Hands-On Microsoft Server 2019 Final

¡Supera tus tareas y exámenes ahora con Quizwiz!

You need multiple boot images on a WDS server, one for each operating system.

False

If a site cannot hold a copy of the global catalog, which of the following features can be enabled on the site to provide fast authentication?

Universal Group Membership Caching

. Identify the option that can be used to create storage pools that include storage devices from different servers on a network.

a. Storage Spaces Direct

Which of the following statements is true of SAN devices?

d. SAN devices are functionally like an external USB drive.

Kristoffer creates a PowerShell script to automatically execute a set of tasks on system startup. He uses variables in his script to accomplish certain tasks. He is using a variable to filter out certain conditions during which the script should not execute. Which of the following names can Kristoffer use for the variable?

$count

Hasad is the system administrator for a marketing company. The company stores sensitive data in a folder named Assets on the company's network drive. Hasad is asked to identify the users who access the files within the folder or make changes to them. Which of the following steps should Hasad take to track all the activity within the folder Assets?

. Edit the Default Domain Policy object to enable auditing functionality

Which of the following is true of Storage Server 2019?

. It cannot be purchased from Microsoft directly

What is the IP address that is assigned to the network loopback interface?

127.0.0.1

You are investigating strange traffic on your network and wish to resolve an IP address to a DNS name. What resource record should you use to perform a reverse lookup?

A PTR record

Kiora is setting up an RODC for the first time at one of her organization's branch offices. She creates a prestaged RODC computer account. Next, she installs a Windows Server 2019 system that will function as the RODC. What is the most appropriate step that Kiora should take next?

Add branch office user accounts to the Allowed RODC Password Replication Group

Janice has set up a Windows Server 2019 lab environment to practice labs related to her training. The base operating system is Windows 10. She has three Windows Server virtual machines running. If one of the virtual machines is running inside another virtual machine, which of the following must also be true?

Janice has enabled nested virtualization on the Windows 10 operating system

How do you create a RAID level 1 volume with two disks in the Disk Management tool?

Right-click on the disk that you want to configure as a RAID volume and then click New Mirrored Volume to create a RAID level 1 volume with two disks

Ryan, a server administrator, is attempting to install the Windows Admin Center on a server called SERVERX. However, he is unable to do so. Which is the following may be a reason for this?

SERVERX is the domain controller for the Active Directory

Which of the following tabs help configure the times that a printer is available to users, the printer priority, the printer driver, and spooling options?

The Advanced tab

Access to a shared folder on the network will use the most restrictive permissions, regardless of whether they are NTFS or share permissions.

True

Installing the Hyper-V role will install the Hyper-V hypervisor, Hyper-V Manager console, and Hyper-V PowerShell cmdlets.

True

What is the term for programs and system software that can query WMI?

WMI consumers

Achelle Electronics purchases hardware to set up 25 servers. The IT department must deploy Windows Server 2019 on these machines. Which of the following Hyper-V features should Achelle Electronics use?

Windows Deployment Services

Zuber is configuring Windows Server 2019 as an iSCSI SAN device. He has successfully created an iSCSI virtual disk and a new iSCSI target. He is trying to connect his system to the new iSCSI target but he is facing a connection issue. What must be the cause for the connection issue?

a. IQN is not present in the access server list.

Raven is adding FSMO roles to domain controllers in the domain1.com forest. The forest contains a single domain and three domain controllers, DC1, DC2, and DC3. DC1 contains a copy of the global catalog, and all three domain controllers have the latest version of Windows Server 2019 installed. Which of the following is a best practice that Raven should follow?

a. She should create the Domain Naming Master role on DC1.

Chen is a freelance web developer who uses a Windows 10 computer. When she needs to test her web application on a different operating system, she sends it to her friend who has other operating systems installed on multiple devices. This is a time-consuming process. She's looking for a way to test the web application across different operating systems on her own computer. Which of the following features should she use?

virtualization

Which of the following organizations should consider using Azure Active Directory?

. An organization that subscribes to Office 365 services

You are in the process of installing Windows Server 2019 Standard Edition on your computer. You have downloaded the corresponding ISO file and burned it to a DVD. Which of the following steps should you take next?

Change the boot order in the BIOS

Which of the following options on a print queue webpage refreshes the list of print jobs within the print queue when selected?

Document List

Shweta, a system administrator at Status Wire, is configuring Windows Server 2019 using Server Manager. She wants the Dashboard to display an alert whenever the server exceeds certain CPU usage. Which of the following panes should she use to configure this setting?

Performance

What separator page file is used with PostScript-only printers and prints a separator page at the beginning of each document?

Sysprint.sep

Which of the following is a component that enables users to search and locate a shared folder in the Active Directory?

LDAP

Which of the following options provided by Windows Server 2019 helps configure folders that are on different servers to synchronize contents?

Distributed File System (DFS) replication

What option should you use on a printer's Advanced properties page if pages from different jobs are mixed?

a. Start printing after last page is spooled

Live Migration cannot be enabled if the Hyper-V host operating system is joined to an Active Directory domain

False

Pausing all documents within a print queue is often performed after performing routine maintenance on a print device, such as changing toner or refilling paper trays.

False

The DFS Replication role needs to be installed to configure folder quotas and file screen

False

Devika copies a file, TFPresentation, from a folder titled "Mach-2" to a folder titled "Mach-3" on the same NTFS disk volume. The Mach-2 folder allows Read access to the Editor group, while explicitly denying Write permission to the same group. The Mach-3 folder allows Full control to the Editor group. TFPresentation, the original file, has Modify permissions for the Editor group. What is the effective access of the Editor group on the copied file?

Full control

Which feature of Windows Server 2019 is designed to foil malware by preventing programs from using system memory space?

Data Execution Prevention

Don is the system administrator for an organization that conducts virtual IT training sessions. Each participant, during these training sessions, creates multiple unique applications to address various problems. The applications have different hardware resource requirements. Don needs to set up a virtual lab with twenty Windows operating systems on 1 TB storage space for two different training programs. Help Don choose the right size of the virtual hard disk files

Don should use thin provisioning

Ananya is installing the Hyper-V role on a server. When prompted for the location of the virtual machine files, she changes the location from the default value to E:\VMs. Where will the virtual machine configuration files be stored?

