IST-257 Written Test 3 Study Guide
[a] caching [b] only
A DNS server containing no zones is a [a] ________________________ [b]_________________ DNS Server
authoritative
A DNS server that contains resource records for one or more zones is _____________ for those zones
Site Domain OU
A GPO can be linked to a- pick all that apply
Group Policy Object
A GPO is a [a] __________ [b]__________ [c] ________________(type in the meaning of the letters in the abbreviation)
[a] Dynamic [b] Host [c] Configuration [d] Protocol
A [a] _____________ [b] ____________ [c] _______________ [d] ____________ server configures a network interface (on the clients) with the IP address automatically(use complete words)
[a] Active [b] Directory [c] integrated
A [a] _________________ - [b] __________________ [c] _________________ Primary DNS Server contains a read-write copy of a zone file in its Active Directory Database
[a] forward [b] lookup
A [a]___________ [b]__________ is when DNS Servers resolve a FQDN to an IP Address
[a] reverse [b] lookup
A [a]___________ [b]__________ is when DNS Servers resolve an IP Address to a FQDN
primary
A _____________ DNS server contains a read-write copy of a zone
Using hardware RAID externally to provide fault tolerance.
A server rack containing data files, databases, web content, etc. is stored on an external SAN, which is connected to the Windows Server 2019 operating system via iSCSI. Which of the following is not likely to be achieved with this configuration?
secondary
A___________ DNS server contains a read-only copy of a zone
[a] stub [b] DNS [c] server
As with conditional forwarders, a [a]______________ [b]_____________[c] _____________forwards request for a target directly to a DNS server in the target organization
046
Changes the node type for NetBIOS name resolution 0x08 says query the WINS Server first for NetBIOS name resolution and if that doesn't work broadcast the query
[a] root [b] hints
DNS Servers contain a [a]________________ [b] _____________ file that contains IP addresses of DNS servers holding top-level DNS zones
[a] symmetric [b] asymmetric
EFS uses both [a] __________ and [b] __________________ encryption
zone
Each part of a namespace is a _________________________
The system uses an SSD and not an HDD.
Gabriela attempts to create a virtual disk on a storage pool using Server Manager. However, she is unable to select the Create storage tiers on this virtual disk option. Why do you think she is not able to use the option?
[a] public [b] symmetric
HTTPS uses a [a] __________ key and a [b]__________ key
Right-click on the disk that you want to configure as a RAID volume and then click New Mirrored Volume to create a RAID level 1 volume with two disks
How do you create a RAID level 1 volume with two disks in the Disk Management tool?
1 MB
How much storage space is reserved on a storage device to convert a storage disk to a dynamic disk using a Windows tool?
MX
Identifies the email server
Storage Spaces Direct
Identify the option that can be used to create storage pools that include storage devices from different servers on a network.
Enforced
If a GPO link is configured with the _______________ setting, the GPO settings will be applied to the containers that have Block Policy Inheritance configured
Mounting
Imran is associating a drive letter to a filesystem so that the drive letter can be accessed by the operating system. What is the term given to the process that Imran is carrying out?
Every backup only backs up data that has been modified since the previous backup.
Merjem, a PhD student, is writing her thesis. She takes regular backup of her files and data. When taking backup, she chooses the Faster backup performance option in the Optimize Backup Performance window. Which of the following is true of the backup process in the given scenario?
[a] default [b] forwarders
Most organizations will configure DNS servers as [a]______________ [b]_____________ to relay lookup request that they cannot resolve to ISP DNS servers
1. Discover 2. Offer 3. Request 4. Acknowledge
Move the terms in the correct order to demonstrate the DHCP Lease process.
The performance of file sharing applications will increase.
Nadia uses the Disk Management tool to create a simple volume in one of the disks. She specifies the simple volume size and chooses a drive letter. While selecting the formatting options, she modifies the default allocation unit size. What will happen if the allocation unit size is large?
Right-click the volume on that disk and click Extend Volume to increase the size of the volume using the unallocated space
One of the disks on your computer is running low on storage space. You notice that there is unallocated space in the spanned volume. How will you use the unallocated space to increase storage space?
Right-click the volume, click Properties, highlight the Tools tab, and click the Optimize button.
Pablo is a system administrator in training. He is trying to manually defragment the F: volume in Becky's system. Help Pablo identify the correct method to perform manual defragmentation.
