283

¡Supera tus tareas y exámenes ahora con Quizwiz!

What is the IP address that is assigned to the network loopback interface? 224.0.0.255 192.168.1.1 127.0.0.1 1.1.1.1

127.0.0.1

Without the aid of APICs or special Intel features, what is the maximum number of IRQ lines available to a system? 8 15 21 32

15

What is the minimum amount of RAM required in order to support Windows Server 2016 with a GUI desktop? 512 MB 1 GB 2 GB 4 GB

2 GB

For members of a protected users global group, how often must the Kerberos Ticket Granting Ticket be renewed? 4 hours 6 hours 8 hours 10 hours

4 hours

On a typical x86 computer, what size is a single data page? 4KB 8KB 16KB 32KB

4KB

What is the maximum number of supported central processor sockets for Windows Server 2016 Standard Edition? 8 16 32 64

64

What is the maximum number of logical processors supported by Windows Server 2016 when Hyper-V is not in use? 160 320 640 1280

640

What is an ideal scenario for the installation and use of Windows Server Core or Nano Server? An organization needs a server that will not be dedicated for a specific function, but will serve multiple functions. A small business needs a server that will be managed by a novice administrator that fulfills other roles in the company. A server within an organization will be dedicated to web services and will be accessed via the Internet. A network administrator requests a server installed with a version of Windows Server capable of configuration through wizards.

A server within an organization will be dedicated to web services and will be accessed via the Internet.

What is the most typically used boundary for an Active Directory site? A site boundary is typically defined by an OU. A site boundary is typically defined by a domain. A site boundary is typically defined by a network or subnet boundary. A site boundary is typically defined by an administrative boundary.

A site boundary is typically defined by a network or subnet boundary.

What occurs when a device driver that has not been signed is installed? The device will function, but a warning will be logged in Event Viewer when it is loaded. A warning indicating that the publisher of the driver can't be verified and the driver will not be loaded. A warning indicating that the publisher of the driver can't be verified, but the driver will still be loaded. The driver will be loaded without incident, and the device will function normally.

A warning indicating that the publisher of the driver can't be verified and the driver will not be loaded.

What tab under a user's account properties allows you to define the hours at which the user is able to log on to the domain? Profile tab Organization tab Access tab Account tab

Account tab

What Windows Server 2016 role installs the Identity Management for UNIX service? Active Directory Domain Services Active Directory Certificate Services Host Guardian Services Network Controller Services

Active Directory Domain Services

What Windows Server role can be used to specifically help safeguard information through the use of encryption, user authentication, and security certificates? Active Directory Certificate Services Active Directory Domain Services Active Directory Federation Services Active Directory Rights Management Services

Active Directory Rights Management Services

What PowerShell command will install the DNS role on a Windows Server 2016 server? Add-WindowsFeature DNS Get-WindowsRole DNS Install-NewRole DNS Deploy-Role DNS

Add-WindowsFeature DNS

What is NOT one of the three distinct advantages offered by a Windows Server Core installation? There is reduced overhead by removing the graphical interface. Less disk space and memory are required to carry out every day tasks. The computer has a much smaller attack surface. Additional services and management utilities are made available.

Additional services and management utilities are made available.

What happens when two devices end up with conflicting IRQ assignments? Both devices become inoperable until new IRQs are assigned. Both devices will share the same IRQ at reduced performance. Both devices will share the same IRQ with no penalties to performance. The conflicting devices will both pick a new random IRQ.

Both devices become inoperable until new IRQs are assigned.

The act of spooling a print job helps free up what resource on the print server? Hard drive storage Active memory utilization Paged memory space CPU utilization

CPU utilization

What feature is designed to foil malware, such as computer viruses, Trojan horses, and worms, by preventing programs from using system memory space? Data Execution Prevention Protected Memory Blocking System Memory Guard Data Memory Protection

Data Execution Prevention

What type of group is typically used to manage resources in a domain? Local group Domain local group Global group Universal group

Domain local group

What statement regarding trust relationships between domains is accurate? If domain A and B have a trust and domain B and C have a trust, domain A does not automatically trust domain C. Due to the trust relationship between parent and child domains, any one domain can have access to the resources of all others. The security in a two-way trust relationship between domains is based on RADIUS security techniques. A new domain joining a tree has no trust relationships with the other domains in the same tree.

Due to the trust relationship between parent and child domains, any one domain can have access to the resources of all others.

