1. Which of the following Network File System (NFS) command line tools is used for displaying or resetting counts of calls made to a Server from NFS?
2. Which of the following features is NOT configurable in Generation 2 Encryption-Supported VMs?
3. Which of the following authentication protocols is used to authenticate users within an Active Directory Domain?
4. The main function of Forensics, which is one of the DNS policies, is to:
5. Which of the following error codes is thrown when an invalid health certificate is detected in DHA?
6. In Windows Server 2016, VXLAN- and NVGRE-based virtual networking is used to:
7. Which of the following Windows versions and editions does NOT support RDP?
8. Which of the following is the correct description of the Hyper-V Terminology term 'emulated device'?
9. How much Physical (HOST) Memory per physical server (6X) is supported by Windows Server 2016?
10. How much Virtual Machine Memory per VM (12x) is supported by Windows Server 2016?
11. Which of the following statements is incorrect about Server Performance Advisor (SPA)?
12. Which of the following command line tools are included in the Active Directory Domain Services Tools?
13. Which of the following features are available under the Remote Access Server Role?
14. Which of the following features have been completely removed from Windows Server 2016?
15. Which of the following options are correct about the Nano Server installation option in Windows Server 2016?
16. In Windows Server 2016, which of the following are the correct requirements for running Hyper-V as a guest VM running on Hyper-V?
17. In Windows Server 2016, which of the following parameters are related to the 'essential storage hardware' fault coverage provided by Health Service?
18. In Windows Server 2016, which of the following are Software Defined Networking (SDN) technologies?
19. Which of the following command line tools are included in the File Services Remote Server Administration Tools?
20. Which of the following types of authentication are supported by Windows Hello for Business?
21. For monitoring the resource usage in the Remote Desktop (RD) gateway, which of the following performance counters are used only for legacy RPC transport?
22. Which of the following are the NEW security features that are supported by Windows Server 2016 but not by Windows Server 2012 R2?
23. Windows Server 2016 supports which of the following networking scenarios?
24. Following are the server roles that need to be migrated from Windows Server R2 2012 to Windows Server 2016. Which of the following will require a downtime to complete the migration process?
25. Which of the following areas fall under the Fabric network management part of Windows Server 2016 networking?
26. In Windows Server 2016, which of the following features are related to Software-defined networking?
27. Which of the following options are specified while requesting for an 'Updating Run' under Cluster-Aware Updating?
28. Which of the following attributes are present in a packet running under Stateful ACL rules?
29. Which of the following options are correct?
30. Which of the following statements are correct about Virtualized Domain controller cloning process?
31. In Windows Server 2016, which of the following statements are correct about BranchCache?
32. Windows Containers provide operating-system-level virtualization that allows multiple isolated applications to be run on a single system. Which of the following statements are correct regarding Windows Containers?
33. In Windows Server 2016, what is the function of the 'change' Remote Desktop (RD) services command line-tools?
34. What are the prerequisites for Storage Replica testing between two Windows Server 2016 servers?
35. Which of the following is true regarding volumes on Windows Server 2008?
36. In a Windows Server 2008 based DHCP server, what is the default value of the Lease duration for DHCP clients?
37. Which of the following parameters will you use in the 'route' command so that Windows will keep and retain the newly added route in the IP routing table even if the server is rebooted?
38. Which of the following commands will you use to take the backup of IIS Global Configuration?
39. Which of the following commands will enable Automatic Updates on Windows Server 2008?
40. An internet connection sharing and using the Windows Server 2008 as a router with NAT can be enabled on the same computer at the same time.
41. What is the maximum length of a password for either a domain or a local user account on Windows Server 2008?
42. In Windows Server 2008, which of the following replaced the 'Manage Your Server' present in Windows Server 2003?
43. How many roles does Microsoft support in the Server Core installation?
44. For which of the following protocols is support available in Windows Server 2008?
45. Which of the following utilities will you use to convert basic disks to dynamic disks?
46. Which of the following commands will you use to convert an NTFS drive to FAT or FAT32?
47. Which of the following commands will you use to configure the Windows core installation server to accept the remote connection and to designate a port for the remote connection?
48. Which of the following tools would you use to reset the Directory Services Recovery Mode (DSRM) password on a single domain controller?
