DF FINAL

¡Supera tus tareas y exámenes ahora con Quizwiz!

Both Generation 1 and Generation 2 virtual machines support Secure Boot. a. True b. False

False

Creating OUs within the Active Directory database is also called prestaging. a. True b. False

False

Domain controllers store local user accounts within a SAM database and domain user accounts within Active Directory. a. True b. False

False

In the following example, three loops will be executed.$args = "one","two","three","four"foreach ($i in $args) {write $i -foregroundcolor magenta} a. True b. False

False

PowerShell console files use the .ps1 extension. a. True b. False

False

Replication must be enabled on your Hyper-V host before you are able to copy the contents of a virtual machine to a target Hyper-V host. a. True b. False

False

Servers that exist within a data center that is publicly accessible on the Internet are referred to as on-premises servers. a. True b. False

False

The Sigverif tool can be used to verify and repair corrupt system files. a. True b. False

False

The View effective access tab within the Advanced Security Settings window for a folder or file can be used to view the groups that have access to a particular folder or file. a. True b. False

False

Virtual machine settings are stored within a .vhdx file. a. True b. False

False

Windows Server 2019 supports up to 64 physical processors and 128 logical processors. a. True b. False

False

You are configuring a DFS replication group to synchronize folder contents between four file servers. To minimize the network bandwidth used by DFS replication, you should choose a Full mesh topology for your replication group. a. True b. False

False

You can use the Install-ADDSDomain cmdlet within Windows PowerShell to configure a new forest root domain. a. True b. False

False

Which Windows Server edition supports Windows Containers and up to two Hyper-V Containers? a. Essentials b. Standard c. Datacenter d. Storage Server

Standard

Which of the following Windows Server 2019 editions are licensed per processor core? (Choose all that apply.) a. Essentials b. Standard c. Datacenter d. Hyper-V Server

Standard Datacenter

After importing a virtual machine template to create a new virtual machine, you should rename the new virtual machine. a. True b. False

True

Any changes to a guest operating system made following the creation of a checkpoint are stored within a.avhdx file in the same directory as the associated .vhdx file. a. True b. False

True

Before installing Active Directory on a Windows Server system to function as an additional domain controller within a forest, you must first ensure that the Windows Server is configured to contact a DNS server that contains the appropriate service records for the forest. a. True b. False

True

Both NFS and SMB shared folders can be published to Active Directory. a. True b. False

True

Clustering may be used with multiple Windows Server 2019 systems to enhance speed and fault tolerance for network services. a. True b. False

True

Commands within Windows PowerShell are referred to as cmdlets. a. True b. False

True

Guest operating systems require VMBus drivers to support the virtualized hardware within a Generation 2 virtual machine. a. True b. False

True

If a RODC is stolen, you can delete the computer account to reset affected user and computer accounts. a. True b. False

True

If a global catalog cannot be placed within a branch office site, you can enable UGMC on the site to ensure branch office domain controllers provide fast authentication. a. True b. False

True

Only the NTFS filesystem supports all of the basic and advanced attributes for folders and files. a. True b. False

True

Server Manager can be used to monitor and manage other Windows Server 2008 and later systems. a. True b. False

True

Some software issues require that you modify the value of an entry within the Windows Registry to fix a system problem. a. True b. False

True

System environment variables apply to any user logged onto the system. a. True b. False

True

The Tab key can be used to auto complete a PowerShell cmdlet as you are typing it. a. True b. False

True

The Test-NetConnection cmdlet can be used to test network connectivity to a target computer. a. True b. False

True

The Windows Admin Center allows you to obtain a Windows PowerShell session within your Web browser. a. True b. False

True

The physical network interface used by an external virtual switch is not configured using IP. Instead, it uses the Hyper-V Extensible Virtual Switch protocol to allow virtual network interfaces attached to the external virtual switch to use the physical network interface. a. True b. False

True

The schema and configuration partitions of the Active Directory database are replicated forest-wide. a. True b. False

