Labs Quiz (7-12)

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

True or False. A Windows Server running the iSCSI Target feature requires that the Microsoft iSCSI Initiator Service to be in Running status. TRUE FALSE

FALSE

True or False. When implementing L2TP protocol on VPN server and client, the only option is to assign computer certificates on both devices from a trusted Certification Authority. TRUE FALSE

FALSE

True or False. The contents of a basic disk remain intact following its conversion to a dynamic disk. TRUE FALSE

TRUE

True or False. Two Windows Servers are configured to forward Event Logs to a Windows 10 management computer. The Windows Event Collector service to be in Running state and Startup Type Automatic on the Windows 10 computer. TRUE FALSE

TRUE

True or False. When FTP users authenticate with an FTP server, the sign-in process can be decoded by a protocol analyzer or network sniffer software. TRUE FALSE

TRUE

True or False. Windows Update Services when installed on Windows Server 2016 supports the storage of updates on local storage. TRUE FALSE

TRUE

When creating a VPN dial-in connection with a Windows PowerShell cmdlet, which of the following parameters do you include to clear the "Use default gateway on remote network" check box? a. -SplitTunneling b. -SplitNetworking c. -SplitTunnel d. -SplitNetwork

a. -SplitTunneling

Which of the following switch parameters must be added to get a super-verbose output when running gpresult.exe? a. /Z b. /V c. /L d. /A e. /D

a. /Z

Which of the following statements correctly describes the function of a DHCP relay agent? a. A DHCP relay agent is a computer with more than one network interface that forwards IP configuration to another network segment b. A DHCP relay agent distributes the IP configuration settings to clients c. A DHCP relay agent has one network interface running in full-duplex mode d. A DHCP relay agent is a Windows workstation that supports NetBIOS broadcasting

a. A DHCP relay agent is a computer with more than one network interface that forwards IP configuration to another network segment

What is the Event Viewer path, where you can view details of the Data collector set that recorded a system alert about a processor going over its threshold value? a. Applications and Services Logs > Microsoft > Windows > Diagnosis-PLA > Operational b. Applications and Services Logs > Microsoft > Windows > Diagnosis-DPS > Operational c. Applications and Services Logs > Microsoft > Windows > Diagnosis-Scheduled > Operational d. Applications and Services Logs > Microsoft > Windows > Diagnosis-PCW > Operational

a. Applications and Services Logs > Microsoft > Windows > Diagnosis-PLA > Operational

To increase the throughput when reading databases from a server, you decided to put the database file in a software-based RAID 0 or striped volume. You are well aware that RAID 0 does not provide data redundancy in the event of a disk failure. What other cost-effective measures can you apply to ensure that you can recover the database when the database server's disk stops working? a. Create a daily backup of the database file. b. Implement Failover Clustering c. Enable Network Load Balancing on the database file. d. Configure SSL offloading on the database server

a. Create a daily backup of the database file.

What are the supported types to identify a Windows-based iSCSI initiator, when adding the iSCSI initiators that will access the iSCSI virtual disk? [Choose all that apply]. a. IP Address b. NetBIOS Name c. Host Name d. IQN e. DNS Name

a. IP Address d. IQN e. DNS Name

What is the output of the following command: Add-WindowsFeature DNS, AD-Domain-Services -IncludeManagementTools [Choose two that apply] a. Installs Active Directory Domain service b. Installs DNS service c. Installs a replica Domain controller d. Installs a new Domain forest

a. Installs Active Directory Domain service b. Installs DNS service

Which of following folder cannot be included in a folder redirection policy? a. My Documents b. Music c. Desktop d. Pictures e. Start Menu

a. My Documents

Your organization spans multiple geographical locations. Name resolution is done using a single DNS zone for the entire organization. Which of the following is likely to happen if you continue with the single DNS zone? [Choose all that apply] a. Name resolution traffic goes to a single zone b. Administrative burden c. Centralized Management d. Granular application of policies e. Higher security

a. Name resolution traffic goes to a single zone b. Administrative burden c. Centralized Management

