{"id":420,"date":"2018-11-14T15:41:09","date_gmt":"2018-11-14T14:41:09","guid":{"rendered":"https:\/\/cybercop-training.ch\/?p=420"},"modified":"2018-11-14T15:41:09","modified_gmt":"2018-11-14T14:41:09","slug":"mcsa-70-740-exam-preparation-p12","status":"publish","type":"post","link":"https:\/\/cybercop-training.ch\/?p=420","title":{"rendered":"MCSA 70-740 Exam Preparation P12"},"content":{"rendered":"<p><strong>MCSA 70-740<\/strong><\/p>\n<p><strong>Topic: Manage and monitor server environments<\/strong><\/p>\n<p>Your network includes a server called Server1. Server1 has the Windows Server 2016 operating system and the IP Address Management Server (IPAM) feature installed.<\/p>\n<p>You must change the GPO prefix that IPAM uses.<\/p>\n<p>What do you do?<\/p>\n<p>Answer: <strong>Run the Set-IpamConfiguration cmdlet.<\/strong><\/p>\n<p><a href=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/11\/ipam1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-423\" src=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/11\/ipam1-1024x349.png\" alt=\"\" width=\"1024\" height=\"349\" srcset=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/11\/ipam1-1024x349.png 1024w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/11\/ipam1-300x102.png 300w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/11\/ipam1-768x262.png 768w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/11\/ipam1.png 1838w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<hr \/>\n<p>Your network includes an Active Directory overall structure called cybercop-training.ch. The overall structure includes a single domain with four domain controllers. The Windows Server 2016 operating system is installed on all domain controllers.<\/p>\n<p>You must determine which domain controller is running the Schemamaster operation master role.<\/p>\n<p>1: You run the netdom query fsmo command.<\/p>\n<p>Does the procedure meet your goal?<\/p>\n<p>Answer: Yes<\/p>\n<p><a href=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/11\/net_dom_query.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-424\" src=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/11\/net_dom_query.png\" alt=\"\" width=\"698\" height=\"472\" srcset=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/11\/net_dom_query.png 698w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/11\/net_dom_query-300x203.png 300w\" sizes=\"auto, (max-width: 698px) 100vw, 698px\" \/><\/a><\/p>\n<hr \/>\n<p>Your network includes an Active Directory domain services (AD DS) domain called cybercop-training.ch. The domain contains a server named Server1. Server1 has the Windows Server 2016 operating system installed.<\/p>\n<p>You install the IP address management server (IPAM server) feature on Server1. You select the Group Policy-based deployment method and specify a prefix for the IPAM GPOs.<\/p>\n<p>You must configure the environment for automatic server discovery.<\/p>\n<p>What cmdlet are you running?<\/p>\n<p><a href=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/11\/ipam2-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-426\" src=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/11\/ipam2-1-1024x175.png\" alt=\"\" width=\"1024\" height=\"175\" srcset=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/11\/ipam2-1-1024x175.png 1024w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/11\/ipam2-1-300x51.png 300w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/11\/ipam2-1-768x132.png 768w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2018\/11\/ipam2-1.png 1535w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<p>Answer: <strong><code>Invoke-IpamGpoProvisioning -Domain \"cybercop-training.ch\" -GpoPrefixName \"IPAM1\"<\/code><\/strong><\/p>\n<hr \/>\n<p>Your network includes a complete Active Directory structure called cybercop-training.ch. The overall structure contains a member server with the name Server1. The Windows Server 2016 operating system is installed on Server1. Server1 is located in the company&#8217;s area network.<\/p>\n<p>You install the Active Directory network services (AD FS) on Server1. You create a federated server farm and use a certificate with the common name sts.certbase.de.