Logs created by auditing Active Directory processes show up under the "System" section in Event Viewer. True False

False

NTFS access permissions can't be used in conjunction with DFS using NTFS formatted volumes. True False

False

Peer-to-peer networking offers only maximun network security because user account information must be maintained on each workstation. True False

False

The 192.10.0.0 network falls within the private network range. True False

False

What should be done by an administrator to enable the hot swapping of a disk drive or controller without using the Safely Remove Hardware icon? File caching and flushing should be disabled. File caching and flushing should be enabled. File caching should be enabled, and flushing should be disabled. File caching should be disabled, and flushing should be enabled.

File caching and flushing should be disabled.

What feature provided at the Windows Server 2012 domain functional level creates a secure channel or tunnel between a client seeking authentication for a computer service and the server providing secure access keys for secure communications? Flexible Authentication Secure Tunneling (FAST) Secure Tunneling Authentication Protocol (STAP) Kerberos Hardening Policy (KHP) Tunneled Authentication Security (TAS)

Flexible Authentication Secure Tunneling (FAST)

What Registry key contains information about the desktop setup for the account presently signed in to the server console? HKEY_USERS HKEY_LOCAL_MACHINE HKEY_CURRENT_USER HKEY_CURRENT_CONFIG

HKEY_CURRENT_USER

What statement regarding the use of the Windows Server 2016 Essentials edition is accurate? Essentials is limited to a maximum of 50 users and 25 devices. Essentials can join a pre-existing domain and function as a domain controller in the domain. Hyper-V is not included in Server 2016 Essentials. Server 2016 is limited to a maximum of 64 CPU sockets.

Hyper-V is not included in Server 2016 Essentials.

What statement regarding the use of Microsoft Hyper-V is accurate? Hyper-V supports only 64-bit operating systems. Hyper-V supports only Windows based operating systems. Hyper-V requires the use of a server cluster. Hyper-V supports both Windows and Linux operating systems.

Hyper-V supports both Windows and Linux operating systems.

What is NOT one of the tasks that the Devices and Printers utility can be used for? Invoking the operating system to use PnP to detect new hardware. Installing new non-PnP hardware and hardware drivers. Troubleshooting problems you might be having with existing hardware. Identifying resource conflicts between devices.

Identifying resource conflicts between devices.

If no domain or workgroup is configured during installation of Windows Server 2016, where is the computer placed? In a domain called "example.com" In a workgroup called "Contoso" In a workgroup called "Workgroup" In a workgroup that is randomly generated.

In a workgroup called "Workgroup"

What is NOT one of the advantages that can be provided by Windows Server 2016 when implementing the server-based network model? Software applications can be stored and shared from a central location. Printers can be shared with other computers on the network. Increased network management ability through workgroups. Increased security due to shared resources and central management.

Increased network management ability through workgroups.

You are attempting to access the BIOS screen of a computer to assess the BIOS's capabilities and to determine the BIOS version. What key is NOT a typical key pressed to enter the BIOS? F1 F2 Del Insert

Insert

Under what conditions can a global group be converted to a universal group? It can be converted as long as it is not nested in another global group or in a universal group. It can be converted as long as it is not nested in a local group. It can be converted as long as it is not nested in a domain group. It can be converted regardless of nested memberships.

It can be converted as long as it is not nested in another global group or in a universal group.

By default on Windows Server 2016, what is the processor scheduling set to prioritize? It is set to prioritize programs. It is set to prioritize background services. It is set to prioritize user tasks. It is set to prioritize system monitoring services.

It is set to prioritize background services.

User Jsmith is a member of the Accounting and Contractor groups, and is trying to save a file to Folder A on his local computer, but finds he has no access. Upon investigating, you discover the Accounting group has Full Control over Folder A, but the Contractor group has been denied all access to the folder. What Jsmith's effective access? Because the two groups have opposite levels of access, the two cancel out and Jsmith is left with only read permissions. Jsmith's membership in the Contractor group means that he has been denied all access to the folder. Jsmith's membership in the Contractor group limits him to read and execute permissions. Jsmith's membership in the Contractor group allows him to edit files in the folder only after he takes control of the folder using the Accounting group permissions.

Jsmith's membership in the Contractor group means that he has been denied all access to the folder.

