Zacker book, Chapter 11

This chapter I found to be interesting but also some what lacking in overall content. I may or may not need to know about the RFCs
associated with DHCP but I did appreciate that the author included that basic scope of DHCP messages. Which can be viewed online
here and I would honestly recommend reading every one of those
articles and be prepared to understand what scopes look like when looking at a range of addresses. Overall not as bad as the last chapter
on subnetting.

Please read the header for this post
regarding the answer key situation for these chapters.

1. Which of the following message types is not used during a successful DHCP address assignment?

A. DHCPDISCOVER

B. DHCPREQUEST

C. DHCPACK

D. DHCPINFORM

Answer: D, this is used when a client machine decides it needs to request more information.

2. Which of the following is not one of the techniques you can use to provide fault tolerance for DHCP servers?

A. Splitting scopes

B. Using stand-by servers

C. DHCP servers using identical scopes

D. Failover clustering

Answer: B, to be honest im not sure what they are talking about. Like have an unauthorized but prepared dhcp server that you
can manually plug in when one fails? Thats not exactly fault tolerance because it requires a manual throwing of a
switch so to speak.

3. Which of the following DHCP infrastructure designs requires the largest number of DHCP server implementations?

A. Hybrid

B. Centralized

C. Dynamic

D. Distributed

Answer: D, the method described as distributed in the book requires the largest number of servers.

4. Which of the following types of DHCP addresses allocation is the equivalent of a reservation in Windows Server 2012?

A. Dynamic Allocation

B. Automatic Allocation

C. Manual Allocation

D. Hybrid Allocation

Answer: C, a reservation is also known as a Manual Allocation of an IP address

5. Which of the following DHCP message types is sent first in process of obtaining an address lease?

A. DHCPOFFER

B. DHCPACK

C. DHCPDISCOVER

D. DHCPPREQUEST

Answer: D if obtaining an address for the first time, which seems to be the case here, if renewing D

6. At which layer of the OSI model does DHCP operate?

A. Session layer

B. Network layer

C. Application layer

D. Presentation layer

Answer: C, DHCP operates on the application layer. I found this to be a little confusing but maybe this paragraph from an online
book available in pdf form will help DHCP is an application-layer protocol that together enable administrators to dynamically
allocate IP addresses from a pool. Computers equipped with DHCP clients automatically
contact a DHCP server when they start, and the server assigns them unique addresses and all
the other configuration parameters the server is configured to provide.

7. A DHCP client first attempts to reacquire its lease at half the lease time, which is known as:

A. DHCP reservation

B. T1

C. T2

D. DHCP lease

Answer: B, T1 is what a half life for DHCP is known as

8. The following is an administrative grouping of scopes that is used to support multiple logical subnets on a single network
segment:

A. Host

B. Scope

C. Superscope

D. multinet

Answer: C, the question is describing a superscope.

9. The following is a hexadecimal address that is uniquely associated with a specific Network Interface Card (NIC):

A. MAC

B. JET

C. BOOTP

D. IETF

Answer:A, they are, in this case, describing a MAC address.

10. Which of the following network components are typically capable of functioning as DHCP relay agents?

A. Windows 8 computers

B. Routers

C. Switches

D. Windows Server 2012 computers

Answer: B is the answer but given that this is multiple choice D is also true.

Zacker book, Chapter 10

I consider any thing involving IP technology to be among the most difficult subjects on the server test. I’ve also found book material
to often times be severely limiting. Most of the time when learning these technologies I have submitted to 3rd or independent people who,
like my self have found them selves to be in the position of a student. There are TechNet articles that are helpful but unless you have
your bearings pretty well sorted in the world of ip even these can be difficult to navigate through to a complete understanding of the technology
in the same way if you simply read a powershell article without any understanding of what powershell is or how to use it the ideas seem
either ignorantly simple or with a fleeting concept overwhelmingly complex. Microsoft does have some amazing resources for powershell in
the form of hosted videos and I would encourage you to seek that series out and watch every one of them while taking notes, backing up
and then rewatching the scripts in action. They also did a great job of keeping them interesting in more ways that just the obvious.

That aside, im going to struggle through trying to make the most of these next few chapters and hope that I learn a few things a long
the way.

Please read the header for this post
regarding the answer key situation for these chapters.

1.Which of the following is the primary method for transmitting IPv6 traffic over an IPv4 network?

1. Subnetting

2. Tunneling

3. Supernetting

4. Contracting

Answer: B, tunneling by use of translation technologies
such as ISATAP and teredo. For any thing involving understanding subnetting I recommend a video seires named
subnetting demystified. Ive probably recommended it before but im putting it here as well. I could stand to rewatching
the whole thing again.

2. Which of the following is the IPv6 equivalent to a private IPv4 address?

A. Link-local unicast address

B. Global unique unicast

C. Unique local unicast address

D. Anycast address

Answer: C, again this is some complex things that we are dealing with that go beyond the check boxes and basic definitional ideas
combined with conceptual scenarios. This is a whole new world and these basic definitions are just a part of it. I found a couple
helpful things, first This
article and second the video below. I must admit that at the time of writing this I didnt watch the entire thing but after geting
about half way through I realized that it was really good, worth sharing and that I should finish watching it at some point sooner
rather than later.