You enable Point-to-Point-Tunneling-Protocol (PPTP) on the VPN server. Apart from the username and password information to sign in to the VPN server, what other system requirements are needed to successfully implement PPTP? a. None b. Computer Certificate c. Certificate Revocation List d. User Certificate

a. None

When creating a data collector set, which of the following type of data can be included? [Choose two that apply]. a. Performance Counter Alert b. Graphs c. Data logs d. Charts

a. Performance Counter Alert c. Data logs

You have a server with multiple disks but with no RAID configured. You want to mirror the C drive with D drive. Which of the following RAID should you configure? a. RAID 1 b. RAID 0 c. RAID 5 d. RAID 5+1

a. RAID 1

Which of the following software-based RAID levels are supported by Windows Server 2016? [Choose all that apply]. a. RAID 5 b. RAID 1 c. RAID 0 d. RAID 3

a. RAID 5 b. RAID 1 c. RAID 0

You installed Remote Desktop Services role and selected Quick Start deployment option when you added the roles on a Windows Server 2016 computer. Which of the Remote Desktop components are automatically added when you view the Remote Desktop Services pane in Server Manager Dashboard? Select three answers a. RD Connection Broker b. RD Hyper-V Host c. RD Session Host d. RD Session Browser e. RD Web Access

a. RD Connection Broker c. RD Session Host e. RD Web Access

To set a domain controller to use DS repair mode at the next restart, what should you do after logging on to the domain controller? a. Run the msconfig.exe tool b. Restart the domain controller c. Enable the Active Directory repair option in the System Repair dialog box d. Restore from the backup

a. Run the msconfig.exe tool

Where are the GPOs contained? a. SYSVOL b. System registry c. Active Directory database d. System start-up files

a. SYSVOL

The following screenshot shows an organizational unit that was mistakenly deleted by IT support:Complete the following command in ntdsutil to recover the deleted user with authoritative restore. restore [blank] "OU=APAC,DC=PRACTICELABS,DC=COM" a. Subtree b. Container c. OU d. Folder

a. Subtree

What is the default port number used by HTTP over SSL, when configuring secure sockets layer for IIS Web Server? a. TCP 443 b. Protocol ID 443 c. Service ID 443 d. UDP 443

a. TCP 443

When granting dial-in permissions to VPN server, what is the effect of selecting Allow access to a domain user account? [Choose two that apply]. a. The user will be able to dial-in to VPN server any day and any time. b. The user will be able to use Run as command to elevate permissions to Administrator. c. The user will not be covered by restrictions such as group membership when he attempts to connect to dial-in to VPN server. d. The user will be able to connect via Remote Desktop Protocol when connected to VPN server.

a. The user will be able to dial-in to VPN server any day and any time. c. The user will not be covered by restrictions such as group membership when he attempts to connect to dial-in to VPN server.

You have successfully installed DirectAccess-VPN feature on Windows Server 2016. After using the wizard to configure Virtual Private Network on the server, you get a system message, see the attached screenshot. What must be done to address this possible issue reported by Routing and Remote Access? a. Verify that GRE, L2TP, PPTP and SSTP are allowed in the Inbound Rules of Windows Firewall. b. Verify that Routing and Remote Access has successfully started. c. Verify that PPTP is allowed in the Inbound Rules of Windows Firewall d. Ensure that Remote Access service is configured to Log on as Service.

a. Verify that GRE, L2TP, PPTP and SSTP are allowed in the Inbound Rules of Windows Firewall.

Which of following Windows Server operating systems support Forefront Threat Management Gateway 2010? Select two answers. a. Windows Server 2008 R2 Standard b. Windows Server 2008 R2 Enterprise c. Windows Server 2012 R2 Standard d. Windows Server 2003 e. Windows Server 2016 Data Center

a. Windows Server 2008 R2 Standard b. Windows Server 2008 R2 Enterprise

Which of the following programs can be used to modify the type of updates that can be downloaded by Windows Update Services? a. Windows Update Services b. Command Prompt c. Server Manager d. Internet Information Services e. Control Panel

