IST 1244 Final
Sonia is configuring a RAID level 5 array with five disks. Each disk has the capacity to store 3 TB of data. What is the total storage size that Sonia can use to store data?
12 TB
Amber is a hacker who steals information when people enter their personal details on specific websites. She intercepts the public key as it is sent from the Web server to the Web browser and substitutes her own public key in its place. This enables her to intercept the communication and decrypt the symmetric encryption key using her private key. Which type of hacking attack is Amber perpetrating?
A man-in-the-middle attack
Which of the following organizations does not need to install a WINS server?
An organization that has disabled NetBIOS on its computers
David, a system administrator, has created specific GPOs for every department in his organization based on the permissions required by the various departments. However, he needs to apply the Default Domain Policy for some managers but not for the rest of the users. How can David ensure that the Default Domain Policy is applied only to specific managers' accounts?
By removing the Authenticated Users group from the Security Filtering section and adding the managers' account
Radha is using nslookup to troubleshoot DNS-related issues on SERVER1. She uses the command prompt and types in the statement nslookup servery.zone1.com. SERVER1 returns an incorrect result. If SERVER1 is non-authoritative for this lookup, what should Radha do to resolve this issue?
Clear the DNS Server cache, and clear the DNS cache on the resolver
Rishab is looking for ways to manage duplicate file content on his organization's shared drive. He enables data deduplication for this purpose. To save computing resources, he wants to change the settings such that data deduplication occurs in the evening. What must Rishab do to make this change?
Click Set Deduplication Schedule
Tara, an administrator, has added storage devices to the storage pool and selected the RAID level for the virtual disk using Server Manager. She wishes to allocate more space than is required for the current amount of data such that the system only uses the actual space it needs, enabling the actual size to grow with data. What would you do to achieve Tara's wish?
Create several thin-provisioned virtual disks
The users at Trembot Information Systems currently need to manually initiate a VPN connection when remotely accessing the organization's servers. Samir, a system administrator at Trembot, receives a request from multiple remote users to simplify the process of accessing the organization's servers. Which of the following options should Samir use?
DirectAccess
Merjem, a PhD student, is writing her thesis. She takes regular backup of her files and data. When taking backup, she chooses the Faster backup performance option in the Optimize Backup Performance window. Which of the following is true of the backup process in the given scenario?
Every backup only backs up data that has been modified since the previous backup
1. If multiple GPOs are linked to the same site, domain, or OU, they will be applied in a random order. T/F
False
WPA3 is immune to wireless cracking tools because it uses a Wi-Fi password in a different way than WPA2 does. T/F
False
When configuring the authentication methods for a remote access server, you should select the option Allow remote systems to connect without authentication. T/F
False
What is Group Policy, and why is it used?
Group Policy is a hierarchical infrastructure that allows a network administrator in charge of Microsoft's Active Directory to implement specific configurations for users and computers. Group Policy is primarily a security tool, and can be used to apply security settings to users and computers.
Imran is associating a drive letter to a filesystem so that the drive letter can be accessed by the operating system. What is the term given to the process that Imran is carrying out?
Mounting
Kelsan Informatics has its client computers connected to a router through which the clients can access the organization's servers in the DMZ. The DMZ is connected to a NAT router that is connected to the Internet. In addition to providing access to the Internet, the NAT router also offers additional capabilities, such as traffic throttling, intrusion prevention, and malware filtering. What is the term for this type of NAT router?
Next Generation Firewall
You are investigating strange traffic on your network and wish to resolve an IP address to a DNS name. What resource record should you use to perform a reverse lookup?
PTR record
Can you distinguish between proactive and reactive maintenance with examples?
Proactive maintenance is a preventive approach that aims to anticipate problems (failures or defects) and stop them before they occur. reactive maintenance occurs once a piece of machinery has already failed. In contrast to proactive maintenance, no analysis, tracking, or anticipation is required to carry it out. As the name implies, work is only completed in reaction to a breakdown.
What are the different RAID levels, and how are they different from each other?
RAID 0,1,2,4,5,6,10
Zahara is accessing an application installed on her organization's remote access server from her laptop. She saves output from the application into a file on the server. She opens the saved file on the server and prints it using her local printer. Which protocol is employed in this scenario?
