ITN 200 Final

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

How much storage space is reserved on a storage device to convert a storage disk to a dynamic disk using a Windows tool?

1 MB

Parker runs the net start svsvc command at a Command Prompt to scan volume errors. He finds a corrupted spot on a volume. How can Parker directly go to the corrupted spot identified by the Spot Verifier service?

By using the /spotfix option with the chkdsk command

For zones that allow dynamic updates, you do not need to create CNAME and MX records or host records that provide for round robin or netmask ordering.

FALSE

The modern partition table is called the Master Boot Record (MBR) and uses storage devices that are larger than 2 TB.

False

Trimming erases sections of the volatile memory chips on an SSD that no longer contain data, consolidating the existing data into fewer memory locations.

False

Which of the following RAID level configurations is not supported by Windows Server 2019?

RAID Level 2

Reno is facing some DNS server issues that he is unable to resolve using nslookup, DNS manager, and other general methods. He decides to use information from the DNS Server log to identify the issue. However, the information that was logged is insufficient to resolve the issue. Reno is able to identify the issue after enabling debug logging.

Reno should turn off debug logging.

Which of the following statements is true of SAN devices?

SAN devices are functionally like an external USB drive.

Identify a vital service provided by secondary DNS servers.

Secondary DNS servers respond to DNS lookup requests using read-only zone files.

The subnet mask cannot be modified once a scope is created.

TRUE

Gabriela attempts to create a virtual disk on a storage pool using Server Manager. However, she is unable to select the Create storage tiers on this virtual disk option.

The system uses an SSD and not an HDD.

Tuyet types the following statement into File Explorer: \\serverA\Share1. The NetBIOS name is resolved by a WINS server, and Tuyet is able to access the shared folder. After this interaction with the WINS server, Tuyet does not perform any other operations that requires her computer to interact with the WINS server for over a week.

Tuyet's computer's name record will be deleted from the WINS server.

When configuring the authentication methods for a remote access server, you should select the option Allow remote systems to connect without authentication.

· FALSE

You can obtain a Remote Desktop session by navigating to https:// server/RdWeb in a Web browser, where server is the FQDN of the Remote Desktop Web Access server.

· TRUE

Sonia is configuring a RAID level 5 array with five disks. Each disk has the capacity to store 3 TB of data. What is the total storage size that Sonia can use to store data?

12TB

You are configuring a Windows Server 2016 VPN server using L2TP and NAT.

1701/TCP

Which of the following is a requirement for using Storage Spaces Direct?

A 10 GB Ethernet network interface with remote-direct memory access (RDMA) support is a must.

Sam, an administrator, sends out an HR policy file to Vicky, Mohammad, Charle, and Reena. They save the HR policy file on their home directories under a shared folder of Windows Server 2019 with different file names. As a result, the same copies of the file are present multiple times with different names. Reena opens and saves the file after making minor changes.

A new copy of Reena's file is created and associated with the same file name.

Leisl configures multiple WINS servers on her organization's network. She wants the WINS servers to be able to share the NetBIOS records with each other.

A replication partner

You are the administrator for an Active Directory domain and have been tasked with improving the response time for resolving DNS queries for resources in a second company-owned domain that does not use Active Directory.

A stub zone

What resource record type defines an IPv6 host address in DNS?

AAAA record

Which of the following organizations does not need to install a WINS server?

An organization that has disabled NetBIOS on its computers.

Carlos is configuring a DHCP server in his organization. Some of the computers in his organization contain manually configured IP addresses. Currently, he is setting up the new server to configure IP addresses for users who operate their mobile devices on the organization's network.

Carlos sets the lease duration to 7 days.

Radha is using nslookup to troubleshoot DNS-related issues on SERVER1. She uses the command prompt and types in the statement nslookup servery.zone1.com. SERVER1 returns an incorrect result.

Clear the DNS Server cache, and clear the DNS cache on the resolver.

Rishab is looking for ways to manage duplicate file content on his organization's shared drive. He enables data deduplication for this purpose. To save computing resources, he wants to change the settings such that data deduplication occurs in the evening.

Click Set Deduplication Schedule

What is the first step in troubleshooting an issue where a single computer is unable to lease an address?

Confirming that the computer has a physical connection to the network.

Tara, an administrator, has added storage devices to the storage pool and selected the RAID level for the virtual disk using Server Manager. She wishes to allocate more space than is required for the current amount of data such that the system only uses the actual space it needs, enabling the actual size to grow with data.

Create several thin-provisioned virtual disks

You are asked to create seven partitions in a storage device that uses an MBR. The device already has two partitions. However, you are also told that you cannot create more than a certain number of partitions on the storage device using an MBR.

Create the partitions and label one of the partitions as extended

Merjem, a PhD student, is writing her thesis. She takes regular backup of her files and data. When taking backup, she chooses the Faster backup performance option in the Optimize Backup Performance window.

Every backup only backs up data that has been modified since the previous backup.

If there are multiple DHCP servers on a network, DHCP clients will accept the first offer that they receive.

FALSE

Which of the following is true of WINS?

It can only resolve NetBIOS names to IPv4 addresses.

You are configuring a remote access server in your organization. You install the Direct Access and VPN (RAS) role service along with the Routing role service.

LAN routing

Imran is associating a drive letter to a filesystem so that the drive letter can be accessed by the operating system. What is the term given to the process that Imran is carrying out.

Mounting

Kelsan Informatics has its client computers connected to a router through which the clients can access the organization's servers in the DMZ. The DMZ is connected to a NAT router that is connected to the Internet. In addition to providing access to the Internet, the NAT router also offers additional capabilities, such as traffic throttling, intrusion prevention, and malware filtering.

NEXT GENERATION FIREWALL

While copying files between folders, it is possible to retrace and complete the transfer in case of a power failure if an NTFS-based filesystem is being used. The same cannot be said for a FAT32 filesystem.

NTFS is a journaling filesystem, while FAT32 is not.

Rebecca is configuring a RAID with three storage devices. If she saves a file, the file will be divided into three sections, with each section written to separate storage devices concurrently, in a third of the amount of time it would take to save the entire file on one storage device.

RAID Level 0

Danielle creates a new scope, Sales LAN, for a DHCP server in her organization. She wants to assign an IP address to a printer in the sales department.

RESERVATIONS

How do you create a RAID level 1 volume with two disks in the Disk Management tool?

Right-click on the disk that you want to configure as a RAID volume and then click New Mirrored Volume to create a RAID level 1 volume with two disks.

One of the disks on your computer is running low on storage space. You notice that there is unallocated space in the spanned volume.

Right-click the volume on that disk and click Extend Volume to increase the size of the volume using the unallocated space.

Pablo is a system administrator in training. He is trying to manually defragment the F: volume in Becky's system.

Right-click the volume, click Properties, highlight the Tools tab, and click the Optimize button.

Christopher sets up multiple WINS servers in his organization and configures users' computers to use the WINS server. During testing, he attempts to access a folder called Share on the computer SERVERA. He enters the following statement into File Explorer: \\serverA\share. However, Christopher is unable to access the shared folder.

SERVERA does not have a NetBIOS name record on any WINS server.

Lashonda, a system administrator, installs a remote access server in her organization. The remote access server is connected directly to the demarc. Additionally, the remote access server is configured as a NAT router.

She will select the Demand-dial connections service.

Identify the option that can be used to create storage pools that include storage devices from different servers on a network.

Storage Spaces Direct

When some computers have incorrect address information, you should check for the presence of unauthorized DHCP servers on the network running a non-Windows operating system and remove them if found.

TRUE

You are troubleshooting a DHCP server and discover that it is not dynamically updating DNS records for DHCP clients.

The DNS server and DHCP server are in different domains.

Raymond and Lin are facing network issues on their computers. Rayna, the administrator, is troubleshooting the issue. She notices that Raymond and Lin's computers are using the same IP address, 192.167.1.85.

The IP addresses were configured manually.

Felicia is drafting an email to her colleague Rhonda. After Felicia types out the email, she enters the email address [email protected] and clicks Send. Felicia's email server uses the email address typed to locate the recipient email server.

The MX record.

Which of the following is a necessary condition if you want to configure a reverse proxy instead of port forwarding on a NAT router to enable access to a remote access server?

The NAT router should be a Next Generation Firewall.

Lashonda sets up a DNS server, SERVER1, with a forward lookup zone called domainA.com. It hosts the resource records for the domainX.com Active Directory domain. It contains host (A) records for two network interfaces on SERVER1 (172.16.0.10 and 192.168.1.50). The host records are associated with the FQDNs server1.domainA.com and domainA.com. There is also an SOA record and an NS record for the zone.

The NS record

Aspen sets up the round robin feature in DNS for an FQDN server, server.domainA.com. She creates two identical Web servers with IP addresses 192.168.1.75 and 172.6.0.15 and associates two A records on the FQDN server with these IP addresses. The first A record is associated with the Web server having the IP address 192.168.1.75, and the second A record is associated with the Web server having the IP address 172.6.0.15. Aspen uses a client with the IP address 172.6.0.95 to perform a forward lookup of server.domainA.com.

The client will contact the Web server with the address 172.6.0.15.

