Exam 2
Sonia is configuring a RAID level 5 array with five disks. Each disk has the capacity to store 3 TB of data. What is the total storage size that Sonia can use to store data? 3 TB 8 TB 12 TB 15 TB
12TB - In RAID level 5, one fifth of the toral storage size is reserved for parity information. The total storage is 5*3 = 15 TB; the storage reserved for parity information is 15 * (1/5) = 3 TB; and the combined storage capacity that Sonia can use is 15 - 3 = 12 TB.
How much storage space is reserved on a storage device to convert a storage disk to a dynamic disk using a Windows tool? 1 KB 10 KB 1 MB 10 MB
1MB - The last 1 MB of storage on the device is automatically reserved to ensure that it can be converted to a dynamic disk, if necessary.
Which of the following is a requirement for using Storage Spaces Direct? A 10 GB Ethernet network interface with remote-direct memory access (RDMA) support is a must. More than 20 servers must be available. The number of SSDs used should not be more than one. The servers should be from different Active Directory domains.
A 10 GB Ethernet network interface with remote-direct memory access (RDMA) support is a must. - Microsoft only supports Storage Spaces Direct on systems that have a 10 GB or greater Ethernet network interface that supports remote-direct memory access (RDMA).
Sam, an administrator, sends out an HR policy file to Vicky, Mohammad, Charle, and Reena. They save the HR policy file on their home directories under a shared folder of Windows Server 2019 with different file names. As a result, the same copies of the file are present multiple times with different names. Reena opens and saves the file after making minor changes. What will happen to the files when Sam enables the Data Deduplication Service on Windows Server 2019? A copy of Reena's file is created with a new file name. All the files get deleted when the Data Deduplication Service is enabled. A new copy of Reena's file is created and associated with the same file name. None of the files are deleted as they have different file names.
A new copy of Reena's file is created and associated with the same file name. - After Reena modifies the file, a new copy of the file is created and associated with the same file name.
Iqbal publishes a shared folder named KettleProgram to Active Directory. He wants other users to be able find the folder using the search feature on File Explorer. However, in addition to finding the folder when searching for KettleProgram, he also wants the folder to show up when users search for "KettleApp." What is the most efficient method that Iqbal can use to enable this? Rename the shared folder to KettleProgram/KettleApp. Create an empty file called KettleApp within the folder. Add KettleApp as a keyword in the folder's properties. Transfer ownership of the folder to a user called KettleApp.
Add KettleApp as a keyword in the folder's properties. - This is the most efficient method. Windows Server allows associating keywords with shared folder objects. To ensure that the KettleProgram folder shows up when users search for KettleApp, Iqbal can supply KettleApp as a keyword in the folder's properties.
Which printer server configuration task is performed before shared printers are added within the Print Management tool? Add manufacturer-supplied printer drivers for the associated print device Change the printer name, location, and comment Render print jobs on client computers Deploy with Group Policy
Add manufacturer-supplied printer drivers for the associated print device - Before adding printers on your print server, you should first add any manufacturer-supplied printer drivers for the associated print devices.
Your university has installed a shared printer, Print_MV, on SERVERX. To accommodate the large amount of print jobs generated by the students, the spool folder needs to be placed in a storage device with a large capacity. Which of the following tabs under the print server properties dialog box can be used for this purpose? Advanced Security Drivers Port
Advanced - The location of the spool folder can be modified under the Advanced tab. Typically, spool folders should be located on a separate storage device that has a large capacity for print jobs.
Which of the following statements is true of the ownership of a file or folder? An administrator can take ownership of a file or folder without being granted the permission to do so. The account that creates a file or a folder gets its ownership only when the administrator grants ownership to that account. Ownership of individual files and folders cannot be transferred by anyone with the Take ownership permission. The owner of a file or folder cannot modify all the permissions for that file or folder.
An administrator can take ownership of a file or folder without being granted the permission to do so. - An administrator can take ownership of a file or folder without being granted the permission to do so. By default, the owner of a resource, the local Administrator user account (within a workgroup) and members of the Domain Admins group (within a domain) can change folder and file ownership.
Pavel is an IT project lead at Krystal Engineering. Because of his role, he is part of multiple groups, including the Developer group as well as the Project Manager group. One of the files that he is trying to access, PLStatus.xls, is not opening. Upon investigation, you find that Pavel's user account has Full control permission over the file. The Project Manager group has Modify access but not Full control. The Developer group has Write access but no Read access. What is the most likely reason that Pavel is not able to open the file? Another group has the Deny box checked for Read access. The Developer group restricts Pavel's ability to view the file. The Project Manager group restricts Pavel's ability to view the file. The group permissions override permissions granted to Pavel's user account.
Another group has the Deny box checked for Read access. - From the given information, it is highly likely that the restriction placed on Pavel's ability to open the file comes from the permission settings of another group. One of the other groups that he belongs to might have the Deny box checked for the Read access.
As a system administrator, you are tasked with identifying the reason for print jobs not getting completed. You notice that the queue status against one of the printers is "paused." This does not provide a specific reason. To ease the process of troubleshooting in the future, you want the queue status to show specific notifications from the printer. Which of the following options would you enable for this purpose? Printer pooling Bidirectional printing Branch office direct printing List in the directory
Bidirectional printing - Printers must have bidirectional printing enabled to display notifications from the print device within the Queue Status column.