3. Which of the following is an automatic tunneling protocol used by Windows operating systems that are located behind NAT routers?

A. Toredo

B. 6to4

C. ISATAP

D. APIPA

Answer: A, Toredo is for clients behind NAT routers.

4. What subnetmask would you use when configuring a TCP/IP client with an IPv4 Address on the 172.16.32.0/19 network?

A. 255.224.0.0

B. 255.240.0.0

C. 255.255.224.0

D. 255.255.240.0

E. 255.255.255.240

Answer:C, im not the best at explaining this but if you search google for a subnetting cheat sheet and watch the previously mentioned videos
it sort of makes sense. At first I was convinced that all these numbers where random until I used a calculator that told
me some thing different. This is also sort of an easier question than what you could see tested.

5. What are the classes of IPv4 addresses use to provided support for networks?

A. Class A

B. Class A & B

C. Class A, B & C

D. Class A, B, C & D

Answer: C, if you dont know this one you will find the previous question as hard as some of the questions that are on the actual test
you know if this where a relative equation.

6. How does Classless inter-domain router (CIDR) help reduce waste of IP name space?

A. Uses a subnetting method also called variable length subnet masking

B. Uses a subnetting method that divides between network bits and host bits at any location, not just between octets.

C. Uses NAT

D. Converts between IPv4 and IPv6

Answer: B, this one is also super easy and if your unsure of it you will have a real hard time with actual questions. At least from
my experience. If we go back to the drawing example we would probably be drawing similey faces at this point. Maybe one of
those pirates from the art school by mail program.

7. There are three alternatives to assigning an IPv4 address Two are manual configuration and DHCP. What is the third?

A. Automatic Private IP Addressing (APIPA)

B. Network Address Translation (NAT)

C. Automatic Public Addressing (APA)

D. Group Policy

Answer: A, I would have liked to put more links in here but unfortunately there are not a lot of individual pages for these
ideas. Here is the MSFT article on this
subject.

8. Instead of the four 8-bit decimal numbers separated by periods that IPv4 uses, IPv6 addresses use a notation called ______?

A. Hexidecimal fold

B. Double-colon format

C. Bi-octet

D. Colon-hexadecimal format

Answer: D, this doesnt seem like an overly important note. Its possibly a good thing to know but again I found this section to
to be completely under whelming in terms of useful information. Its like getting a juice box for lunch.

9. What does s double-colon in an IPv6 address signify?

A. Two or more 8-bit blocks of ones

B. Abbreviated form, leaving our company ID

C. Two consecutive 8-bit blocks of zeros

D. The division between subnet mask and host ID

Answer: C, it can only be used once in an address. This is a decent forumesque article that seems to explain
the concept moderately well.

10. What is the stateless address auto-configuration process during a windows computer start?

A. The computer assigns its self an anycast address

B. The computer pings for a DHCP address

C. The computer assigns itself 192.168.1.0

D. The computer assigns itself a link-local unicast address

Answer: D, then it starts looking for DHCP using this process.

Zacker book, Chapter 9

Well, I thought about taking a break but this is fun. I had a goal to try and get the book multiple answer multiple choice questions
done in time to have a chance to review Measure-up test prep questions (the best study resource for any tech test) as well. Im thinking
if I hurry I may have a day or two to set up the possible new wordpress site for Stevie B’s Chicken A La King A La Carte. I cant wait to
try and format some actual HTML that possibly responds to the more in depth code from Codecademy
and a few other places have listed. Nothing overly complicated but it would be nice to implement tables.

Well in the process of writing this I did get the wordpress site set up and all the tumblr posts ported over. So far a much better format
than what I was previously using. I got a book on HTML and CSS from my local library hopefully ill figure out how to do some interesting
things with the header and body links. I dont think its that hard, I just think I dont know how to do it. More computer learning fun! Now that im looking at it theres more capitalization errors to fix in keeping with a theme and the reference to a post on tumblr that ill need to manually update but it shouldnt take too long.

I suppose that one other thing that could be helpful in this process, as opposed to just displaying questions is to throw in a few chapter
notes. You could read any book you like and get similar ideas but I suposse this is for me. Any way I think that an indepth understanding of the
osi model is some thing that’s often overlooked so as a prerequisite to these exams so here is a link
to Microsoft’s example or teaching methodology as to the meaning of each layer. This is by no means the only example thats avalible or nessesarly the
best example that is provided through the internet but it is a method of understanding. That said we are studying for a Microsoft test so it could be
good to review their material. That aside I have found this book to be slightly standout among the 2 other books ive consumed along with
countless TechNet articles on possibly every technology I’ve studied so far. The only thing Ive found lacking from technet is a true concept
on the full grasp of how complex DHCP can get.

Please read the header for this post
regarding the answer key situation for these chapters.

1. Which of the following are valid reasons for using an emulated network adapter rather than a synthetic one?

A. You want to install the guest os using a WDS server.

B. There is no Guest Integration Services package available for the guest OS you plan to use.

C. The manufacture of your physical network adapter has not yet provided a synthetic network adapter driver.

D. The emulated network adapter provides better performance.

Answer: A, B, this one gets a little tricky as using a WDS server is PXE booting and thats more commonly discussed, in addendum
to that to use the better performing synthetic network adapter over an emulated (legacy) adapter you have to have integration
services available to your OS.

2. Which of the following statements is not true about synthetic network adapters?

A. Synthetic adapters communicate with the parent partition using the VMbus.

B. Synthetic adapters require the Guest Integration Services package to be installed on the guest OS.

C. Synthetic adapters provide faster performance than emulated adapters

D. Synthetic adapters can start the child VM using a PXE network boot.

Answer: D, you cannot PXE boot from a synthetic network adapter, that requires a legacy NIC.

3. What is the maximum number of ports supported by a Hyper-V virtual switch?

A. 8

B. 256

C. 4,096

D. unlimited

Answer: D, this one proved to be googleable and while it is helpful information some actual Microsoft source material
would be nice as this
page about virtual switches proves to be less than helpful. However this blog post
from 2008 seems to indicate that the answer is indeed true, it would still be nice to find some easily searchable
“official” material on the subject.

4. Which of the following virtual switch types does not enable guest OSs to communicate with the parent partition?

A. External

B. Internal

C. Private

D. Isolated

Answer: D, I found this non-official and ad laden documentation to be helpful in a narrative sense.
It does a good job of explaining some things that perhaps the MSFT documentation doesn’t do so good at. It also demonstrates the problem of
linguistics used, for example, they say “host” when implying what the author is calling the parent partition on this care.

5. How many dynamically assigned MAC addresses can a Hyper-V server provide by default?

A. 8

B. 256

C. 4096

D. Unlimited

Answer: B, however this is a configurable setting so you have have more or less as well as specify a specific range
(for more information on configuring that check here
or in certain cases, such as DHCP errors, you will want a static MAC address

This video is helpful, and covers several topics from this chapter so it could be worth it to watch if you
can get past this guys manor of speaking. He does actually use the software and its not silent so he gets extra youtuber bonus
points for being awesome.

6. You can create virtual switches after what role is installed?

A. Hyper-V

B. Application Server

C. Remote Access

D. Network Policy and Access Services

Answer: A, virtual switches are created in the Hyper-V management console.

7. Creating the default virtual switch places it between ________ & _______

A. The physical switch the network adapter in the host operating system

B. The virtual adapter; the network adapter in the host operating system

C. The network adapter; the virtual adapter in the host operating system

D. The physical switch; the next upstream physical switch

Answer: A, I had to google this one and I still think it requires explanation or at least is worded poorly because I dont
think of “physical switch” as being a NIC card on a computer. Perhaps it could read more like the
MSFT documentation.
This image on that page stands out in particular with reference to that question, the answer that seems
correct would be C if it was implying the virtual adapter connecting to the virtualized machine.

 photo IC619544_zps86ywf260.jpeg

8. How do you create a virtual switch for the purpose of isolating virtual machines (VMs)?

A. You create an external virtual switch

B. You create an internal virtual switch

C. You create a private virtual switch

D. You cannot isolate a VM from the external network

Answer: C, This is also worded somewhat strangely but we can instantly rule out A and D and possibly B assuming (which
doesn’t always work out) that it doesn’t need to communicate with the host. See the question before this one with the
non Microsoft documentation about this issue.

9. Which is faster, synthetic adapters or emulated adapters?

A. Synthetic, because it doesn’t correspond to a real world device

B. Emulated, because it is legacy and more compatible

C. Synthetic because it uses the VMBus

D. Emulated because it uses the VMBus

Answer: C, this one gets confusing with terminology as well. Legacy NIC is what ive most commonly read and heard when
speaking of an emulated network adapter. Thankfully at least the answer has that helpful reminder. A sounds like
nonsense but you cant always trust how some thing sounds however given what we understand about Hyper-V C clearly
makes the most sense.

Zacker Book, Chapter 8

Not entirely through with reading this chapter but I have made it about half way through this text from appearance and page number which I suppose makes sense
since im half way through the book chapter wise. Really happy with the progress ive made so far. Hopefully the answers are correct and the links are helpful
and appropriate. I get a little concerned when reaching any farther back than the start of 2012 but some times theres not really a better a option. This is also
a good time to take few days off from bogging so that I can finish reading the book. Im also moving this to a wordpress site as Im not convinced that Tumblr is
the best place to host some thing like this. Birthday present from the family. Excited to do more with the coding in the future. Having more fun with it than I
ever thought I would. Went the rout of an admin because I thought I hated coding so much. Took a similar route in art school. Who knows maybe Ill be a code monkey
in the future.

Edit: almost forgot to add this, still need to edit the first post with the “editor” text from chapter 3. Please read the header for this post
regarding the answer key situation for these chapters.

1. Which of the following statements about VHDX files is/are true?

A. VHDX files can be as large as 64 TB.

B. VHDX files can only be opened by computers running Windows Server 2012.

C. VHDX files support larger block sizes than VHD files.

D. VHDX files support 4kb logical sectors.

Answer: All of them are true. The book wording for the question is a bit sketchy however all of the above
statements are true about VHDX files according to the text and several google articles I just read through.

2. Which of the following must be true about a pass-through disk?

A. A pass-through disk must be offline in the guest OS that will access it.

B. A pass-through disk must be offline in the parent partition of the Hyper-V server.

C. A pass-through disk can only be connected to a SCSI controller.

D. A pass through disk must be added to a VM with the disk management snap in.

Answer: B, the pass-through disk must be available on the hyper V host and offline in order for the VM to be able to
access it for more information check out this TechNet Article

3. The merge function only appears in the Edit Virtual Hard Disk Wizard under which of the following conditions?

A. When you select a VHDX file for editing.

B. When you select two or more disks for editing.

C. When you select a disk with free space available in it.

D. When you select a differencing disk for editing

Answer: D, merge combines a differencing disk and a parent disk but you have to select the differencing disk first, this
one is available in the other text for reference checking. Any way, heres an older article for information on how to
create a merged differencing disk

4. Which of the following are valid reasons not to take snapshots of VMs? (choose all that apply)

A. Snapshots can consume a large amount of disk space.

B. Each snapshot requires a separate copy of the VMs memory allocation.

C. Each snapshot can take several hours to create.

D. The existence of snapshots slows down VM performance.

Answer: A, D according the the cross checked material. While deciding to google question 9 I found this answer listed there as well.

5. Which of the following is not required to add Fibre Channel adapter to Hyper-V?

A. You must create a Fibre Channel virtual SAN.

B. You must have a physical Fiber Channel adapter installed in the host computer.

C. You must have a Fibre Channel adapter driver that supports virtual networking.

D. You must have a SCSI cable connecting the Fibre Channel adapter to the storage devices.

Answer: D, SCSI cables are obviously not required for a for a Fiber Channel adapter.

6. What Server Manager tool allows you to create a new virtual hard disk (VHD)?

A. Hyper-V server

B. Active Directory Domain Services (AD DS) manageability

C. Hyper-V Manager

D. File and storage services

Answer: C, new VHDs are created in Hyper-V Manager

Here is a video on how to create a new VHD thats helpful for some of the previous questions, there is also this

7. When creating a new VHD what feature does Windows PowerShell offer that the graphical interface does not?

A. You can specify the block size and the logical sector size

B. You can decide between VHD and VHDX disk types

C. You can choose among Fixed, Dynamic or differencing.

D. You can specify the path.

Answer: A, if you’ve gotten proficient at reading Technet articles on PowerShell cmdlets this one on
new-vhd is helpful.

8. Can you modify an existing VHD file?

A. No, once created a VHD file is fixed

B. Yes, but you can only modify it using PowerShell

C. No, but you can change it into a VHDX file.

D. Yes, you can even modify it without mounting it to a VM.

Answer: D, you can compact, convert, expand and shrink an existing VHD file using the hypver-v manager console.

Here is a short video showing how to convert a VHD to a VHDX but thats part of the process to edit a VHD at all
so its part of C but the no answer is wrong.

I probably should cover some PowerShell cmdlets too shouldnt I? ok maybe that would be good

9. Do VMs ever directly access a physical hard disk?

A. No, VMs access only VHDs, areas of space on the physical hard disk.

B. Yes, VMs access a physical hard disk by way of a “pass through disk” a special
virtual disk that directly accesses the physical disk if it is made exclusively available
to the VM.

C. No, VMs access physical hardware only through the hypervisor.

D. Yes, VHDs correlate one to one with physical hard disks.

Answer: B, I actually decided to google this one and came across an interesting site that might be helpful
to those of us working against a clock with server 2012. This
site has some flash cards that may be useful. I would recommend studying the technologies more directly then learning
the chaotic logic associated with putting the words (in this case the ideas of the technologies) into sentences due to the
previously mentioned problem of ideas not exactly correlating 1-1 with questions due to the nature of real life server administration.

10. Creating a virtual SAN allows you to ______.

A. Eliminate the physical disk.

B. Have VHDs communicate with physical hard disks.

C. Make distant storage accessible to VMs.

D. Utilize the Fibre Channel adapters.

Answer: D, in order for you to use A virtual SAN you must use a Fibre Channel adapter communication protocol. For more information
on implementing this technology please check TechNet.

Zacker book, Chapter 7

I feel like we are starting to make progress. Give that its the first of the month I think I should possibly be able to get through this
text, go through measure up a few times and test again by the end of the month. We will see what it has in store for me this time.
I did actually find this chapter to be very helpful as it was full of illustrations and ideas I had not seen presented in other materials.
Well worth reading twice.

Please read the header for this post
regarding the answer key situation for these chapters.

1. Which of the following statements about Type I and Type II virtualization are true?

A. In Type I Virtualization the Hypervisor runs on top of a Host OS.

B. In Type I Virtualization the Hypervisor runs directly on the computer hardware.

C. In Type II Virtualization, the Hypervisor runs on top of a host OS.

D. In Type II Virtualization, the Hypervisor runs directly on the computer hardware.

Answer: B, and C I found this bit of information interesting as I had not seen it other places but its basicly telling you how
Hyper-V interacts with the host operating system in a way thats superior to other virtualizatioon products.

Its also helpful to provide a definition here for these two products, so here is some thing found in the oline
PDF book

Hyper-V uses Type I virtualization, in which the hypervisor is an
abstraction layer that interacts directly with the computer’s physical hardware—that is, without
an intervening host OS. The term hypervisor is intended to represent the level beyond the term
supervisor, in regard to the responsibility for allocating a computer’s processor clock cycles.
The hypervisor creates individual environments called partitions, each of which has its
own OS installed and accesses the computer’s hardware via the hypervisor. Unlike Type II
virtualization, no host OS shares processor time with the hypervisor. Instead, the hypervisor
designates the first partition it creates as the parent partition and all subsequent partitions as
child partitions

This arrangement, in which the hypervisor runs on top of a host OS, is called Type II virtualization.
By using the Type II hypervisor, you create a virtual hardware environment for each
VM. You can specify how much memory to allocate to each VM, create virtual disk drives by
using space on the computer’s physical drives, and provide access to peripheral devices. You
then install a “guest” OS on each VM, just as if you were deploying a new computer. The host
OS then shares access to the computer’s processor with the hypervisor, with each taking the
clock cycles it needs and passing control of the processor back to the other

2. Which of the following types of server virtulization provides the best performance for high-traffic servers
in production environments?

A. Type I virtualization

B. Type II virtualization

C. Presentation virtualization

D. Remote App

Answer: A, if you read the previous explanation its fairly obvious.

3. Which of the following Microsoft operating systems includes a license that enables you to create and unlimited number of
virtual instances of Server 2012

A. Hyper-V Server 2012

B. Windows Server 2012 Datacenter

C. Windows Server 2012 Standard

D. Windows Server 2012 Foundation

Answer: B allows unlimited, C allows 2 and D allows for 0 virtualized instances. Having trouble finding a whole lot of useful
info for comparisons sake other than pdf shown on this blog

4. Which of the following Hyper-V features make it possible for a VM to function with a minimum Ram value
that is less than the start up value?

A. Smart paging

B. Dynamic memory

C. Memory weight

D. Guest integration services

Answer: B, given these choices which appear to be tricky answers as none of them are straight forward, again kind of
using crow wing logic from my illustration but the answer according to the text is that dynamic memory
is the technology that allows more fluid, so to speak, ram functions.

5. When you install the Hyper-V role on a server running Windows Server 2012, the instance of the OS on which you installed the role
is converted to which system element?

A. The hypervisor

B. The Virtual Machine Monitor

C. The parent partition

D. A child partition

Answer: C, the parent partition, hypervisor is the software and VMM has to do with VmWare

6. If an administrator wants to install additional roles along with Hyper-V what does Microsoft recommend the administrator do?

A. Microsoft recommends that you install other roles on one of the VMs you create with Hyper-V.

B. Microsoft recommends that you install only roles related to Hyper-V

C. Microsoft recommends you install only roles on the parent partition

D. There are no recommendations against roles installed with Hyper-V

Answer: A, according to the text you should install additional roles such as DHCP on a VM. It doesnt implicitly say this
but its implied that this is for performance reasons. Again I question the cost effectiveness of this but perhaps
if the question about how Hyper-V operates directly on the hardware instead of on top of the OS is true I assume its
effecent but even still the additional clock cycles of having the OS installed where Hyper-V is installed still make it
only efficient in terms of downtown for critical services and development.

7. What are the two files used for every VM?

A. A saved state file & a .vmc file in INF format

B. A .vmc file in INF format and virtual hard disk (.vhd or vhdx) files for the guest OS and data

C. A saved-state file and virtual hard disk (.vhd or .vhdx) files for the guest OS applications and data

D. A virtual machine configuration (.vmc) file in XML format and virtual hard disk (.vhd or .vhdx) files for the guest OS and data

Answer: D, every VM has a .vmc xml file and it has to have a VHD associated with it thats only used by that virtual machine.

8. When using the create a virtual machine wizard, how is the virtual hard disk created by default?

A. You set the maximum size and it starts at that size

B. It starts at 40 GB and warns the admin when close to full

C. It starts small and dynamically expands up to the maximum size you specify

D. It starts small and continually expands to fill the available storage

Answer: D, this is known as a dynamically expanding VHD. There is an older technet article about the subject available
here some of the terminology is older
however the ideas are correct, according to whats in the text.

9. What operating systems can an administrator install on a VM?

A. Windows Server 2008 and newer

B. Windows Server 2003 and newer

C. Any Microsoft windows edition

D. Several Microsoft products as well as Red Hat and SuSe Linux

Answer: D, you can install almost any thing on a VM

10. In some cases, certain Hyper-V guest OS features do not function properly using the OS’s own device drivers. What can an
administrator do?

A. Install and configure Guest Integration Services

B. Install Hyper-V manager

C. Reinstall Hyper-V

D. Try a different operating system

Answer: A, according to the test if native OS features do not function properly try integration services to get them up and
running.

