{"id":413,"date":"2018-11-14T15:40:55","date_gmt":"2018-11-14T14:40:55","guid":{"rendered":"https:\/\/cybercop-training.ch\/?p=413"},"modified":"2018-11-14T15:40:55","modified_gmt":"2018-11-14T14:40:55","slug":"mcsa-70-740-exam-preparation-p11","status":"publish","type":"post","link":"https:\/\/cybercop-training.ch\/?p=413","title":{"rendered":"MCSA 70-740 Exam Preparation P11"},"content":{"rendered":"<p><strong>MCSA 70-740<\/strong><\/p>\n<p><strong>Topic: Manage and monitor server environments<\/strong><\/p>\n<p>You install a new Nano Server with the name Nano1. Nano1 is member of a working group and has the IP address 192.168.1.10.<\/p>\n<p>You are using a server named Server1. The operating system Windows Server 2016 is installed on Server1.<\/p>\n<p>You must create a remote PowerShell session with Nano1 from Server1.<\/p>\n<p>How do you complete the PowerShell script shown in the figure?<\/p>\n<p><a href=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/11\/monit1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-414\" src=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/11\/monit1-1024x390.png\" alt=\"\" width=\"1024\" height=\"390\" srcset=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/11\/monit1-1024x390.png 1024w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/11\/monit1-300x114.png 300w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/11\/monit1-768x292.png 768w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/11\/monit1.png 1561w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<p>Answer:<\/p>\n<p>P1: <strong>Set-Item<\/strong><\/p>\n<p>P2: <strong>Enter-PSSession<\/strong><\/p>\n<hr \/>\n<p>You must create a data collector set that meets the requirements for creating the processor usage report.<\/p>\n<p>What command do you run to create the data collector set?<\/p>\n<p>Answer: <code><strong>l<\/strong><span id=\"lblA2\"><b>ogman<\/b> create <b>counter<\/b> perf_log -c \"\\Process(_Total)\\% Processor Time\" -max 10 -rf 05:00:00<\/span><\/code><\/p>\n<hr \/>\n<p>Your network contains a server named Server1. Server1 has the Windows Server 2016 operating system installed.<\/p>\n<p>An application named App1 is installed on Server1. App1 logs errors in the event log application. The event IDs are either 111 or 112.<\/p>\n<p>You must ensure that a service is restarted when one of these events occurs.<\/p>\n<p>Answer: <strong>Use Event Viewer and run the Simple Tasks wizard for each of the two event IDs.<\/strong><\/p>\n<hr \/>\n<p>You plan to use Windows Server Backup to back up data to Server1. You create a new volume on Server1.<\/p>\n<p>You must ensure that the new volume can be used as the backup destination. The backup target must support incremental backups.<\/p>\n<p>1: You provide the volume in the path C:\\Backups and format it with the file system FAT32<\/p>\n<p>Does this match your goal?<\/p>\n<p>Answer: No<\/p>\n<hr \/>\n<p>Your network includes two Windows Server 2016 computers named Server1 and Server2. The two servers are separated by a firewall. The Windows Server Update Services (WSUS) are installed on both servers.<\/p>\n<p>Server1 synchronizes updates from the Microsoft Update Servers.<\/p>\n<p>You want to configure Server2 to synchronize updates from Server1.<\/p>\n<p>Which port do you open in the firewall on Server1?<\/p>\n<p>Answer: <strong>Port 8530<\/strong><\/p>\n<hr \/>\n<p>Your network includes a Windows Server 2016 computer named Server1. Windows Defender is enabled on Server1.<\/p>\n<p>Server1 runs an application that stores different file types in Microsoft One Drive and Microsoft SharePoint Online. App1 also interacts with multiple local services.<\/p>\n<p>You must prevent Windows Defender from scanning files opened by App1.<\/p>\n<p>Which step do you perform on Server1?<\/p>\n<p>Answer: A<strong>dd a process exclusion to the Windows Defender settings.<\/strong><\/p>\n<hr \/>\n<p>You must ensure that the WSUS downstream servers can successfully synchronize updates from the WSUS upstream server. Synchronization traffic must be transmitted in encrypted form.<\/p>\n<p>What do you do?<\/p>\n<p>Answer:<strong> Create a firewall rule to allow port 8531 TCP.<\/strong><\/p>\n<hr \/>\n<p>Whenever App1 uses more than 4 GB of memory, you must log an entry in the application log.<\/p>\n<p>1: You create a data collector replacement for a counter warning.<\/p>\n<p>Does the procedure meet your goal?