reports share permissions for the Everyone group to Allow Full Control.

You have a folder on your Windows Server 2012 R2 computer that you would like members of your development team to access.

You want to restrict network and local access to only specific users. All other users must not be able to view or modify the files in the folder.

What should you do? (Select two. Each choice is a required part of the solution.)

1. Configure both share and NTFS permissions. 2. Place the files on an NTFS partition

On your Windows Server 2012 R2 computer, you share the D:\Reports folder using a share name of Reports.

You need to configure permissions on the shared folder as follows:

• Members of the Accounting group should be able to view files, but not modify them.
• Phil, a member of the Accounting group, needs to be able to open and edit files in the shared folder.

You need to assign the necessary permissions without assigning extra permissions beyond what is required and without affecting other access that might already be configured on the computer. You need to complete the task using the least amount of effort possible.

What should you do?

Add the Accounting group and assign the Read permission. Add the Phil user account and assign Read/Write permission

You are the network administrator for eastsim.com. The network consists of a single domain. All the servers run Windows Server 2012 R2. All the clients run Windows 8.

The company has one main office. The main office has 200 Windows client computers, 20 Windows servers, and 50 Unix servers. There is one print server named PSl. You need to configure the print server to provide printing services to the Unix servers.

What should you do? (Select two. Each answer represents a complete solution.)

Install the Line Printer Daemon (LPD) services role on PSl. Install theInternet Printing services role on PSl.

You have connected a print device to your server and created a printer for it. You have shared the printer as Printer! and granted the Everyone group permission to print to it. The server is called Srvl and has a reserved P address of 192.168.1.27.

You want to manage printing to a network printer on your local subnet. The printer is connected directly to the network and uses anIP address of 192.168.1.14.

What should you do?

Open the Print Management console on Srvl and create a new TCP/IP printer using the 192.168.1.14IP address. Select the appropriate printer driver according to the make and model of the printer

You manage a Windows Server 2012 R2 server for a small company. This server is used as a file and print server.

One of the shared printers hosted by the server is heavily used. To optimize the printing process, you want to reconfigure the printer to start printing before each document is completely spooled.

Click the tab in the properties of the printer you would use to configure this.

Advanced

You manage a Windows Server 2012 R2 server for a small company. This server is used as a file and print server.

Several users have complained that when they try to connect to a shared printer, they receive an error message indicating that a driver isn’t available for their operating system. Upon investigation, you discover they are using older hardware running a 32-bit version of Windows 8.1. You need to add a 32-bit driver to the shared printer.

Click the tab in the properties of the printer you would use to do this.

Sharing

You are the network administrator for eastsim.com.

The network consists of a single domain. All the servers run Windows Server 2012 R2. All the clients run Windows 8.
You support a print server named PSl that provides print services for 100 users. After installing a new printer on the print server, you observe that the print spooler needs to be restarted more frequently. You believe the problem is related to the new printer driver that has just been installed. However, investigation of the event logs is inconclusive. You need to determine if the driver for the new printer is the cause of the recent failures using the least amount of administrative effort. Your solution must not affect the ability of users to print to the new printer.

What should you do?

Configure the print driver isolation settings for the new driver.

You manage a Windows Server 2012 R2 server that has an attached printer that is used by the Sales department. The sales manager has asked you to restrict access to the printer as follows:
• Sally needs to connect to a printer, print documents, and pause and resume her own print jobs.
• Damien needs to pause and resume documents for all users, but does not need to change printer properties.

You want to assign the most restrictive permissions that meet the sales manager’s requirements. What should you do? (Choose two. Each choice is part of the correct solution.)

Assign Sally the Print permission Assign Damien the Manage Documents permission

You are the administrator for a small network with several servers. All of your clients run Windows 8. There is only one printer, which is centrally located. Although indications are that this printer is over-utilized, there is neither space nor budget to add additional printers at this time.

There are often cases where a document is needed urgently, but when it is printed, it goes into the queue and is printed in the order received, not the order of the document’s priority. You would like to allow Gladys, the administrative assistant, to have the ability to maintain the print queue. Specifically, you want her to be able to alter the order of printing for the documents waiting to be printed.
You need to permit Gladys to make this change without adding her to the local Administrators group or making significant changes to the way your office operates.

