1.
Your network contains a domain-based Distributed File System (DFS) namespace named \\contoso.com\DFS1. You have two servers named Server1 and Server2 that are configured as namespace servers for \\contoso.com\DFS1. You need to verify that the DFS namespace replicates successfully between Server1 and Server2. Which tool should you use?
2.
Your network contains a server that runs Windows Server 2008 R2. Windows BitLocker Drive Encryption (BitLocker) is enabled for all drives. You need to perform a bare metal recovery of the server. What should you do first?
3.
Your network contains a server named Server1 that runs a Server Core installation of Windows Server 2008 R2. The network contains a client computer named Computer1 that runs Windows 7. You need to ensure that you can collect events from Server1 on Computer1. What should you run on Server1?
4.
Your company has an Active Directory domain that has two domain controllers named DC1 and DC2. You prepare both servers to support event subscriptions. On DC1, you create a new default subscription for DC2. You need to review system events for DC2. Which event log should you select?
5.
Your network contains a server named Server1 that runs Windows Server 2008 R2. Server1 has the Remote Access Service role service installed. Server1 is configured as a VPN server. You need to ensure that you can configure Server1 as a Network Address Translation (NAT) server. What should you do first on Server1?
6.
Your network contains two servers named Server1 and Server2. Server1 and Server2 run the Server Core installation of Windows Server 2008 R2. You need to duplicate the Windows Firewall configurations from Server1 to Server2. What should you use?
7.
Your network contains two Active Directory sites named Site1 and Site2. Site1 contains a server named Server1. Server1 runs a custom application named App1. Users in Site2 report that they cannot access App1 on Server1. Users in Site1 can access App1. Server1 has a Windows Firewall with Advanced Security rule named Rule1. You discover that Rule1 blocks the connection to App1. You verify that Server1 has no connection security rules. You need to ensure that the Site2 users can connect to Server1. What should you modify in Rule1?
8.
Your network contains an Active Directory domain. The domain contains a member server named Server1. Server1 has a single network connection. You need to log every attempt to connect to Server1 on a restricted port. What should you do?
9.
Your network contains a server named Server1 that has Windows Server 2008 R2. An administrator runs the following command on Server1: netsh.exe advfirewall reset You discover that you can no longer access Server1 on port 3389. You need to ensure that you can access Server1 on port 3389. Which firewall rule should you enable?
10.
Your network contains two servers named Server1 and Server2 that run Windows Server 2008 R2. Server1 has several custom inbound rules and connection security rules. You need to duplicate the Windows Firewall rules from Server1 to Server2. What should you do on Server1?