a. Windows Update Services

Complete the following Windows PowerShell commandlet to install iSCSI Target Server: install-windowsfeature -includemanagementtools a. fs-iscsitarget-server b. fs-iscsi-server c. fs-iscsi-targetserver d. fs-iscsi-target-server

a. fs-iscsitarget-server

Which of the following commands do you run on Windows 10 to collect details, such as the IPv4 address of the DHCP server that issued the IPv4 address lease? a. ipconfig /all b. Get-NetIPInterface c. Get-NetIPAddress d. ipconfig

a. ipconfig /all

Which of the following tools can be used to install Internet Information Services on Windows Server 2016 computer? [Choose two that apply]. a. servermanager.exe b. services.exe c. control.exe d. mmc.exe

a. servermanager.exe c. control.exe

Which of the following tools is used for creating and managing subscriptions to events forwarded by remote event sources like Windows Servers that support the WS-Management or the Windows Remote Management service? a. wecutil b. wins c. wmi d. winrm

a. wecutil

What is the minimum number of physical disks required to create a RAID 1 or mirrored volume of the Windows operating system? a. 4 b. 2 c. 5 d. 3

b. 2

You plan to use a Windows 10 computer as the Event Collector management computer. The computer has two network interfaces. The first network interface has a static IP address used for connecting to the corporate network. The second one interface is configured a dynamic IP address and is seldom used. Before running "winrm quickconfig" on the Windows 10 computer, what must be done first? a. Start Windows Event Collector service. b. Disable the second network interface to avoid errors when enabling WinRM service. c. Restart Windows 10 prior to enabling WinRM. d. Configure the first network interface to use a dynamic IP address.

b. Disable the second network interface to avoid errors when enabling WinRM service.

You have a Windows Server 2016 computer with three physical hard disks installed. The first hard disk called Disk 0 holds the operating system. It has some unallocated partition. The second hard disk called Disk 1 hosts an application and it has some unallocated partition likewise. The third hard disk called Disk 2 is running custom accounting application and it has some unallocated partition as well. You right-clicked an unallocated partition in Disk 0 to create a RAID-5 volume and noticed that New RAID-5 Volume is greyed out. Why is the command to create a New RAID-5 Volume unavailable? a. Disk 0 is not converted to GPT disk. b. Disk 0 is current boot volume where Windows starts-up. The disk cannot be added as member of a RAID-5 volume. c. The Logical Disk Manager service is set to Start up Manually. d. Disk 0 is not using a Dynamic Disk type.

b. Disk 0 is current boot volume where Windows starts-up. The disk cannot be added as member of a RAID-5 volume.

To which object in the Active Directory Domain hierarchy will you link a Group Policy that will enforce a company-wide password policy? a. Site b. Domain c. Organizational unit d. Local Computer

b. Domain

You have followed the documentation in setting up Event Forwarding in a Windows test laboratory. There are 2 computers called Server1 and Server 2 are the Event forwarders, while Workstation1 is the Event Collector computer. After double-checking the services and settings on all three devices, Workstation1's Forwarded Events node is empty. Which of the following tasks can you do to help resolve this issue? [Choose two that apply]. a. Ensure that Windows Event Collector is Running and Startup Type is Automatic-Delay on Server1 and Server 2. b. Ensure that Windows Event Collector is Running and Startup Type is Automatic-Delay on Workstation1. c. Verify that TCP port 5985 is allowed on the Windows firewall settings of all Windows devices. d. Run wecutil ss.

b. Ensure that Windows Event Collector is Running and Startup Type is Automatic-Delay on Workstation1. d. Run wecutil ss.