True

To install a Windows Server 2019 virtual machine, you typically attach an ISO image file that contains the installation media to a virtual DVD drive within the virtual machine settings. a. True b. False

True

Virtual machine checkpoints are often used prior to making an important configuration change within a guest operating system, such as installing software or device drivers. a. True b. False

True

WDS can be used to install multiple physical or virtualized systems at the same time, provided those systems can boot from the network using PXE. a. True b. False

True

Windows systems that have the Client for NFS installed can access an NFS shared folder by browsing the network or specifying the shared folder's UNC. a. True b. False

True

You can start the Windows Server Configuration Wizard within Server Core by running the sconfig.cmd command. a. True b. False

True

You can use soft quotas to provide warnings to users that exceed folder quotas, while not restricting their ability to add content to a folder. a. True b. False

True

You can use the Set-ACL cmdlet within Windows PowerShell to configure entries within a DACL or SACL. a. True b. False

True

You must be a member of the Enterprise Admins group in order to add a trust relationship. a. True b. False

True

Which of the following basic NTFS/ReFS permissions allows you to delete a file? (Choose all that apply.) a. Full control b. Modify c. Write d. Read and execute

a b

Which of the following occurs when you join a computer to an Active Directory domain? (Choose all that apply.) a. The Domain Users group is added to the local Users group b. A computer account is created within Active Directory, if one has not been prestaged c. The Domain Admins group is added to the local Administrators group d. The SAM database is replaced by the Active Directory database

a b c

Which of the following hardware devices does a Generation 1 virtual machine emulate? (Choose all that apply.) a. IDE hard disk b. SCSI hard disk c. UEFI BIOS d. Serial ports

a b d

Which of the following Hyper-V features requires that your host operating system be joined to an Active Directory domain? (Choose all that apply.) a. Live migration b. Checkpoints c. Replication d. Quality of Service (QoS)

a c

Which of the following features are provided by the File Server Resource Manager server role? (Choose all that apply.) a. File screens b. Access-based enumeration c. Folder quotas d. User quotas

a c

You would like to provide a central shared folder that users can access to view all other shared folders within the organization. What must you do? (Choose all that apply.) a. Install the DFS Namespaces role and configure a DFS namespace b. Configure a replication group c. Add targets to the DFS namespace for each shared folder d. Install the DFS Replication role on each file server

a c

Your domain consists of two separate physical locations. Each location contains several domain controllers, and you have noticed that domain controller replication traffic consumes a large amount of your Internet bandwidth. What can you do within Active Directory Sites and Services to ensure that replication occurs outside of business hours? (Choose all that apply.) a. Create a site object for each physical location and ensure that domain controller objects are placed within the correct site object. b. Create subnet objects for each site. Ensure that the properties of each subnet object contains a schedule that excludes business hours. c. In the properties of a site link object, configure a replication schedule that excludes business hours. d. Modify the NTDS Site Settings for each site to include a replication schedule that excludes business hours.

a c

To create a virtual machine template, what actions must you perform at minimum? (Choose all that apply.) a. Create a new virtual machine and install a guest operating system within it b. Install additional software components within the guest operating system c. Run the System Preparation Tool within the guest operating system to remove unique identifiers d. Export the virtual machine to a folder on the filesystem

a c d

Which functions does the global catalog provide? (Choose all that apply.) a. Fast object searching b. Time synchronization c. Universal group membership d. Domain authentication using UPNs

a c d

Which of the following are valid methods for executing the superscript.ps1 file within PowerShell, assuming it is in your current directory, C:\Scripts? (Choose all that apply.) a. C:\Scripts\superscript.ps1 b. superscript.ps1 c. ./superscript.ps1 d. .\superscript.ps1

a c d

Which of the following can be used to set the compress attribute for an NTFS file? (Choose all that apply.) a. Set-ItemProperty b. cipher.exe c. compress.exe d. compact.exe

a d

Which two files must you import within the Windows Deployment Services tool to provide for remote installation? a. install.wim b. PXE.wim c. bootmgmt.wim d. boot.wim