What should you do?

Assign Manage Documents permission for the printer to Gladys.

You have connected a print device to Srv6 which runs Windows Server 2012 R2. You have also shared the printer as Printerl and granted the Everyone group permission to print to it.
The department manager prints an important document. After waiting a few minutes for the document to print, he calls you to say it hasn’t printed yet. You examine the print queue and notice two large documents ahead of his document in the queue. You increase the priority of his document so it will print as soon as possible.
You want to configure the printer so that the manager’s documents print as quickly as possible in the future.

What should you do?

• Create a second printer called Printer2. • Configure permissions on Printer2 to allow only the manager to print. • Set the priority on Printerl to 1, and set the priority on Printer2 to 99.

You have connected a print device to the SRV12 server and created a printer for it. You have shared the printer as Printer! and granted the Everyone group permission to print to it.

Terry, the company vice-president, informs you that he just submitted a print job to your printer and needs it in 5 minutes. Upon checking the printer, you find that there are numerous print jobs ahead of Terry’s.
You need to print Terry’s print job without causing other users to lose their print jobs.

What should you do?

Set the priority of Terry’s document to 99 and all others to 1.

You have connected a print device to the Srvll server created a printer for it. You have shared the printer as Printer! and granted the Everyone group permission to print to it.
A third-party technician is visiting your company today to clean the company’s printers. You check the print queue and find numerous jobs in the queue. An identical print device is attached to SrvS. The printer on SrvS is shared as Printer2.
You want to let the technician clean the printer attached to Srvll while allowing the print jobs in queue to print.

What should you do?

Add a new local port and configure Printer! to print to it.

You have connected a print device to Srv3 and created a printer for it. You have shared the printer as Printerl and
granted the Everyone group permission to print to it.

Users in the art department frequently send multiple page graphics to the printer. The jobs often take a long time to print. Other users, whose jobs are typically short, must wait for a long time for their documents to print.
You want to prevent large print jobs from delaying the print jobs of non-art users. You want to accomplish this with least amount of administrative effort.

What should you do?

Configure the priority of Printerl to 1. Add a new printer and set the priority to 99. For the new printer, deny the Print permission for users in the art department.Instruct all users except those in the art department to use the new printer.

You have connected two identical print devices to the Srv12 server and created two printers for them named Printerl and Printer2. You have shared both printers using their default names and granted the Everyone group permission to print to them.

Printerl receives the vast majority of print jobs submitted from users on the network. You want to distribute the printing load evenly between the two print devices. You want to do this while minimizing hardware costs.

What should you do?

Enable printer pooling for Printerl and configure it to print to both local printer ports in use by your print devices.

You have connected a print device to the Srv2 server and created a printer for it. You have shared the printer as Printer! and published it to Active Directory.
During the hours 11:00 a.m. to 2:00 p.m., you want to restrict access to the print device to members of the Help Desk Reports group. No other users should be able to print to your print device during those hours. During all other hours, all users in the company should have equal access to the print device.

What should you do?

Create a second printer for your print device and name it Printer2. Keep the default configuration for Printer!, except configure Printerl’s availability to 2:00 p.m. to 11:00 a.m. For Printer2, remove permissions for the Everyone group and grant the Print permission to the Help Desk Reports group

You have connected a print device to Srv4 and created a printer for it. You have shared the printer as Printerl and published it to Active Directory.
You assign the Allow Print permission for the printer to the Help Desk Technicians domain local group. However, you discover that users who are not members of the Help Desk technicians group can print to the printer.
You want only members of the Help Desk Technicians group to print to Printerl.

What should you do?

Remove the Everyone group from the printer’s access control list.

You have connected a print device to the Srv9 server and created a printer for it. You have shared the printer as Printerl and published it to Active Directory.

You are leaving on vacation and want to let Chad pause, restart, and delete print jobs on the printer while you are gone. Chad should not be allowed to delete the printer or change its properties. Chad is a member of the Help Desk Technicians domain local group. Currently, the Everyone group has the Allow Print permission to the printer.

What should you do?

Assign Chad the Allow Manage Documents permission to the printer.

