Servers Tea #1

¡Supera tus tareas y exámenes ahora con Quizwiz!

Cmdlets are NOT case-sensitive, so Get-Host and get-host are equivalent. TRUE/FALSE

TRUE

True or False. The System File Checker is useful in recovering system files that have been corrupted.

True

What is the term for programs and system software that can query WMI? A. WMI consumers B. WMI classes C. WMI infrastructure D. WMI providers

A. WMI consumers WMI consumers are the programs and system software that can query WMI. WMI infrastructure refers to the components of the operating system that respond to these WMI queries.

Linwood is the IT manager of a small organization, Turtle Designs, with less than 50 employees. Caroline, his boss, asks him to set up a computer that will act as the central repository for the company's data. Linwood estimates the costs and suggests using an Internet-based service instead. What is Linwood recommending in this scenario? A. An on-premise server B. A cloud-based server C. A network D. A client

B. A cloud-based server

You are experiencing problems during the installation of Windows Server 2019. More specifically, critical file extensions have lost their associated program data. You need to restore the settings from a Registry backup. Where will the settings be found? A. HKEY_LOCAL_MACHINE B. HKEY_CLASSES_ROOT C. HKEY_CURRENT_CONFIG D. HKEY_CURRENT_USER

B. HKEY_CLASSES_ROOT You will find the relevant settings under the HKEY_CLASSES_ROOT key. This key holds data to associate file extensions with programs. This is a more extensive list than the one viewed under HKEY_CURRENT_USER.

Chen is a freelance web developer who uses a Windows 10 computer. When she needs to test her web application on a different operating system. she sends it to her friend who has other operating systems installed on multiple devices. This is a time-consuming process. She's looking for a way to test the web application across different operating systems on her own computer. Which of the following features should she use? a. Sandboxing b. Deduplication c. Journaling d. Virtualization

Virtualization

You are experiencing problems during the installation of Windows Server 2019. More specifically, critical file extensions have lost their associated program data. You need to restore the settings from a Registry backup. Where will the settings be found? A. HKEY_CLASSES_ROOT B. HKEY_LOCAL_MACHINE C. HKEY_CURRENT_USER D. HKEY_CURRENT_CONFIG

A. HKEY_CLASSES_ROOT

Felipe requests the system administrator, Lucida, to change the font settings on a shared desktop system. Felipe wants a larger font size when he logs onto this computer but doesn't want it to affect other users. Which Registry root key should Lucida access to change the font size? A. HKEY_CURRENT_USER B. HKEY_LOCAL_MACHINE C. HKEY_CURRENT_CONFIG D. HKEY_CLASSES_ROOT

A. HKEY_CURRENT_USER Lucida can change the font size by accessing the HKEY_CURRENT_USER key. This key contains data on color combinations, font sizes and type, the keyboard layout, the taskbar, clock configuration, and other profile settings for the current user.

Haruko is a system administrator. He is configuring Windows Server 2019 on SERVERX and adding multiple servers to Server Manager so that he can manage all the servers from the same console. He is trying to add SERVERY, a file server. Despite his efforts, he is unable to add this server to Server Manager. Which of the following is a likely reason that he is unable to add SERVERY to the console? A. SERVERY has Windows Server 2016 installed, so it is not compatible with SERVERX. B. SERVERY is part of a workgroup, but the workgroup server is not on the trusted hosts list. C. SERVERY is joined to the same Active Directory domain as SERVERX. D. SERVERX has the Welcome to Server Manager pane hidden from the Dashboard.

B. SERVERY is part of a workgroup, but the workgroup server is not on the trusted hosts list.

Malaika uses the Edge browser on her computer to access a website. The browser sends a request to another computer over the Internet, which returns web page data that is displayed on the browser. Which of these entities is the server? A. The Edge browser B. The responding computer C. Malaika's computer D. The website address

B. The responding computer

Asmara, a system administrator, is performing routine maintenance checks on the Windows servers in her organization. As part of these checks, she is required to verify that drivers and system files on each server are not corrupted. Which of the following commands should Asmara run? A. ChkDisk B. sfc/scannow C. Get-Command | more D. regedit

B. sfc/scannow You can run the System File Checker manually from a Command Prompt window (MS-DOS shell) or Windows PowerShell window by executing the sfc/scannow command to scan and replace damaged files.

When using the Best Practices Analyzer (BPA) to verify server roles, what severity level indicates the role does not meet best practices and problems can be expected? A. Warning B. Performance C. Error D. Information

C. Error

Felipe requests the system administrator, Lucida, to change the font settings on a shared desktop system. Felipe wants a larger font size when he logs onto this computer but doesn't want it to affect other users. Which Registry root key should Lucida access to change the font size? A. HKEY_CURRENT_CONFIG B. HKEY_CLASSES_ROOT C. HKEY_CURRENT_USER D. HKEY_LOCAL_MACHINE

C. HKEY_CURRENT_USER

Mahmood works as a full stack web developer at Insignia Informatics. As one of the senior developers, Mahmood is often tasked with testing web applications built by his team. Often, he finds himself testing multiple web applications simultaneously over a short period. Mahmood uses a separate virtual machine to run each application in isolation. This often causes a resource crunch because each virtual machine uses large amounts of system resources, and Mahmood cannot be as productive as he wants to be. What would you advise Mahmood? A. Avoid sandboxing in a testing environment B. Use nested virtualization instead C. Run these web applications in containers D. Increase the scalability of the system

C. Run these web applications in containers Containers contain a subset of an operating system essential to running the web applications. This means that containers use fewer resources than virtual machines.

Haruko is a system administrator. He is configuring Windows Server 2019 on SERVERX and adding multiple servers to Server Manager so that he can manage all the servers from the same console. He is trying to add SERVERY, a file server. Despite his efforts, he is unable to add this server to Server Manager. Which of the following is a likely reason that he is unable to add SERVERY to the console? A. SERVERY has Windows Server 2016 installed, so it is not compatible with SERVERX. B. SERVERX has the Welcome to Server Manager pane hidden from the Dashboard. C. SERVERY is part of a workgroup, but the workgroup server is not on the trusted hosts list. D. SERVERY is joined to the same Active Directory domain as SERVERX.

C. SERVERY is part of a workgroup, but the workgroup server is not on the trusted hosts list. If SERVERY is part of a workgroup, it can be added to Server Manager on SERVERX only once the workgroup server is added to the trusted hosts list.

Candace works as a system administrator at Capnia Systems, a product company with over 250 employees. She receives an email from her boss that says that one of the servers is running slow. The server is running the Standard Edition of Windows Server 2019, and the hardware includes HDDs and SSDs. Upon investigation, she finds that some frequently accessed files are being stored on HDDs, while other smaller and infrequently used files are stored on SSDs. Which feature should Candace enable to improve the efficiency of the server? A. Capacity planning B. Storage pinning C. Storage tiering D. Data deduplication

C. Storage tiering

Identify the true statement about Type 2 hypervisors. A. They self-contain a small operating system. B. They can interact with the hardware directly. C. They can run multiple operating systems on a single host. D. They can run independent of a host operating system.

C. They can run multiple operating systems on a single host. Type 2 hypervisors can run multiple operating systems, called virtual machines, on an underlying host operating system.

Eileen is a Web app developer. All the apps that Eileen builds run in Linux containers on the cloud. She currently uses a Windows 7 operating system. She would like to test Linux applications on her workstation. Why should Eileen consider upgrading to Windows 10? A. Windows 10 has the Windows Server Azure Network Adapter. B. Windows 10 provides Server Core and Nano Server options. C. Windows 10 has Windows Subsystem for Linux. D. Windows 10 automatically encrypts Linux containers.

C. Windows 10 has Windows Subsystem for Linux The Windows Subsystem for Linux feature of Windows 10, a new feature in Windows Server 2019, allows users to create and test Linux apps on Windows 10 systems.

Remtax offers tax consulting services over the Internet. It assists people in preparing their income tax returns. In which of the following scenarios should Remtax use Windows Server Core or Nano Server? A. The server will be managed by a novice administrator that fulfills other roles in the company. B. The server will also function as an Active Directory domain controller. C. The server will not be dedicated to a specific function but will serve multiple functions. D. The server will be dedicated to web services and accessed via the Internet.

D. The server will be dedicated to web services and accessed via the Internet.

Where can the most up-to-date list of compatible hardware available for Windows Server 2019 be found? A. Windows Admin Center B. Windows Server Configuration Wizard C. Microsoft Management Console D. Windows Server Catalog

D. Windows Server Catalog

Storage pinning is the process of planning hardware for a specific server within an organization. TRUE/FALSE

FALSE Planning hardware for a specific server given its use within an organization is often called capacity planning. Storage pinning is an intelligent storage feature that allows you to force specific data to be stored on a particular device.

Raymond is a system administrator at Kelly Consulting. He's trying to automate some security features using window server. one of the tasks he's trying to accomplish is automatically blocking any outlook rules that are set to forward emails. Particularly, he's attempting to write a script that blocks any rules that automatically forward emails to external parties. Which of the following tools would be effective in completing this task? a. Window Admin Center b. Window PowerShell c. Microsoft Management d. Azure Active Directory

Window PowerShell

What is the use of adding tags to servers in the Window Admin Center? a. tag allows you to monitor and manage DHCP server configuration b. tags allow you to upload and download files to and from the filesystems on the server. c. Tags help configure additional areas of the system via MMC tools d. Tag help identify servers and can be searched using the Search dialog box

d. Tag help identify servers and can be searched using the Search dialog box

Asmara, a system administrator, is performing routine maintenance checks on a window server in her organization. As part of these checks, she is required to verify that drivers and system files on each server are not corrupted. Which of the following commands should Asmara run? a. ChkDisk b. sfc/scannow c. Get-Command | more d. regedit

sfc/scannow


Conjuntos de estudio relacionados

Flagella Movement, Fimbrae, Pili, and Endospores

View Set

Family Test 1: Ch 8. (Care of Family During Pregnancy); Ch 9. Maternal child

View Set

Cybersecurity Essentials - Chapter 1 (Cisco Networking Academy)

View Set

Proquest Research Companion Library Quiz Module 7

View Set

SP302 - Introduction to Social and Developmental Psychology

View Set

Chapter 9_NEW! Mini Sim_Product Life Cycle MARK3300

View Set