Hands-On Server 2019 Post-Assessment Quiz
When a BPA scan used to verify server roles, the analysis of each role yields a report that shows four levels of severity. a. True b. False
FALSE
Runako is configuring DHCP options on his organization's DHCP server. He has configured the default router option and the time server option. Next, he wants to configure the DNS Servers option.Which option number is Runako likely to choose to complete this task? a. 003 b. 006 c. 046 d. 015
b. 006
Riya has an external storage area network device that she wants to connect to the Windows Server 2019 operating system. Which of the following protocols can she use to connect her device to the operating system? a. SMB b. FTP c. iSCSI d. NFS
c. iSCSI
Which TCP port should be open and accessible to allow remote access VPN utilizing SSTP to function? a. 500 b. 1723 c. 443 d. 1812
443
Booker is the IT administrator for Juan Computing. He receives a request to install Windows Server 2019. One of the accompanying requests is that the data stored on the server will be accessed and modified frequently by hundreds of users.Which of the following should Booker consider using for the installation? a. An SSD b. A regular hard disk c. A 1.4 GHz processor d. A full HD monitor
a. An SSD
Which Registry root key has information about the current hardware profile? a. HKEY_CURRENT_CONFIG b. HKEY_CURRENT_USER c. HKEY_USERS d. HKEY_LOCAL_MACHINE
a. HKEY_CURRENT_CONFIG
Which of the following is true of the Infrastructure Master Active Directory FSMO role? a. It is limited to one role per domain controller. b. It is used to coordinate user password changes. c. It is limited to one role per forest. d. It is used to coordinate group membership.
d. It is used to coordinate group membership.
The queue status in the Print Management window shows Attention Required. The print server does not have the LPD service installed. Which command will you use to mitigate this problem? a. Restart-Service spooler-force b. Suspend-PrintJob c. Net start lpdsvc d. Restart-Service spooler
d. Restart-Service spooler
Fault-tolerant RAID volumes ensure that you no longer need backups. a. True b. False
FALSE
Microsoft Hyper-V is a Type 2 hypervisor. a. True b. False
FALSE
Modern operating systems such as Windows 10 do not support NetBIOS and use FQDNs instead. a. True b. False
FALSE
A Read-only Domain Controller (RODC) cannot be used to update information in Active Directory, and it does not replicate to regular DCs. a. True b. False
TRUE
If a WSUS server is implemented in an organization, updates must be approved on the WSUS server before they can be installed on computers. a. True b. False
TRUE
Peer-to-peer networking offers only moderate network security because user account information must be maintained on each workstation. a. True b. False
TRUE
Windows 7 clients can be allowed to use DirectAccess. a. True b. False
TRUE
Windows Deployment Services can be used to rapidly deploy Windows Server 2019 to physical servers that are connected to the network. a. True b. False
TRUE
Windows Server 2019 allows you to enable data deduplication for NTFS and ReFS volumes that are not the boot or system volume. a. True b. False
TRUE
What statement correctly describes the pathping command? a. It can be used to test network latency in milliseconds. b. It should be used in Windows PowerShell. c. It cannot be used along with a target IP address. d. It is used to check the connectivity within a network.
a. It can be used to test network latency in milliseconds.
Which of the following statements is true of Distributed File System (DFS) namespaces? a. It does not have to be installed on all the servers within an organization. b. It cannot be accessed through File Explorer. c. The access-based enumeration feature is enabled by default after DFS namespace is created. d. It must be installed on all the servers that synchronize folder contents.
a. It does not have to be installed on all the servers within an organization.
Which of the following statements is true of the primordial storage pool? a. It lists the four available local storage devices in the physical disks. b. The primordial storage pool contains the boot and system partitions. c. It stores 1 MB of its space to convert to a dynamic disk. d. The primordial storage pool is used to create an MBR on new storage devices.
a. It lists the four available local storage devices in the physical disks.
Lisa attempts to increase the priority of a print job to allow it to print before other print jobs are submitted by other users. However, she is unable to do so because of a restriction.Which of the following limitations placed by Windows Server 2019 may be causing this issue? a. Lisa does not have Manage Documents permission. b. Lisa has not enabled Branch Office Direct Printing (BODP) on the shared printer. c. Lisa does not have Print permission to the shared printer. d. Lisa has not installed the Internet Printing component of Print and Document Services on a print server.
a. Lisa does not have Manage Documents permission.