You have several UNIX and Linux computers in your network and need to ensure that they can use shared printers through Windows Server 2016. What role service should you install in Print and Document Services to accomplish this? LPD service UNIX Print Services WinPrint for UNIX Samba Shared Printers

LPD service

What is NOT one of the three items that must be present on a Windows Server 2016 install in order for the server to function as a web-based print server? Internet Printing Client Print and Document Services role with the Internet Printing role service installed Web Server role (IIS) Line Printer Daemon role

Line Printer Daemon role

What Active Directory Domain Services role feature can be used to replace passwords with a two-step authentication process that combines verifying a device is enrolled in the domain and that the device has a personal identification number? LDAP Identity Management LDAP TwoStep ADS TwoAuth Microsoft Passport

Microsoft Passport

What is NOT a true statement to keep in mind when designing an OU structure? Microsoft recommends nesting OUs at least four levels deep. Active directory works more efficiently when OUs are set up horizontally. Creation of OUs involves more processing resources because each request through an OU requires CPU time. Nested OUs should be used sparingly to maintain simplified administration.

Microsoft recommends nesting OUs at least four levels deep.

What permissions should you assign a group if you want the group to have the ability to read, add, delete, execute, and modify files, but not to be able to delete subfolders and their file contents, change permissions, or take ownership? Full control Modify Read and write Read and execute

Modify

How are changes made within Active Directory maintained on different domain controllers? Multimaster replication is used to replicate changes to other DCs. The primary domain controller on the network must be notified of the changes, after which other secondary DCs will pull changes from the master. The domain controllers must manually sync their configurations. The configurations will copy to each domain controller one at a time.

Multimaster replication is used to replicate changes to other DCs.

What is the native file system utilized by Windows Server 2016? ReFS NTFS FAT32 ext3

NTFS

What statement regarding NTFS features is NOT accurate? NTFS supports the use of file compression. NTFS is a journaling file system. NTFS does not maintain an index of files. NTFS supports the POSIX standard.

NTFS does not maintain an index of files.

What Active Directory certificate service enables detection of a revoked certificate without the need to access a revocation list? Certification Authority Web Enrollment Certification Authority Microsoft Simple Certificate Enrollment Protocol Online Certificate Status Protocol

Online Certificate Status Protocol

When using the protected users global group, what is not a valid security restriction imposed on the group? Group members cannot use weaker forms of authentication, such as NTLM, CredSSP, or digest authentication. Connections to systems that do not utilize this global group may not succeed. Only higher-level encryption methods compatible with Kerberos security, such as Advanced Encryption Standard (AES) can be used. Only computers running Windows 7 or higher can be made member computers.

Only computers running Windows 7 or higher can be made member computers.

What statement regarding the placement of the paging file is accurate? Server performance is improved by placing the paging file in the boot partition. Paging files should be placed on stripe set RAID volumes to improve the performance of the drives. Paging files should be placed on the main disk in a mirrored set, not the backup disk. In a system with multiple drives available, the paging file should be configured on only one drive.

Paging files should be placed on the main disk in a mirrored set, not the backup disk.

What statement regarding the use of printer pooling is accurate? Pooled printers must be identical in order to be used in a pool. Pooled printers can use any printers available, provided drivers are available. Pooled printers must all use the same port type. Pooled printers reduce print volume by spreading jobs across the pool.

Pooled printers must be identical in order to be used in a pool.

What Windows feature provides a scripting language and includes command-line tools in the form of "cmdlets" that can be used for automation? Visual Basic Script interface DOS Batch file processor PowerShell Bourne Again Shell

Powershell

Once a printer is shared, what permissions are given to the ALL APPLICATION PACKAGES special group? Print Manage documents Print and Manage documents Print, Manage this printer, and Manage Documents

Print and Manage documents

What do most non-PostScript laser printers use for a page description language? enhanced metafile (EMF) Printer Control Language (PCL) Formatted Print File (FPF) Defined Output Print Language (DOPL)

Printer Control Language (PCL)

What type of applications or programs might not work with Data Execution Prevention (DEP) enabled? Programs that execute during the boot sequence that are not from Microsoft approved publishers. Programs that require real time processing. Programs that utilize multiple executable files. Programs that utilize dynamic code generation.

Programs that utilize dynamic code generation.

What is NOT one of the requirements that must be met prior to the installation of Windows Deployment Services? A DNS server must be configured and on the network A DHCP server must be configured on the network ReFS must be used as the file system on the Windows Deployment Services server Active Directory Domain Services must be installed on a network server, and the target Windows Deployment Services server must be a member or domain controller in the domain.