Which of the following Windows PowerShell cmdlet will you run to verify the App-V state on a Windows 10 computer? a. Get-Module Appvclient b. Get-AppvStatus c. Get-AppVPublishingServer d. Get-AppvClientStatus

b. Get-AppvStatus

Aside from gpresult.exe which of the following tools can be used by a Windows administrator to determine the inherited Group Policy of a domain user account? [Choose two that apply]. a. Gpupdate.exe b. Group Policy Modeling c. Dcgpofix.exe d. Group Policy Results

b. Group Policy Modeling d. Group Policy Results

Which of the following data output options are supported when capturing performance metrics under the Monitoring Tools > Performance Monitor node? [Choose three that apply]. a. Pie b. Histogram bar c. Circular d. Line e. Report

b. Histogram bar d. Line e. Report

A member of the IT Helpdesk security group has successfully installed Microsoft Forefront Threat Management Gateway 2010 on Windows Server 2008 SP2 computer called TMGServer01. Using another workstation, he tried to send a PING command directed to TMGServe01, the server responded with the Request timed out message. What must be done in order to successfully send PING packets to TMGServer01? a. In Forefront Threat Management Gateway 2010 console, access the Intrusion Detection feature and create an intrusion detection access policy. b. In Forefront Threat Management Gateway 2010 console, create a firewall accesspolicy. c. In Forefront Threat Management Gateway 2010 console, create a web caching access policy. d. Use Windows Firewall and enable File and Printer Sharing on the Domain, Private and Public network profiles.

b. In Forefront Threat Management Gateway 2010 console, create a firewall accesspolicy.

Which of the following Windows PowerShell commands enables an administrator to configure Windows Remote Access service? [Choose all that apply] a. Install-WindowsFeature -Name DirectAccess-VPN -IncludeAllSubFeature b. Install-WindowsFeature -Name DirectAccess-VPN -IncludeManagementTools c. Add-WindowsFeature -Name DirectAccess-VPN -IncludeManagementTools d. Add-WindowsFeature -Name DirectAccess-VPN -IncludeAllSubFeature

b. Install-WindowsFeature -Name DirectAccess-VPN -IncludeManagementTools c. Add-WindowsFeature -Name DirectAccess-VPN -IncludeManagementTools

Which of the following tools is used for requesting a PFX (Personal Information Exchange) certificate for a Windows Server 2016 that runs the Remote Desktop Gateway service? a. mmc b. Internet Information Services (IIS) Manager c. cmd d. certutil

b. Internet Information Services (IIS) Manager

What are the two components of the Domain Name System? [Choose two that apply] a. Forwarder b. Name server c. Namespace d. Resolver

b. Name server d. Resolver

Which of the following file formats are supported by default, in the Reports node to print collected data in the Data collector sets? [Choose two that apply]. a. TSV b. PDF c. MHTML d. XPS e. CSV

b. PDF d. XPS

Microsoft Forefront Threat Management Gateway (TMG) 2010 is installed on TMGServer01 computer. A penetration tester hired by your organization is using a third party port scanning tool to test the intrusion detection features of TMG 2010. During the testing phase, it appears that TMGServer01 is not registering alert status in the Monitoring tab of TMG 2010. What is the possible cause of this issue? a. TMGServer01 network interface card is not enabled for promiscuous mode. b. Port scan attacks setting is not enabled in TMGServer01's Intrusion Detection feature. c. The port scanning tool is sending port scanning attacks on the TMGServer01's network interface connected to the Internet. d. TMGServer01's intrusion detection service is not running.

b. Port scan attacks setting is not enabled in TMGServer01's Intrusion Detection feature.

A folder redirection GPO was created for ITHelpDesk organizational unit and is populated with user accounts that are members of security group GHelpDesk. A user called HelpDeskUser1 signs-in to a Windows 10 workstation and reported that his files were not redirected to a network share. You have checked the GPO folder redirection and found that everything is in order. What actions can you recommend to HelpDeskUser1 to resolve this issue? [Choose two that apply]. a. Restart computer b. Sign out, sign back in c. Run gpupdate /force d. Run Group Policy Results wizard e. Run dcgpofix.exe

b. Sign out, sign back in c. Run gpupdate /force

You want to test application streaming using Microsoft App-V feature available in Microsoft Desktop Optimization Pack (MDOP). How can your organization get the MDOP tools? a. Download MDOP from Microsoft TechNet. b. Sign up for a Microsoft Software Assurance subscription. c. Download MDOP from Microsoft tools page. d. Download MDOP from MSDN site.

b. Sign up for a Microsoft Software Assurance subscription.