E:\VMs\Virtual Machines

The modern partition table is called the Master Boot Record (MBR) and uses storage devices that are larger than 2 TB.

False

The subnet mask cannot be modified once a scope is created.

True

Sanya, an IT administrator for an organization, installs a new application on 150 computers used by programmers in the organization. She does this with a few clicks only for this specific set of users without impacting the rest of the organization. Which of the following features of Active Directory is exemplified by Sanya's actions in this scenario?

Group Policy

You are experiencing problems during the installation of Windows Server 2019. More specifically, critical file extensions have lost their associated program data. You need to restore the settings from a Registry backup. Where will the settings be found?

HKEY_CLASSES_ROOT

Which of the following options is provided by the Print Management tool to quickly check the status of printers to identify any problems?

. Custom filters

Which of the following statements regarding a domain functional level is accurate?

. It represents the oldest Windows Server version that can be used on a domain controller.

What happens if an encrypted file in an NTFS partition on a Windows 10 system is moved to a FAT32 partition on a Windows 7 system?

. The file is decrypted and placed onto the FAT32 volume

Which of the following is true of WINS

It can only resolve NetBIOS names to IPv4 addresses.

. How much storage space is reserved on a storage device to convert a storage disk to a dynamic disk using a Windows tool?

1 MB

Which of the following is a requirement for using Storage Spaces Direct?

A 10 GB Ethernet network interface with remote-direct memory access (RDMA) support is a must.

Which printer server configuration task is performed before shared printers are added within the Print Management tool?

Add manufacturer-supplied printer drivers for the associated print device

Which of the following statements is true of the ownership of a file or folder?

An administrator can take ownership of a file or folder without being granted the permission to do so

Carlos is configuring a DHCP server in his organization. Some of the computers in his organization contain manually configured IP addresses. Currently, he is setting up the new server to configure IP addresses for users who operate their mobile devices on the organization's network. Which of the following decisions should Carlos reevaluate

Carlos sets the subnet mask as 255.255.255.0.

Which of the following statements about directory partitions is true?

Changes to a domain partition on a domain controller are only replicated to domain controllers within the same domain.

Candice, a graphic designer, attaches a new portable hard disk to her computer. She can connect to the hard disk immediately without installing any drivers. After some time, she turns on the second monitor attached to her computer. The display malfunctions despite being connected to the computer and receiving adequate power supply. What is the most likely explanation for this issue?

Computers contain a limited number of IRQ lines

. By default, a new domain has six organizational units: Domain Controllers, Builtin, Computers, ForeignSecurityPrincipals, Managed Service Accounts, and User.

False

A limitation of Windows PowerShell is that it cannot be used to install or remove Windows roles.

False

By default, the only site created within a new forest does not contain any domain controller.

False

If there are multiple DHCP servers on a network, DHCP clients will accept the first offer that they receive

False

The XPS API stores documents within a spool folder using Enhanced Metafile (EMF) format.

False

The print server does not spool the print job when branch office users connect to a shared printer across the Internet that has BODP enabled.

False

What is the use of the New-ADReplicationSite Windows PowerShell cmdlet?

It can be used to create a new site object

Nodin is a system administrator in training. He is trying to grant the user, Becky Winters, shared folder permissions using Server Message Block. Help Nodin identify the correct sequence to grant Becky Winters Full control shared folder permissions.

Right-click the folder, click Properties, highlight the Sharing tab, and click the Advanced Sharing button.

Caylin, an IT administrator, receives an email from a coworker that the company website, eloxnet.com, is not accessible. She decides to check if there is an issue that is preventing access to the website. Which of the following PowerShell cmdlets should Caylin run first?

Test-NetConnection

Alina is using Windows PowerShell on a Windows Server 2019 system for the first time. She wants a list of all cmdlets in PowerShell, so she types the following command: PS C:\Users\Administrator>Get-Command | More Why does Alina use the pipe symbol (|) in this command?

To send the output from Get-Command to More, which displays the output page-by-page

Which of the following is the most likely cause for missing resource records in a secondary zone?

Zone transfer issues

Identify the process that coverts the documents within the spool folder to a format understandable by the print device.

Rendering

Felipe requests the system administrator, Lucida, to change the font settings on a shared desktop system. Felipe wants a larger font size when he logs onto this computer. Which Registry root key should Lucida access to change the font size?

. HKEY_CURRENT_USER

Keplez Informatics is headquartered in Sydney, Australia, and has smaller branch offices spread across the world. The RODC in one of the branch offices gets stolen. Shannon is the system administrator at Keplez Informatics. What is the appropriate security measure that Shannon should take?

Delete the RODC computer account

The Device and Printers utility contains print server configuration options that are not available within the Print Management tool.

False

Trimming erases sections of the volatile memory chips on an SSD that no longer contain data, consolidating the existing data into fewer memory locations.

False

Within a workgroup environment, if EFS keys are not backed up, you can still access EFS files when they are restored after a recovery, provided you are a member of the Administrators group.

False

Which of the following print server permissions allows users to configure print server settings within the Print Management tool?

Manage Server

Madison is using the Backup Schedule Wizard from the Actions pane of the Windows Server Backup tool. He selects the backup configuration as Custom and specifies the items to be backed up. While adding the items to be backed up, he happens to select the System state option. What does this option create a backup of?

Operating system settings

Danielle creates a new scope, Sales LAN, for a DHCP server in her organization. She wants to assign an IP address to a printer in the sales department. Which of the following folders should Danielle use to configure this option?

Reservations

Nodin, a trainee system administrator, is configuring a shared print device, PrinterA, on a colleague's computer. PrinterA is shared through ServerV. He uses the format below to successfully configure the print device. \\ServerV\PrinterA Identify the protocol that he most likely used.

SMB

Identify a vital service provided by secondary DNS servers.

Secondary DNS servers respond to DNS lookup requests using read-only zone files.