You set up a Windows Server 2019 system and install the Docker EE package. Next, you run the following command to enable LCOW: PS C:\> [Environment]::SetEnvironmentVariable("LCOW_SUPPORTED", "1", "Machine")Which of the following commands should you run next to complete setting up LCOW? a. PS C:\> Restart-Service Docker b. PS C:\> docker images c. PS C:\> docker tag microsoft/iis iis d. PS C:\> docker search apache
a. PS C:\> Restart-Service Docker
Nancy is a system administrator working in a multinational corporation. She often receives complaints from her colleagues that people take the wrong printed documents because of the large number of print jobs.How can Nancy sort this issue? a. She should configure a separator page. b. She should reinstall the printer driver. c. She should cancel all existing print jobs. d. She should move the spool folder to a different storage device.
a. She should configure a separator page.
Sakura, a system administrator, is making some changes to the domain-level GPO in her organization. These changes must be applied to all users and computer accounts. She knows that some of the OUs in the Active Directory have GPO settings that prevent the application of any domain-level GPO changes.What should Sakura do to ensure that changes in the domain-level GPO are applied to all users and computer accounts? a. She should configure the GPU link with the Enforced setting. b. She should configure the Block Inheritance setting on the OUs. c. She should ask the users under the OUs to accept the domain-level setting when prompted. d. She should create a new OU and move the users under that OU.
a. She should configure the GPU link with the Enforced setting.
Maryann is working on a system that is connected to the Active Directory domain of her company, Fixvent. She is performing a few server administration tasks using Server Manager. The server that requires these administration tasks is running Windows Server 2019.If Maryann uses the Remote Server Administration Tools (RSAT) to complete these tasks, which is the most likely operating system on her computer? a. Windows 10 Professional b. Windows Server 2016 c. Windows Server 2019 d. Windows XP
a. Windows 10 Professional
Raisa is configuring the logging properties for the sales department on the RADIUS server. She wants the server to only log specific events. Raisa selects Sales on the Network Policy Server tool.Which of the following options should Raisa select next? a. Configure Accounting b. Change Log File Properties c. Change SQL Server Logging Properties d. Configure Sales
b. Change Log File Properties
Keanu, a system administrator, created a virtual machine using the default settings. After a few weeks, he notices that the virtual hard disk is almost full, so he decides to expand the hard disk. He opens the virtual hard drive settings and is faced with multiple options.Help Keanu pick the correct settings option. a. Browse b. Edit c. Remove d. Inspect
b. Edit
As a system administrator, you will be tasked with performing both proactive and reactive maintenance of a Windows Server 2019 machine.Which of the following tasks will you perform as part of proactive maintenance? a. Gather as much as information about a problem as soon as it occurs. b. Ensure that 20% free space is always available for file caches. c. Document the solutions you provided for problems. d. Monitor the system and take backup if it had not been already done.
b. Ensure that 20% free space is always available for file caches.
One of the common applications running on Safara's system has not been receiving automatic updates. She suspects that the update service for the application has turned off. She wants to view a list of services on the system.Which of the following PowerShell cmdlets should Safara run? a. Net-Service b. Get-Service c. Set-Service d. Start-Service
b. Get-Service
Nathaniel, a system administrator of a marketing firm, has noticed unusual activity consistent with a malware attack. After some research, he finds out that the firm's private key has been compromised, and he needs to revoke the compromised certificate.What steps should Nathaniel follow to find the option to revoke the compromised certificate? a. Go to Revoked Certificates, right-click, select All Tasks, and click Publish b. Go to Issued Certificates, right-click the relevant certificate, and click All Tasks c. Go to Revoked certificates, right-click the relevant certificate, and click Move d. Go to Pending Requests, right-click, click All Tasks, and click Issue
b. Go to Issued Certificates, right-click the relevant certificate, and click All Tasks
Norman installs the Windows Server 2019 Essentials Edition on a server. He needs to send out a note to his team explaining the features and limitations of the server.Which of the following statements should Norman include in his email? a. It is limited to a maximum of 100 concurrent remote access connections. b. It does not include the Hyper-V role that is used to manage virtual machines. c. It is limited to a maximum of 64 CPU sockets and 24 TB of memory. d. It can join a preexisting domain and function as a domain controller in the domain.
b. It does not include the Hyper-V role that is used to manage virtual machines.
Pascal installs the Remote Desktop Services server role on multiple servers in his organization. He intends to allow users remote access to the organization's resources in the DMZ. Because multiple users will be creating remote sessions, Pascal wants to ensure that this load is balanced across the servers with the Remote Desktop Services server role installed.Which of the following role services will allow Pascal to accomplish this? a. Remote Desktop Gateway b. Remote Desktop Connection Broker c. Remote Desktop Virtualization Host d. Remote Desktop Web Access
b. Remote Desktop Connection Broker
Abu is creating a virtual machine template to enable rapid server deployment at his organization. He creates a virtual machine, installs Windows Server 2019, installs server roles and features, and adds third-party software. The next step is to remove all unique information from this computer.Which of the following tools should Abu use? a. Windows Deployment Services b. System Preparation Tool c. NIC Teaming d. File System Freeze
b. System Preparation Tool
Which of the following statements accurately reflects the default permissions applied to printers? a. Manage Printers permission is assigned to all users. b. The Everyone group has Print permission. c. Users can configure the print server by default. d. CREATORs are denied Manage Documents permission.
b. The Everyone group has Print permission.
Read the script below and answer the question that follows.$answer = Read-Host "Would you like to run the WebsiteCache script?Yes/No/Quit"if ($answer -eq "Yes" -or $answer -eq "Y"){"Caching Websites - Please Wait"; & C:\WebsiteCache.ps1}elseif($answer -eq "No" -or $answer -eq "N"){"Caching Aborted"}elseif($answer -eq "Quit" -or $answer -eq "Q"){"End Program"; Start-Sleep 3; exit}else{"Caching Websites - Please Wait"; & C:\WebsiteCache.ps1}If a user executes this code in Windows PowerShell and enters "Okay," what is the result? a. The PowerShell window will display Caching Aborted. b. The WebsiteCache script will be executed successfully. c. The user will be prompted to enter another response. d. End Program will appear on screen and the PowerShell window will close in 3 seconds.
b. The WebsiteCache script will be executed successfully
Which of the following is true of user quotas? a. They contain a list of filename extensions used in screening. b. They limit the space that users can consume within the filesystem. c. They prevent users from storing files of a certain category within folders. d. They limit the space consumed by a folder on the filesystem.
b. They limit the space that users can consume within the filesystem.
Priscilla is configuring a new Web server in her organization. A common complaint across the organization is that Web apps load slowly. Her manager asks her to configure IIS in a way that improves the loading of Web apps.Which of these IIS role services should Priscilla install to help with this? a. IIS Management Tools b. Web Server Performance c. Web Server Security d. FTP Server
b. Web Server Performance
You are troubleshooting a network issue on your server and suspect the issue exists beyond your gateway/router, in another LAN. Which of the following commands will you use to test the connectivity to the router in the other LAN? a. ping b. tracert c. nslookup d. arp -a
b. tracert
Which of the following refers to a temporary space for files that need to replicate to other systems? a. DFS replication group b. Hub and spoke topology c. DFS staging folder d. Full mesh topology
c. DFS staging folder
Nova, a Web app developer, builds an application that she wants to make available to other developers. She wants to distribute it along with the container image that is configured to run the app.Which of the following can host Nova's Web app? a. Docker client program b. DockerProvider c. Docker Hub d. Docker daemon
c. Docker Hub
Jsmith is a member of two groups in your organization, the Accounting group and the Contractor group. He wants to save a file to Folder A on his local computer but finds he has no access. Upon investigating, you discover the Accounting group has Full control over Folder A, but the Contractor group has been denied all access to the folder.What is Jsmith's effective access? a. Jsmith's membership in the Contractor group allows him to edit files in the folder only after he takes control of the folder using the Accounting group permissions. b. Because the two groups have opposite levels of access, the two cancel out and Jsmith is left with only read permissions. c. Jsmith's membership in the Contractor group means that he has been denied all access to the folder. d. Jsmith's membership in the Contractor group limits him to read and execute permissions.
c. Jsmith's membership in the Contractor group means that he has been denied all access to the folder.