Zacker book, Chapter 6

On to chapter 5, only 14 more question sets to go for this round. Leaving my self some room to go through the book again and possibly
go through the Panek book as well. Not sure if I will have time for that before my shots at exams are up but I dont imagine I would want
to quite studying even after those are over as Im sure the knowledge will transfer. However I did pick up a Network + book, I think I
mentioned that previously, as Ive found my fundamental/basic networking skills to be slightly lacking.

Edit: again, Please read the header for this post
regarding the answer key situation for these chapters.

1. Which of the following tasks must you perform before you can manage a remote server running Server 2012 using the
compmgmt.msc (computer management) snap in?

A. Enable WinRM on the remote server.

B. Enable the COM+ Network Access rule on the remote server.

C. Enable the Remote Event Log Management rules on the remote server.

D. Install RSAT on the remote server

Answer: B, this one was actually verifiable, its still probably good to read the RSAT tools link even though it has nothing to do
with firewall rules.

2. Which of the following PowerShell cmdlets can you use to list the existing Windows Firewall rules on a computer running Windows
Server 2012?

A. Get-NetFirewallRule

B. Set-NetFirewallRule

C. Show-NetFirewallRule

D. New-NetFirewallrule

Answer: A,C you could also specify certain parms to have them listed in an orginzed fashion. Like you could use the
Export-Csv

cmdlet to get them really organized
or there are a lot of them I would test the recursive function just to see if it changes the results. Not sure if it would or not
I suppose that would be easy enough to test in a MSFT lab. They do time out rather quickly though.

3. Which of the following updates must you install on a server running windows server 2008 before you can connect to it using Server 2008
before you can connect to it using Windows Server 2012 SrvMan?

A. .NET Framework 3.5

B. .NET Framework 4.0

C. Windows Management Framework 3.0

D. Windows Server 2008 R2

Answer: C and B specifics like this are always a little tricky for me. I suppose I could put some effort into remembering 4.0
In addition here is an article
on this particular subject. Pretty sure Ill remember this one now.

4. When you run Server Manager from a Windows 8 Workstation using Remote Server Admin tools, which of the following elements do
not appear in the default display?

A. The Dashboard

B. The local Server homepage

C. The All Servers homepage

D. The Welcome tile

Answer: B, the local server homepage clearly cant display as your not on a server.

5. Windows Firewall is enabled by default in Windows Server 2012. How are remote management tools affected?

A. Both MMC and WinRM are blocked. You must alter inbound Firewall rules on the remote server.

B. MMC is blocked. You must alter inbound Windows Firewall rules on the remote server.

C. WinRM is blocked. You must alter inbound Windows Firewall rules on the remote server.

D. Neither MMC not WinRM is blocked.

Answer: B is true but a brings up an interesting point, at least to me, is server manager considered part of WinRM? Im assuming its the
same thing and you should be able to add any server in your domain to your Server Manager console as long as its a 2012 sever
without any issues. If you had trouble with that check out this TechNet article
on the subject indicating that WinRM should allow you to add any server in your domain. As MMC is kind of an out of date technology
it is not enabled by default and requires firewall configuration even inside the domain. Powershell remote management is very similar
but as with adding a server to your server manager it to requires you to specify credentials when accessing, for more info on that
check here

Theres also a video on this topic however you dont see him specify any kind of domain credentials when he adds a server to server manager
so perhaps we should investigate further so we are certain about this process. Any way for starters heres that video which is helpful for
question 8 as well as this guy is running server manager from a desktop

Ok so if we check with Technet on adding servers to server manager
about a third of the way down the page it goes into the process of providing those and it seems like it would be an intuitive process after use
as it basically describes it as being similar to a UAC prompt only you are only asked the first time and they are cached. So dont leave your
machine unlocked! That said, I dont have the luxury of using server so hopefully I dont miss an overly complex scenario question on the subject.

6. How can you remotely configure the firewall on several servers at once?

A. Use the powershell command set-netfirewallrule -name -enabled true

B. Applying the configuration change to the applicable server grouping in Server Manager.

C. Creating a configuration file for Jr. Admins to configure servers in parallel.

D. Applying a Group Policy related to Windows Firewall to the servers.

Answer: A, D would both work for firewall management. The TechNet article on using GP to deploy firewall rules is fairly old
so im linking a newer article in this case.

7. The Server Manager interface accommodates several servers, tested at nearly 100. What did the text (Zacker says lesson) highlight
as an element that can easily degrade Server Manager performance, and how to resolve it?

A. The Event tile generates a large number of records. It is resolved by configuring the types ages and sources of events.

B. The hardware resources of the Server Manager computer can degrade Server Manager. It is resolved by adding additional server memory.

C. The server’s screen resolution is set too high. It is resolved by choosing a lower resolution.

D. The amount of data the sever sends to all remote servers can degrade Server Manager. It is resolved by NIC teaming.

Answer: B, Adding that many servers can really tie up network and processor bandwidth.

8. By default Server Manager does not connect with down-level servers (for example a 2012 box could not connect to an unpatched
08 box). What must be done to properly connect?