Malia configures a primary zone on a DNS server to accept dynamic updates. Whenever a computer is added to the network, resource records for the computer are automatically created. For a computer, NX2001EY, Malia configures resource records manually. On the Zone Aging/Scavenging Properties window, she selects Scavenge stale resource records, sets the No-refresh interval to 14 days, and sets the Refresh interval to 14 days. She also enables automatic scavenging in the DNS server's properties. If Malia removes NX2001EY from the network, what is the most likely outcome in this scenario?

Some of the resource records for N2001EY will be made available for scavenging after 28 days

. Access-based enumeration limits the shares a user can see to only the shares for which the user has at least Read permission.

True

Which of the following statements is true of a client on a computer network?

c) It is computer that requests for resources from another computer on the network

You are the administrator for an Active Directory domain and have been tasked with improving the response time for resolving DNS queries for resources in a second company-owned domain that does not use Active Directory. What type of zone can be used to accomplish this task with minimal overhead?

A stub zone

Alaska, a system administrator, copies important and sensitive encrypted files from an NTFS filesystem to various locations on the network. As the files are encrypted, she is not worried about anyone accessing the files. However, the file copy in one of the locations is no longer secure as it has been decrypted and can be read by anyone who has access to the folder. Which of the locations is most vulnerable to theft among the locations where the files have been copied?

FAT32 on a Windows 7 system

Decision constructs such as If and Switch allow you to perform a task multiple times.

False

For zones that allow dynamic updates, you do not need to create CNAME and MX records or host records that provide for round robin or netmask ordering.

False

If domain1.com is the forest root domain, you can use the command Set-ADForestMode Windows2012R2Domain to raise the forest functional level to Windows Server 2012 R2.

False

Jonathan has access to the files and folders in a newly created DFS namespace. The files and folders that he does not have access to are hidden. This indicates that the access-based enumeration is enabled by default.

False

Storage pinning is the process of planning hardware for a specific server within an organization.

False

The Windows 10 Education edition supports Hyper-V but not nested virtualization

False

To replicate a virtual machine, it is sufficient that replication is enabled on the Hyper-V host of the virtual machine that is being replicated.

False

Which of the following organizations does not need to install a WINS server?

An organization that has disabled NetBIOS on its computers

Pavel is an IT project lead at Krystal Engineering. Because of his role, he is part of multiple groups, including the Developer group as well as the Project Manager group. One of the files that he is trying to access, PLStatus.xls, is not opening. Upon investigation, you find that Pavel's user account has Full control permission over the file. The Project Manager group has Modify access but not Full control. The Developer group has Write access but no Read access. What is the most likely reason that Pavel is not able to open the file?

Another group has the Deny box checked for Read access.

Raphael has successfully installed the Essentials Edition of Windows Server 2019 on his computer. He's completing some post-installation configuration tasks including naming the server. He has four options. Which of the following names should Raphael pick for the newly installed server and why?

COR-WEB-12 because it contains allowed characters and is shorter than 15 characters

Which of the following actions cannot be performed by a user with Print permission?

Cancel all print jobs

Rishab is looking for ways to manage duplicate file content on his organization's shared drive. He enables data deduplication for this purpose. To save computing resources, he wants to change the settings such that data deduplication occurs in the evening. What must Rishab do to make this change?

Click Set Deduplication Schedule

Barry, a system administrator, finds that a shared drive on his organization's network is slow because of the huge amount of data stored in it. He realizes that most employees of the company back up all their data on this drive. He wants to restrict the amount of data that each employee stores on the drive. Which of the following steps will help Barry limit employees' space usage?

Configuring user quota

What is the first step in troubleshooting an issue where a single computer is unable to lease an address?

Confirming that the computer has a physical connection to the network

Deion is creating a new virtual machine using the New Virtual Machine Wizard. After choosing the generation for his virtual machine, he is prompted to select the memory and an optional choice to enable the use of dynamic memory. He consults a colleague, Kanesha, and they decide against enabling dynamic memory. What is the most likely reason that prompted this decision?

Deion intends to use this virtual machine in a nested virtualization configuration.

Ivan is the IT administrator at Alphina Systems. He wants to be able to plug and unplug his hardware devices without using the Safely Remove Hardware option. What should Ivan do?

Disable file caching and flushing

Latanya, a system administrator, is creating computer objects. She uses the Active Directory Users and Computers tool instead of the Active Directory Administrative Center. What is the most likely reason for not using the Active Directory Administrative Center?

It uses a minimal color interface that is similar to the one provided by Server Manager.

. Imran is associating a drive letter to a filesystem so that the drive letter can be accessed by the operating system. What is the term given to the process that Imran is carrying out?

Mounting

A user, Petra.T, is trying to access their system while the global catalog server for the domain is offline. What is the most likely outcome?

Petra.T will be allowed to log in to the system with cached credentials

A user is attempting to access a shared file. The file has Full control NTFS permissions and Read permissions at the share level. What is the effective permission for the user on the file?

Read

Christopher sets up multiple WINS servers in his organization and configures users' computers to use the WINS server. During testing, he attempts to access a folder called Share on the computer SERVERA. He enters the following statement into File Explorer: \\serverA\share. However, Christopher is unable to access the shared folder. What is the most likely reason for this issue

SERVERA does not have a NetBIOS name record on any WINS server.

Haruko is a system administrator at Notion Source, a company that specializes in digital marketing. He is configuring Windows Server 2019 on SERVERX and adding multiple servers to Server Manager so that he can manage all the servers from the same console. He is trying to add SERVERY, a file server. Despite his efforts, he is unable to add this server to Server Manager. Which of the following is a likely reason that he is unable to add SERVERY to the console?

SERVERY is part of a workgroup, but the workgroup server is not on the trusted hosts list.

Identify the correct process that automatically adds SMB shared printers to computers that join a domain.

Select the printer within the Print Management tool, select More Actions, and choose Deploy with Group Policy from the Actions menu

. Gyaltsen is a system administrator who is managing the operation of virtual machines at her company. One of her key responsibilities is to ensure maximum uptime of virtual machines. She uses replication to ensure this. She is configuring replication for a virtual machine called VM1 on SERVERX to be replicated to SERVERY. If the replication is successful, which of the following tasks did Gyaltsen most likely complete?