49. For which of the following does the Network Policy Server in Windows Server 2008 allow you to create and enforce organization wide network access policies?
50. The jetpack.exe command is used to reduce the size of DHCP database.
51. Which of the following commands will you use to test IPv6 communication to a server?
52. Which of the following features are available under the NTFS file system, but not under the FAT or FAT32 file systems?
53. What is/are the number of RAID levels that Windows Server 2008 supports?
54. Which of the following are requirements for data compression in Windows Server 2008?
55. Which of the following EAP methods are supported by Windows Server 2008 by default?
56. You want VPN connection between your company's head office and branch offices to use end-to-end encryption to encrypt data transmission. You also want VPN connection to use only computer-level authentication instead of usernames and passwords. Which of the following will you use to accomplish this?
57. Which of the following can be used to perform database maintenance of Active Directory, manage and control single master operations and create application directory partitions?
58. Windows 2000 Professional supports IPv6.
59. How many logical drives can you create in an extended partition?
60. Your company opened a new branch office with 32 computers. You are asked to assign an appropriate subnet scheme to the new network. Which of the following subnets will accomplish this task without wasting IP addresses?
61. Which of the following methods will you use to remove the outdated DNS records from the DNS zone automatically?
62. How many primary partitions can be made on a single drive?
63. Which of the following commands will you use to take the backup of BCD in a 'C:\Backup' folder?
64. What is the maximum memory that is supported by the Windows Server 2008 Enterprise Edition running on a 64-bit processor?
65. What is the full form of AIA?
66. Which of the following should you use on a DHCP server to make sure that the DHCP server does not assign to the DHCP clients, the IP addresses which are currently in use on the network?
67. There can be more than one domain naming masters in the whole forest.
68. What will you do to allow peer-to-peer communication between all branch office computers where each branch office is protected by a firewall that performs symmetric NAT?
69. With which of the following TCP ports is the Remote Desktop Protocol designed to work?
70. Which of the following can be used by administrators to enforce health requirements for all the computers that are connected to an organization's private network?
71. Which command will you use to remove an NT Loader from the boot sequence completely?
72. You cannot uncompress a volume once it is compressed.
73. Which of the following file systems fully utilizes all the features of Windows Server 2008 such as domains and active directory?
74. Which of the following will you use to see the logon attempts (including the IP address and the user account) on the domain controller?
75. What is the full form of ADLDS?
76. Which of the following would you use to transfer all forest-wide operation master roles to another domain?
77. Which of the following roles are required to be installed on the server to configure a server as a VPN server?
78. What is the full form of RADIUS?
79. To record all inbound DNS queries to the DNS server, which of the following would you configure in the DNS Manager Console?
80. There can be only one schema master in the whole forest.
81. Which of the following configuration file settings apply to the whole server and are inherited by all .NET and IIS configuration files?
82. Which of the following can you use to create, configure, and manage volumes?
83. What is the maximum length of a username for either a domain or a local user account in Windows Server 2008?
84. In Windows Server 2016, how many VM virtual processors are supported?
85. Windows Server 2016 has a Cloud Ready Application Platform. One of its new features is: Nano Server Installation, which:
86. In Windows Server 2016, which of the following networking features are related to DNS server technologies?
87. Which of the following statements is incorrect about Remote Credential Guard?
88. Which of the following assurances is provided by Shielded VMs to encrypt disk data and provide protection to operating system's disk?
89. In the Active Directory of Windows Server 2016, which of the following options is a set of rules, which defines the classes, attributes and name format of objects present in a directory?
90. Which of the following BranchCache cmdlets configures BranchCache to operate in the hosted cache client mode?
91. In Windows Server 2016, W32tm.exe is used to configure Windows Time service settings. Which of the following W32tm.exe parameters will convert an NT system time, in (10^-7)s intervals from 0h 1-Jan 1601, into a readable format?
92. Which of the following options is a public or private cloud administrator that can manage virtual machines but does not have access to shielded VMs?
93. Which of the following Windows Server 2016 security features ensure that only permitted binaries are deployed on the server?
94. Which of the following VDI collection types are NOT supported by the Remote Desktop Services with Managed Pools and Managed Personal?