a d

After creating a production checkpoint of a virtual machine, you would like to revert the virtual machine to the state it was in prior to the checkpoint. What should you select within the Actions pane of Hyper-V Manager after selecting your checkpoint within the Checkpoints pane? a. Apply b. Revert c. Delete d. Delete Subtree

a. Apply

Which of the following can be used to open a new Windows PowerShell prompt that is connected to a remote computer (provided that winRM is enabled)? a. Enter-PSSession computername b. Invoke-Command computername c. Execute-Shell computername d. Enable-PSRemoting computername

a. Enter-PSSession computername

To which of the following virtual switches can a host operating system connect? (Choose all that apply.) a. Internal b. External c. Public d. Private

a. Internal b. External

Which two small footprint installation options are available for Windows Server 2019? (Choose two answers.) a. Nano Server b. Microsoft Hyper-V Server c. Server Core d. Essentials

a. Nano Server c. Server Core

Which Hyper-V feature allows you to install a virtual machine within another virtual machine? a. Nested virtualization b. SLAT c. Checkpoints d. Hyper-V containers

a. Nested virtualization

Which filesystem feature of Windows Server 2019 allows you to create large volumes that span multiple physical storage devices? a. Storage Spaces b. ReFS c. Storage Migration Service d. Storage Replicas

a. Storage Spaces

What command could you execute within PowerShell to learn about the syntax of the Get-WMIObject cmdlet? (Choose all that apply.) a. help Get-WMIObject b. Get-Help Get-WMIObject c. get-help Get-WMIObject d. Get-Help Get-WMIObject -online

all

Which of the following are panes that you will see listed for a server, server group, or server role within Server Manager? (Choose all that apply.) a. Services b. Events c. Roles and Features d. Performance

all

Which of the following features can be configured within Control Panel? (Choose all that apply.) a. File caching and flushing b. Environment variables c. Power options d. Startup and recovery options

all

Which of the following tasks are typically performed following a Windows Server 2019 installation? (Choose all that apply.) a. Verify the correct time and time zone information b. Activate the Windows Server 2019 operating system c. Configure the appropriate computer name and domain membership d. Set IP configuration on network interfaces

all

Which of the following FSMO roles are stored on one domain controller within each domain? (Choose all that apply.) a. Schema Master b. PDC Emulator c. RID Master d. Domain Naming Master

b c

You have a large number of users that access the same files within a shared folder that is replicated to another shared folder on the network using DFS replication. Users often report problems with missing content in the files that they access within the shared folder, and that changes take a long time to propagate from one shared folder to the other. What two actions can you take to address these issues? (Choose two answers.) a. Add a shared folder on a third file server to the replication group b. Disable remote differential compression (RDC) on the connections within the replication group c. Increase the size limit of the DFS staging folder for each member of the replication group d. Modify the replication group settings to use a Full mesh topology for replication

b c

Which of the following domain functional levels provides Kerberos armoring? (Choose all that apply.) a. Windows Server 2008 R2 b. Windows Server 2012 c. Windows Server 2012 R2 d. Windows Server 2016

b c d

Which of the following occurs when you encrypt a file using EFS within a domain environment? (Choose all that apply.) a. An asymmetric private key is generated and used to encrypt the file contents b. A copy of the symmetric encryption key is stored within the file metadata and asymmetrically encrypted with your public key c. A symmetric encryption key is generated and used to encrypt the file contents d. A copy of the symmetric encryption key is stored within the file metadata and asymmetrically encrypted with recovery agent's public key

b c d

Which of the following group scopes can contain objects from any domain within the forest? (Choose all that apply.) a. Global b. Domain local c. Distribution d. Universal

b d

Your server has an additional SSD that you wish to use exclusively within a virtual machine as a pass-through disk to increase performance. What must you do to achieve this? (Choose two answers.) a. Ensure that the SSD is set to an Online state within the Disk Management tool. b. Ensure that the SSD is set to an Offline state within the Disk Management tool. c. In the properties of the virtual machine, create a new virtual hard disk file that is stored on the drive letter that is used by the SSD. d. In the properties of the virtual machine, select an existing virtual hard disk, choose Physical hard disk, and select the SSD.

