Advanced Windows Server Test 1

¡Supera tus tareas y exámenes ahora con Quizwiz!

​Under what tab within WDS server properties can an administrator change the image used based on a client CPU's architecture?

Boot

WDS Mixed Mode is a new mode in Windows Server 2012/R2 that provides backward-compatibility with Remote Installation Services.​

False

When using a multiple-server deployment strategy with WSUS, the replica mode provides distributed administration, requiring an administrator for each WSUS server to approve updates on that server.​

False

Windows Deployment Services (WDS) in Windows Server 2012/R2 can't be used to deploy Windows operating systems prior to Windows Vista.​

False

Windows Server 2012/R2 enables the Windows Update automatic updates by default.

False

How does file classification function?

File classification works by indexing and searching files based on content, using classification properties.

The _____ PowerShell cmdlet can be used to show a list of WSUS client computers registered on a WSUS server.​

Get-WsusComputer

In a Namespace's settings, which tab is used to configure how DFS works when multiple servers exist for a namespace root or folder target?​

Referrals

Group policy or registry settings can be used to configure client-side targeting.

True

​Which of the following statements is true regarding a GPO containing update settings that is applied at the domain level?

​Update settings may inadvertantly affect domain controllers and servers

Within Windows 8, when does automatic maintenance occur?​

​When the computer is idle and not on battery power

Where are the Windows PE and Windows Setup programs located on a Windows 8.1 DVD?

​\sources\boot.wim

Select below the MMC that can be used for configuring clients for client-side targeting:

​gpedit.msc

The ___ GPO setting ​allows an administrator to set the WSUS server to be used by all computers affected by the GPO.

"Specify intranet Microsoft update service location"

Which option can be used in conjunction with the dism.exe command line tool to mount an offline image?​

/mount-wim

What is the maximum number of synchronizations that can be performed automatically per day?​

24

When creating a replication group, what is the maximum single file size that can be replicated?​

250 GB

What UDP port is used by a default WDS server setup when it is ​listening for PXE boot requests?

67

What is the maximum number of files that can be replicated from a volume?​

70 million

The configuration of a proxy server utilizes what port by default?​

80

The staging folder begins deleting old staged files once it reaches what percentage of its defined size?​

90%

How can a computer without PXE capabilities be imaged by WDS?​

A discover image can be used to boot the computer into Windows PE, which then performs the imaging process.

What does a folder target consist of?​

A folder target consists of a UNC path that points to a shared folder hosted on a computer.

What is the difference between active file screening and passive file screening?

Active file screening will prevent users from saving unauthorized files, whereas passive screening only monitors and notifies when unauthorized files are saved.

When a computer contacts a WSUS server for the first time, what groups is the computer added to by default?

All Computers and Unassigned Computers

What is an Active Directory prestaged device?

An Active Directory prestaged device uses a computer object that is created within AD to join a newly imaged computer to the Windows domain automatically.

What item is needed in order to perform an unattended installation of Windows?​

An answer file

What is the purpose of an image group?​

An image group is used to organize images with common properties, such as by OS version.

What makes the asymmetric encryption method more secure than the symmetric encryption method?​

Asymmetric encryption uses both a public key and a private key to encrypt / decrypt information

Why should at least one custom group be created within WSUS?​

At least one custom group should be created for update testing purposes.

Why is it recommended to leave automatic updates off on a Windows Server?​

Automatic updates make require a restart of a server, causing an outage if the server reboots on its own.

A junior administrator needs to find out when a computer checked for updates and which updates have been downloaded / installed. Where can the administrator find a log containing this information?​

C:\Windows\WindowsUpdate.log

Where is the sysprep utility located within Windows?​

C:\Windows\system32\sysprep

What happens to clients using an image after an image is disabled in WDS

Clients will finish their installations, but new clients will be unable to access the image.

The _____ role service provides full WDS features and depends on the Transport Server role service to function.

Deployment Server

The log of original file names stored within the ConflictandDeleted folder is written to which file below?

DFSRPRivate\ConflictandDeletedManifest.xml

If a conflict occurs, DFS replication stores the losing conflicted file in what folder?​

DFSRPrivate\ConflictandDeleted

The ___ is a role service that allows the grouping of shares from different servers into a single logical share called a namespace.​

Distributed File System (DFS)

The ___ window shows servers that are using the current server as an update source.​

Downstream Servers

What can be used to restrict the driver packages installed by specific client computers, based on factors such as the BIOS, manufacturer, model, or OS edition used by the device?​

Driver group

An administrator wants to enable the automatic unlocking feature on a non-Windows volume. What PowerShell cmdlet should the administrator use?​

Enable-BitLockerAutoUnlock -MountPoint

A file encrypted with the Encrypting File System can be opened by anyone with the proper passcode.​

False

A file encryption key (FEK) is an example of an asymmetric key.

False

Under what circumstances would it be advisable to use a proxy server for synchronization of WSUS?​

If a firewall exists between the WSUS server and the update source, a proxy server can facilitate communications.

What types of updates are considered "Important updates"?​

Important updates are generally updates that solve a security issue or reliability issue.

What would be the advantage of importing a cloned DFS database instead of resorting to a database rebuild?​

Importing a clone would reduce the restoration time of the database.

What is the first step for configuring a WSUS server ​to use SSL?

Install an SSL certificate

What PowerShell command below will install the WDS role?​

Install-WindowsFeature WDS

What does the "Configure DHCP options for Proxy DHCP" option do?

It configures a Microsoft DHCP service to automatically forward PXE requests to the WDS server

What two different types of options can be used for the WSUS update file location?​

Local folders or remote shares, through the use of a UNC path.