95. Which of the following are correct features of software-defined compute stack for Windows Server 2016?
96. A fault domain is a set of hardware components that share a single point of failure. Which of the following Windows Server 2016 cmdlets is used to move one fault domain into another cluster?
97. Which of the following remote access techniques provides the functionality in which the users of a corporate office can safely and securely access an office application from outside the office network?
98. Cluster-Aware Updating (CAU) is a feature in Windows Server 2016, which automates the software updating process on clustered servers while maintaining availability. It has two modes: self-updating mode and remote-updating mode. Which of the following option is/are correct?
99. Which of the following Dynamic Access Control scenarios is used to deploy and manage authorization policies in an Active Directory?
100. In Windows Server 2016, the kernel-mode web driver (http.sys) receives and routes HTTP requests. In http.sys, which setting handles the maximum size of an entry in the kernel-mode cache and which setting handles the memory allocation to the kernel-mode cache?
101. In Windows Server 2016, which of the following options is incorrect about the Active Directory administrative tier model?
102. On a Windows 10 device, which of the following is the correct way to resolve the error: 'NTE_AUTHENTICATION_IGNORED (Hex: 0x80090031)', during the PIN creation in Windows Hello?
103. Which of the following are the components of a standard shielding data file (PDK file)?
104. Which of the following networking technologies distributes traffic across several servers using the TCP/IP networking protocol?
105. In Windows Server Health Service, which of the following metrics provides info on the pool capacity that is NOT allocated to the footprint of volumes?
106. For Class B IP Address Class, which of the following is the correct bit representation of the subnet mask?
107. In Windows Server 2016, one of the failover cluster configuration is: Workgroup clusters. These are
108. In Windows Server 2016, the Active Directory administrative tier model consists of 3 levels: Tier 0, Tier 1 and Tier 2. Which of the given tiers controls the enterprise server and applications, including the server operating systems, cloud services and enterprise applications?
109. Which of the following is the absolute minimum disk space requirement for the Windows Server 2016 system partition?
110. Which of the following options are incorrect about the Server Core installation option in Windows Server 2016?
111. Which of the following command line parameters is NOT supported by the 'Get-DHASCertificateChainPolicy'cmdlet?
112. DHA on-premises service runs in either EKCert or AIKCert validation mode. Which of the following statements is incorrect about these validation modes?
113. Which of the following older versions of Windows Server are eligible for upgrade to Windows Server 2016 Datacenter edition?
114. In Windows Server 2016, which of the following virtualization technologies provides computing resources through hardware virtualization?
115. In the Active Directory Domain Services (AD DS) of Windows Server 2016, Azure AD Join feature provides:
116. Suppose that a Windows Server 2016 Hyper-V Cluster is running and it has 10 nodes, each having 512GB memory. The Active Memory Dump settings are currently running. Node 2 is currently using 5GB of memory. In case of an issue in Node 2, what will be the size of the memory dump created?
117. In Windows Server 2016, Health Service is a new feature that improves day-to-day monitoring and operational experience for clusters running Storage Spaces Direct. The related info can be fetched using the PowerShell cmdlet. Which of the given statements is/are correct regarding the following cmdlet
118. Which of the following error codes is thrown when an invalid health certificate is detected in DHA?
119. Which of the following DHA services is a free, geo-load-balanced service, which is accessible across the world?
120. In Windows Server 2016, which of the following features in Failover Clustering reduce(s) intra-cluster communication issues during increased virtual machines computation?
121. In Windows Server 2016, load balancing can be configured by the cluster common property 'AutoBalancerMode'. The following command does the same using the PowerShell. What will be the load balancing setting, if the following command is fired? (Get-Cluster).AutoBalancerMode = 1
122. Which of the following protocols is used by the Windows Time Service to help synchronize the time across a network?
123. An IT company needs to upgrade from Windows Server 2012 R2 to Windows Server 2016. They want to move to the Windows Server 2016, while staying on the same hardware. Which of the following options is best suited in this situation?
124. Which of the following features are available in Generation 2 Shielded VMs?
125. For a Windows Server 2016 acting as a File Server, which of the following REG_DWORD registry settings will be used to control the maximum number of connections to be established with a single server running Windows Server 2012 across all interfaces?