b d

Which action should you choose for a virtual machine within the Actions pane in order to obtain the Virtual Machine Connection window? a. Start b. Connect c. View d. Ctrl+Alt+Del

b. Connect

What term is used to refer to a logical grouping of computers that participate in Active Directory single sign-on? a. Group Policy b. Domain c. Domain controller d. Azure Active Directory

b. Domain

Which of the following Hyper-V features allows a virtual machine to use additional physical memory within a server, provided that it is available? a. Smart caching b. Dynamic memory c. Smart paging d. Shielding

b. Dynamic memory

The minimum memory required for a graphical Windows Server 2019 installation is 512 MB. a. True b. False

b. False

Which of the following PowerShell cmdlets can be used to move or seize a FSMO role? a. Move-FSMORole b. Move-ADDirectoryServerOperationMasterRole c. Transfer-ADOperationMasterRole d. Set-DirectoryServerOperationMaster

b. Move-ADDirectoryServerOperationMasterRole

You wish to add a copy of the global catalog to a domain controller within Active Directory Sites and Services. For which object must you right-click and select Properties? a. Server b. NTDS Settings c. NTDS Site Settings d. Site link

b. NTDS Settings

You wish to grant a specific user the ability to view the read-only attribute on files within a particular folder on the system, but do not wish to grant any other access. What advanced permission should you assign to this user? a. Traverse folder/execute file b. Read attributes c. Read extended attributes d. Read permissions

b. Read attributes

You would like to share a folder that uses the access-based enumeration feature. What must you do? a. Share the folder using SMB by accessing folder properties. b. Share the folder using SMB using Server Manager. c. Share the folder using NFS by accessing folder properties. d. Share the folder using NFS using Server Manager.

b. Share the folder using SMB using Server Manager.

Which of the following is not a question that should be asked when planning a Windows Server 2019 installation? a. What are the storage needs of the server? b. Who will be supporting the server? c. How many users are expected to connect to the server? d. What services will the server run?

b. Who will be supporting the server?

You are about to move an EFS-encrypted file called SecureData.xml from a folder on an NTFS volume to a folder on a ReFS volume. Which of the following statements are true regarding the permissions and encryption on the file following the move operation? (Choose all that apply.) a. SecureData.xml will retain its original permissions following the move operation b. SecureData.xml will remain encrypted following the move operation c. SecureData.xml will inherit the permissions from the target folder following the move operation d. The SecureData.xml will be not be encrypted following the move operation

c d

You have shared a folder using SMB and assigned members of the Accounting group Full Control shared folder permission. One of the members of the Accounting group complains that they get an access denied message when attempting to access files within the shared folder. What are two possible causes of this issue? (Choose two answers.) a. The shared folder is on an FAT32 or exFAT volume, and the DACL on the files denies access to a group to which the user belongs b. The shared folder is on an FAT32 or exFAT volume, and the DACL on the files does not allow the user access c. The shared folder is on an NTFS or ReFS volume, and the DACL on the files denies access to a group to which the user belongs d. The shared folder is on an NTFS or ReFS volume, and the DACL on the files does not allow the user access

c d

Your organization maintains a shared folder called PrivateHR that only the HumanResources-G and Domain Admins groups have access to. You wish to audit each time a member of the HumanResources-G group successfully modifies or deletes a file within this folder. What must you do? (Choose all that apply.) a. Configure an audit entry within the SACL of the PrivateHR folder that allows the Modify permission for the HumanResources-G group b. Configure the audit attribute on the PrivateHR folder c. Configure an audit entry within the SACL of the PrivateHR folder that audits the Modify permission for the HumanResources-G group d. Enable success auditing for the system using an audit policy

c d

Which component of Microsoft Defender can be used to provide cloud-based threat analysis within Windows Server 2019? a. Shielded virtual machines b. IIS c. ATP d. Windows Defender Firewall