You have a Windows Server 2008 R2 server named Printl that is the print server for 5 shared printers. You have configured a printer object for each printer, and shared each printer.
Your network has several hundred users. You would like users to be able to search for printers based on capabilities such as color,duplex, and other features, and to be able to select the printer that is appropriate for a specific task.

What should you do?

Right-click each printer and choose Listin Directory.

Members of the Accounting group use a set of special printers in a locked room for printing all print jobs. Accounting computers use Windows 7.
You want to make sure that these printers and any others you might add for the group are always available for any member of the Accounting group, regardless of the computer they are using.
You create a Group Policy Object (GPO) called AcctGroup that is linked to the Accounting OU. All computers and users in the Accounting department are in this OU.

What should you do?

Deploy the printers in the AcctGroup policy, adding the printers to the User Configuration section.

You have three shared printers that are used by the Sales team. To simplify administration, you use a Group Policy Object (GPO) to deploy these printers to all Sales team members.
You have received a new printer to replace one of the older printers. You install the printer and deploy it in the same GPO as the other printers. You check and find that the printer is automatically added to the Sales team member computers.

You need to remove the printer object for the older printer from all Sales team members’ computers.

What should you do?

Edit the GPO and remove the specific deployed printer.

You have a Windows Server 2012 R2 server named Printl that is the print server for 5 shared printers. You have configured a printer object for each printer,and shared each printer.
Users start complaining that one of the printers, the FastPrint 6000, is missing parts of graphics when it prints. You check the manufacturer’s website and find an updated printer driver that is supposed to fix the problem.
You need to update each client computer with the new driver. You need to do so as quickly as possible with the least amount of effort.

What should you do?

On the server, update the printer object with the new driver.

You are the network administrator for eastsim.com. The network consists of a single domain. All the servers run Windows Server 2012 R2. All the clients run Windows 8.
The company has one main office. The main office has 200 Windows client computers, 20 Windows servers, and 50 Unix servers. There is one print server named PSl. You need to configure the print server to provide printing services to the Unix servers.

What should you do?

(Select two. Each answer represents a complete solution.)

1. Install the Internet Printing services role on PSl 2. Install the Line Printer Daemon (LPD) services role on PSl.

You have connected a print device to your server and created a printer for it. You have shared the printer as Printer! and granted the Everyone group permission to print to it. The server is called Srvl and has a reserved P address of 192.168.1.27.

You want to manage printing to a network printer on your local subnet. The printer is connected directly to the network and uses anIP address of 192.168.1.14.

What should you do?

Open the Print Management console on Srvl and create a new TCP/IP printer using the 192.168.1.14IP address. Select the appropriate printer driver according to the make and model of the printer.

You manage a Windows Server 2012 R2 server for a small company. This server is used as a file and print server.

One of the shared printers hosted by the server is heavily used. To optimize the printing process, you want to reconfigure the printer to start printing before each document is completely spooled.

Click the tab in the properties of the printer you would use to configure this.

Advanced

You manage a Windows Server 2012 R2 server for a small company. This server is used as a file and print server.

Several users have complained that when they try to connect to a shared printer, they receive an error message indicating that a driver isn’t available for their operating system. Upon investigation, you discover they are using older hardware running a 32-bit version of Windows 8.1. You need to add a 32-bit driver to the shared printer.

Click the tab in the properties of the printer you would use to do this.

Sharing

On a Windows Server 2012 R2 server, you share a folder named Public using the default share name and share permissions. Later you receive a phone call from Sally, a member of the Sales group, claiming that she cannot save a file to the Public shared folder.

You examine the NTFS permissions for the folder and see share and NTFS permissions shown in the Exhibits. No other permissions are granted or denied. Sally is not a member of any other groups.

You want to make sure Sally and other members of the Sales group can open, edit, save, and delete files to the Public shared folder. You want to make as few assignments as possible without affecting permissions for other users.

What should you do?

Grant Everyone the Change share permission. Grant the Sales group the Allow Modify NTFS permission

You have a folder on your Windows Server 2012 R2 system that you would like to share with members of your development team. Users should be able to view and edit any file in the shared folder.

You share the folder and give Everyone Full Control permission to the shared folder.

Users connect to the shared folder and report that they can open the files, but they cannot modify any of the files.

What should you do?

Modify the NTFS permissions on the folder.

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending