ITN 200 Midterm
Kristoffer creates a PowerShell script to automatically execute a set of tasks on system startup. He uses variables in his script to accomplish certain tasks. He is using a variable to filter out certain conditions during which the script should not execute. Which of the following names can Kristoffer use for the variable? $filter continue $count *number
$count
What is the IP address that is assigned to the network loopback interface? 0.0.0.0 255.255.255.255 127.0.0.1 10.0.0.0
127.0.0.1
Dillon wants to create a PowerShell script that automatically opens a bunch of websites whenever his system boots. He downloads a script from an Internet forum for PowerShell scripts and runs it. The script executes without warnings or asking for any additional confirmation. What is the most likely execution policy on Dillon's system? Restricted AllSigned Unrestricted Bypass
Bypass
Raphael has successfully installed the Essentials Edition of Windows Server 2019 on his computer. He's completing some post-installation configuration tasks including naming the server. He has four options. Which of the following names should Raphael pick for the newly installed server and why? Home-FileServer-Raphael because it contains his name and is at least 15 characters COR-WEB-12 because it contains allowed characters and is shorter than 15 characters TEL COMP F3 because it contains a mix of letters, numbers, and spaces W@$h!nGT0n, because it contains special characters, numbers, upper case letters, and lower case letters
COR-WEB-12 because it contains allowed characters and is shorter than 15 characters.
Candice, a graphic designer, attaches a new portable hard disk to her computer. She can connect to the hard disk immediately without installing any drivers. After some time, she turns on the second monitor attached to her computer. The display malfunctions despite being connected to the computer and receiving adequate power supply. What is the most likely explanation for this issue? Candice did not open the Device Manager when attaching the hard disk. Hard disks are not PnP-friendly devices. Computers contain a limited number of IRQ lines. The display driver did not go through driver signing when Candice turned it on.
Computers contain a limited number of IRQ lines.
Which feature of Windows Server 2019 is designed to foil malware by preventing programs from using system memory space? Data Execution Prevention Processor Scheduling Flushing Windows Registry
Data Execution Prevention
Don is the system administrator for an organization that conducts virtual IT training sessions. Each participant, during these training sessions, creates multiple unique applications to address various problems. The applications have different hardware resource requirements. Don needs to set up a virtual lab with twenty Windows operating systems on 1 TB storage space for two different training programs. Help Don choose the right size of the virtual hard disk files. Don should use thin provisioning and fix the size of each virtual disk to 60 GB. Don should use thick provisioning and fix the size of each virtual disk to 100 GB. Don should use thin provisioning. Don should use thick provisioning.
Don should use thin provisioning.
You need multiple boot images on a WDS server, one for each operating system. True False
False
Fareeda, a system administrator, is configuring the security settings for a Generation 2 virtual machine called VM1. She enables the Trusted Platform Module (TPM). Next, she wants to encrypt the virtual hard disks for VM1 so that other virtual machines are restricted from using these hard disks. If the virtual hard disks are successfully encrypted, which of the following statements must be true? Secure Boot is disabled by default in Generation 2 virtual machines. Fareeda enabled shielding in the security settings for VM1. Fareeda selected the option to Encrypt state and virtual machine traffic. BitLocker contains the encryption keys.
Fareeda enabled shielding in the security settings for VM1.
Thandiwe is using a server running the Windows Server 2019 operating system. She notices some of the server's services are not functioning as intended. She suspects that a recent update may have caused this issue. While troubleshooting, she intends to look up the list of recently installed updates. She runs the following command: X | ogv Complete the command by selecting the missing component identified by X. More Get-HotFix select -last 1 Get-WindowsFeature
Get-HotFix
You are experiencing problems during the installation of Windows Server 2019. More specifically, critical file extensions have lost their associated program data. You need to restore the settings from a Registry backup. Where will the settings be found? HKEY_CLASSES_ROOT HKEY_LOCAL_MACHINE HKEY_CURRENT_USER HKEY_CURRENT_CONFIG
HKEY_CLASSES_ROOT
Which of the following statements is true of a client on a computer network? It is a server that is located within the physical premises of an organization. It is a computer that shares resources in response to a request from another computer. It is a computer that requests for resources from another computer on the network. It is a server that is located outside an organization's premises and accessed via the Internet.
It is a computer that requests for resources from another computer on the network
Janice has set up a Windows Server 2019 lab environment to practice labs related to her training. The base operating system is Windows 10. She has three Windows Server virtual machines running. If one of the virtual machines is running inside another virtual machine, which of the following must also be true? Janice is using a Type-2 hypervisor to control both virtual machines. Janice has enabled nested virtualization on the Windows 10 operating system. Janice has enabled nested virtualization on the Windows Server operating system. Janice is using the Windows Server 2012 R2 Edition in the virtual machines.
Janice has enabled nested virtualization on the Windows 10 operating system.
Jenaro installed the Windows Admin Center on a Windows Server 2019 system called SERVERX. He intends to manage other servers using SERVERX. If SERVERX has Web server software installed using port 443, which of the following must be true? Jenaro can connect to the Windows Admin Center only by appending the port number to the URL. SERVERX is also a domain controller and has the Active Directory Domain Services role installed. SERVERX does not have an existing HTTPS certificate, so the Windows Admin Center can use port 443. Jenaro should avoid modifying the local computer's trusted host settings.
Jenaro can connect to the Windows Admin Center only by appending the port number to the URL
Nadira is testing an application that needs to work on multiple operating systems. For this purpose, she uses Hyper-V to set up a Windows Server 2019 virtual machine (named VM1) and a Linux-based virtual machine (named VM2) on her host Windows 10 operating system. She sets up a third virtual machine, Windows Server 2012 (named VM3), to test the compatibility of the application between Windows Server 2019 and 2012 versions. Which of the following must be true if VM3 was set up successfully using nested virtualization? Nadira removed VM2 to accommodate VM3. Nadira powered off VM1, ran a PowerShell command, and powered on VM1. Nadira ran the following PowerShell command: Get-VMNetworkAdapter -VMName VM3 | Set-VMNetworkAdapter -MacAddressSpoofing On. Nadira enabled nested virtualization in Windows 10 using a PowerShell command.
Nadira powered off VM1, ran a PowerShell command, and powered on VM1.
Isabella configures three virtual machines, VM1, VM2, and VM3, on a Windows Server 2019 host. The host and VM1 are connected to a physical switch (external virtual switch). VM1 and VM2 are connected to a private virtual switch. VM2 and the host are connected to an internal virtual switch. VM3 is not connected to any switch. Isabella is building an application that provides clients access to confidential financial information in a secure database. Isabella chooses to run the application on the host server and decides to implement an N-tier security design to protect the database. Where should Isabella place the database? On the host server On VM1 On VM2 On VM3
On VM2
Shweta, a system administrator at Status Wire, is configuring Windows Server 2019 using Server Manager. She wants the Dashboard to display an alert whenever the server exceeds certain CPU usage. Which of the following panes should she use to configure this setting? Events Services Best Practices Analyzer Performance
Performance
Abu is creating a virtual machine template to enable rapid server deployment at his organization. He creates a virtual machine named VM1. On VM1, he installs Windows Server 2019 and names the server SERVERX. Next, he installs server roles and features and adds third-party software. He then runs the System Preparation Tool. What will this tool most likely to do? Rename the virtual machine VM1 Remove the computer name SERVERX Uninstall server roles and features Uninstall third-party software
Remove the computer name SERVERX
Mahmood works as a full stack web developer at Insignia Informatics. As one of the senior developers, Mahmood is often tasked with testing web applications built by his team. Often, he finds himself testing multiple web applications simultaneously over a short period. Mahmood uses a separate virtual machine to run each application in isolation. This often causes a resource crunch because each virtual machine uses large amounts of system resources, and Mahmood cannot be as productive as he wants to be. What would you advise Mahmood? Avoid sandboxing in a testing environment Run these web applications in containers Increase the scalability of the system Use nested virtualization instead
Run these web applications in containers.
Ryan, a server administrator, is attempting to install the Windows Admin Center on a server called SERVERX. However, he is unable to do so. Which of the following may be a reason for this? SERVERX is running a Windows Server 2016 operating system. SERVERX is the domain controller for the Active Directory. SERVERX does not have an existing HTTPS certificate. SERVERX has Web server software that is using port 443.