<\/p>\n<p>You must enable certificate-based authentication for Internet clients.<\/p>\n<p>Which two incoming TCP ports do you open on the firewall?<\/p>\n<p>Answer: <strong>Port 443 and Port 49443<\/strong><\/p>\n<hr \/>\n<p>Your network includes an Active Directory domain services (AD DS) domain called certbase.de. The domain contains a DNS server named Server1.<\/p>\n<p>You enable the Response Rate Limiting (RRL) security feature on Server1.<\/p>\n<p>You must prevent Response Rate Limiting (RRL) from being applied to hosts on the 10.0.0.0\/24 subnet.<\/p>\n<p>What cmdlets do you run?<\/p>\n<p>Answer:<\/p>\n<p>First Cmdlet: <code><strong>Add-DnsServerClientSubnet<\/strong><\/code><br \/>\nSecond cmdlet:<strong><code> Set-DnsServerResponseRateLimitingExceptionlist<\/code><\/strong><\/p>\n<hr \/>\n<p>You are deploying DirectAccess (DA) on a server named DA1. DA1 is behind a firewall and has a single network adapter. DA1 uses Internet Protocol version 4 (IPv4) to communicate with clients.<\/p>\n<p>You must configure the firewall to support DirectAccess.<\/p>\n<p>What firewall rules do you create for network communication with DA1?<\/p>\n<p>Answer:<\/p>\n<p><strong> Teredo traffic: UDP 3544<\/strong><br \/>\n<strong>6to4 data traffic: IP protocol ID 41<\/strong><br \/>\n<strong>IP-HTTPS: TCP 443<\/strong><\/p>\n<hr \/>\n<p>Your network includes multiple Hyper-V servers that provide 50 Web servers, 10 Microsoft SQL Server servers, 10 file servers, and eight domain controllers.<\/p>\n<p>You need to design a virtual machine backup solution. Your solution must meet the following requirements:<\/p>\n<p>All servers must be backed up.<br \/>\nThe solution must provide centralized management of backups.<br \/>\nThe solution must enable application-level backups.<br \/>\nThe solution must support bare-metal recovery (BMR).<\/p>\n<p>Answer: <strong>Microsoft Azure Backup Server<\/strong><\/p>\n<hr \/>\n<p>You have a file server with the name Server1. Server1 is running Windows Server 2016. Server1 is configured to monitor object access attempts.<\/p>\n<p>You must filter the Security event log to see all log entries that refer to a user named User1.<\/p>\n<p>What do you do?<\/p>\n<p>Answer: <strong>Click with the right mouse button on the security log and then on &#171;Filter current log&#8230;&#187;. In the &#171;Filter current log&#187; dialog, enter a value in the User field.<\/strong><\/p>\n<hr \/>\n<p>You have a server called Server1. Server1 runs the Windows Server 2016 operating system.<\/p>\n<p>An application named App1 is installed on Server1. App1 writes entries to the application log if errors occur. The events have IDs 111 or 112.<\/p>\n<p>You must restart the service each time one of these events is logged.<\/p>\n<p>What do you do?<\/p>\n<p>Answer: <strong>Use the Create Task&#8230; action in task scheduling and create a task that contains triggers for both event IDs.<\/strong><\/p>\n<hr \/>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>MCSA 70-740 Topic: Manage and monitor server environments Your network includes a server called Server1. Server1 has the Windows Server 2016 operating system and the <a class=\"mh-excerpt-more\" href=\"https:\/\/cybercop-training.ch\/?p=420\" title=\"MCSA 70-740 Exam Preparation P12\">[&#8230;]<\/a><\/p>\n<\/div>","protected":false},"author":2,"featured_media":307,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21,20],"tags":[],"class_list":["post-420","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-exam-preparation","category-system-administration"],"_links":{"self":[{"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=\/wp\/v2\/posts\/420","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=420"}],"version-history":[{"count":3,"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=\/wp\/v2\/posts\/420\/revisions"}],"predecessor-version":[{"id":428,"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=\/wp\/v2\/posts\/420\/revisions\/428"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=\/wp\/v2\/media\/307"}],"wp:attachment":[{"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=420"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=420"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=420"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}