Shaw, a server administrator, uses an iSCSI SAN protocol to transfer data to and from SAN devices at a speed of up to 40 Gb/s. He configures one of the SAN devices to provide storage to Jasper's Windows Server 2019 system.

The iSCSI target

Michelle is configuring a DHCP server in her organization. When creating a new scope, she is prompted to enter the subnet delay. She chooses to enter a few milliseconds of delay.

The organization contains DHCP relay agents in different locations.

Nadia uses the Disk Management tool to create a simple volume in one of the disks. She specifies the simple volume size and chooses a drive letter. While selecting the formatting options, she modifies the default allocation unit size. What will happen if the allocation unit size is large?

The performance of file sharing applications will increase.

Ava, a system administrator, configures 45 remote access clients to use the VPN server in the organization using the SSTP protocol. On any day, the number of users that work remotely does not exceed 15, so AVA configures the SSTP VPN protocol for 25 connections on the server. One day, owing to extreme weather, many employees are asked to work from home. When more than 25 users try to connect to the organization's servers, they are not allowed access. Ava uses the Routing and Remote Access tool to increase the number of connections for the SSTP protocol to 45. When she asks these additional users to confirm if they have received access, the users tell her that they are unable to connect to the organization's servers.

The remote access server was not rebooted after the recent changes.

Using a disk management tool, you can create a GPT on a disk that has an MBR when no partitions exist on a disk.

True

A server rack containing data files, databases, web content, etc. is stored on an external SAN, which is connected to the Windows Server 2019 operating system via iSCSI.

Using hardware RAID externally to provide fault tolerance

An organization has published applications on its web servers. The applications are accessible to users in the organization when they are authenticated via Active Directory.

Web Application Proxy

Which of the following is the most likely cause for missing resource records in a secondary zone?

Zone transfer issues

Which of the following is a term given to the software component in the operating system that connects to the SAN device via iSCSI?

iSCSI initiator

An organization separates its client computers from its servers in a DMZ. The client computers are allowed access to the Internet by connecting to the DMZ. The DMZ is connected to a NAT router.

· Demarcation point

Remote users must manually initiate a VPN connection each time they wish to connect to the resources in their organization when using DirectAccess.

· FALSE

The Remote Desktop app uses Secure Socket Tunneling Protocol (SSTP) to transfer desktop graphics, keystrokes, and mouse movements to and from the remote access server.

· FALSE

Kyra has set up a remote access server (RAS) in her organization. She has also configured VPN access on the NAT router. Next, she needs to set up the client systems that will be allowed to access the RAS. Kyra wants to ensure that the client and server communicate using the most secure authentication method.

Extensible Authentication Protocol (EAP)

Zuber is configuring Windows Server 2019 as an iSCSI SAN device. He has successfully created an iSCSI virtual disk and a new iSCSI target. He is trying to connect his system to the new iSCSI target but he is facing a connection issue.

IQN is not present in the access server list.

Madison is using the Backup Schedule Wizard from the Actions pane of the Windows Server Backup tool. He selects the backup configuration as Custom and specifies the items to be backed up. While adding the items to be backed up, he happens to select the System state option. What does this option create a backup of?

Operating system settings

Malia configures a primary zone on a DNS server to accept dynamic updates. Whenever a computer is added to the network, resource records for the computer are automatically created. For a computer, NX2001EY, Malia configures resource records manually. On the Zone Aging/Scavenging Properties window, she selects Scavenge stale resource records, sets the No-refresh interval to 14 days, and sets the Refresh interval to 14 days. She also enables automatic scavenging in the DNS server's properties.

Some of the resource records for N2001EY will be made available for scavenging after 28 days.

You are investigating strange traffic on your network and wish to resolve an IP address to a DNS name.

A PTR record

Kaya is an administrator at Kelvin Computing. Benjamin, a user, wants to access a shared folder on SERVERA, so he uses the UNC \\servera\share to access the folder. His computer then sends out a broadcast to the network to resolve the name SERVERA. Because of the broadcast, all computers on the LAN interpret it and causes additional processing that interferes with other operations.

Install a WINS server.

Trang, a system administrator, is configuring a DHCP relay on the remote access server. She needs to configure the DHCP relay agent to listen for DHCPDISCOVER packets on a network interface.

Trang should select the network interface that is connected to the DMZ


Kaugnay na mga set ng pag-aaral

General Psychology Test 1 - Lamar (Barclay)

View Set

H- Practice test questions- psych and mental

View Set

Penny Review Chapter 13: Testicular/ Male Pelvis

View Set

Human Resource Management Exam 1 Question Study Guide

View Set

Unit 2 Exam - What would you write about? (6 and 8 markers)

View Set