SERVERX is the domain controller for the Active Directory
Haruko is a system administrator at Notion Source, a company that specializes in digital marketing. He is configuring Windows Server 2019 on SERVERX and adding multiple servers to Server Manager so that he can manage all the servers from the same console. He is trying to add SERVERY, a file server. Despite his efforts, he is unable to add this server to Server Manager. Which of the following is a likely reason that he is unable to add SERVERY to the console? SERVERY is joined to the same Active Directory domain as SERVERX. SERVERY is part of a workgroup, but the workgroup server is not on the trusted hosts list. SERVERY has Windows Server 2016 installed, so it is not compatible with SERVERX. SERVERX has the Welcome to Server Manager pane hidden from the Dashboard.
SERVERY is part of a workgroup, but the workgroup server is not on the trusted hosts list.
Minato has created multiple virtual machines. He is using the Virtual Switch Manager to configure virtual switches. He wants to create an external virtual switch that will allow Hyper-V to manage network requests from these different machines. The purpose of this is to optimize performance across the network. Which of the following options should Minato enable? N-tier security Single-root I/O virtualization Hyper-V Extensible Virtual Switch protocol Credential Security Support Provider
Single-root I/O virtualization
Candace works as a system administrator at Capnia Systems, a product company with over 250 employees. She receives an email from her boss that says that one of the servers is running slow. The server is running the Standard Edition of Windows Server 2019, and the hardware includes HDDs and SSDs. Upon investigation, she finds that some frequently accessed files are being stored on HDDs, while other smaller and infrequently used files are stored on SSDs. Which feature should Candace enable to improve the efficiency of the server? Storage pinning Storage tiering Capacity planning Data deduplication
Storage tiering
Which of the following statements regarding the use of system and user environment variables is accurate? User environment variables are always set first. System environment variables are always set first. User environment variables apply to any user logged onto the computer. System environment variables can be applied on a per-user basis.
System environment variables are always set first.
What is the use of adding tags to servers in the Windows Admin Center? Tags allow you to upload and download files to and from the filesystems on the server. Tags allow you to monitor and manage DHCP server configuration. Tags help configure additional areas of the system via MMC tools. Tags help identify servers and can be searched using the Search dialog box.
Tags help identify servers and can be searched using the Search dialog box
Rozalia installs the Windows Deployment Services (WDS) role on SERVERX. She intends to use SERVERX to enable rapid server deployment across her organization's network. She opens the Windows Deployment Services tool and notices a yellow warning icon on the SERVERX server object in the navigation pane. What does this indicate? The Deployment Server service is not running. The Transport Server service is not running. The WDS role was not installed successfully. The WDS service is not yet configured.
The WDS service is not yet configured.
Lehana is creating a new virtual machine using the New Virtual Machine Wizard. After choosing the name WindowsServer2019VM for her virtual machine, she proceeds to the next step. She chooses Generation 1 when prompted to pick the generation for the virtual machine. Which of the following reasons justifies Lehana's choice? The generation of the virtual machine can be changed later, so this choice does not matter. The guest operating system on the virtual machine is a 32-bit version of Windows 7. The virtual machine will need to emulate a UEFI BIOS to provide faster boot time. The virtual machine will need to emulate a Serial Attached SCSI disk.
The guest operating system on the virtual machine is a 32-bit version of Windows 7.
Malaika uses the Edge browser on her computer to access a website. The browser sends a request to another computer over the Internet, which returns web page data that is displayed on the browser. Which of these entities is the server? Malaika's computer The Edge browser The website address The responding computer
The responding computer
Miguel is using the New Virtual Machine Wizard to create a new virtual machine for the first time. Which of the following statements is true if Miguel creates a virtual machine with default settings? The virtual machine will be a Generation 1 virtual machine. The virtual machine will be named VM1. The virtual machine will have 4 GB of memory, which is expandable up to 36 GB. The virtual machine will have a 127 GB dynamically expanding hard disk.
The virtual machine will have a 127 GB dynamically expanding hard disk.
Identify the true statement about Type 2 hypervisors. They can run independent of a host operating system. They can interact with the hardware directly. They can run multiple operating systems on a single host. They self-contain a small operating system.
They can run multiple operating systems on a single host.
Dmitry installs the Hyper-V role using the Add Roles and Features Wizard. Upon completion, he is prompted to reboot the computer. However, his computer reboots twice. Why does Dmitry's computer reboot the second time? To allow Hyper-V to start the Kerberos protocol To allow Hyper-V to start the host operating system To add Hyper-V in a Type 2 configuration To add Hyper-V in a Type 1 configuration
To allow Hyper-V to start the host operating system
Hamza installs the Windows Deployment Services role on SERVERX. He intends to use SERVERX to enable rapid server deployment across his organization's network. He wants SERVERX to be able to send WIM images to each computer on the network in response to their PXE requests. Which component of the Windows Deployment Services role provides this feature? Deployment Server Transport Server Single-root I/O virtualization Live migration
Transport Server
Cmdlets are case-insensitive, so Get-Host and get-host are equivalent. True False
True
The System File Checker is useful in recovering system files that have been corrupted. True False
True
Andrei enabled the Live Migration feature of Hyper-V during its installation. He selects a virtual machine called VM1 within Hyper-V Manager and clicks on Move within the Actions pane. Next, he selects "Move the virtual machine's storage." Which of the following is true of this scenario? VM1's virtual hard disk files will be moved to the destination server. VM1's virtual machine configuration files will be moved to the destination server. VM1's virtual hard disk files and virtual machine configuration files will be moved to the destination server. VM1 will be copied to the destination server and renamed as VM2.
VM1's virtual hard disk files will be moved to the destination server.
Orana works for an organization that sets up several virtual machines on a day-to-day basis to be deployed for various clients. Orana is exploring various Hyper-V options that will simplify this process. Which of the following Hyper-V features should Orana use? Replication Live migration Virtual machine templates Production checkpoints
Virtual machine templates
Chen is a freelance web developer who uses a Windows 10 computer. When she needs to test her web application on a different operating system, she sends it to her friend who has other operating systems installed on multiple devices. This is a time-consuming process. She's looking for a way to test the web application across different operating systems on her own computer. Which of the following should she use? Journaling Virtualization Sandboxing Deduplication
Virtualization
What is the term for programs and system software that can query WMI? WMI infrastructure WMI consumers WMI providers WMI classes
WMI consumers
Where can the most up-to-date list of compatible hardware available for Windows Server 2019 be found? Windows Admin Center Microsoft Management Console Windows Server Catalog Windows Server Configuration Wizard
Windows Server Catalog
Which of the following tools can be used to create an unattended answer file? Windows System Image Manager Windows Deployment Services System Preparation Tool Hyper-V Manager
Windows System Image Manager
Catelin creates a virtual machine template named WindowsServer2019VMTemplate. She wants to import this template, so she opens the Import Virtual Machine wizard in Hyper-V Manager on SERVERX and proceeds with the process. She specifies the location D:\VMS\Win2019VM1 for the configuration files and virtual hard disks. When Catelin clicks Finish during the last step and the virtual machine is created, what name will it have? WindowsServer2019VMTemplate SERVERX Win2019VM1 It will not have a name.
WindowsServer2019VMTemplate
Asmara, a system administrator, is performing routine maintenance checks on the Windows servers in her organization. As part of these checks, she is required to verify that drivers and system files on each server are not corrupted. Which of the following commands should Asmara run? sigverif regedit Get-Command | more sfc/scannow
sfc /scannow
Linwood is the IT manager of a small organization, Turtle Designs, with less than 50 employees. Caroline, his boss, asks him to set up a computer that will act as the central repository for the company's data. Linwood estimates the costs and suggests using an Internet-based service instead. What is Linwood recommending in this scenario? An on-premise server A cloud-based server A client A network
A cloud-based server
You are in the process of installing Windows Server 2019 Standard Edition on your computer. You have downloaded the corresponding ISO file and burned it to a DVD. Which of the following steps should you take next? Change the boot order in the BIOS. Insert the DVD after turning on your computer. Copy the ISO image to a bootable USB drive. Download Burnaware or Rufus.