What are some of the key factors of DNS policies that defines how a DNS responds to DNS queries? [Choose all that apply] a. Server type b. Subnet c. Clients type d. Transport protocol e. Number of queries f. Time of day

b. Subnet d. Transport protocol f. Time of day

A trainee Windows domain administrator is setting up a GPO folder redirection policy to redirect Documents folder to a shared folder called SalesDocs. This policy is for members of the Sales security group. SalesUser1 a member of the Sales group reported that when he checked the properties of the Documents folder, its Location points to C:\Users\SalesUser1. Other users of the Sales security group reported the same issue. All users use Windows 10 as the client operating system. What is a possible cause of this folder redirection problem? a. The created GPO is based on a Local Group Policy Object. b. The Sales group does not have the necessary folder and NTFS permission on SalesDocs. c. The SalesDocs folder is not enabled for folder redirection. d. Folder redirection client software is not installed on user workstation.

b. The Sales group does not have the necessary folder and NTFS permission on SalesDocs.

A trainee administrator is installing Remote Desktop Services on a Windows Server 2016 computer in a test laboratory. He's on the Confirm selections page and noticed that Deploy button is greyed out. See screenshot. What is cause of this issue? a. RD Gateway is not installed on the server. b. The checkbox Restart the destination server automatically is not selected. c. RD Session Manager service is not running. d. He does not have full administrator rights on the Windows Server 2016 computer.

b. The checkbox Restart the destination server automatically is not selected.

What is the objective of saving the application package that was transformed by App-V Sequencer in a shared folder? a. To allow Windows installer service to install the application. b. To allow properly configured App-V clients access to the streamed application after it has been published. c. Enable users to connect to the shared folder and install the application themselves. d. Enable administrators to create a Group Policy Object for software installation that will deploy the application.

b. To allow properly configured App-V clients access to the streamed application after it has been published.

What are the reasons why organizations opt for a certificate issued by third party commercial certification authorities to secure their web server? [Choose two that apply]. a. To securely redirect a customer to a third party website. b. To run a trusted web site that conduct business with the general public. c. To secure browsing of social media sites. d. To secure data transfer, transactions and logins to the website.

b. To run a trusted web site that conduct business with the general public. d. To secure data transfer, transactions and logins to the website.

You execute the following command in PowerShell: Set-Disk -Number 3 -IsReadOnly $false What would be the output of this command? a. Creates a new disk with the name 3 and turns off Read-only attribute b. Turns off the Read-only attribute on Disk number 3 c. Creates a new disk with the name 3 and turns on the read-only attribute d. Sets an existing disk to disk 3 with the read-only attribute

b. Turns off the Read-only attribute on Disk number 3

What are the necessary tasks to perform when changing a dynamic disk back to a basic disk? [Choose all that apply]. a. Delete the vhd file associated with the virtual hard disk. b. Uninstall applications that use a dynamic disk as storage for its support files. c. Unmount any virtual hard disk. d. Backup all data stored in the dynamic disk volume. e. Delete the volume in the dynamic disk.

b. Uninstall applications that use a dynamic disk as storage for its support files. d. Backup all data stored in the dynamic disk volume. e. Delete the volume in the dynamic disk.

What is the correct entry that must be entered in the Root Path text box of Specify Group and Location when configuring a folder redirection policy? a. \\servername\sharedfolder\%username% b. \\servername\sharedfolder c. \\servername\%username% d. \\servername\c$\sharedfolder

b. \\servername\sharedfolder

You have a Windows Server 2008 R2 computer where you plan to install Threat Management Gateway 2010. The server is equipped with two network interface cards where the first NIC is using a static IP address while the second NIC is using a dynamic IP address. Which of the following tools can you use to assign a static IP address on the second NIC? a. mmc.exe b. cmd.exe c. Server Manager d. ocsetup.exe

b. cmd.exe c. Server Manager

You are setting up Event Log forwarding in a Windows test laboratory. Which of the following commands will configure Windows Event Collector to Delay-Start mode? a. wins qc b. wecutil qc c. gwmi qc d. winrm qc