Parker runs the net start svsvc command at a Command Prompt to scan volume errors. He finds a corrupted spot on a volume. How can Parker directly go to the corrupted spot identified by the Spot Verifier service? By using the /r option with the chkdsk command By using the /spotfix option with the chkdsk command By using the /c option with the chkdsk command By using the /x option with the chkdsk command
By using the /spotfix option with the chkdsk command - He can use the /spotfix option with the chkdsk command to only fix errors that were previously identified by the Spot Verifier service.
Which of the following actions cannot be performed by a user with Print permission? Send print jobs to the printer Pause, resume, and restart print jobs Cancel the print jobs they have ownership of Cancel all print jobs
Cancel all print jobs - To perform this action, a user needs Manage Documents permission.
Rishab is looking for ways to manage duplicate file content on his organization's shared drive. He enables data deduplication for this purpose. To save computing resources, he wants to change the settings such that data deduplication occurs in the evening. What must Rishab do to make this change? Enter the file extensions to be excluded Click the Add button under Deduplication Settings Click Set Deduplication Schedule Select the Apply button under Deduplication Settings
Click Set Deduplication Schedule - The Set Deduplication Schedule button will allow Rishab to modify the performance options for the Data Deduplication Service.
Fayola realizes that many of her colleagues use folders on the network drive to store videos, and this consumes a lot of space on the drive. She asks the employees to delete their videos from the network drive. Which of the following steps can Fayola take to maintain a log whenever a video file is saved on the drive in the future? Configure passive screening Configure active screening Enable the encrypt attribute Enable the archive attribute
Configure passive screening - Fayola can configure passive screening to maintain a log whenever a video file is saved on the drive. Configuring passive screening will log an event every time a video file is saved on the drive.
Barry, a system administrator, finds that a shared drive on his organization's network is slow because of the huge amount of data stored in it. He realizes that most employees of the company back up all their data on this drive. He wants to restrict the amount of data that each employee stores on the drive. Which of the following steps will help Barry limit employees' space usage? Configuring user quota Configuring folder quota Configuring active screening Configuring passive screening
Configuring user quota - Configuring user quota will help Barry limit employees' space usage. User quotas can be configured to limit the space that users can consume on the drive.
Tara, an administrator, has added storage devices to the storage pool and selected the RAID level for the virtual disk using Server Manager. She wishes to allocate more space than is required for the current amount of data such that the system only uses the actual space it needs, enabling the actual size to grow with data. What would you do to achieve Tara's wish? Create several thin-provisioned virtual disks Create several thick-provisioned virtual disks Create several fixed-provisioned virtual disks of combined capacity smaller than the storage pool Create several virtual disks of combined capacity smaller than the storage pool
Create several thin-provisioned virtual disks - You can allocate more space than is required for the current amount of data, but the system only uses the actual space it needs, enabling the actual size to grow with the data.
You are asked to create seven partitions in a storage device that uses an MBR. The device already has two partitions. However, you are also told that you cannot create more than a certain number of partitions on the storage device using an MBR. What would your next step be? Use the drive letters A and B to label the partitions Create the partitions and label one of the partitions as extended Use a storage device that is more than 7 TB in size and uses an MBR Convert the device to GPT
Create the partitions and label one of the partitions as extended - To overcome the limitation of partitions created on the MBR storage device, one of the partitions is labeled "extended," which can then contain an unlimited number of smaller partitions called logical drives.
Which of the following options is provided by the Print Management tool to quickly check the status of printers to identify any problems? The Advanced tab Properties View Server Custom filters
Custom filters - The Print Management tool provides custom filters that you can use to quickly check the status of printers to identify any problems.
A print device, Printer_2AC, is installed on SEVERX within your organization. The printer must be automatically added to each computer added to the domain. Which of the following options can be used for this purpose? Use the Add Printer wizard Audit object access policy Enable advanced printing features Deploy with Group Policy
Deploy with Group Policy - You can use Group Policy to automatically add SMB shared printers to computers that are joined to the domain, provided that the appropriate printer drivers for the computers are installed on the print server. To do this, right-click a printer within the Print Management console and select Deploy with Group Policy.
Which of the following options provided by Windows Server 2019 helps configure folders that are on different servers to synchronize contents? Distributed File System (DFS) namespaces Distributed File System (DFS) replication Client for Network File System (NFS) File Server Resource Manager (FSRM)
Distributed File System (DFS) replication - Distributed File System (DFS) replication can synchronize folder contents between different servers. DFS is an optional component provided by Windows Server 2019.
Which of the following options on a print queue webpage refreshes the list of print jobs within the print queue when selected? Document List Properties All Printers Cancel All Documents
Document List - Document List is selected to refresh the list of print jobs within the print queue.
Hasad is the system administrator for a marketing company. The company stores sensitive data in a folder named Assets on the company's network drive. Hasad is asked to identify the users who access the files within the folder or make changes to them. Which of the following steps should Hasad take to track all the activity within the folder Assets? Assign the hidden attribute to the folder Use a pair of public and private keys that are uniquely generated for a system Modify the folder permissions for each user through Advanced Security Settings Edit the Default Domain Policy object to enable auditing functionality
Edit the Default Domain Policy object to enable auditing functionality - Hasad should enable auditing functionality on every computer within the domain by editing the settings of the Default Domain Policy object. Folder and file auditing allows one to track activities, such as a read or write activity, on a folder or file. Some organizations configure auditing to see which users access or modify information.
Merjem, a PhD student, is writing her thesis. She takes regular backup of her files and data. When taking backup, she chooses the Faster backup performance option in the Optimize Backup Performance window. Which of the following is true of the backup process in the given scenario? Every backup overwrites the previous backup. Every backup only backs up data that has been modified since the previous backup. The backup process will provide the fastest option at the time of restoring data. The backup process backs up the all the specified data every time.
Every backup only backs up data that has been modified since the previous backup. - Selecting Faster backup performance option performs incremental backups. This option performs a full backup the first time the backup is taken. However, subsequent backups only back up data that has been modified since the previous backup.
Alaska, a system administrator, copies important and sensitive encrypted files from an NTFS filesystem to various locations on the network. As the files are encrypted, she is not worried about anyone accessing the files. However, the file copy in one of the locations is no longer secure as it has been decrypted and can be read by anyone who has access to the folder. Which of the locations is most vulnerable to theft among the locations where the files have been copied? FAT32 on a Windows 10 system Windows Server 2019 Windows Server 2016 FAT32 on a Windows 7 system
FAT32 on a Windows 7 system - The copy of the file on FAT32 on the Windows 7 system is most vulnerable to theft. When an encrypted file is copied or moved from an NTFS filesystem to a filesystem that does not support Encrypting File System (EFS), such as ReFS or FAT32 on a Windows 7 system, the file is automatically decrypted.
Pausing all documents within a print queue is often performed after performing routine maintenance on a print device, such as changing toner or refilling paper trays. True False
False - A printer can be configured to resume printing the documents within the print queue after the maintenance has been completed instead of pausing all documents within the print queue that is often performed after performing routine maintenance.
Jonathan has access to the files and folders in a newly created DFS namespace. The files and folders that he does not have access to are hidden. This indicates that the access-based enumeration is enabled by default. True False
False - Access-based enumeration is enabled for this DFS namespace, but this feature is not enabled by default. This feature was most likely turned on after the namespace was created.
To allow users within a branch office to print to a network-attached printer within a main office, you must enable Branch Office Direct Printing. a. True b. False
False - Branch Office Direct Printing allows branch office users to print directly to a network-attached printer within the branch office after validating their printer permissions on a shared printer on a print server within a main office.
Separator pages can be configured to reduce the cost of printing for an organization. a. True b. False
False - Separator pages add an additional page to each print job, increasing printing costs for an organization.
The DFS Replication role needs to be installed to configure folder quotas and file screens. True False
False - The File Server Resource Manager server role needs to be installed to configure folder quotas and file screens.
The XPS API stores documents within a spool folder using Enhanced Metafile (EMF) format. True False
False - The XPS API stores documents within a spool folder using XPS format, whereas the GDI stores documents using the EMF format.
The print server does not spool the print job when branch office users connect to a shared printer across the Internet that has BODP enabled. True False
False - When branch office users connect to a shared printer across the Internet that has BODP enabled, the print server does not spool the print job.
The Device and Printers utility contains print server configuration options that are not available within the Print Management tool. True False
False - While you can also use the Devices and Printers utility on Windows Server 2019 to add and share locally attached or network-attached printers, you should instead use the Print Management tool that is part of the Print and Document Services server role, and it contains print server configuration options that are not available within the Device and Printers utility.
Within a workgroup environment, if EFS keys are not backed up, you can still access EFS files when they are restored after a recovery, provided you are a member of the Administrators group. True False
False - Within a workgroup environment, if EFS keys are not backed up, you cannot recover the files because there is no recovery agent.
Trimming erases sections of the volatile memory chips on an SSD that no longer contain data, consolidating the existing data into fewer memory locations. True False
False - SSDs use non-volatile memory chips for storage.
The modern partition table is called the Master Boot Record (MBR) and uses storage devices that are larger than 2 TB. True False
False - The traditional partition table is called the Master Boot Record (MBR), and is limited to storage devices that are equal to or less than 2 TB in size. The modern partition table is called a GUID Partition Table (GPT), which uses storage devices larger than 2 TB.
When you select the List in the directory option within printer properties, a shared printer object is created within the OU that you specify within Active Directory. a. True b. False
False - When you select the List in the directory option, a printQueue object for the printer is created under the computer object of the print server.
Devika copies a file, TFPresentation, from a folder titled "Mach-2" to a folder titled "Mach-3" on the same NTFS disk volume. The Mach-2 folder allows Read access to the Editor group, while explicitly denying Write permission to the same group. The Mach-3 folder allows Full control to the Editor group. TFPresentation, the original file, has Modify permissions for the Editor group. What is the effective access of the Editor group on the copied file? Read Modify Full control No access
Full control - Since Mach-3 assigns Full control permissions to the Editor group, the copied file will inherit these permissions.
Zuber is configuring Windows Server 2019 as an iSCSI SAN device. He has successfully created an iSCSI virtual disk and a new iSCSI target. He is trying to connect his system to the new iSCSI target but he is facing a connection issue. What must be the cause for the connection issue? IQN is not present in the access server list. CHAP authentication is not enabled. DSM is not be added to the system. JBOD is not enabled in the system.
IQN is not present in the access server list. - The iSCSI target identifies iSCSI initiators using IQN. If the IQN is not present in the access server lists, the connection issue will arise because the ISCSI target cannot identify the iSCSI initiator of the system.
Which of the following is a component that enables users to search and locate a shared folder in the Active Directory? LDAP RAP SMB NFS
LDAP - LDAP is a component of the Active Directory that enables users to search and locate folders.
Which of the following options will allow a shared printer to be automatically published, allowing domain users to search for the Print window? Enable printer pooling List in the directory Enable advanced printing Branch Office Direct Printing
List in the directory - This will allow domain users to search Active Directory for the shared printer within the Print window of a software application, as well as ensure that it appears in the list of available printers at the beginning of the Add Printer wizard.
Laurel creates a shared folder on a ReFS filesystem using NFS. She grants Read-Only permission to MSmark. When her colleague Mark tries to access the folder from his computer, he cannot access it. Which of the following is the most likely reason that Mark cannot access the folder? The default permission is Read-Only, but Mark needs the Read-Write permission. MSmark is a computer name and not Mark's user account name. Laurel forgot to click the Allow root access option for Mark. The ReFS permission is Read/Write, whereas the NFS permission is Read.
MSmark is a computer name and not Mark's user account name. - In NFS, shared folder permissions are granted to computers and not to users. If it is true that MSmark is a computer name, then Laurel has shared the folder with this computer. Laurel should find out the name of Mark's computer and share it with that computer.
Which of the following print server permissions allows users to configure print server settings within the Print Management tool? Manage Printers View Server Manage Server Manage Documents
Manage Server - Manage Server allows users to configure print server settings within the Print Management tool.
Denji has access to a shared folder on his company's network drive. He updates the data in some files and replaces one of the existing files on the shared folder with a new version. He wants to share the updated files with a colleague who must verify the updated data and make changes if necessary. However, the colleague can only view the file contents, and Denji does not have the rights to grant the required permission. Which of the following NTFS/ReFS folder and file permissions does Denji most likely have that allows him to make the changes mentioned in the scenario but does not allow him to grant the required permissions? Read and execute Modify Full control Write
Modify - Denji most likely has the permission to modify the folder. Modify grants permission to read, add, delete, execute, and modify files. However, it does not allow the user to change permissions or take ownership. In order to change the folder permission for his colleague, Denji must have ownership of the folder.
Imran is associating a drive letter to a filesystem so that the drive letter can be accessed by the operating system. What is the term given to the process that Imran is carrying out? Journaling Formatting Mounting Spanning
Mounting - The term "mounting" refers to the process of associating a drive letter or folder to a filesystem so that the drive letter or folder can be accessed by the operating system.
Which of the following is the default format used to store documents received by the GDI API for modern print devices? NT EMF GDI2XPS RAW (FF auto) RAW (FF appended)
NT EMF - NT EMF is the default format used to store documents received by the GDI API for modern print devices.
While copying files between folders, it is possible to retrace and complete the transfer in case of a power failure if an NTFS-based filesystem is being used. The same cannot be said for a FAT32 filesystem. What do you think could be the reason for this difference? NTFS is a filesystem, while FAT32 is not. FAT32 keeps track of information being written, while NTFS does not. FAT32 is only used as a removable device, while NTFS is not. NTFS is a journaling filesystem, while FAT32 is not.
NTFS is a journaling filesystem, while FAT32 is not. - NTFS is a journaling filesystem, while FAT32 is not. A journaling filesystem writes each step required to copy a file to a new location in a journal, which allows the file to complete the file copy after power is restored.
Natalie is a graphic designer who frequently works with large files. These files, which are stored on an NTFS filesystem, measure 500 MB on average. She uses a software application to create backups of her work, and she had not faced any issues with backing up her files until recently. During a recent backup, she noticed that a newly created folder was not backed up. Identify the most likely cause for this issue. The software does not back up files larger than 500 MB. Natalie did not enable the archive attribute on the folder. Natalie did not enable the index attribute on the folder. NTFS filesystems do not support the backup of large files.
Natalie did not enable the archive attribute on the folder. - The archive attribute indicates that a file or folder needs to be backed up. Newly created folders do not have the archive attribute enabled by default. The most likely cause for the issue is that Natalie did not enable the archive attribute on the folder.
Madison is using the Backup Schedule Wizard from the Actions pane of the Windows Server Backup tool. He selects the backup configuration as Custom and specifies the items to be backed up. While adding the items to be backed up, he happens to select the System state option. What does this option create a backup of? Operating system settings The entire system Virtual hard disk files Boot and recovery volumes
Operating system settings - This creates a backup of all operating system settings, including the Windows Registry, Active Directory database (for domain controllers), and boot loader files.
Several users access the same shared printer in Lia's organization. A colleague tells her that the paper tray needs to be refilled. She uses the Printer menu to manage the print jobs and refill the paper tray. Which option do you think she would have chosen in the Printer menu if the documents within the print queue resumed printing after the refilling of the paper tray? Pause Printing Cancel All Documents Pause Restart
Pause printing - This option holds all the documents within the printer queue. This option is often used before performing a maintenance task, such as refilling paper trays.
While installing Print and Document Services, Laurel selects an option available under "Role Services." After the printer is configured, her colleagues can access the shared printer using a UNC. Which option do you think Laurel selected? Print Server Internet Printing LPD Service Shared Printer
Print Server - If the Print Sever option is selected, the printer will be configured as an SMB shared printer. A UNC can be used to connect to an SMB shared printer using server name or IP address.
Rebecca is configuring a RAID with three storage devices. If she saves a file, the file will be divided into three sections, with each section written to separate storage devices concurrently, in a third of the amount of time it would take to save the entire file on one storage device. Which of the following RAID levels is Rebecca configuring? RAID level 0 RAID level 1 RAID level 2 RAID level 5
RAID level 0 - In RAID level 0, an individual file is divided into sections and saved concurrently on two or more storage devices, one section per storage device.
Which of the following RAID level configurations is not supported by Windows Server 2019? RAID level 0 RAID level 1 RAID level 2 RAID level 5
RAID level 2 - RAID level 2 is no longer used and was a variant of RAID 0 that allowed for error and integrity checking on storage devices.
A user is attempting to access a shared file. The file has Full control NTFS permissions and Read permissions at the share level. What is the effective permission for the user on the file? Full control Modify Read Read/Write
Read - The user will only be able to read the file because the Read permission at the share level overrides the Full control permission at the NTFS level.
Identify the process that coverts the documents within the spool folder to a format understandable by the print device. Rendering Print job Spooling Print queue
Rendering - The rendering process converts the documents within the spool folder to a format understandable by the print device.
How do you create a RAID level 1 volume with two disks in the Disk Management tool? Right-click on the disk that you want to configure as a RAID volume and then click New Mirrored Volume to create a RAID level 1 volume with two disks Right-click on the disk that you want to configure as a RAID volume and then click New Spanned Volume to create a RAID level 1 volume with two disks Right-click on the disk that you want to configure as a RAID volume and then click New Striped Volume to create a RAID level 1 volume with two disks Right-click on the disk that you want to configure as a RAID volume and then click Shrink Volume to create a RAID level 1 volume with two disks
Right-click on the disk that you want to configure as a RAID volume and then click New Mirrored Volume to create a RAID level 1 volume with two disks - The New Mirrored Volume option is used to create a RAID level 1 volume with 2 disks as three-way mirroring is not possible in the Disk Management tool.
Nodin is a system administrator in training. He is trying to grant the user, Becky Winters, shared folder permissions using Server Message Block. Help Nodin identify the correct sequence to grant Becky Winters Full control shared folder permissions. Right-click the folder, click Properties, highlight the Sharing tab, and click the Share button. Right-click the folder, click Properties, highlight the Sharing tab, and click the Advanced Sharing button. Click File and Storage Services, highlight Shares, select the Tasks drop-down box, and click New Share. Click File and Storage Services, select SMB Share - Quick, select Type a custom path, and specify the path to an existing shared folder that must be shared.
Right-click the folder, click Properties, highlight the Sharing tab, and click the Advanced Sharing button. - Full control is an advanced shared folder permission that is only available under the Advanced Sharing option in folder properties window. There are three advanced shared folder permissions—Read, Change, and Full control.
One of the disks on your computer is running low on storage space. You notice that there is unallocated space in the spanned volume. How will you use the unallocated space to increase storage space? Right-click the volume, click Reactivate Volume once the storage device is available, and use the unallocated space Right-click the volume on that disk and click Extend Volume to increase the size of the volume using the unallocated space Right-click a RAID level 1 volume and click Remove Mirror to remove the volume while retaining the data from one disk you specify Right-click the system or boot partition in the Disk Management tool, click Add Mirror, and select the second storage device
Right-click the volume on that disk and click Extend Volume to increase the size of the volume using the unallocated space - If there is unallocated space on one of the disks that contain a spanned volume, you can right-click the volume on that disk and click Extend Volume to increase the size of the volume using the unallocated space.
Pablo is a system administrator in training. He is trying to manually defragment the F: volume in Becky's system. Help Pablo identify the correct method to perform manual defragmentation. Right-click the volume, click Properties, highlight the Tools tab, and click the Optimize button. Right-click the volume, click Properties, highlight the Tools tab, and click the Check button. Write the "Repair-Volume-DriveLetter F -Scan" command in Windows PowerShell. Write the "Optimize-Volume -DriveLetter" command in Windows PowerShell.
Right-click the volume, click Properties, highlight the Tools tab, and click the Optimize button. - This sequence will optimize the volume and help it run more efficiently.
Which of the following statements is true of SAN devices? SAN devices are the same as network-attached storage. SAN devices use SAN protocols to manage and format filesystems. SAN devices use hardware RAID externally to provide fault tolerance for the storage device that they contain. SAN devices are functionally like an external USB drive.
SAN devices are functionally like an external USB drive. - SAN devices only provide storage to other systems using a SAN protocol and do not format or manage filesystems on this storage. Instead, the operating system that connects to the SAN device provides this functionality. As a result, a SAN device is functionally like an external USB drive.
Nodin, a trainee system administrator, is configuring a shared print device, PrinterA, on a colleague's computer. PrinterA is shared through ServerV. He uses the format below to successfully configure the print device. \\ServerV\PrinterA Identify the protocol that he most likely used. LDP SMB IPP SMS
SMB - SMB protocol uses the format mentioned to print documents to shared printers. The default format is \\severname\sharedprintername.
Identify the correct process that automatically adds SMB shared printers to computers that join a domain. Access the Advanced tab of the printer and select Auto deploy printer to client computers Access the Sharing tab of the printer and select the List in the directory option Select the printer within the Print Management tool, select More Actions, and choose Deploy with Group Policy from the Actions menu Select the printer within the Print Management tool and click Enable Branch Office Direct Printing
Select the printer within the Print Management tool, select More Actions, and choose Deploy with Group Policy from the Actions menu - You can use Group Policy to automatically add SMB shared printers to computers that are joined to the domain, provided that the appropriate printer drivers for the computers are installed on the print server. To do this, right-click a printer within the Print Management console and select Deploy with Group Policy.
What option should you use on a printer's Advanced properties page if pages from different jobs are mixed? Start printing after last page is spooled Print spooled documents first Print directly to the printer Enable advanced printing
Start printing after last page is spooled - This ensures that pages of a print job are sent to the print device only after all pages within the print job have finished spooling.
Identify the option that can be used to create storage pools that include storage devices from different servers on a network. Storage Spaces Direct A combination of hard disks and SDDs A thin-provisioning virtual disk The primordial storage pool
Storage Spaces Direct - Using Storage Spaces Direct, you can configure Storage Spaces to create storage pools that include storage devices from up to 16 servers on the network.
Which of the following commands can be used within Windows PowerShell to view and manage print jobs within the print queue for a printer? Set-Printer printername-restart Suspend-PrinJob Restart-Service spooler-force http://serverx/printers
Suspend-PrinJob -This is used to suspend the print jobs.
What separator page file is used with PostScript-only printers and prints a separator page at the beginning of each document? Pcl.sep Pscript.sep Sysprint.sep Sysprtj.sep
Sysprint.sep - This is used to print a PostScript separator page on a printer that supports PostScript only.
Which of the following tabs help configure the times that a printer is available to users, the printer priority, the printer driver, and spooling options? The Sharing tab The Ports tab The Advanced tab The Security tab
The Advanced tab - The Advanced tab helps configure the times that a printer is available to users, the printer priority, the printer driver, and spooling options.
What happens if an encrypted file in an NTFS partition on a Windows 10 system is moved to a FAT32 partition on a Windows 7 system? The file transfer does not occur because FAT32 cannot store encrypted files. The file encryption is maintained on the new location. The file is moved but is only visible to Windows systems that can see EFS files. The file is decrypted and placed onto the FAT32 volume.
The file is decrypted and placed onto the FAT32 volume. - When an encrypted file is moved to a FAT32 partition on a Windows 7 system, Encrypting File System (EFS) decrypts the file and stores an unencrypted version on the FAT32 partition.
What happens when a folder with NTFS permissions is copied to a shared folder on a FAT volume? The folder loses all NTFS and share permissions associated with it. The folder inherits the share permissions but loses the NTFS permissions. The folder is copied along with all NTFS and share permissions. The folder is set to read-only until the user performing the move changes the attribute.
The folder inherits the share permissions but loses the NTFS permissions. - FAT filesystems do not support NTFS permissions. However, the folder retains the share permissions.
Shaw, a server administrator, uses an iSCSI SAN protocol to transfer data to and from SAN devices at a speed of up to 40 Gb/s. He configures one of the SAN devices to provide storage to Jasper's Windows Server 2019 system. What should Jasper configure in his system to be able to connect to the storage? The iSCSI target The iSCSI initiator HBA MPIO
The iSCSI target - To connect a Windows Server 2019 system to an iSCSI SAN, he must first ensure that the appropriate iSCSI target has been configured on the iSCSI SAN device and that his server can connect to it. These tasks must be performed using the configuration tools provided by the iSCSI SAN device manufacturer.
Nora is a data scientist and works with programs that routinely acquire a lot of data. After data analysis, she stores the raw data for future use. However, she does not want the Windows Search Service to include the data files every time she performs a search function. Which of the following attributes should Nora deactivate to exclude the data files from searches The index attribute The compress attribute The archive attribute The hidden attribute
The index attribute - Nora should deactivate the index attribute for the data files to exclude them from searches.
Nadia uses the Disk Management tool to create a simple volume in one of the disks. She specifies the simple volume size and chooses a drive letter. While selecting the formatting options, she modifies the default allocation unit size. What will happen if the allocation unit size is large? The performance of file sharing applications will increase. The performance of database applications will increase. The performance of file sharing applications will decrease. The performance of database applications will decrease.
The performance of file sharing applications will increase. - A large allocation unit size will increase the performance of file sharing applications, whereas a small allocation unit size will increase the performance of database applications.
What happens when a print job exceeds the print device storage capacity? The print jobs are sent to the Server Message Block (SMB). The print jobs are divided into smaller parts and sent to the print device sequentially. The Print Spooler service increases the print device storage capacity. The rendering process slows down, which results in a decrease in the print job.
The print jobs are divided into smaller parts and sent to the print device sequentially. - Print devices have a limited amount of storage to store print jobs. When print jobs exceed print device storage, it is divided into smaller parts and sent to a print device sequentially.
Gabriela attempts to create a virtual disk on a storage pool using Server Manager. However, she is unable to select the Create storage tiers on this virtual disk option. Why do you think she is not able to use the option? She enters the wrong virtual disk name. She is not using the New Virtual Disk Wizard. The system uses an SSD and not an HDD. The storage spool does not have sufficient space.
The system uses an SSD and not an HDD. - The Create storage tiers on this virtual disk option is only selectable if the storage pool contains a combination of hard disk and SSD storage devices.
Which service is a faster replacement for the Windows Indexing Service that is available on Windows Server 2019? Common Internet File System The Windows Search Service Windows Run A discretionary access control list
The windows search service - The Windows Search Service is a faster replacement for the Windows Indexing Service that is available on Windows Server 2019.
What are users who only have the List folder contents permission allowed to do? They can list files in the folder or switch to a subfolder, view folder attributes and permissions, and execute files, but cannot view file contents. They can read, add, delete, execute, and modify files, but cannot delete subfolders and their file contents, change permissions, or take ownership. They can view file contents, view folder attributes and permissions, traverse folders, but cannot execute files. They can traverse folders, view file contents, view attributes and permissions, and execute files.
They can list files in the folder or switch to a subfolder, view folder attributes and permissions, and execute files, but cannot view file contents. - Users with the List folder contents permission can list (traverse) files in the folder or switch to a subfolder, view folder attributes and permissions, and execute files. However, they cannot view file contents.
Selecting a shared printer within the Print Management console and clicking on More Actions, Properties from the Actions menu, you will be able to change the printer name, location, and comment. True False
True - After adding a shared printer to the system, you can perform additional configuration tasks by accessing the properties of the printer within the Print Management console.
Access-based enumeration limits the shares a user can see to only the shares for which the user has at least Read permission. True False
True - Enabling access-based enumeration prevents users from viewing shared folders (and subfolders and files) for which they do not have at least Read share and NTFS/ ReFS permissions.
Access to a shared folder on the network will use the most restrictive permissions, regardless of whether they are NTFS or share permissions. True False
True - You must be granted both shared folder permissions and NTFS/ReFS permissions to access files within a shared folder on an NTFS or ReFS filesystem. For example, if you have a Read/Write share access to a shared folder and a Read NTFS/ReFS permission to a file within the shared folder, you will only be able to read the contents of the file even though you have a Write access to the folder.
Users can access a webpage to view and manage their own print jobs provided that the Internet Printing component of the Print and Document Services role is installed on the print server. a. True b. False
True -The Internet Printing component of the Print and Document Services role provides a webpage (http://printservername/printers) that users can use to view and manage their own print jobs.
You can configure auditing for a shared printer provided that the Audit object access policy setting is configured within a Group Policy that applies to the print server. a. True b. False
True - Auditing for printers works similar to auditing for folders and files. The Audit object access policy setting must first be enabled before configuring the auditing of folders, files, and printers.
Using a disk management tool, you can create a GPT on a disk that has an MBR when no partitions exist on a disk. True False
True - Provided that no partitions exist on the disk, you can right-click a disk in the Disk Management tool and click Convert to GPT to create a GPT on a disk that has an MBR, or click Convert to MBR to create an MBR on a disk that has a GPT.
Documents are rendered into print jobs on the print client by default. a. True b. False
True - Shared printers are configured with the Render print jobs on client computers option enabled by default on the Sharing tab of printer properties.
Windows 10 PCs can be configured to print directly to a network-attached print device, or to a shared printer on print server that prints directly to a network-attached print device. True False
True - You can configure a local printer on Windows 10 to print to a network-attached print device. Alternatively, you can configure Windows 10 to print to a shared printer on a print server that forwards print jobs to a network-attached print device.
Malaika purchased a print device that can be automatically configured by the system. The print device is PnP-capable, and it does not have a network interface. Which of these should Malaika use to connect the print device to the system? Wi-Fi Bluetooth USB Ethernet
USB - A PnP-capable physical printer connects to the system via physical ports, such as USB, parallel, or serial, and it is configured by the system automatically.
Martha, a support technician, is troubleshooting a problem with a shared printer. All her colleagues, including Flavio, had complained that the printer control codes appear on printouts. She identifies corrupt print drivers as the cause of the problem. She reinstalls the print driver on Flavio's computer, and he does not face this problem again. However, other people in her company still face the issue. What should Martha have done to mitigate this issue for everyone? Changed the location of the spool folder Turned the printer off and turned it on again Updated or reinstalled the printer driver on the print server Updated or reinstalled the printer driver on all the print clients individually
Updated or reinstalled the printer driver on the print server - If all print clients (i.e., the computers using the shared printer) are experiencing this problem, the driver must be updated or installed on the print server and not on the clients.
