final

¡Supera tus tareas y exámenes ahora con Quizwiz!

storage space direct requirement

10 gb Ethernet

When you join a computer to an Active Directory domain:

A computer account is created for your computer within the Active Directory database. The Domain Admins group in Active Directory is added to the local Administrators group The Domain Users group in Active Directory is added to the local Users group he Domain Guests group in Active Directory is added to the local Guests group

Keplez Informatics is headquartered in Sydney, Australia, and has smaller branch offices spread across the world. The RODC in one of the branch offices gets stolen. Shannon is the system administrator at Keplez Informatics.

Delete the RODC computer account

To replicate a virtual machine, it is sufficient that replication is enabled on the Hyper-V host of the virtual machine that is being replicated.

False

What is the first step in troubleshooting an issue where a single computer is unable to lease an address?

First confirm that the computer has a physical connection to the network.

Devika copies a file, TFPresentation, from a folder titled "Mach-2" to a folder titled "Mach-3" on the same NTFS disk volume. The Mach-2 folder allows Read access to the Editor group, while explicitly denying Write permission to the same group. The Mach-3 folder allows Full control to the Editor group. TFPresentation, the original file, has Modify permissions for the Editor group.

Full control

Sanya, an IT administrator for an organization, installs a new application on 150 computers used by programmers in the organization. She does this with a few clicks only for this specific set of users without impacting the rest of the organization.

Group Policy

neww iscsi target but he is facing a connection issue

IDQ is not present in the access server list

Which of the following is the most likely cause for missing resource records in a secondary zone?

Missing resource records in a secondary zone are often caused by zone transfer issues.

While copying files between folders, it is possible to retrace and complete the transfer in case of a power failure if an NTFS-based filesystem is being used. The same cannot be said for a FAT32 filesystem.

NTFS is a journaling filesystem, while FAT32 is not.

How is NTFS self healing

NTFS volumes are self-healing. This means that when software encounters a damaged disk area, NTFS can heal the area without having to take down the server. NTFS self-heals by generating a "worker thread" that repairs data from the damaged area

Lehana is creating a new virtual machine using the New Virtual Machine Wizard. After choosing the name WindowsServer2019VM for her virtual machine, she proceeds to the next step. She chooses Generation 1 when prompted to pick the generation for the virtual machine. Which of the following reasons justifies Lehana's choice

Recall that Generation 2 virtual machines emulate Serial Attached SCSI (SAS) storage devices.

Machine with least downtime

Replication Hyper-V also provides a replication feature that can be used to create a copy of a virtual machine on a destination Hyper-V host within the same Active Directory domain that is continually updated as changes are made. Should you experience a hardware failure on your Hyper-V host, you can start the replicated virtual machine on the destination Hyper-V host to ensure that users can access the resources provided by the guest operating system.

What happens if an encrypted file in an NTFS partition on a Windows 10 system is moved to a FAT32 partition on a Windows 7 system?

Storage Spaces Direct

Which service is a faster replacement for the Windows Indexing Service that is available on Windows Server 2019?

The Windows Search Service

Rozalia installs the Windows Deployment Services (WDS) role on SERVERX. She intends to use SERVERX to enable rapid server deployment across her organization's network. She opens the Windows Deployment Services tool and notices a yellow warning icon on the SERVERX server object in the navigation pane. What does this indicate?

The first time you open the Windows Deployment Services tool, you will see a yellow warning icon on your server object in the navigation pane indicating that the WDS service needs to be configured.

Read only domain controller

They primarily used as a way to provide security/authentication for domains. They are read only copies of databases within an active directory.

You are troubleshooting a DHCP server and discover that it is not dynamically updating DNS records for DHCP clients. What is the most likely cause for this issue?

This can happen if the DNS server is not in the same domain as the DHCP server.

Access to a shared folder will use most restrictive permissions

True

Hyper-V supports nested virtualization that can be used to create virtual machines within another virtual machine.

True

If domain1.com is the forest root domain, you can use the command Set-ADForestMode Windows2012R2Domain to raise the forest functional level to Windows Server 2012 R2.

True

A system administrator wants to give NTFS folder permission to a project manager so that the manager can add or remove the read-only, hidden, archive, index, compress, and encrypt attributes.

Write extended attributes

Christopher sets up multiple WINS servers in his organization and configures users' computers to use the WINS server. During testing, he attempts to access a folder called Share on the computer SERVERA. He enters the following statement into File Explorer: \\serverA\share. However, Christopher is unable to access the shared folder.

a. SERVERA does not have a NetBIOS name record on any WINS server.

Walter Wells, Inc., a company that builds robotic process automation (RPA) applications, uses Windows Server 2016 to run several Linux and Windows virtual machines.

a. Walter Wells spends a considerable amount of money on encrypting Linux virtual machines.

Which of the following is true of WINS?

b. It can only resolve NetBIOS names to IPv4 addresses.

You are the system administrator at an organization. Most of the servers in your organization, including domain controllers, are running Windows Server 2012 and above. Some servers, excluding domain controllers, are running Windows Server 2008 R2. Most of the clients are running Windows 10, but a few systems are running Windows 7. You have been tasked with improving the security measures of the Active Directory forest by restricting malicious access to Active Directory. You decide to use Privilege Access Management.

c. Update all the domain controllers running Windows Sever 2012 to Windows Server 2016

By default, a new domain has six organizational units: Domain Controllers, Builtin, Computers, ForeignSecurityPrincipals, Managed Service Accounts, and User.

false

if efs keys are not backed up you can still access efs files

false

Which of the following is a term given to the software component in the operating system that connects to the SAN device via iSCSI?

iSCSI initiator

How much storage space is reserved on a storage device to convert a storage disk to a dynamic disk using a Windows tool?

the last 1 MB of storage on the device is automatically reserved to converted to a dynamic disk

you can create a gpt on a disk that has an mbr

true

Which of the following is the most likely cause for missing resource records in a secondary zone?

zone transfer issues


Conjuntos de estudio relacionados

COM 312: Chapter 9: Managing Conflict Through Forgiveness

View Set

Hands on Machine Learning with Scikit-Learn, Keras & TensorFlow

View Set

Chapter 13 Nutrition for Older Adults

View Set

Gilded Age and Unionization (1865-1900)

View Set

Unit 7 (Use of financial statements)

View Set