b. wecutil qc

You are configuring a third party firewall and you want to allow Point to Point Tunnelling Protocol to the VPN servers public interface? What TCP port number does PPTP use? a. 1731 b. 1607 c. 1723 d. 1701

c. 1723

What is the minimum number of physical disks required to create a RAID 5 or striped volume with parity? a. 5 b. 2 c. 3 d. 4

c. 3

Which of the following TCP port number is used by an iSCSI target server to listen to incoming connections? a. 3268 b. 3390 c. 3260 d. 3389

c. 3260

What are the default TCP port number used by WSUS when communicating with Windows clients over the local intranet? [Choose two that apply]. a. 443 b. 80 c. 8531 d. 8530

c. 8531 d. 8530

Complete the following Windows PowerShell command to add an application trigger to a VPN profile:[Blank] -Name "PLABSVPN" -ApplicationID "C:\Windows\system32\mstsc.exe" a. Create-VPNConnectionTriggerApplication b. Create-VPNConnectionTriggerApp c. Add-VPNConnectionTriggerApplication d. Add-VPNConnectionTriggerApp

c. Add-VPNConnectionTriggerApplication

Which of the following file contains the root DNS mapping? a. Cache.xml b. CacheDNS.xml c. Cache.dns d. Cache.txt

c. Cache.dns

What is the Group Policy Object path for enabling the App-V client locally for a Windows 10 client? a. Computer Configuration > Administrative Templates > Control Panel > App-V. b. Computer Configuration > Administrative Templates > Server > App-V. c. Computer Configuration > Administrative Templates > System > App-V. d. Computer Configuration > Administrative Templates > Network > App-V.

c. Computer Configuration > Administrative Templates > System > App-V.

A user has successfully mounted and created a simple volume out of a virtual hard disk in Windows Server 2016. He tried to convert the virtual hard disk to dynamic disk but noticed that the Convert to Dynamic Disk command is greyed out. What is the cause of this issue? a. Convert to Dynamic Disk command is available when the virtual hard disk is dismounted. b. Convert to Dynamic Disk command is supported only on the command line when virtual hard disk is mounted. c. Convert to Dynamic Disk command is supported only on physical disks. d. Convert to Dynamic Disk command is greyed out because the user needs to launch Disk Management as an administrator.

c. Convert to Dynamic Disk command is supported only on physical disks.

To configure a Windows Server computer to function as a DHCP relay agent host, which of the following Windows server roles or features must be installed? a. NPAS b. Remote-Desktop-Services c. DirectAccess-VPN d. Remote-Assistance

c. DirectAccess-VPN

A user who is a member of the Administrators group in Windows 10 launched Local Group Policy Object by running gpedit.msc. He noticed that under User Configuration > Policies > Windows Settings, the Folder Redirection node is nowhere to be found. What is the cause of this issue? a. The Folder redirection feature is not in installed. b. The Windows 10 computer is missing a feature update. c. Folder Redirection feature is not supported on Local Group Policy Object. d. The Windows 10 computer is not running Remote Server Administration Tools or RSAT.

c. Folder Redirection feature is not supported on Local Group Policy Object.

Why is there a requirement to restart Windows 10, after enabling App-V client settings in Group Policy Object on a Windows 10 device? a. GPO settings linked to User configuration will apply after the user has signed out. b. GPO settings linked to Computer configuration logs application streamed on Windows that use App-V. c. GPO settings linked to Computer configuration will apply after the computer is restarted. d. GPO settings linked to Computer configuration rely on Windows installer service to run the streamed application.

c. GPO settings linked to Computer configuration will apply after the computer is restarted.