She enabled replication on SERVERX.

Which of the following commands can be used within Windows PowerShell to view and manage print jobs within the print queue for a printer?

Suspend-PrinJob

Which of the following statements regarding the use of system and user environment variables is accurate?

System environment variables are always set first.

You are troubleshooting a DHCP server and discover that it is not dynamically updating DNS records for DHCP clients. What is the most likely cause for this issue?

The DNS server and DHCP server are in different domains.

. What is the use of adding tags to servers in the Windows Admin Center?

Tags help identify servers and can be searched using the Search dialog box.

Tamara wants to install Server Core on a virtual machine on her Windows Server 2019 computer. She tries installing it but fails. Which of the following is most likely to have caused the installation failure?

Tamara's computer has 30 GB free hard disk space.

Raymond and Lin are facing network issues on their computers. Rayna, the administrator, is troubleshooting the issue. She notices that Raymond and Lin's computers are using the same IP address, 192.167.1.85. If the organization's network uses a DHCP server, which of the following most likely caused this issue?

The IP addresses were configured manually.

Lashonda sets up a DNS server, SERVER1, with a forward lookup zone called domainA.com. It hosts the resource records for the domainX.com Active Directory domain. It contains host (A) records for two network interfaces on SERVER1 (172.16.0.10 and 192.168.1.50). The host records are associated with the FQDNs server1.domainA.com and domainA.com. There is also an SOA record and an NS record for the zone. Which of the following records identifies SERVER1 as an authoritative DNS server?

The NS record

Lehana is creating a new virtual machine using the New Virtual Machine Wizard. After choosing the name WindowsServer2019VM for her virtual machine, she proceeds to the next step. She chooses Generation 1 when prompted to pick the generation for the virtual machine. Which of the following reasons justifies Lehana's choice?

The guest operating system on the virtual machine is a 32-bit version of Windows 7.

Shaw, a server administrator, uses an iSCSI SAN protocol to transfer data to and from SAN devices at a speed of up to 40 Gb/s. He configures one of the SAN devices to provide storage to Jasper's Windows Server 2019 system. What should Jasper configure in his system to be able to connect to the storage?

The iSCSI target

Nora is a data scientist and works with programs that routinely acquire a lot of data. After data analysis, she stores the raw data for future use. However, she does not want the Windows Search Service to include the data files every time she performs a search function. Which of the following attributes should Nora deactivate to exclude the data files from searches?

The index attribute

Michelle is configuring a DHCP server in her organization. When creating a new scope, she is prompted to enter the subnet delay. She chooses to enter a few milliseconds of delay. If true, which of the following would justify this choice?

The organization contains DHCP relay agents in different locations.

. Calvin has installed Windows Server 2019 on his personal computer to take part in training program. During one of his lab exercises, his computer crashes. Upon investigation, he finds that the server has not created a crash dump file. What is the most likely reason that Calvin's computer failed to create the dump file?

The paging file is disabled on the computer

Nadia uses the Disk Management tool to create a simple volume in one of the disks. She specifies the simple volume size and chooses a drive letter. While selecting the formatting options, she modifies the default allocation unit size. What will happen if the allocation unit size is large?

The performance of file sharing applications will increase

Hamza installs the Windows Deployment Services role on SERVERX. He intends to use SERVERX to enable rapid server deployment across his organization's network. He wants SERVERX to be able to send WIM images to each computer on the network in response to their PXE requests. Which component of the Windows Deployment Services role provides this feature?

Transport Server

. The System File Checker is useful in recovering system files that have been corrupted.

True

Azure Active Directory can be configured to trust an organization's Active Directory forest, or mirror it using a synchronization service.

True

Cmdlets are case-insensitive, so Get-Host and get-host are equivalent.

True

Hyper-V supports nested virtualization that can be used to create virtual machines within another virtual machine.

True

Selecting a shared printer within the Print Management console and clicking on More Actions, Properties from the Actions menu, you will be able to change the printer name, location, and comment.

True

Using a disk management tool, you can create a GPT on a disk that has an MBR when no partitions exist on a disk.

True

When some computers have incorrect address information, you should check for the presence of unauthorized DHCP servers on the network running a non-Windows operating system and remove them if found.

True

You are attempting to upgrade a server from Windows Server 2008 R2 to Windows Server 2019 Standard Edition. What must be done in order to accomplish the upgrade

The server should be updated to the latest service pack for 2008 R2 and then upgraded to Server 2012 R2, after which the server can be upgraded to Server 2019.

Remtax offers tax consulting services over the Internet. It assists people in preparing their income tax returns. In which of the following scenarios should Remtax use Windows Server Core or Nano Server?

The server will be dedicated to web services and accessed via the Internet

. Andrei enabled the Live Migration feature of Hyper-V during its installation. He selects a virtual machine called VM1 within Hyper-V Manager and clicks on Move within the Actions pane. Next, he selects "Move the virtual machine's storage." Which of the following is true of this scenario?

VM1's virtual hard disk files will be moved to the destination server.

What are users who only have the List folder contents permission allowed to do?

They can list files in the folder or switch to a subfolder, view folder attributes and permissions, and execute files, but cannot view file contents.

Identify the true statement about Type 2 hypervisors.

They can run multiple operating systems on a single host

Dmitry installs the Hyper-V role using the Add Roles and Features Wizard. Upon completion, he is prompted to reboot the computer. However, his computer reboots twice. Why does Dmitry's computer reboot the second time?

To allow Hyper-V to start the host operating system

A system administrator wants to give NTFS folder permission to a project manager so that the manager can add or remove the read-only, hidden, archive, index, compress, and encrypt attributes. Which of the following permissions should the administrator give to the project manager?

Write extended attributes

Eileen is a Web app developer. All the apps that Eileen builds run in Linux containers on the cloud. She currently uses a Windows 7 operating system. Why should Eileen consider upgrading to Windows 10?