A server rack containing data files, databases, web content, etc. is stored on an external SAN, which is connected to the Windows Server 2019 operating system via iSCSI. Which of the following is not likely to be achieved with this configuration? Connection to Fibre Channel SAN devices Accessing multiple SAN devices Providing storage to other servers Using hardware RAID externally to provide fault tolerance
Using hardware RAID externally to provide fault tolerance - SAN devices use hardware RAID internally to provide fault tolerance for the storage devices that they contain.
A system administrator wants to give NTFS folder permission to a project manager so that the manager can add or remove the read-only, hidden, archive, index, compress, and encrypt attributes. Which of the following permissions should the administrator give to the project manager? Read attributes Write extended attributes Write attributes Read extended attributes
Write extended attributes - The administrator should give Write extended attributes permission to the project manager. Write extended attributes permission allows the user to add or remove the archive, index, compress, and encrypt attributes.
Which of the following are print server configuration tasks that you normally perform before adding shared printers within the Print Management tool? (Choose all that apply.) a. Add manufacturer-supplied printer drivers for the print devices within your organization b. Add a PRINT$ shared folder c. Verify the ports and forms available on your print server, and add additional ones, if necessary d. Configure default printer and print server permissions
a. Add manufacturer-supplied printer drivers for the print devices within your organization c. Verify the ports and forms available on your print server, and add additional ones, if necessary d. Configure default printer and print server permissions
Which of the following spooling formats can be used by the GDI print API? (Choose all that apply.) a. EMF b. XPS c. RAW d. TEXT
a. EMF c. RAW d. TEXT
You have submitted a print job to a shared printer that uses a different layout than is supported by the print device. After noticing that your print job was not printed, you open the print queue and see your print job with a Paused status. What action can you select from the Documents menu to ensure that the print job is printed, even if the layout is not ideal? a. Resume b. Unhold c. Restart d. Cancel
a. Resume
You notice that printouts from small print jobs are inserted within the printouts of large print jobs on a print device within your organization. What option can you select within printer properties to resolve the issue? a. Start printing after last page is spooled b. Hold mismatched documents c. Print directly to the printer d. Keep printed documents
a. Start printing after last page is spooled
Which of the following settings within printer properties allows print device notifications to be sent to the print server? a. Enable printer pooling b. Enable bidirectional support c. Enable notifications and logs d. Allow printer notifications
b. Enable bidirectional support
You wish to configure a Windows Server 2019 print server using the Print Management tool to share printers using SMB and LPD. What components must you select when installing the Print and Document Service server role? (Choose all that apply.) a. Print Management b. Print Server c. LPD Service d. Internet Printing
b. Print Server c. LPD Service
Your organization maintains a shared folder called PrivateHR that only the HumanResources-G and Domain Admins groups have access to. You wish to audit each time a member of the HumanResources-G group successfully modifies or deletes a file within this folder. What must you do? (Choose all that apply.) a. Configure an audit entry within the SACL of the PrivateHR folder that allows the Modify permission for the HumanResources-G group b. Configure the audit attribute on the PrivateHR folder c. Configure an audit entry within the SACL of the PrivateHR folder that audits the Modify permission for the HumanResources-G group d. Enable success auditing for the system using an audit policy
c. Configure an audit entry within the SACL of the PrivateHR folder that audits the Modify permission for the HumanResources-G group d. Enable success auditing for the system using an audit policy
The manager of the Accounting department needs to be able to print to the shared printer within the Accounting department, as well as manage other user's print jobs within the print queue. What printer permissions must you assign to the manager on the shared printer at minimum? a. Print b. Manage Documents c. Print and Manage Documents d. Manage Documents and Manage Printers
c. Print and Manage Documents
Imala, a research scientist, wants to encrypt a document that contains her research data as she does not want the content to be made public before it is published. She is using the Command Prompt window to configure the encrypt attribute. Which of the following commands should Imala use to configure the encrypt attribute? fsutil.exe dfsutil.exe compact.exe cipher.exe
cipher.exe - Imala can use the command "cipher.exe." This command is used in a Command Prompt window to configure the encrypt attribute.
Which of the following features must you install on a Windows print client in order to print to a shared printer using SMB? a. Internet Printing Client b. LPR Port Monitor c. SMB Printer Client d. None of the above
d. None of the above
You would like to ensure that an SMB shared printer is automatically configured on client computers within your organization. What must you do? a. Access the Sharing tab of the printer and select List in the directory. b. Create a shared printer object within Active Directory Users and Computers. c. Access the Advanced tab of the printer and select Auto deploy printer to client computers. d. Select the printer within the Print Management tool and click More Actions, Deploy with Group Policy from the Actions menu.
d. Select the printer within the Print Management tool and click More Actions, Deploy with Group Policy from the Actions menu.
Which of the following formats can be used to print to a shared printer using IPP? a. servername:\sharedprintername b. servername:/sharedprintername c. \\servername\sharedprintername d. http://servername/printers/sharedprintername/.printer
d. http://servername/printers/sharedprintername/.printer
Which of the following is a term given to the software component in the operating system that connects to the SAN device via iSCSI? iSCSI target iSCSI initiator HBA MPIO
iSCSI initiator - The software component in the operating system that connects to the SAN device via iSCSI is referred to as an iSCSI initiator.