You have a DCHP server PLABDC01, connected to subnet 172.16.0.0/24, and a client computer PLABWIN101 connected to subnet 172.16.1.0/24. You also have a DHCP Relay Agent PLABSA02, which has two network interfaces - NIC1, connected to 172.16.0.0/24 and NIC2, connected to 172.16.1.0/24. Which interface do you select to enable PLABSA02 to forward DHCP packets to PLABWIN101? a. NIC1 b. Internal c. NIC2 d. None

c. NIC2

You have a small lab network and only one server is available to run Remote Desktop Services. Which of the following deployment type is applicable in this one-server scenario? a. MultiPoint Services b. Standard deployment c. Quick Start d. Single deployment e. MultiPort Services

c. Quick Start

What is the advantage of using Monitoring Tools > Performance Monitor node over the other methods of collecting system performance like Data Collector Sets and Reports? [Choose two that apply]. a. You can schedule when Performance Monitor starts and ends capturing data on hardware and software resources. b. You can enable overwriting of captured data on hardware and software resources. c. You get to view the collected statistics of hardware objects like CPU, disk, memory, network interface as well as software resources using different graph types. d. You get to view the collected statistics of hardware objects like CPU, disk, memory, network interface as well as software resources in real time.

c. You get to view the collected statistics of hardware objects like CPU, disk, memory, network interface as well as software resources using different graph types. d. You get to view the collected statistics of hardware objects like CPU, disk, memory, network interface as well as software resources in real time.

What is the name of pre-configured Microsoft Management Console that you can launch to create a Local GPO on a Windows computer? a. poledit.msc b. mmc.exe c. gpedit.msc d. dsa.msc

c. gpedit.msc

Which of the following port is used by Remote Desktop Gateway services to listen to incoming connections from clients connecting from an external network? a. 468 b. 449 c. 447 d. 443

d. 443

Which of the following PowerShell command is used to install a Windows Server Backup on Windows Server 2019? a. Add-WindowsFeature windows-server-backup b. Add-Feature windows-server-backup -IncludeManagementTools c. Add-WindowsFeature server-backup -IncludeManagementTools d. Add-WindowsFeature windows-server-backup -IncludeManagementTools

d. Add-WindowsFeature windows-server-backup -IncludeManagementTools

What is the Group Policy Object path where you can configure settings to ensure that Windows clients can download updates from Windows Server Update Services? a. User Configuration > Policies > Security Settings > Application Control Policies > Windows Update b. Computer Configuration > Policies > Windows Settings > Security Settings > Windows Update c. User Configuration > Policies > Administrative Templates > Windows Components > Windows Update d. Computer Configuration > Policies > Administrative Templates > Windows Components > Windows Update e. Computer Configuration > Policies > Security Settings > Application Control Policies > Windows Update

d. Computer Configuration > Policies > Administrative Templates > Windows Components > Windows Update

When configuring the Network Template Selection for a newly-installed Threat Management Gateway (TMG) 2010 server, which of the following network templates are supported for a TMG 2010 server with two network interfaces? Select two answers. a. Bastion host b. 3 Leg perimeter c. Web caching firewall d. Edge firewall e. Back firewall

d. Edge firewall e. Back firewall

You receive the following system message after enabling Routing and Remote Access on a Windows Server 2019 device in your test lab. See the attached screenshot. What measures do you take to address this system message by Routing and Remote Access? a. Verify that delegate server for client access policy is enabled. b. Add the VPN Server as a member of the Remote Access Servers security group in the domain. c. Bind a computer certificate to the VPN server. d. Enable GRE, L2TP, PPTP and SSTP services in the Inbound Rules of Windows Firewall.

d. Enable GRE, L2TP, PPTP and SSTP services in the Inbound Rules of Windows Firewall.

A Windows Server 2016 computer running as a file and print server is running out of disk space on Drive C. You noticed that there are unallocated partitions on the server's disk subsystem. Which of the following is a possible solution to increase the disk capacity of the server with minimal administrative effort? a. Configure hardware RAID disk mirroring by adding new disk controllers on the server. b. Remove print services on the server and transfer it to another server. c. Remove all the shared files on the server and transfer it to another server. Reconfigure the share and NTFS permissions to ensure users and groups will have access to their work files. d. Extend the disk volume of the file and print server.

d. Extend the disk volume of the file and print server.