c. ATP

Which of the following utilities can be used to manually install a new device that is not fully PnP-compliant? a. Windows PowerShell b. Device Manager c. Devices and Printers utility d. Server Manager

c. Devices and Printers utility

Which of the following are hardware requirements for Hyper-V? a. 64GB of memory b. Two network interfaces c. Processor with Intel VT or AMD-V and SLAT d. A 32-bit or 64-bit processor

c. Processor with Intel VT or AMD-V and SLAT

Which of the following NFS shared folder permissions allows computers to access an NFS shared folder and modify content? a. Full Control b. Change c. Read-Write d. Modify

c. Read-Write

You have created a template user account within Active Directory Users and Computers. What must you do to create additional user accounts based on this template user account? a. Create a new user account and select the template user account when prompted b. Create a new user account and specify the name of the template user account in the User Principle Name text box c. Right-click the template user account, and click Copy d. Right-click the template user account, and click Import

c. Right-click the template user account, and click Copy

Which of the following Windows logs stores auditing events? a. System b. Application c. Security d. Auditing

c. Security

Which of the following tools within the navigation pane of the Windows Admin Center can be used to perform capacity planning? a. Performance b. Services c. System Insights d. Azure hybrid services

c. System Insights

Which of the following operating systems are supported for use within a Generation 2 virtual machine? (Choose all that apply.) a. 32-bit versions of Windows 7 b. 64-bit versions of Windows Server 2008 c. Ubuntu 14.04 d. FreeBSD 9.1

c. Ubuntu 14.04

Which default folder under a domain within Active Directory Users and Computers contains the Administrator user account and Domain Admins group? a. Builtin b. Default c. Users d. ForeignSecurityPrinciples

c. Users

Which of the following commands may be used to start Hyper-V Manager? a. hyperv b. hyper-v c. virtmgmt.msc d. new-virtconsole

c. virtmgmt.msc

Your system has three physical storage devices. Windows Server 2019 is installed on the first physical storage device. What can you do to increase the performance of the system as much as possible? a. Move the paging file to the second physical storage device b. Move the paging file to the third physical storage device c. Create a paging file on the second and third physical storage devices d. Create a paging file on the second and third physical storage devices and remove the page file from the first storage device

d. Create a paging file on the second and third physical storage devices and remove the page file from the first storage device

Which of the following trust relationships can be created between two domains in separate Active Directory forests? a. Forest trust b. Shortcut trust c. Realm trust d. External trusts

d. External trusts

What should be your first course of action when you see a device marked Unknown within Device Manager? a. Install the manufacturer-provided driver package on the system and reboot. b. Right-click the Unknown device within Device Manager and choose Update driver. Supply the manufacturer-provided driver files if prompted. c. Right-click the Unknown device within Device Manager and choose Uninstall device. Reboot your system afterwards. d. Right-click the Unknown device within Device Manager and choose Properties. Note whether there is a resource conflict.

d. Right-click the Unknown device within Device Manager and choose Properties. Note whether there is a resource conflict.

Which of the following management tools is not installed by default on Windows Server 2019? a. Server Manager b. MMC c. Windows PowerShell d. Windows Admin Center

d. Windows Admin Center

Which of the following aliases can be used to switch to a different PowerShell provider? a. sp b. ps c. cd d. sl

d. sl

The Active Directory Recycle Bin can be enabled using the Active Directory Domains and Trusts tool. a. True b. False

false

Which of the following PowerShell constructs is best to use when you wish to perform a specific action based on the value of a single variable? a. if b. switch c. do...while d. for

switch

Containers are often used to host Web apps within cloud environments. a. True b. False

true

Server Manager is typically used to perform most post-installation tasks on a graphical Windows Server 2019 system. a. True b. False

true


Conjuntos de estudio relacionados

I am a lung disease. Guess which one

View Set

Smooth muscle and Motility in the GI tract

View Set

Chapter 17 Evolutionary Processes

View Set

Mixed Acceleration and Acceleration with Displacement Problems

View Set