Change the boot order in the BIOS
Huong is the system administrator for a virtual machine that is used by over 500 employees. She wants to install some device drivers to enable support for a few hardware components. Before she installs the drivers, she wants to ensure that she can revert to the current version of the virtual machine if something goes wrong with the installation. Which of the following Hyper-V features should Huong use? Replication Nested virtualization Live migration Checkpoints
Checkpoints
Deion is creating a new virtual machine using the New Virtual Machine Wizard. After choosing the generation for his virtual machine, he is prompted to select the memory and an optional choice to enable the use of dynamic memory. He consults a colleague, Kanesha, and they decide against enabling dynamic memory. What is the most likely reason that prompted this decision? Deion chose Generation 2 in the previous step. Deion intends to use this virtual machine in a nested virtualization configuration. Deion allocates 1024 MB of startup memory, which is sufficient to run most operating systems. Deion intends to run Windows Server 2019 on this virtual machine.
Deion intends to use this virtual machine in a nested virtualization configuration.
Ivan is the IT administrator at Alphina Systems. He wants to be able to plug and unplug his hardware devices without using the Safely Remove Hardware option. What should Ivan do? Disable file caching and flushing Enable file caching and flushing Enable file caching and disable flushing Disable file caching and enable flushing
Disable file caching and flushing
A limitation of Windows PowerShell is that it cannot be used to install or remove Windows roles True False
False
Decision constructs such as If and Switch allow you to perform a task multiple times. True False
False
Q: The Windows 10 Education edition supports Hyper-V but not nested virtualization. True False
False
To replicate a virtual machine, it is sufficient that replication is enabled on the Hyper-V host of the virtual machine that is being replicated. True False
False
Freya notices some performance issues with an important Generation 2 virtual machine. She realizes that the issue is caused by the presence of other virtual hard disks on the same physical disk. She has another physical hard disk on her system that is currently underutilized. She decides to use this disk as a pass-through disk to enhance the performance of the virtual machine. If Freya was able to accomplish this task successfully, which of the following must be true? Freya deleted the virtual disk from her system. Freya changed the physical disk's settings to take it offline. Freya removed the virtual hard drive from the virtual machine. Freya used the Browse option under the virtual hard drive settings.
Freya changed the physical disk's settings to take it offline.
Felipe requests the system administrator, Lucida, to change the font settings on a shared desktop system. Felipe wants a larger font size when he logs onto this computer. Which Registry root key should Lucida access to change the font size? HKEY_CLASSES_ROOT HKEY_LOCAL_MACHINE HKEY_CURRENT_USER HKEY_CURRENT_CONFIG
HKEY_CURRENT_USER
Which of the following is true of Storage Server 2019? It can have a maximum memory of 24 TB. It can host unlimited virtual machines. It cannot be purchased from Microsoft directly. It can be download for free and used in any environment.
It cannot be purchased from Microsoft directly
Yihana has configured a WDS server with the appropriate boot and install images. Next, she starts the WDS service to respond to PXE requests from other computers and virtual machines on the network. She wants to enable rapid server deployment using WDS to install Windows Server 2019 on these virtual machines and computers. If Yihana can successfully install the operating system, which of the following tasks has she completed? Turned off the DHCP service Turned off the WDS service on the WDS server Pressed F1 or Esc keys Listed the network interface at the top of the boot order
Listed the network interface at the top of the boot order
Shae is using a Windows Server 2019 operating system. She recently spilled hot chocolate on her keyboard, which damaged the keyboard. She purchased a new keyboard and connected it to her computer. She assumed that she would have to download a driver to use the keyboard. To her surprise, she was able to use the keyboard without any further action from her side. Which of the following features allowed Shae to start using the keyboard straightaway? Plug and Play (PnP) Remote Desktop Protocol (RDP) Gateway Server Mode Devices and Printers utility
Plug and Play (PnP)
Satish wants to install Windows Server 2019 Essentials Edition on his computer. The hardware specifications of his system are as follows: 3 GHz 64-bit processor, 16 GB memory, and 50 GB storage. If Satish installed the server using Rufus, which of the following is most likely true? Satish's computer does not meet the minimum storage requirements. Satish installed Server Core instead of the full version. Satish's computer does not have an optical disk drive. Satish has installed the server over the Internet from a remote device.