Remote Desktop Protocol
Asa is working from home. She launches an application from the Start menu on her computer. The application is running on the remote access server in her organization. She is able to see and manipulate the application's graphical interface on her computer without running a full graphical desktop of the remote server. Which Remote Desktop services server role allows this behavior of the application?
Remote Desktop Web Access
Danielle creates a new scope, Sales LAN, for a DHCP server in her organization. She wants to assign an IP address to a printer in the sales department. Which of the following folders should Danielle use to configure this option?
Reservations
Why do organizations configure default forwarders?
Restricted communication is allowed between it and the organization's internal DNS servers. If the external forwarder becomes compromised, the internal servers remain safe and function normally. By default, DNS servers are already configured as forwarders. They install without zones, and with the correct root hints
One of the disks on your computer is running low on storage space. You notice that there is unallocated space in the spanned volume. How will you use the unallocated space to increase storage space?
Right-Click the volume on that disk and click Extend Volume increase the size of the volume using the unallocated space
Asmara, a system administrator, is performing routine maintenance checks on the Windows servers in her organization. As part of these checks, she is required to verify that drivers and system files on each server are not corrupted. Which commands should Asmara run?
SFC/scannow
You are attempting to troubleshoot an issue that is preventing you from logging in to your Windows Server 2019 system by using the information in the Windows Registry used the last time the system successfully booted. Which of the following options would you choose from the Advanced Boot Options menu?
Safe Mode
Monitoring is a time-consuming task. T/F
True
The ping utility is used to test the connectivity between two devices on a network. T/F
True
Alonso, a system administrator, has configured and deployed a new GPO at the domain level in his organization. However, when he checks after a few hours, two of the OUs in the Active Directory do not reflect the change. What is the most likely reason the new GPO configuration did not apply to the two OUs?
The Block Inheritance setting prevented the OUs from applying the GPOs
Raymond and Lin are facing network issues on their computers. Rayna, the administrator, is troubleshooting the issue. She notices that Raymond and Lin's computers are using the same IP address, 192.167.1.85. If the organization's network uses a DHCP server, which of the following most likely caused this issue?
The IP addresses were configured manually
Felicia is drafting an email to her colleague Rhonda. After Felicia types out the email, she enters the email address [email protected] and clicks Send. Felicia's email server uses the email address typed to locate the recipient email server. Which DNS resource record for zoneA.com allows Felicia's email server to locate the recipient email server?
The MX record
How does Remote Desktop differ from VPNs and DirectAccess?
They serve a similar function, but where a VPN gives you access to a secure network, RDP focuses on providing remote access to a specific computer. Both will (usually) encrypt your traffic in one way or another, and both will grant you private access to a server or device that might be thousands of miles away.
The terms "program" and "process" are one and the same. T/F
True
When some computers have incorrect address information, you should check for the presence of unauthorized DHCP servers on the network running a non-Windows operating system and remove them if found. T/F
True
What are the advantages of implementing a Windows Server Update Services (WSUS) server in an organization?
WSUS allows an internal server within a private intranet to act as a virtual Windows Update server, Administrators have selective control over what updates are posted and deployed from the public Windows Update site, Automatic Updates can be configured on client computers to access the local WSUS server as opposed to the public Windows Update site, WSUS checks each update to verify that it is digitally signed by Microsoft. Any updates that are not digitally signed are discarded, Administrators can manage WSUS servers remotely using HTTP or HTTPS if their web browser is Internet Explorer 5.5 or higher.
An organization has published applications on its web servers. The applications are accessible to users in the organization when they are authenticated via Active Directory. What RAS capability will allow the organization's applications to be accessible to users outside of the organization?
Web Application Proxy
The new system administrator of XYZ company realizes that whenever updates are available for Windows, WSUS redirects computers to the Microsoft Update servers on the Internet to obtain updates instead of storing the update information on the WID. Which of the following is a likely reason for this issue?
While installing WSUS, the option Store updates in the following location was deselected
Achelle Electronics purchases hardware to set up 25 servers. The IT department must deploy Windows Server 2019 on these machines. Which of the following Hyper-V features should Achelle Electronics use?
Windows Deployment Services