. Windows 10 has Windows Subsystem for Linux

Which of the following tools can be used to create an unattended answer file?

. Windows System Image Manager

Which of the following is a term given to the software component in the operating system that connects to the SAN device via iSCSI?

. iSCSI initiator

Parker runs the net start svsvc command at a Command Prompt to scan volume errors. He finds a corrupted spot on a volume. How can Parker directly go to the corrupted spot identified by the Spot Verifier service?

. By using the /spotfix option with the chkdsk command

Freya notices some performance issues with an important Generation 2 virtual machine. She realizes that the issue is caused by the presence of other virtual hard disks on the same physical disk. She has another physical hard disk on her system that is currently underutilized. She decides to use this disk as a pass-through disk to enhance the performance of the virtual machine. If Freya was able to accomplish this task successfully, which of the following must be true?

. Freya changed the physical disk's settings to take it offline.

Faustino is the system administrator at an organization that has offices in multiple locations. The domain controllers in each location are within location-specific sites to improve Active Directory replication. Faustino notices performance issues in the Active Directory replication across sites. Which of the following measures can Faustino use to improve the performance?

. He change the bridgehead server to one with a faster network interface.

Hiroshi is the system administrator at an organization that has offices spread across three locations, Boston, London, and Paris. The organization has an Active Directory domain, domainA.com, with two domain controllers in each location for the marketing business unit. The company expanded recently and added over 3000 new users across these locations. Hiroshi notices that this surge in users is causing Internet congestion because of the Active Directory replication. What is a cost-effective method of dealing with this issue?

. Hiroshi should create site objects and specify timed intervals for replication using site link objects.

Which of the following is the default format used to store documents received by the GDI API for modern print devices?

. NT EMF

What is the advantage of using production checkpoints over standard checkpoints?

. Production checkpoints cause fewer problems than standard checkpoints when applied.

5. Reno is facing some DNS server issues that he is unable to resolve using nslookup, DNS manager, and other general methods. He decides to use information from the DNS Server log to identify the issue. However, the information that was logged is insufficient to resolve the issue. Reno is able to identify the issue after enabling debug logging. What should Reno do next?

. Reno should flush the DNS server cache.

Satish wants to install Windows Server 2019 Essentials Edition on his computer. The hardware specifications of his system are as follows: 3 GHz 64-bit processor, 16 GB memory, and 50 GB storage. If Satish installed the server using Rufus, which of the following is most likely true?

. Satish's computer does not have an optical disk drive

Devansh creates a checkpoint on his virtual machine before making some Windows Registry changes. After making these changes, he runs a test to verify that the virtual machine is working as intended. He notices some unintended effects of the Registry changes. Devansh applies the checkpoint to revert the virtual machine to its state before the Registry changes were made. Which of the following is true of this scenario?

. The checkpoint file that is used to reverse the changes will be deleted from the system.

A recently promoted employee at your company has called you because they attempted to log in to their computer several times with a password created after a password expiry notice, but the attempts made were unsuccessful. You have reset the user's account password, but the user is still unable to log in. What is most likely the cause of the failure?

. The user's account has been locked because of frequent failed password attempts

Martha, a support technician, is troubleshooting a problem with a shared printer. All her colleagues, including Flavio, had complained that the printer control codes appear on printouts. She identifies corrupt print drivers as the cause of the problem. She reinstalls the print driver on Flavio's computer, and he does not face this problem again. However, other people in her company still face the issue. What should Martha have done to mitigate this issue for everyone?

. Updated or reinstalled the printer driver on all the print clients individually

Walter Wells, Inc., a company that builds robotic process automation (RPA) applications, uses Windows Server 2016 to run several Linux and Windows virtual machines. Which of the following statements, if true, would make upgrading to Windows Server 2019 a good choice?

. Walter Wells spends a considerable amount of money on encrypting Linux virtual machines

Sonia is configuring a RAID level 5 array with five disks. Each disk has the capacity to store 3 TB of data. What is the total storage size that Sonia can use to store data?

12 TB

. Sam, an administrator, sends out an HR policy file to Vicky, Mohammad, Charle, and Reena. They save the HR policy file on their home directories under a shared folder of Windows Server 2019 with different file names. As a result, the same copies of the file are present multiple times with different names. Reena opens and saves the file after making minor changes. What will happen to the files when Sam enables the Data Deduplication Service on Windows Server 2019?

A new copy of Reena's file is created and associated with the same file name.

Leisl configures multiple WINS servers on her organization's network. She wants the WINS servers to be able to share the NetBIOS records with each other. Which of the following features should Leisl use?

A replication partner

What resource record type defines an IPv6 host address in DNS?

AAAA record

Censu Technologies wants to enforce a strict timings policy such that users are able to log into their systems only during specific time slots on weekdays. The company also wants to restrict access on weekends. Glenna, a system administrator at Censu, is tasked with enforcing this change. What tab under a user object's properties will allow Glenna to make this change?

Account

Iqbal publishes a shared folder named KettleProgram to Active Directory. He wants other users to be able find the folder using the search feature on File Explorer. However, in addition to finding the folder when searching for KettleProgram, he also wants the folder to show up when users search for "KettleApp." What is the most efficient method that Iqbal can use to enable this?

Add KettleApp as a keyword in the folder's properties.

. Your university has installed a shared printer, Print_MV, on SERVERX. To accommodate the large amount of print jobs generated by the students, the spool folder needs to be placed in a storage device with a large capacity. Which of the following tabs under the print server properties dialog box can be used for this purpose?

Advanced

After an RODC gets stolen along with a few other computers, Shania, the system administrator, resets the computer accounts of the stolen computers that were cached on the RODC. She accomplishes this task by using the Reset all passwords for computer accounts that were cached on this Read-only Domain Controller option. Which of the following is true of this scenario

Any computers that were not stolen will need to rejoin the domain.

As a system administrator, you are tasked with identifying the reason for print jobs not getting completed. You notice that the queue status against one of the printers is "paused." This does not provide a specific reason. To ease the process of troubleshooting in the future, you want the queue status to show specific notifications from the printer. Which of the following options would you enable for this purpose?