006
Provides the IP address of the DNS server to the client
044
Provides the IP address of the WINS server to the client
003
Provides the IP address of the default gateway to the client
RAID level 0
Rebecca is configuring a RAID with three storage devices. If she saves a file, the file will be divided into three sections, with each section written to separate storage devices concurrently, in a third of the amount of time it would take to save the entire file on one storage device. Which of the following RAID levels is Rebecca configuring?
A
Resolves FQDN to an IP address
PTR
Resolves and IP address to an FQDN
CNAME
Resolves one FQDN to another FQDN; also called an alias
Click Set Deduplication Schedule
Rishab is looking for ways to manage duplicate file content on his organization's shared drive. He enables data deduplication for this purpose. To save computing resources, he wants to change the settings such that data deduplication occurs in the evening. What must Rishab do to make this change?
assigned
Software that is ___________________ under software settings is automatically installed
12 TB
Sonia is configuring a RAID level 5 array with five disks. Each disk has the capacity to store 3 TB of data. What is the total storage size that Sonia can use to store data?
Create several thin-provisioned virtual disks
Tara, an administrator, has added storage devices to the storage pool and selected the RAID level for the virtual disk using Server Manager. She wishes to allocate more space than is required for the current amount of data such that the system only uses the actual space it needs, enabling the actual size to grow with data. What would you do to achieve Tara's wish?
5
The CA public/private key pair expires every ____________ years. (provide number) by default
[a] dynamic [b] update
The [a]____________________ [b] _____________________ feature of DNS is used to create SRV records to locate Active Directory Services
scope
The ____________________ has the IP configuration for your clients on your network
root
The first CA deployed is known as the ________________ CA
nslookup
The first step in troubleshooting DNS typically involves testing the forward lookup zone with _______________________ (not PING)
False
The modern partition table is called the Master Boot Record (MBR) and uses storage devices that are larger than 2 TB.
Security Settings
The password policy container is in the [a] __________ [b]__________ subfolder in the computer configuration folder.
True
There is also a Local Computer GPO. True or False?
Group Policy Management
To configure GPOs in Active Directory you can use [a] __________ [b]__________ [c] __________ in the tools menu of server manaager
activate
To configure a 2019 server as a DHCP server you must ___________________ the scope
MMC
To edit the local GPO you can add the Group Policy Object editor to the _______________(use abbreviation)
gpudate /force
To ensure that the computer and user configuration settings are applied, you can run _____________ at the command prompt window
[a] ipconfig [b] registerdns
To fix missing or mis-configured DNS records you can use [a]______________ / [b]_____________ at the command prompt
True
To prevent a Man-In-The-Middle attack, use public keys endorsed by a certificate authority. True or false?
Group Policy
To use [a] __________ [b]__________ you configure GPOs that have the appropriate settings
[a] \\ [b] bluedog [c] \ [d] QTR1
Type in the UNC including the slashes in the correct direction to access the QTR1 folder on the server with the NetBIOS name bluedog (no space) [a]Slash(es)______________ [b]text_____________[c] Slash(es) _____________[d]text__________
RAID level 2
Which of the following RAID level configurations is not supported by Windows Server 2019?
Public Key Digital Signature CRL location the location of the CAs public key certificate name a serial number
Which of the following are/ can be included in a certificate(all that apply)
iSCSI initiator
Which of the following is a term given to the software component in the operating system that connects to the SAN device via iSCSI?
SAN devices are functionally like an external USB drive.
Which of the following statements is true of SAN devices?
NTFS is a journaling filesystem, while FAT32 is not.
While copying files between folders, it is possible to retrace and complete the transfer in case of a power failure if an NTFS-based filesystem is being used. The same cannot be said for a FAT32 filesystem. What do you think could be the reason for this difference?
Create the partitions and label one of the partitions as extended
You are asked to create seven partitions in a storage device that uses an MBR. The device already has two partitions. However, you are also told that you cannot create more than a certain number of partitions on the storage device using an MBR. What would your next step be?
Block Inheritance
You can configure [a] __________ [b]__________ to prevent user and group accounts in an OU from apply GPO settings
Windows Internet Name Service (WINS)
You can configure a __________________ server for NetBIOS name resolution
Administrative Templates
[a] __________ [b]__________ contains several subfolders that can configure different windows components like the control panel and desktop settings
Revoked Certificates
[a] __________ [b]__________ lists certificates that have a future expiration date but should not be used.
Filtering
________________ GPOs mean you remove the authenticated users and add the users and groups that you wish the GPO settings to apply.