<\/p>\n<p>Answer: <strong>Yes<\/strong><\/p>\n<p>2: You create a data collector set for event tracing.<\/p>\n<p>Does the procedure meet your goal?<\/p>\n<p>Answer: <strong>No<\/strong><\/p>\n<hr \/>\n<p>On Server1, you use the template collector set Basis to create a new collector set named Data Collector Set1.<\/p>\n<p>You must configure Data Collector Set1 to generate counter alerts.<\/p>\n<p>What do you do before you start Data Collector Set1?<\/p>\n<p>Answer: <strong>Add a new data collector to Data Collector Set1<\/strong>.<\/p>\n<p><a href=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/11\/monit2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-415\" src=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/11\/monit2-1024x781.png\" alt=\"\" width=\"1024\" height=\"781\" srcset=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/11\/monit2-1024x781.png 1024w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/11\/monit2-300x229.png 300w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/11\/monit2-768x586.png 768w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/11\/monit2-80x60.png 80w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/11\/monit2.png 1480w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<hr \/>\n<p>Your network includes a file server named Server1. Server1 has the Windows Server 2016 operating system installed.<\/p>\n<p>Server1 is configured to monitor object access attempts.<\/p>\n<p>You must filter the Security protocol so that only the log entries for a user named User1 are displayed.<\/p>\n<p>What do you do?<\/p>\n<p>Answer: <strong>First click with the right mouse button on the Security protocol and then on Filter current protocol&#8230;. On the Filter tab, specify a value for the User field.<\/strong><\/p>\n<hr \/>\n<p>Your network includes an Active Directory domain services (AD DS) domain called cybercop-training.ch. The domain contains two servers named Server1 and Server2. The Windows Server 2016 operating system is installed on both servers.<\/p>\n<p>Server1 has the IP address management server (IPAM server) feature installed. Server2 has Microsoft System Center 2016 Virtual Machine Manager (VMM) installed.<\/p>\n<p>You want to integrate IPAM into VMM.<\/p>\n<p>What objects do you create on each of the two servers?<\/p>\n<p><a href=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/11\/monit1-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-418\" src=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/11\/monit1-1.png\" alt=\"\" width=\"948\" height=\"461\" srcset=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/11\/monit1-1.png 948w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/11\/monit1-1-300x146.png 300w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/11\/monit1-1-768x373.png 768w\" sizes=\"auto, (max-width: 948px) 100vw, 948px\" \/><\/a><\/p>\n<p>Answer:<\/p>\n<p><strong>Server1: Access policy<\/strong><br \/>\n<strong>Server2: Network service<\/strong><br \/>\n<strong>Server2: &#171;Run as&#187; account<\/strong><\/p>\n<hr \/>\n<p><span id=\"lblFrage\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>MCSA 70-740 Topic: Manage and monitor server environments You install a new Nano Server with the name Nano1. Nano1 is member of a working group <a class=\"mh-excerpt-more\" href=\"https:\/\/cybercop-training.ch\/?p=413\" title=\"MCSA 70-740 Exam Preparation P11\">[&#8230;]<\/a><\/p>\n<\/div>","protected":false},"author":2,"featured_media":307,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21,20],"tags":[],"class_list":["post-413","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-exam-preparation","category-system-administration"],"_links":{"self":[{"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=\/wp\/v2\/posts\/413","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=413"}],"version-history":[{"count":4,"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=\/wp\/v2\/posts\/413\/revisions"}],"predecessor-version":[{"id":422,"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=\/wp\/v2\/posts\/413\/revisions\/422"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=\/wp\/v2\/media\/307"}],"wp:attachment":[{"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=413"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=413"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=413"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}