Bidirectional printing

Dillon wants to create a PowerShell script that automatically opens a bunch of websites whenever his system boots. He downloads a script from an Internet forum for PowerShell scripts and runs it. The script executes without warnings or asking for any additional confirmation. What is the most likely execution policy on Dillon's system?

Bypass

Huong is the system administrator for a virtual machine that is used by over 500 employees. She wants to install some device drivers to enable support for a few hardware components. Before she installs the drivers, she wants to ensure that she can revert to the current version of the virtual machine if something goes wrong with the installation. Which of the following Hyper-V features should Huong use?

Checkpoints

Radha is using nslookup to troubleshoot DNS-related issues on SERVER1. She uses the command prompt and types in the statement nslookup servery.zone1.com. SERVER1 returns an incorrect result. If SERVER1 is non-authoritative for this lookup, what should Radha do to resolve this issue

Clear the DNS Server cache, and clear the DNS cache on the resolver

Tara, an administrator, has added storage devices to the storage pool and selected the RAID level for the virtual disk using Server Manager. She wishes to allocate more space than is required for the current amount of data such that the system only uses the actual space it needs, enabling the actual size to grow with data. What would you do to achieve Tara's wish?

Create several thin-provisioned virtual disks

You are asked to create seven partitions in a storage device that uses an MBR. The device already has two partitions. However, you are also told that you cannot create more than a certain number of partitions on the storage device using an MBR. What would your next step be

Create the partitions and label one of the partitions as extended

A print device, Printer_2AC, is installed on SEVERX within your organization. The printer must be automatically added to each computer added to the domain. Which of the following options can be used for this purpose?

Deploy with Group Policy

Alfons recently received a promotion to lead a team of 35 software engineers, testers, and business analysts. When he needs to send an email or meeting invite to his team, he realizes that he must type out the email IDs for all his team members. He approaches Priyanka from the IT team to help him make this process easier and more efficient. Which of the following features of Active Directory can Priyanka use to provide a solution?

Distribution groups

Merjem, a PhD student, is writing her thesis. She takes regular backup of her files and data. When taking backup, she chooses the Faster backup performance option in the Optimize Backup Performance window. Which of the following is true of the backup process in the given scenario?

Every backup only backs up data that has been modified since the previous backup.

Fareeda, a system administrator, is configuring the security settings for a Generation 2 virtual machine called VM1. She enables the Trusted Platform Module (TPM). Next, she wants to encrypt the virtual hard disks for VM1 so that other virtual machines are restricted from using these hard disks. If the virtual hard disks are successfully encrypted, which of the following statements must be true?

Fareeda enabled shielding in the security settings for VM1.

What is the term for domain and forest functions that must be coordinated from a single domain controller?

Flexible Single Master Operations

Thandiwe is using a server running the Windows Server 2019 operating system. She notices some of the server's services are not functioning as intended. She suspects that a recent update may have caused this issue. While troubleshooting, she intends to look up the list of recently installed updates. She runs the following command: X | ogv Complete the command by selecting the missing component identified by X.

Get-HotFix

Kaya is an administrator at Kelvin Computing. Benjamin, a user, wants to access a shared folder on SERVERA, so he uses the UNC \\servera\share to access the folder. His computer then sends out a broadcast to the network to resolve the name SERVERA. Because of the broadcast, all computers on the LAN interpret it and causes additional processing that interferes with other operations. What can Kaya do to avoid this additional overhead?

Install a WINS server

Jenaro installed the Windows Admin Center on a Windows Server 2019 system called SERVERX. He intends to manage other servers using SERVERX. If SERVERX has Web server software installed using port 443, which of the following must be true?

Jenaro can connect to the Windows Admin Center only by appending the port number to the URL

Which of the following options will allow a shared printer to be automatically published, allowing domain users to search for the Print window?

List in the directory

Yihana has configured a WDS server with the appropriate boot and install images. Next, she starts the WDS service to respond to PXE requests from other computers and virtual machines on the network. She wants to enable rapid server deployment using WDS to install Windows Server 2019 on these virtual machines and computers. If Yihana can successfully install the operating system, which of the following tasks has she completed?

Listed the network interface at the top of the boot order

. Laurel creates a shared folder on a ReFS filesystem using NFS. She grants Read-Only permission to MSmark. When her colleague Mark tries to access the folder from his computer, he cannot access it. Which of the following is the most likely reason that Mark cannot access the folder?

MSmark is a computer name and not Mark's user account name

. Kettle Inc. from Florida merges with Blue Clu Networks from Minneapolis. Minisha, a system administrator, is granted the responsibility of configuring Active Directory across both locations to enable users from both locations to access common resources. If Minisha is able to accomplish this task successfully, which of the following must be true?

Minisha is a member of the Enterprise Admins group in both organizations

Denji has access to a shared folder on his company's network drive. He updates the data in some files and replaces one of the existing files on the shared folder with a new version. He wants to share the updated files with a colleague who must verify the updated data and make changes if necessary. However, the colleague can only view the file contents, and Denji does not have the rights to grant the required permission. Which of the following NTFS/ReFS folder and file permissions does Denji most likely have that allows him to make the changes mentioned in the scenario but does not allow him to grant the required permissions?

Modify

While copying files between folders, it is possible to retrace and complete the transfer in case of a power failure if an NTFS-based filesystem is being used. The same cannot be said for a FAT32 filesystem. What do you think could be the reason for this difference?

NTFS is a journaling filesystem, while FAT32 is not.

Nadira is testing an application that needs to work on multiple operating systems. For this purpose, she uses Hyper-V to set up a Windows Server 2019 virtual machine (named VM1) and a Linux-based virtual machine (named VM2) on her host Windows 10 operating system. She sets up a third virtual machine, Windows Server 2012 (named VM3), to test the compatibility of the application between Windows Server 2019 and 2012 versions. Which of the following must be true if VM3 was set up successfully using nested virtualization?