Select below the option that best serves as an example of server-side targeting:

Moving computers within the WSUS console to custom groups

What happens if a GPO containing automatic update settings is applied to an OU with only user objects inside?​

Nothing, since automatic update settings do not affect user accounts directly.

What option for the "Configure automatic updating" GPO setting places the responsibility for downloading and installing updates on the computer's user?​

Notify for download and notify for install

If the default automatic approval rule is enabled, what types of updates are approved automatically?​

Only critical and security updates

Which feature below enables an admin to perform a basic unattended installation by specifying the computer name, selecting the boot and install images a client should receive, and joining ​the client to a domain?

Prestaging

utilizes a single key to encrypt and decrypt data, and is also known as private key cryptography.​

Symmetric encryption

The WSUS _______ shows the results of the last synchronization attempt.​

Synchronization report

What is the default level of access configured on an image group?​

The Authenticated Users group has read access

Why might an administrator want to modify the replication schedule and bandwidth usage?​

The default DFS replication settings try to make use of network's full bandwidth when performing replications.

What can be done to improve security if the PXE Response Policy is set to respond to all client computers, both known and unknown?

The option to require administrator approval can be enabled so that each unknown computer must be approved before it will be added to the list of prestaged clients.

How is a public key used in conjunction with a private key?​

The public key is used to encrypt information which can only be decrypted by the owner's private key.

How does the Auto-Cast option in the Multicast Transmission Wizard work? ​

The transmission is started automatically when a client requests an image, and other clients requesting the same image can be joined into the transmission.

A computer that is set to apply updates manually may still automatically install updates if the updates are configured with an approval deadline.​

True

The Network Unlock feature can be used to automatically unlock a BitLocker volume when it is connected with a specific network.​

True

The Recovery mode in Windows Server 2012/R2 or Windows 8.1 installations is a Windows PE.

True

​The Trusted Platform Module (TPM) is a microchip built into some computer motherboards that is used to store cryptographic information.

True

One of the requirements for network unlock is that a Windows 8 or Windows Server 2012/R2 computer have a NIC with a ___________ -compatbility DHCP driver.​

Universal Extensible Firmware Interface (UEFI)

What is the recommended method for creating an answer file?

Using System Image Manager

The ___ is a basic bootstrap program that allows the PXE client to request the actual boot image.​

WDSNBP

Under what circumstances would a transport server be installed without a deployment server?​

When the install environment lacks Active Directory and DHCP.

The default database within WSUS is the ____ which is essentially a light version of a SQL database with no management interface.​

Windows Internal Database (WID)

The ____ feature prevents users from saving unauthorized files.

active screening

Which command below can be used to encrypt and decrypt files and folders on Windows?​

cipher.exe

What utility can be used to update a pre-existing image with patches, drivers, hot fixes, and service packs?

dism

The process of creating redundant copies of files on multiple servers is known as

replication

Which of the following is not an image format supported by WDS?

​.img

Specific drivers that are added into the WDS console under the Drivers node utilize what file extension?​

​.inf

When updating an image, what option can be used with dism to stop an update that requires a restart from being installed on a target computer?

​/preventpending

What is the maximum size of all replicated files allowed within a replication group?​

​100 TB

The Windows Internal Database requires a minimum of how much free space on volume where it's stored?​

​2 GB

When the "Install updates automatically" option is selected, at what time is Windows set to perform maintenance tasks ​by default?

​2:00 am

What is the minimum recommended amount of disk space that should be used for storing WSUS updates?​

​40 GB

The default HTTP/HTTPS ports used by WSUS server for client access are:

​8530/8531

How much RAM should be installed into a server that will function as a WSUS server?​

​At least 2 GB

If a server is using manual synchronization, how often should the server be manually synchronized?​

​At least once a week

A WSUS server that utilizes centralized administration of update approvals and client groups uses what WSUS administration mode?​

​Autonomous mode

How is the numeric string that makes up a digital signature created?​

​By using a hash algorithm

After a multicast transmission has begun, what option causes connected clients to finish the install, but prevents new clients from connecting to the transmission?​

​Deactivate

When installing WDS on a DHCP server, what option must be selected in order to avoid a conflict?​

​Do not listen on DHCP and DHCPv6 ports

A WSUS server that downloads updates from another WSUS server is known as?

​Dowstream server

In the File Server Resource Manager, which tool can be used to take action on files identified by classification properties and other attributes?

​File Management Tasks

Within the properties of a folder target, what "Override referral ordering" option will make the server the default target if it is available?

​First among all targets

Select below the topology that uses bidirectional synchronization with all members:​

​Full mesh

What PowerShell command can be used to clean up old update files on a WSUS server, including unused update files, old revisions, superseded updates, and inactive computer accounts?​

​Invoke-WsusServerCleanup

Which replication diagnostics test creates a test file in a replicated folder, then tests replication of that file to other servers in the replication group?

​Propagation test

​How can an administrator force a client computer that is set to install updates manually to automatically apply a specific update?

​Set an approval deadline for the update

An administrator has noticed that GPO containing new update settings has not yet applied to one of the computers on the network. What command can the administrator run to force the GPO to be applied?

​gpupdate /force

When preparing a reference computer for image capture, what utility must be used to reset system identifiers and other information unique to the computer?​

​sysprep

Which command can be used to successfully move the WSUS update files location?​

​wsusutil movecontent <destination folder>

What command below must be used to tell WSUS to make use of SSL?​

​wsusutil.exe configuressl <WSUSServerName>


Conjuntos de estudio relacionados

(ORANGE BOOK)Therapeutic Equivalence Codes

View Set

Chapter 1 - The Human Body: An Orientation

View Set