126. when fired on the command prompt in Windows Server ? Update-VmConfigurationVersionvmname or vmobject.
127. File explorer provides ____ ways to view the contents of a folder
128. You can quickly find any file, folder, or program using ____.
129. The documents folder is in the ____ folder
130. The left pane of the file explorer window is the ____ pane.
131. The default view for any folder in the pictures library is ____.
132. The three types of group policy objects (gpos) include local, domain and _____.
133. You support an IT infrastructure for an organization that has physical locations and WAN connections from the main office to each branch. You are designing a network where users at all locations have access to shared files, both online and offline. Which Windows technology is best for your design?
134. Which type ot DNS record is most commonly used in a forward lookup zone to resolve a host name to a specific IP address?
135. What can you perform to free up space on a Windows Server 2012 R2 C: drive?
136. A Windows Server 2012 R2 VM is available to use. You created an XML file that includes all the server roles and features you require for a file server. The XML tile is stored at the root of the D: drive. What PowerShell command do you run to configure the server?
137. When configuring a CA which role service provides a web interface for users to easily request and renew certificates?
138. Two companies with different names and domains are merging. What do you set up to ensure that name resolution requests are forwarded directly to the other company's authoritative server?
139. Hyper-V _ is a disaster recovery tool that replicates virtual machines from one Hyper-V host server to another in a Hyper-V Windows Server 2016 environment.
140. You have installed the Remote Desktop Services role. Which remote desktop mode comes with two built-in licenses?
141. How would you link a unique users policy made for the Human Resources Department users in your domain?
142. You've deployed a Server Core installation of Windows Server 2016. Which is NOT a way to update the server?
143. When deploying a Windows Server as a print server, which role needs to be installed?
144. Which type of DNS record is NOT specifically associated with an AD domain controller?
145. Your Hyper-V server has two physical disks installed, Disk 1 is a C: drive that hosts the Windows system files, and disk 2 is a D: drive that has no data. You need to connect the D: drive to a newly created VM using a pass-through disk configuration. What is true about the D: drive?
146. Which Windows Server technology enables replication of volumes between servers or clusters for disaster recovery?
147. You want to verify that a DHCP server has been authorized use in Active Directory. Which cmdlet do you run in Windows PowerShell?
148. You log in to the domain controller to manage some user and computer accounts in Active Directory (AS) and you cannot find the AD tools. To resolve this using the Add Roles and Features Wizard, which feature would you install without any unnecessary services?
149. You deploy Windows Server 2012 R2 server as a VPN server and must configure new firewall rules for workstation connections. Which command do you use to configure the new rules with the least amount of effort?
150. A basic DHCP server can provide clients with an IP address, subnet mask, default gateway, DNS IP address. and what other IP address?
151. When setting up a disaster recovery plan for your Hyper-V virtual machines in a System Center Virtual Machine Manager (VMM) cloud, what happens during the initial replication?
152. You want to secure your Windows server so the built-in web browser can navigate only to sites listed in Internet Explorer's 'trusted sites' list. How can you configure this security capability?
153. After adding a network printer to the Windows print server, you try to add the printer to a Windows 8 desktop client. While typing the network path to the new printer, you are unable to find it. Why is the new network printer unavailable for selection?
154. You built a container image on Nano Server. The container image has multiple layers, including a custom application built for your company, and your development team pushed the image to your Azure image registry. What happens if you attempt to pull that image to a new server with previously downloaded OS images?
155. You need to configure your DHCP server to deny certain client MAC addresses receiving an IP address. Where do you configure this setting?
156. Where can you go to restore deleted objects in Active Directory without the use of Microsoft PowerShell or ldp.exe?
157. You have a running Active Directory Certificate Services (AD CS) server and need to back up the certificate databases and private keys. How do you accomplish this?
158. You must configure set of three DNS IP addresses to be given to clients that receive IP configuration from your DHCP server. The DNS IP will apply to all DHCP created on the server. Where on your DHCP do you configure this setting?
159. You are working toward managing cross-forest certificate enrollment deployment and need to copy objects in the source forest to the target forest. How do you keep the source and target forest synchronized?
160. A company IIS server will host the corporate site, which is accessible only by company computers. You need to configure this website to SSL. You obtain certificate to install on the server. Into which certificate store should you import the server's certificate?