Nadira powered off VM1, ran a Powershell command and powered on VM1

. Natalie is a graphic designer who frequently works with large files. These files, which are stored on an NTFS filesystem, measure 500 MB on average. She uses a software application to create backups of her work, and she had not faced any issues with backing up her files until recently. During a recent backup, she noticed that a newly created folder was not backed up. Identify the most likely cause for this issue.

Natalie did not enable the archive attribute on the folder.

Isabella configures three virtual machines, VM1, VM2, and VM3, on a Windows Server 2019 host. The host and VM1 are connected to a physical switch (external virtual switch). VM1 and VM2 are connected to a private virtual switch. VM2 and the host are connected to an internal virtual switch. VM3 is not connected to any switch. Isabella is building an application that provides clients access to confidential financial information in a secure database. Isabella chooses to run the application on the host server and decides to implement an N-tier security design to protect the database. Where should Isabella place the database?

On VM2

Shae is using a Windows Server 2019 operating system. She recently spilled hot chocolate on her keyboard, which damaged the keyboard. She purchased a new keyboard and connected it to her computer. She assumed that she would have to download a driver to use the keyboard. To her surprise, she was able to use the keyboard without any further action from her side. Which of the following features allowed Shae to start using the keyboard straightaway?

Plug and Play (PnP)

Kristian uses the following command on Windows PowerShell to view a list of all cmdlets: PS C:\Users\Administrator>Get-Command | More The command displays a subset of the total output and follows it with the word More. On clicking the return button, the next set of results is displayed. Kristian wants to exit this and return to the PowerShell prompt. Which of these keys should Kristian press?

Q

Rebecca is configuring a RAID with three storage devices. If she saves a file, the file will be divided into three sections, with each section written to separate storage devices concurrently, in a third of the amount of time it would take to save the entire file on one storage device. Which of the following RAID levels is Rebecca configuring?

RAID level 0

Which of the following RAID level configurations is not supported by Windows Server 2019?

RAID level 2

. Abu is creating a virtual machine template to enable rapid server deployment at his organization. He creates a virtual machine named VM1. On VM1, he installs Windows Server 2019 and names the server SERVERX. Next, he installs server roles and features and adds third-party software. He then runs the System Preparation Tool. What will this tool most likely to do

Remove the computer name SERVERX

One of the disks on your computer is running low on storage space. You notice that there is unallocated space in the spanned volume. How will you use the unallocated space to increase storage space?

Right-click the volume on that disk and click Extend Volume to increase the size of the volume using the unallocated space

Pablo is a system administrator in training. He is trying to manually defragment the F: volume in Becky's system. Help Pablo identify the correct method to perform manual defragmentation.

Right-click the volume, click Properties, highlight the Tools tab, and click the Optimize button.

Mahmood works as a full stack web developer at Insignia Informatics. As one of the senior developers, Mahmood is often tasked with testing web applications built by his team. Often, he finds himself testing multiple web applications simultaneously over a short period. Mahmood uses a separate virtual machine to run each application in isolation. This often causes a resource crunch because each virtual machine uses large amounts of system resources, and Mahmood cannot be as productive as he wants to be. What would you advise Mahmood?

Run these web applications in containers

. You are the system administrator tasked with raising the domain functional level of domainA.com from Windows Server 2008 to Windows Server 2012 R2. First, you upgrade the domain controllers running Windows Server 2008 to Windows Server 2012 R2. Which of the following commands must you run next in Windows PowerShell to complete your task?

Set-ADDomainMode -Identity domainA.com -DomainMode Windows2012R2Domain

. Arpita is adding FSMO roles to domain controllers in the domainG.com forest. The forest contains other domains. domainG.com contains two domain controllers, DC1 and DC2. DC1 contains a copy of the global catalog. Which of the following is a best practice that Arpita should follow?

She should create the Infrastructure Master role on DC1.

Minato has created multiple virtual machines. He is using the Virtual Switch Manager to configure virtual switches. He wants to create an external virtual switch that will allow Hyper-V to manage network requests from these different machines. The purpose of this is to optimize performance across the network. Which of the following options should Minato enable?

Single-root I/O virtualization

Candace works as a system administrator at Capnia Systems, a product company with over 250 employees. She receives an email from her boss that says that one of the servers is running slow. The server is running the Standard Edition of Windows Server 2019, and the hardware includes HDDs and SSDs. Upon investigation, she finds that some frequently accessed files are being stored on HDDs, while other smaller and infrequently used files are stored on SSDs. Which feature should Candace enable to improve the efficiency of the server?

Storage tiering

Aspen sets up the round robin feature in DNS for an FQDN server, server.domainA.com. She creates two identical Web servers with IP addresses 192.168.1.75 and 172.6.0.15 and associates two A records on the FQDN server with these IP addresses. The first A record is associated with the Web server having the IP address 192.168.1.75, and the second A record is associated with the Web server having the IP address 172.6.0.15. Aspen uses a client with the IP address 172.6.0.95 to perform a forward lookup of server.domainA.com. Which of the following is true of this scenario?

The FQDN server will return both IP addresses, 192.168.1.75 followed by 172.6.0.15.

Felicia is drafting an email to her colleague Rhonda. After Felicia types out the email, she enters the email address [email protected] and clicks Send. Felicia's email server uses the email address typed to locate the recipient email server. Which DNS resource record for zoneA.com allows Felicia's email server to locate the recipient email server

The MX record

Rozalia installs the Windows Deployment Services (WDS) role on SERVERX. She intends to use SERVERX to enable rapid server deployment across her organization's network. She opens the Windows Deployment Services tool and notices a yellow warning icon on the SERVERX server object in the navigation pane. What does this indicate?

The WDS service is not yet configured.

Which service is a faster replacement for the Windows Indexing Service that is available on Windows Server 2019?

The Windows Search Service

Rhonda's company has a rack containing one email server, file server, web server, firewall server, UPS, SAN, and management station. Owing to a thunderstorm, a ten-block radius surrounding the company faces a power outage. Rhonda, who is working from home, tries sending an email to a colleague, but the email does not get sent. Which of the following is the most likely cause for this issue?

The blackout took down the internet so Rhonda can't reach email server

What happens when a folder with NTFS permissions is copied to a shared folder on a FAT volume

The folder inherits the share permissions but loses the NTFS permissions.