ReFS must be used as the file system on the Windows Deployment Services server

A user with Full control share permissions and read permissions at the NTFS level on the shared folder has what permissions to the files in the folder when accessing over the network? Read only permission Read and execute permission Modify permission Full control permission

Read only permission

You have been tasked with implementing a server infrastructure that allows clients to use virtual machine and session-based desktops to access and run applications on servers. What role should you install for this purpose? Volume Activation Services Remote Desktop Services Remote Access Services Network Controller Services

Remote Desktop Services

How do you make a user profile a mandatory profile, preventing all changes? Rename the Ntuser.dat file to Ntuser.man in the user's profile directory. Check the "mandatory profile" box under the user account's properties. Change the permissions on the Ntuser.dat file to read only. Create the Manual.ini file in the user profile's directory.

Rename the Ntuser.dat file to Ntuser.man in the user's profile directory.

When replication occurs between sites, what servers are involved in replication? All the servers in one site sync directly with the servers of the remote site. Replication only occurs between two bridgehead servers. Replication between the two sites occurs between global catalog servers on both sides. Replication between the sites is handled by randomly picked DCs on both sides.

Replication only occurs between two bridgehead servers.

What happens if a user attempts to sign in while the only global catalog server for the domain is offline? The user will not be allowed to log in. The user will be allowed to log in, but group membership information will not be loaded. Searching AD will become slow or not available. The user will be allowed to sign in to the network with cached credentials.

Searching AD will become slow or not available.

What option should you use on a printer's Advanced properties page if pages are intermixing from printouts? Hold mismatched documents Start printing after last page is spooled Print spooled documents first Keep printed documents

Start printing after last page is spooled

What separator page file is used with PostScript-only printers and prints a separator page at the beginning of each document? Pcl.sep Pscript.sep Sysprint.sep Sysprtj.sep

Sysprint.sep

What statement regarding the use of system and user environment variables is accurate? User environment variables are always set first. System environment variables are always set first. User environment variables apply to any user signed in to the computer. System environment variables can be applied on a per user basis.

System environment variables are always set first.

The Line Printer Daemon (LPD) service requires what TCP communications port to be opened in the Windows Firewall? TCP 515 TCP 343 TCP 945 TCP 123

TCP 515

When the System File Checker utility restores a corrupted Windows file, where does it get the uncorrupted version from? The C:\Windows\System32 folder The C:\Windows\Drivers folder The C:\Windows\.hidden\sysfiles folder The C:\Windows\System\backup folder

The C:\Windows\System32 folder

After deleting an account, what happens to the associated GUID? The GUID will be recycled and reused by another newly created user or object. The GUID will be reused, but only by another account using the same name. The GUID will be permanently deleted and never re-used. The GUID remains in the domain database information to provide restoration options.

The GUID will be permanently deleted and never re-used.

The HKEY_CURRENT_CONFIG key The HKEY_CLASSES_ROOT key The HKEY_LOCAL_MACHINE key The HKEY_USERS key

The HKEY_CLASSES_ROOT key

What statement regarding the use of TCP and UDP is accurate? The TCP protocol is a connection-oriented communication because it ensures delivery of data. TCP utilizes a smaller frame with less header information than UDP. UDP is typically used when reliability of the communication is critical. UDP uses a constantly adjusting window size to account for existing network traffic.

The TCP protocol is a connection-oriented communication because it ensures delivery of data.

What happens if a client device connects to a shared printer and discovers that the print driver is not current on the client device? The shared printer is inaccessible until the driver is updated. The shared printer is available, but at reduced performance / subject to the limitations of the outdated driver. The client will prompt the user to update the driver or continue using the old one. The client will update the driver used for the printer automatically.

The client will update the driver used for the printer automatically.

Your computer has added a dynamically learned MAC address to the local ARP cache. Before the ARP cache timeout has expired, your computer reuses the same ARP cache entry. How long before the entry expires? The entry will expire once the remainder of the 2 minute expiry period is up. The entry will expire immediately after the last usage, regardless of the standard time out interval. The entry will be entered into the ARP cache as a static entry. The entry will remain for 10 minutes after the last usage.

The entry will remain for 10 minutes after the last usage.

What happens when you move a file with NTFS permissions to a different NTFS volume? The file inherits the permissions of the parent folder to which it is moved. The file retains the permissions it had prior to the move. The file permissions are merged with the destination parent's permissions. The file loses all permissions, and must be assigned new permissions.