Satish's computer does not have an optical disk drive.
Gyaltsen is a system administrator who is managing the operation of virtual machines at her company. One of her key responsibilities is to ensure maximum uptime of virtual machines. She uses replication to ensure this. She is configuring replication for a virtual machine called VM1 on SERVERX to be replicated to SERVERY. If the replication is successful, which of the following tasks did Gyaltsen most likely complete? She enabled replication on SERVERX. She enabled the Credential Security Support Provider protocol for replication on SERVERX. She enabled the Kerberos protocol for replication on SERVERY. She enabled replication on SERVERY.
She enabled replication on SERVERY.
Tamara wants to install Server Core on a virtual machine on her Windows Server 2019 computer. She tries installing it but fails. Which of the following is most likely to have caused the installation failure? Server Core cannot be installed on personal computers. Tamara's computer does not contain an optical drive. Server Core requires at least a 1.4 GHz 64-bit processor. Tamara's computer has 30 GB free hard disk space.
Tamara's computer had 30GB free hard disk space
Hyper-V supports nested virtualization that can be used to create virtual machines within another virtual machine. True False
True
Installing the Hyper-V role will install the Hyper-V hypervisor, Hyper-V Manager console, and Hyper-V PowerShell cmdlets. True False
True
Walter Wells, Inc., a company that builds robotic process automation (RPA) applications, uses Windows Server 2016 to run several Linux and Windows virtual machines. Which of the following statements, if true, would make upgrading to Windows Server 2019 a good choice? Walter Wells spends a considerable amount of money on encrypting Linux virtual machines. Walter Wells does not use storage replicas or storage spaces. Walter Wells is considering removing all the Linux virtual machines and switching entirely to Windows. Walter Wells currently outsources its hardware maintenance operations to an external vendor.
Walter Wells spends a considerable amount of money encrypting Linux virtual machines.
Eileen is a Web app developer. All the apps that Eileen builds run in Linux containers on the cloud. She currently uses a Windows 7 operating system. Why should Eileen consider upgrading to Windows 10? Windows 10 automatically encrypts Linux containers. Windows 10 provides Server Core and Nano Server options. Windows 10 has the Windows Server Azure Network Adapter. Windows 10 has Windows Subsystem for Linux.
Windows 10 has Windows Subsystem for LInux
Ananya is installing the Hyper-V role on a server. When prompted for the location of the virtual machine files, she changes the location from the default value to E:\VMs. Where will the virtual machine configuration files be stored? C:\VMs E:\VMs E:\VMs\Virtual Machines E:\VMs\Config Files
E:\VMs\Virtual Machines
Live Migration cannot be enabled if the Hyper-V host operating system is joined to an Active Directory domain. True False
False
Q: Storage pinning is the process of planning hardware for a specific server within an organization. True False
False
What is the advantage of using production checkpoints over standard checkpoints? Production checkpoints are applied without shutting down the guest operating system. Unlike production checkpoints, standard checkpoints use a backup service provided by the guest operating system. Unlike standard checkpoints, production checkpoints are created automatically whenever a virtual machine starts. Production checkpoints cause fewer problems than standard checkpoints when applied.
Production checkpoints cause fewer problems than standard checkpoints when applied.
Kristian uses the following command on Windows PowerShell to view a list of all cmdlets: PS C:\Users\Administrator>Get-Command | More The command displays a subset of the total output and follows it with the word More. On clicking the return button, the next set of results is displayed. Kristian wants to exit this and return to the PowerShell prompt. Which of these keys should Kristian press? Up Arrow Home Q Tab
Q
Caylin, an IT administrator, receives an email from a coworker that the company website, eloxnet.com, is not accessible. She decides to check if there is an issue that is preventing access to the website. Which of the following PowerShell cmdlets should Caylin run first? Test-NetConnection Get-NetIPConfiguration Get-NetAdapterStatistics Set-NetFirewallProfile
Test-NetConnection
Rhonda's company has a rack containing one email server, file server, web server, firewall server, UPS, SAN, and management station. Owing to a thunderstorm, a ten-block radius surrounding the company faces a power outage. Rhonda, who is working from home, tries sending an email to a colleague, but the email does not get sent. Which of the following is the most likely cause for this issue? The SAN on the rack malfunctioned. The management station on the rack malfunctioned. The blackout caused all the servers on the rack to shut down because there is no power supply. The blackout took down the Internet, so Rhonda can't reach the email server.