What happens when a print job exceeds the print device storage capacity

The print jobs are divided into smaller parts and sent to the print device sequentially.

Malaika uses the Edge browser on her computer to access a website. The browser sends a request to another computer over the Internet, which returns web page data that is displayed on the browser. Which of these entities is the server?

The responding Computer

Gabriela attempts to create a virtual disk on a storage pool using Server Manager. However, she is unable to select the Create storage tiers on this virtual disk option. Why do you think she is not able to use the option?

The system uses an SSD and not an HDD.

Miguel is using the New Virtual Machine Wizard to create a new virtual machine for the first time. Which of the following statements is true if Miguel creates a virtual machine with default settings?

The virtual machine will have a 127 GB dynamically expanding hard disk.

Tuyet types the following statement into File Explorer: \\serverA\Share1. The NetBIOS name is resolved by a WINS server, and Tuyet is able to access the shared folder. After this interaction with the WINS server, Tuyet does not perform any other operations that requires her computer to interact with the WINS server for over a week. Which of the following is true of this scenario?

Tuyet's computer's name record will be deleted from the WINS server.

Ahmad, a system administrator in an organization, is setting up new Active Directory domains for the Marketing and Sales teams in the organization. Previously, all the marketing and sales employees worked as a single team. Recently, the employees in these teams were reorganized into two separate teams. He is setting up Active Directory domains on Windows 2019 Server to reflect the organizational structure. What is the minimum number of domain controllers that Ahmad should add to the Marketing domain?

Two

Malaika purchased a print device that can be automatically configured by the system. The print device is PnPcapable, and it does not have a network interface. Which of these should Malaika use to connect the print device to the system?

USB

You are the system administrator at an organization. Most of the servers in your organization, including domain controllers, are running Windows Server 2012 and above. Some servers, excluding domain controllers, are running Windows Server 2008 R2. Most of the clients are running Windows 10, but a few systems are running Windows 7. You have been tasked with improving the security measures of the Active Directory forest by restricting malicious access to Active Directory. You decide to use Privilege Access Management.

Update all the domain controllers running Windows Sever 2012 to Windows Server 2016

A server rack containing data files, databases, web content, etc. is stored on an external SAN, which is connected to the Windows Server 2019 operating system via iSCSI. Which of the following is not likely to be achieved with this configuration?

Using hardware RAID externally to provide fault tolerance

Orana works for an organization that sets up several virtual machines on a day-to-day basis to be deployed for various clients. Orana is exploring various Hyper-V options that will simplify this process. Which of the following Hyper-V features should Orana use?

Virtual machine templates

. Anahira is the system administrator at an organization that has offices in two different locations, New York and Sao Paulo. She decides to create sites for each location, NewYorkSite and SaoPauloSite, to improve Active Directory replication. Once she creates the sites, she associates NewYorkSite with the IP address 10.1.0.0/16. Which of the following is true of this scenario?

When new domain controllers are added to this network, they will be added to NewYorkSite by default.

Emmitt, an IT administrator, is on a holiday when he receives a message from his boss about an issue with one of the servers running Windows Server 2019. Fortunately, Emmitt is carrying his laptop that is running a Windows 7 operating system. Emmitt accesses the server remotely and resolves the issue. Which of the following tools did Emmitt most likely use to access the server?

Windows Admin Center

Raymond is a system administrator at Kelly Consulting. He's trying to automate some security features using Windows Server. One of the tasks he's trying to accomplish is automatically blocking any Outlook rules that are set to forward emails. Particularly, he's attempting to write a script that blocks any rules that automatically forward emails to external parties. Which of the following tools would be most effective in completing this task?

Windows Powershell

Where can the most up-to-date list of compatible hardware available for Windows Server 2019 be found?

Windows Server Catalog

Catelin creates a virtual machine template named WindowsServer2019VMTemplate. She wants to import this template, so she opens the Import Virtual Machine wizard in Hyper-V Manager on SERVERX and proceeds with the process. She specifies the location D:\VMS\Win2019VM1 for the configuration files and virtual hard disks. When Catelin clicks Finish during the last step and the virtual machine is created, what name will it have?

WindowsServer2019VMTemplate

Fayola realizes that many of her colleagues use folders on the network drive to store videos, and this consumes a lot of space on the drive. She asks the employees to delete their videos from the network drive. Which of the following steps can Fayola take to maintain a log whenever a video file is saved on the drive in the future?

a. Configure passive screening

. Several users access the same shared printer in Lia's organization. A colleague tells her that the paper tray needs to be refilled. She uses the Printer menu to manage the print jobs and refill the paper tray. Which option do you think she would have chosen in the Printer menu if the documents within the print queue resumed printing after the refilling of the paper tray?

a. Pause Printing

While installing Print and Document Services, Laurel selects an option available under "Role Services." After the printer is configured, her colleagues can access the shared printer using a UNC. Which option do you think Laurel selected?

a. Print Server

Imala, a research scientist, wants to encrypt a document that contains her research data as she does not want the content to be made public before it is published. She is using the Command Prompt window to configure the encrypt attribute. Which of the following commands should Imala use to configure the encrypt attribute?

cipher.exe

Linwood is the IT manager of a small organization, Turtle Designs, with less than 50 employees. Caroline, his boss, asks him to set up a computer that will act as the central repository for the company's data. Linwood estimates the costs and suggests using an Internet-based service instead. What is Linwood recommending in this scenario?

cloud-based server

Asmara, a system administrator, is performing routine maintenance checks on the Windows servers in her organization. As part of these checks, she is required to verify that drivers and system files on each server are not corrupted. Which of the following commands should Asmara run?

sfc/scannow


Conjuntos de estudio relacionados

35 - Les Almohades (1147-1269) - Architecture

View Set

AP European History Chapter 19 Reading Guide

View Set

DH119A Dentifrices and oral rinses

View Set

HA - Unit 2 - Chapter 16: Assessing Eyes

View Set

Psychology Exam 3 Review (questions)

View Set

Chapter 30 - Secured Transactions

View Set