Malcolm installs Windows Server 2019 on a physical server in his organization to run Windows Web apps. One of the Web apps that Malcolm intends to run on this server requires a large amount of object storage.How can Malcolm address this requirement? a. Malcolm can use SANs to provide object storage options for the app. b. Malcolm can install a software package that provides object storage options on the private cloud. c. Malcolm can configure the app to access object storage on a cloud provider. d. Malcolm can run the Web app on an Apache Web server instead of running it on IIS.
c. Malcolm can configure the app to access object storage on a cloud provider
Barack configures a Window 2019 server as a DNS server. He creates forward and reverse lookup zones on the server to provide authoritative responses. A client contacts the DNS server for a lookup request, but the request cannot be resolved using the zones.Which of the following is true of this scenario? a. The DNS server will automatically forward the request to another DNS server that is capable of resolving the lookup request. b. Barack needs to set up cached entries and root hints on the server after deleting the zones. c. The DNS server will attempt to resolve the request by performing a recursive query using the root hints. d. Barack needs to set up the DNS server as a default forwarder to resolve the lookup request using root hints.
c. The DNS server will attempt to resolve the request by performing a recursive query using the root hints.
Aslam is configuring a DHCP server in his organization. During the creation of a new scope, he is prompted to enter an exclusion range.If Aslam chooses to leave this range empty, which of the following will indicate that Aslam has made an incorrect choice? a. The organization does not contain any DHCP relay agents in other locations. b. The network does not contain other DHCP servers that lease IP addresses. c. The organization contains computers with manually configured IP addresses. d. The network contains DHCP servers configured in a DHCP failover configuration.
c. The organization contains computers with manually configured IP addresses.
Fang creates external and internal virtual switches on a server that has Hyper-V installed.Which of the following statements is true of the physical network interface in this scenario? a. The Hyper-V Extensible Virtual Switch protocol is disabled by default. b. IPv4 and IPv6 are enabled on the physical network interface by default. c. The physical network interface should not be configured to use IP. d. The physical network interface will not appear within the Network Connections area of Control Panel.
c. The physical network interface should not be configured to use IP.
Ksenia sets up the DNS Server role on SERVERX. Next, she sets up a primary and secondary zone, followed by a stub zone.Which of the following is true of this scenario? a. The stub zone cannot access a primary zone on another DNS server. b. The stub zone will function as the authoritative zone. c. The stub zone will contain NS records. d. The stub zone cannot contain host records.
c. The stub zone will contain NS records.
Your organization uses Windows Server 2019, and you recently installed a fresh copy of Windows Server 2019 Standard Edition on a system.Which of the following statements is true if the domain controller automatically activated the license on this new system? a. Your organization has purchased a retail product key or Multiple Activation Key (MAK). b. You forgot to connect the computer to the same network as that of the domain controller. c. You received a generic volume license key (GVLK) with Windows Server 2019 installation media. d. The newly installed server has the Active Directory-based Activation role installed.
c. You received a generic volume license key (GVLK) with Windows Server 2019 installation media.
Which of the following commands can be used on the Command Prompt Window to run the Windows Defender Firewall with Advanced Security tool? a. certmgr.msc b. gpedit.msc c. wf.msc d. certlm.msc
c. wf.msc
Anita logs into her personal computer and begins streaming a movie from ArkanShotz. She simultaneously opens a Microsoft Word file on her laptop and starts jotting down notes to help her write a review of the movie. To calculate some numbers that she needs to plug into the article, she opens a calculator on her smartphone.Which of the following is true of this scenario? a. Microsoft Word is an example of a Web app. b. Anita's calculator is an example of a Web app. c. Anita's laptop is an example of a cloud server. d. ArkanShotz is an example of a Web app.
d. ArkanShotz is an example of a Web app.
Ayan is a system administrator at an organization that has a high rate of employee churn. This means that a high percentage of employees leave the organization over a specific time period. In addition, the organization also sees a high percentage of previous employees returning to the company.When a user leaves this organization, which of the following cmdlets is Ayan most likely to use? a. Enable -ADAccount b. Remove -ADUser c. New -ADUser d. Disable -ADAccount
d. Disable -ADAccount
What is the feature that allows a WDS server to send a bootable WIM copy to be installed by multiple clients simultaneously? a. Port mirroring b. Kerberos c. Live migration d. Multicast
d. Multicast
Nargiza, a system administrator, is setting up user accounts for a newly recruited graphic designer whose name is Philip Thomson. Active Directory is set up on Windows 2019 Server.Which of the following can Nargiza use as the account name? a. Philip[Thomson b. Philip,Thomson c. Philip:Thomson d. Philip.Thomson
d. Philip.Thomson
Dorene, a system administrator, is configuring a DHCP relay on the remote access server. She adds an IPv4 relay agent and specifies the IP address of the DHCP server that contains the scope for the DMZ network.What should Dorene do next? a. She should reboot the remote access server. b. She should configure the DHCP relay agent to forward authentication requests to a RADIUS server. c. She should add a DHCP relay agent for IPv6. d. She should configure the DHCP relay agent to listen for DHCPDISCOVER packets on a network interface.
d. She should configure the DHCP relay agent to listen for DHCPDISCOVER packets on a network interface.
In the past, you have faced issues with the response time of a Windows Server 2019 system, SERVERZ, in your organization. To avoid future problems, you create a data collector set called SERVERZ Data Collector Set.Which of the following predefined data collector configurations will you use? a. WDAC Diagnostics b. System Performance c. Basic d. System Diagnostic
d. System Diagnostic
Which of the following is a tool that a server administrator would typically use first while facing a problem with the performance of a system? a. Performance Monitor b. Event Viewer c. Resource Monitor d. Task Manager
d. Task Manager
A small-scale organization uses a WPA2 wireless LAN to provide Internet access to its regular visitors. It was later found that some people passing by the office building used Aircrack, a cracking tool, to access the Internet through the organization's WLAN. Upon consulting with experts, the organization decides to use a RADIUS server to block such tools.What do you think made it so easy for outsiders to crack and use the organization's WLAN in the first place? a. The WLAN was not password protected. b. The WPA generated random symmetric encryption keys that are easy to identify. c. The WPA does not encrypt the traffic between the devices and the WAP. d. The WLAN allowed users to connect to the Internet using the same password.
d. The WLAN allowed users to connect to the Internet using the same password.
Gabriela attempts to share a folder with other users via NFS sharing. However, she is unable to do so because of a restriction.Which of the following limitations placed by Windows Server 2019 may be causing this issue? a. The Server for NFS role is installed. b. Gabriela is trying to share the folder to a Linux or UNIX computer. c. Gabriela is not an administrator or part of the Administrator group. d. The folder is on a FAT32 filesystem.
d. The folder is on a FAT32 filesystem.
Trent is the system administrator at an organization that has offices in three countries. The Human Resources department has its own domain, domainHR.com, and has two domain controllers in each country. The domain controllers are named DC1, DC2, DC3, DC4, DC5, and DC6. To improve the efficiency of Active Directory replication, Trent decides to create sites for each location. Trent creates the only site in the domain HR.com root forest at the location that contains the domain controllers DC3 and DC4.Which of the following is true of this scenario? a. The site will contain the domain controllers DC3 and DC4. b. The site will contain all domain controllers. c. The site will be named Default_domainHR_Site1. d. The site will be named Default-First-Site-Name.
d. The site will be named Default-First-Site-Name.
Identify the next step in the printing process after a document to be printed has been generated. a. The print job is sent from the print server to the print client across the network. b. The print server sends the print job to the locally attached print device. c. The document is rendered using the printer driver. d. The software application contacts a print API.
d. The software application contacts a print API.
Which of the following commands can be run to perform a check on F: drive and fix any errors found with the filesystem? a. checkdsk /c F:\ b. chkdsk /c F:\ c. chkdsk F:\ /f d. chkdsk /f F:\
d. chkdsk /f F:\