A. Remote manage the down-level server by MMC.

B. Disable the Windows Firewall on the down-level server.

C. Add WinRM 3.0 and .NET 4.0 to the down-level server to ensure its patched

D. Perform an in place upgrade to server 2012 to all 08 R2 machines and lower.

Answer: C, as previously mentioned in the links and texts above.

9. Server Manager is properly connecting and managing your down-level servers. What tool do you use to add roles and features
to theses computers?

A. Using the Add Roles and Features Wizard in Server Manager to install the role.

B. Using Windows PowerShell to install the role.

C. Using the MMC and the applicable snap-in.

D. You cannot add a role remotely to a down-level server.

Answer: You could use A or B but generally its easier to use A. Regardless I thought it might be helpful to watch a video on the
topic.

There’s also a useful Technet article
here.

10. PowerShell web access gateway allows ________

A. Users to remotely connect to their desktops.

B. administrators to remotely manage IIS servers.

C. Uses a command-line alternative to standard websites.

D. Administrators remote management of servers using commands.

Answer: D, this one is pretty straight forward. While we are on a role here why not put another video in here feature our buddy Rick Claus
he has a pretty decent twitter account if your into that sort of stuff. Its kind of sales demo but its still cool.

https://www.youtube.com/watch?v=Qn7P6eGRy9Q

Thats all for this round. I dont know if youve noticed the punctuation issue with some posts have periods and some dont. I hope you dont find that
weird as the text does that as well. Not sure why and I have mixed feelings as to if answers are complete sentences that would require punctuation.

Zacker book, Chapter 5

I had hoped to get through this one on the same day as the previous one but that doesn’t seem likely. Ended up having a busier day
than expected. However, I don’t think I have any thing going on tomorrow. Wednesday Ill be writing on the night shift (hopefully) after
going to see a Norwegian band. Which reminds me that I should save the PDF ive been referencing to a local drive or check the text
before I go out. Regardless of how the timing works out it should be a fun night. Really starting to enjoy coding, as long as I don’t
push my self to fatigue, some thing that seems ironic to a person that spend that past two summers doing lawn care, from typing and thinking
its actually a lot more enjoyable than I ever expected it to be. My impression as a young man was that it was almost mindless work but
yet I seemed to enjoy the results it yielded. A bit selfish or short sighted of me perhaps.

My apologize for the personal dialog, now on to the important part. I suppose I could also say that Im leaving a few questions to type out
later if im feeling so inclined after retesting (and most likely failing) again.

Please read the header for this post
regarding the answer key situation for these chapters.

1. Which of the following terms describes the software interface through which a computer communicates with a print device?

A. Printer

B. Print Server

C. Printer driver

D. Printer management Snap-in

Answer: A, a printer is the software interface. This is a confusing term as its used very flippantly in some documents but the official
use indicates that a print device is the hardware that actually prints out the product, the printer sends the document to the
print server which sends the document to the printer using code that it can understand provided by the client local driver.

2. What printing configuration makes the computer with the locally attached print device function as a print server?

A. Network attached printer sharing

B. Network attached printing

C. Locally attached printer sharing

D. Direct printing

Answer: C, there isnt a lot in the gospels of technet about this from a definitional standpoint but the answer is cross-referenceable
and it appears in the text. It seems to be kind of an older idea as most of the searchable articles are on XP.

3. When planning for additional disk space for the print server spooler consider extra storage for ____.

A. Overhead in case of several smaller print jobs

B. The print server page file

C. Older less efficient print drivers

D. Temporary print device outages

Answer: D, there really isnt much conversation to be had around this point. Just kind of is what it is.

4. Can you install 32-bit print drivers on a Windows Server 2012 system?

A. No because Windows Server 2012 is a 64-bit platform.

B. Yes, because Windows Server 2012 is a 64-bit platform which comes with 32 bit support.

C. No, but you can install the 32-bit driver from a computer running a 32-bit version of Windows.

D. No, but you can install the 32-bit driver from a computer running a 32-bit version of a Windows.

Answer: B, you can install 32-bit drivers because a 64 bit platform can support 32 bit drivers but the reverse is
not true. So you cant put 64-bit drivers on a 32 bit system. This was a “checkable” question.

5. What is the purpose of the Remote Desktop Easy Print driver?

A. Easy print allows remote clients to print to local print devices via a print re-director.

B. Easy print allows admins to configure printers for users connected remotely.

C. Easy print allows administrators to print to remote print devices via a print re-director.

D. Easy print allows remote configuration of all printers

Answer: B, this is true for RDP connections are terminal style usage. For more information check the Technet
article on terminal printing.
Dont forget to hit that search bar with easy print driver and check out a few other articles. I know its
powered by bing but on an intraweb database searching system it seems surprisingly effective. 🙂

6. For a user to print, pause, resume, restart and cancel documents they sent to the printer, the user must have the
basic _____ permission.

A. Take ownership

B. Manage this printer

C. Basic print

D. Manage documents

Answer: C, basic print permissions allows user to cancel “his or her” own documents. I found the book verbiage on this
question to be a little overly complicated when implying the idea of individually owned documents being sent to
a print device.