What could be the primary reason to implement Resilient File System (ReFS) on Windows Server 2019 instead of a New Technology File System (NTFS)? a. It supports Reparse Points b. It supports USN Journal c. It preserves and enforces ACLs d. It can detect data corruption when used with Storage Spaces

d. It can detect data corruption when used with Storage Spaces

Which of the following network encryption protocol applies to a VPN server that uses Point-to-Point-Tunneling-Protocol? a. EAP b. NIS c. AES d. MPPE

d. MPPE

The selected user account in the screenshot was accidentally deleted by the IT support group: Complete the following command in ntdsutil to recover the deleted user with authoritative restore. restore [blank] "CN=Lisa Scott, OU=IT,OU=APAC,DC=PRACTICELABS,DC=COM" a. ADUser b. Account c. User d. Object

d. Object

Which of the following VPN protocols is the easiest to implement in corporate network as it only requires user name and password to authenticate users connecting to a VPN server? a. Internet Key Exchange b. Secure Sockets Tunnelling Protocol c. Layer 2 Tunnelling Protocol d. Point to Point Tunnelling Protocol

d. Point to Point Tunnelling Protocol

Which type of RAID provides fault tolerance through the use of parity information spread across the member disk volumes? a. RAID 1 b. RAID 5+1 c. RAID 0 d. RAID 5

d. RAID 5

A user is examining the properties of a certificate used by PLABDM01 -- an internal web server that has been enabled for Secure Sockets Layer or SSL. He noticed the "Certificate Error" status in the web page and finds the Certificate status as OK. What is good explanation for this system behavior? a. The certificate bound to PLABDM01 is enabled for extended validation or EV. b. The certificate bound to PLABDM01 web server is issued by an internal Certification Authority. c. The certificate bound to PLABDM01 web server is issued by an external Certification Authority. d. The certificate bound to PLABDM01 web server was imported to the Trusted Root Certificates, therefore the certificate status is OK.

d. The certificate bound to PLABDM01 web server was imported to the Trusted Root Certificates, therefore the certificate status is OK.

Identify the output of the following PowerShell command: Get-VHD c:\engineering.vhd a. Creates a new VHD named engineering b. Creates a connection with engineering.vhd c. Links engineering.vhd to the virtual machine d. Verifies the system properties of engineering.vhd

d. Verifies the system properties of engineering.vhd

A trainee administrator is studying the different disk types on a Windows Server computer in a test lab. He mounted a virtual hard disk using Disk Management console and was successful in creating a simple volume using the vhd. He asked for help saying the Extend Volume... is greyed out in the menu. What is the cause of this issue? a. He did not use diskpart.exe to create the vhd. b. There isn't enough disk space to extend the virtual hard disk to another volume. c. He did not open the Disk Management tool as Administrator. d. Virtual hard disks are mere files *.vhd and does not support the Extend Volume command.

d. Virtual hard disks are mere files *.vhd and does not support the Extend Volume command.

What is the correct IQN format for Windows iSCSI initiators, when adding the iSCSI initiators that will access the iSCSI virtual disk? a. iqn.1992-05.microsoft:plabwin10.practicelabs.com b. iqn.1970-05.com.microsoft:plabwin10.practicelabs.com c. iqn.1975-05.microsoft.com:plabwin10.practicelabs.com d. iqn.1991-05.com.microsoft:plabwin10.practicelabs.com

d. iqn.1991-05.com.microsoft:plabwin10.practicelabs.com

When downloading updates for WSUS clients, which of the following operating systems are supported? a. Windows XP b. Windows Vista c. Windows 7 d. Windows 8.1 e. All of the above

e. All of the above

To which object in the Active Directory Domain hierarchy will you link a Group Policy that Prohibits access to Control Panel to a specific department in a company? a. User b. Site c. Local Computer d. Domain e. Organizational unit

e. Organizational unit


Kaugnay na mga set ng pag-aaral

CITI -Social&Behavioral Research

View Set

Unit 7: Promulgated Addenda, Notices, and Other Forms

View Set

Self Test 1: Basics of Medical Terminology

View Set

Chapter 1: People, Politics, and Participation

View Set

canvas orientation quiz (correct answers)

View Set

Carmen Homework 4 - Scatterplots and Correlation

View Set