161. A domain GPO must apply to users based on the location of the computer to which they are logging in. You set up this ability by using which group policy feature?
162. You are planning to install a SAN that will utilize iSCSI storage. You want to provide automatic discovery, management and configuration of iSCSI devices. After running the Get-WindowsFeature * PowerShell command, which should you install?
163. When installing the AD DS server role, which will NOT be installed as part of the requited features and services for AD DS to run?
164. Which is NOT a reason to deploy a DHCP super scope in your network?
165. You prestaged a computer in Active Directory in a domain controller at company headquarters. After 30 minutes, that new computer object is still not available at the branch office domain What should you run from prompt to get a summary of the AD replication status in your domain from the perspective of all domain controllers?
166. You currently have a DHCP server issuing addresses to clients. Which task should you perform first to set up your DHCP server to dynamically issue addresses to clients on the network?
167. In the Add Roles and Features Wizard window, you are unable to remove Active Directory domain Services—the check box is greyed out. How can you remove AC DS from a Windows Server 2012 R2?
168. The first ot root server in a PKI must have the Active Directory Certificate Services installed running which role service?
169. You have shared folder on your FILESVR01 server. You want to be notified vie email when files are saved in the folder. How do you automate this task?
170. What you use to implement a secure hardware store for your CA keys?
171. You are deploying a highly available file server using a Hyper-V cluster configuration. After creating the cluster, why must you add d disk as a cluster shared volume (CSV)?
172. When setting up a new RADIUS client, what piece of information verifies a secure and trusted connection with the RADIUS server?
173. You run a script to encrypt a client computer's hard drive with BitLocker and back up the recovery password to Active Directory. When researching the computer object's properties, you cannot find the BitLocker recovery password. What may be the cause?
174. After running the PowerShell cmdlet Add-WindowsFeature Adcs-Cert-Authority -IncludeManagementTool on a Windows Server 2016 server, which command will make it a Root Certificate Authority (CA)?
175. A set of computer and user settings can be applied to multiple clients and servers in a domain through the use of ___.
176. What is the Microsoft implementation of a RADIUS server?
177. After installing the active directory domain services role to your windows server 2016 OS, how do you promote the server to a domain controller using the GUI?
178. You want to host two virtual machines on the same physical server. Their memory settings in Hyper-V are set to optimize the use of physical memory for each virtual machine. What makes this optimization possible?
179. In a two-tier hierarchy CA design, what is a common security best practice?
180. Group policy objects are not being applied to domain controllers because the Default Domain Controllers and Default Domain group policies are corrupt. What can you run in a command prompt to recover them?
181. You set up a storage area network that makes use of iSCSI storage. You then install the iSNS Server service feature on Windows Server 2012 R2. Why do you need this feature?
182. What type of CAs must be domain members and are typically online to issue certificates or certificate policies?
183. Windows Server 2012 R2 server has two network adapters. You are required to configure load balancing on a pair of network adapters. Which management console would you use to accomplish this task?
184. Using Storage Pools under Files and Storage Services, you configure a mixture of SSD (solid state disk) and HDD (hard disk drive) for tiered storage by creating what?
185. Your organization has the main datacenter on the west side of North America. A secondary site is located on the east side, where data is replicated from west to east. During a disaster recovery, your organization can pick up operations at the east datacenter in about one to two hours. In an official disaster recovery plan document, the east datacenter is referred to as what type of site?
186. You currently have a Windows Server 2008 R2 print server named PRT01. You deploy a Windows Server 2012 R2 print server named PRT02. How do you begin the migration process?
187. Your organization wants to design a disaster recovery plan with two geographical sites. The two sites must be up in an active/active configuration, and some or all services should be able to failover seamlessly. Which Storage Replica configuration would you setup with your Windows Server 2016 systems?
188. You are working toward managing a cross-forest certificate enrollment deployment and need to copy objects in the source forest to the target forest. How do you keep the source and target forst synchonized?
189. When you open a program, a defined work area, referred to as a ____, appears on the screen.
190. When you save an existing file, the ____ dialog box does not open.
191. You can use ____ to scroll through a preview of your open windows.
192. The synthetic network adapter in the child partition is a(n) ________.