7. You are setting up a printer pool on a computer running Windows Server 2012. The printer pool contains three print
devices, all identical. You open the properties dialog box for the printer and select the Enable Printer Pooling
option on the Ports tab. What must you do next?

A. Configure the LPT1 port to support three printers.

B. Select or create the ports mapped to the three printers.

C. On the device settings tab, configure the installable options to support two additional print devices.

D. On the advanced tab, configure the priority for each print device so that printing is distributed among the
three print devices.

Answer: B, you need to configure the ports mapped to the three printers per the the book text and cross-referencing.

8. One of your print devices is not working properly and you want to temporarily prevent users from sending jobs to the printer serving
the device. What should you do?

A. Stop sharing the printer

B. Remove the printer from Active Directory

C. Change the printer port

D. Rename the share

Answer: A, stop sharing the printer is the best option per the book. Check this article
for more information on implementing that process.

9. You are administering a computer running Windows Server 2012 set up as a print server. Users in the marketing group
complain that they cannot print documents using a printer on the server. You view the permissions in the printer’s
properties. The Marketing group is allowed Manage Documents permission. Why cant the users send documents to the print
device?

A. The everyone group must be granted the Manage documents permissions.

B. The administrators group must be granted the manage printers permission.

C. The marketing group must be granted the print permission.

D. The marketing group must be granted the manage printers permission.

Answer: C, you cant print to a device without the basic print permission.

10. You are administering a print server running Windows Server 2012. You want to perform maintenance on a print device
physically connected to the print server. There are several documents in the print queue. You want to prevent the
documents from being printed to the printer but you don’t want users to have to resubmit the documents to the
printer. What is the best way to do this?

A. Open the printer’s properties dialog box, select the sharing tab and then select the Do Not Share This Printer option.

B. Open the printer’s properties dialog box and select a port that is not associated with a print device.

C. Open the printer’s queue window, select the first document, and then select pause from the documents window.

D. Open the printer’s queue window & select the pause printing option from the printer menu.

Answer: D, this one seems fairly obvious.

Why are server tests so hard??!?

This morning while considering why the testing questions where so hard for a Server beginer such as my self I started to remind my self
of a drawing I was working on:

 photo B11CFAD4-9400-42C4-B363-D585D61D9A1F_zpsbyg2urxy.jpg

When I first started drawing I was horrible and I am still not amazing but I remember thinking that basic sailor jerry style bird that had
a very logical and rhythmically repetitious wing patterns where very hard to draw. It took a while to get that down and im still not certain
that I do have it down but I came to the conclusion that testing server questions require you to think in a more chaotic yet more natural pattern
as demonstrated in the crow wing above. I’m still having trouble with that but the point, I suppose, is at least recognizing it. This is just a
sketch that I’ve worked on for an hour or so and it still has lots of problems. like the over all basic bird shape and the engineering question of
how do you maintain the nike swoosh style natural lines of a bird not in motion that I just went out side and observed on this wonderful morning.
In this case there’s two engineering problems with that, for one this is a bird motion for two, im not entirely sure that I left enough room on the
right hand side of the page to express a more chaotic bird in flight or landing motion. Naturally I think a bird in flight would be slightly less
chaotic and lend its self to being an easier subject. However that would require a less spread out tail that would take up more space. Thus leaving
my only option to be redraw the whole thing and my preference would be on tracing paper. When I first started drawing there’s absolutely no way
I could imagined being able to accomplish some thing this pointed with a drafting tool. There’s so much chaos and rhythmical pattern that took years
to understand the transfer from eye to hand. I feel that students of server are supposed to be appreciative of the same thing when applying the logic
required to understand a domain. Its a bit chaotic at times and logically not quite as rhythmically symmetrical as you would want it to be but if you
understand the point it ends up being more natural. In this case I have a large book of Audubon
reference however all his birds are kind of static, as he had a very specific formula for creating them, which isn’t overly helpful to me in
creating this composition. Thus is also the case with administering a network. There are going to be times when as a network administrator that you
have to draw outside the lines of reference using the skill sets that you’ve learned from the masters of your craft. I would like to finish this
at some point, my only worry is time. Much like my worry of passing or not passing a server test in hopes of acquiring work of some sort. I suppose
that’s where some sort of calvinistic sense of fate steps in. Much like my faith that I will be able to understand IP math at some point. Currently
I seem to be able to relate numbers to meaning and based on the meaning Ive prescribed to certain numbers come up with actual equations that seem
correct. Not a very scientific way to calculate but a method none the less. Given that this is a seemingly new skill that my brain has learned the
prospects of being able to train my self to think in a way that produces results for subnetting both IPv4 and IPv6 seem significantly less impossible.

Stay thirsty my friends and remember that life isnt always as logically rhythmical as you would like, some times that bird your trying to
capture is in flight and your going to have to be able to handle that!

Oh in reference to the Sailor Jerry bird mentioned above, there is an image containing examples of that below and please forgive the seemingly pointless angle to the top wing
on the crow in my drawing.

 photo 0c3b3047da63c8351f1b60a08783bb0f_zpskmgy4or6.jpg

Website Powered by WordPress.com.

Up ↑