The blackout took down the Internet, so Rhonda can't reach the email server.
Devansh creates a checkpoint on his virtual machine before making some Windows Registry changes. After making these changes, he runs a test to verify that the virtual machine is working as intended. He notices some unintended effects of the Registry changes. Devansh applies the checkpoint to revert the virtual machine to its state before the Registry changes were made. Which of the following is true of this scenario? The modifications within the checkpoint file will be merged into the virtual hard disk. Devansh can choose to reverse the Windows Registry modifications while retaining other modifications. The checkpoint file that is used to reverse the changes will be deleted from the system. The checkpoint file will replace the current virtual hard disk file.
The checkpoint file that is used to reverse the changes will be deleted from the system.
Calvin has installed Windows Server 2019 on his personal computer to take part in training program. During one of his lab exercises, his computer crashes. Upon investigation, he finds that the server has not created a crash dump file. What is the most likely reason that Calvin's computer failed to create the dump file? The paging file is not located on the same disk as the operating system. The paging file is disabled on the computer. The initial paging file size is configured to a size that is 1.5 times the installed amount of RAM. The paging file is not placed on a RAID volume.
The paging file is disabled on the computer.
You are attempting to upgrade a server from Windows Server 2008 R2 to Windows Server 2019 Standard Edition. What must be done in order to accomplish the upgrade? The Windows Server 2019 disc provides a direct upgrade path for Server 2008 R2, so no additional steps are required to perform the upgrade. The server should be updated to the latest service pack for 2008 R2 and then upgraded to Server 2012 R2, after which the server can be upgraded to Server 2019. The server must run a special upgrade while Server 2008 R2 is running, requiring the migration of server roles to the new OS and merging of configuration files. The server can't be upgraded to Server 2019, as no upgrade path exists. You must perform a clean install.
The server should be updated to the latest service pack for 2008 R2 and then upgraded to Server 2012 R2, after which the server can be upgraded to Server 2019.
Remtax offers tax consulting services over the Internet. It assists people in preparing their income tax returns. In which of the following scenarios should Remtax use Windows Server Core or Nano Server? The server will not be dedicated to a specific function but will serve multiple functions. The server will be managed by a novice administrator that fulfills other roles in the company. The server will be dedicated to web services and accessed via the Internet. The server will also function as an Active Directory domain controller.
The server will be dedicated to web services and accessed via the Internet.
Alina is using Windows PowerShell on a Windows Server 2019 system for the first time. She wants a list of all cmdlets in PowerShell, so she types the following command: PS C:\Users\Administrator>Get-Command | More Why does Alina use the pipe symbol (|) in this command? To create a customized Windows PowerShell session To control execution in the same way as the -whatif option To create an output file called More in which the results of Get-Command are stored To send the output from Get-Command to More, which displays the output page-by-page
To send the output from Get-Command to More, which displays the output page-by-page
Emmitt, an IT administrator, is on a holiday when he receives a message from his boss about an issue with one of the servers running Windows Server 2019. Fortunately, Emmitt is carrying his laptop that is running a Windows 7 operating system. Emmitt accesses the server remotely and resolves the issue. Which of the following tools did Emmitt most likely use to access the server? Server Manager Remote Server Administration Tools Best Practices Analyzer Windows Admin Center
Windows Admin Center
Achelle Electronics purchases hardware to set up 25 servers. The IT department must deploy Windows Server 2019 on these machines. Which of the following Hyper-V features should Achelle Electronics use? Replication Live migration Virtual machine templates Windows Deployment Services
Windows Deployment Services
Raymond is a system administrator at Kelly Consulting. He's trying to automate some security features using Windows Server. One of the tasks he's trying to accomplish is automatically blocking any Outlook rules that are set to forward emails. Particularly, he's attempting to write a script that blocks any rules that automatically forward emails to external parties. Which of the following tools would be most effective in completing the task? Microsoft Management Console Azure Active Directory Windows PowerShell Windows Admin Center
Windows PowerShell