The file inherits the permissions of the parent folder to which it is moved.

What happens if an encrypted file on an NTFS partition is moved to a FAT or FAT32 partition? The file transfer does not occur, because FAT cannot store encrypted files. The file encryption is maintained on the new location. The file is moved, but is only visible to Windows systems that can see EFS files. The file is decrypted and placed onto the FAT volume.

The file is decrypted and placed onto the FAT volume.

What statement regarding functional domain functional levels is accurate? Unlike forest functional levels, you can revert back to earlier domain functional levels. The functional level at both the domain and forest level should be set to the lowest version of Windows Server used. The functional levels are not OS specific, and any Windows Server OS can be configured to run at newer functional levels. The functional level does not affect the features available for use on the domain.

The functional level at both the domain and forest level should be set to the lowest version of Windows Server used.

What statement regarding support of Plug and Play is not accurate? Most devices universally support Plug and Play. The feature must be built into the device. The kernel requires a special flag to enable PnP. The PnP feature must be enabled in the BIOS.

The kernel requires a special flag to enable PnP.

Why do newer versions of the Windows client operating systems reduce the TCO for a network running Windows Server 2016? The latest Windows operating systems provide more automated installation, configuration, desktop, and management policy features compatible with Server 2016. The latest Windows operating systems are not as expensive to purchase licenses for as older workstations. The older Windows operating systems are no longer supported by Windows Server 2016, and often require third party management plugins to be added to Server 2016. The older Windows operating systems require security software in order to be secured on the network.

The latest Windows operating systems provide more automated installation, configuration, desktop, and management policy features compatible with Server 2016.

What is NOT one of Microsoft's recommendations for creating a computer name? The maximum length for the name is 64 characters Shorter names up to 15 characters should be used for easy typing If no DNS server exists on the network, only standard Internet characters should be used. If a DNS server is present, standard Internet characters plus special characters such as $, %, &, * and others can be used.

The maximum length for the name is 64 characters

A Server 2016 installation is crashing and failing to create a crash dump file. What is the most likely cause for the failure to create the dump file? The drive controller driver is an unsigned and unsupported driver. The paging file is disabled on the server. The server dump file has incorrect permissions. The server paging file has been placed in a RAID array.

The paging file is disabled on the server.

What is the general rule for configuring the initial size of a paging file? The paging file should be the exact same size as the amount of RAM installed. The paging file should be 1.5 times the amount of RAM installed. The paging file should be 2 times the amount of RAM installed. The paging file should be half the amount of RAM installed.

The paging file should be 1.5 times the amount of RAM installed.

You are attempting to upgrade a Windows Server 2008 R2 server to Windows Server 2016 Standard. What must be done in order to accomplish the upgrade? The Windows Server 2016 disc provides a direct upgrade path for Server 2008 R2, so no additional steps are required to perform the upgrade. The server should be updated to the latest service pack for 2008 R2, then upgraded to Server 2012, after which the server can be upgraded to Server 2016. The server must run a special upgrade while Server 2008 R2 is running, requiring the migration of server roles to the new OS and merging of configuration files. The server can't be upgraded to Server 2016, as no upgrade path exists. You must perform a clean install.

The server should be updated to the latest service pack for 2008 R2, then upgraded to Server 2012, after which the server can be upgraded to Server 2016.

A recently promoted employee at your company has called you because they attempted to log in to their computer several times with a password created after a password expiry notice, but the attempts made were unsuccessful. You have reset the user's account password, but the user is still unable to log in. What is most likely the cause of the failure? The user is in a new OU and lacks log on permissions to the computer used. The user's account has been locked due to frequent failed password attempts. The computer is having issues communicating with the domain and is attempting to use cached credentials. The global catalog server has not replicated the user's account information to the rest of the domain.

The user's account has been locked due to frequent failed password attempts.

True False

True

A folder target in a DFS namespace is in what format? Universal Naming Convention (UNC) format User@Domain/location format File Hierarchical format B-Tree Organized format

Universal Naming Convention (UNC) format

What open standard supplements Microsoft's Plug and Play and is used in all types of systems and enables connectivity through networks and network protocols? Universal Compatibility Layer (UCL) Universal Plug and Play (UPnP) Hardware EasyConnect Universal Plug and Use

Universal Plug and Play (UPnP)

What is NOT one of the tasks that can be performed using the Device Manager? Hardware can be verified as installed and working properly. Device drivers can be updated. Devices can be uninstalled. Virtual devices can be installed.

Virtual devices can be installed.

What statement regarding the use of virtual memory in Windows Server 2016 is accurate? Virtual memory usage involves a hit to performance. Virtual memory usage is required by the operating system. Virtual memory is by default disabled. Virtual memory is static, and cannot grow while in use.

Virtual memory usage involves a hit to performance.

What service can be installed to replace the Indexing Service in Windows Server 2016 to provide faster file searching? B-Tree Database Service Windows Search Service Windows File Tracker Service Microsoft File Indexer Service

Windows Search Service

What is the minimum forest functional level should you use if you wish to make use of the protected users security group? Windows Server 2008 Windows Server 2008 R2 Windows Server 2012 R2 Windows Server 2016

Windows Server 2012 R2

What domain functional level removes compatibility for Network Access Protection? Windows Server 2008 R2 Windows Server 2012 Windows Server 2012 R2 Windows Server 2016

Windows Server 2016

What version of Windows Server 2016 can be used to share the same physical computer through each person connecting a keyboard, mouse, and monitor to a USB hub that connects to the server? Windows Server 2016 Standard Windows Server 2016 Terminal Windows Server 2016 Multipoint Premium Server Microsoft Hyper-V Server 2016

Windows Server 2016 Multipoint Premium Server

You are attempting to install Windows Server 2016 on a SCSI based disk, but the installation program does not find the disk. What is the most likely cause? Windows Server 2016 does not support SCSI based hard drives. Windows Server 2016 requires a driver for working with the SCSI controller. The drive itself is configured as a slave by cable position, rather than master. The BIOS does not recognize the SCSI controller and has not enabled the device.

Windows Server 2016 requires a driver for working with the SCSI controller.

Where can the most up-to-date list of compatible hardware available for Windows Server 2016 be found? Microsoft Hardware Compatibility List Various hardware vendor web pages Windows Server Catalog website Windows Hardware Check App

Windows Server Catalog website

What utility is used to create an unattended answer file for unattended installation? Windows System Image Manager Windows Automated Answer Generator Windows Unattended Installation Utility Windows Deployment Tool

Windows System Image Manager

What type of Windows Server 2016 container relies on process and user-mode isolation, which involves a base-level sharing of the operating system kernel? Hyper-V containers Windows server containers Partition level containers App level containers

Windows server containers

You are attempting to create a new universal group but find that the radio button in the Create New Object - Group dialog box is deactivated. What is the issue? You are trying to create a universal group in an OU without the permission to do so. You are operating in a domain with a Windows 2000 domain functional level. You are attempting to create a universal group within another universal group. You are not creating the group on the global catalog server.

You are operating in a domain with a Windows 2000 domain functional level.

What is not a valid requirement for joining a computer to an Active Directory domain? You will need a DNS name for the domain to be joined. You must have an authorized user account in the domain. One domain controller and a DNS server that can resolve the domain name must be online. You must have Internet connectivity and be capable of reaching microsoft.com

You must have Internet connectivity and be capable of reaching microsoft.com

You are working on a fresh install of Windows Server 2016 Core and need to set the date and time. What command can you use to do this? datetime rundll32,datetime control timedate.cpl Set-Time

control timedate.cpl

What kind of group is used for e-mail or telephone lists, to provide quick, mass distribution of information? domain local groups global groups distribution groups universal groups

distribution groups

What Windows SIM configuration pass option deletes specific system-related information, such as customized hardware settings not needed for an image file? specialize auditSystem generalize oobeSystem

generalize

What term is used to describe the Windows Server 2016 ability to run a program in an area of memory separate from areas used by other programs? cooperative multitasking preemptive multitasking precognitive multitasking ordered multitasking

preemptive multitasking

What are the two basic attributes in NTFS that are still compatible with FAT? read-only and compression read-only and hidden hidden and encrypted hidden and compression

read-only and hidden

What is NOT one of the features provided by NTFS? disk quotas encryption compression snapshots

snapshots

What Windows Server 2016 Standard and Datacenter feature provides the ability to move selected blocks of data to different storage locations, such as moving data from hard drive storage to solid state storage? storage pinning storage tiering storage leveling storage queuing

storage tiering


Conjuntos de estudio relacionados

The Constitution and Bill of Rights: Drafting the Constitution

View Set

Communication;Written Communication-Assessment

View Set