M05 - M07 (Chapters 7-12)

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

You are investigating strange traffic on your network and wish to resolve an IP address to a DNS name. What resource record should you use to perform a reverse lookup? An A record An AAAA record A PTR record A CNAME record

A PTR record

For zones that allow dynamic updates, you do not need to create CNAME and MX records or host records that provide for round robin or netmask ordering.

False After creating a forward or reverse lookup zone, you can manually create resource records in a zone. For zones that allow dynamic updates, you still need to manually create CNAME and MX records as well as host records that provide for round robin or netmask ordering.

If multiple GPOs are linked to the same site, domain, or OU, they will be applied in a random order.

False If multiple GPOs are linked to the same site, domain, or OU, they will be applied in link order, with the highest link order applied first and the lowest link order applied last.

If there are multiple DHCP servers on a network, DHCP clients will accept the first offer that they receive.

False If there are multiple DHCP servers on your network, DHCP clients will accept the first offer that they receive and decline all other offers by sending a DHCPDECLINE packet to the other DHCP servers.

The IUSRS group in an Active Directory domain or workgroup is used to provide anonymous access to both website and Web app content.

False The IIS_IUSRS group in an Active Directory domain or workgroup is used to provide anonymous access to both website and Web app content. To provide anonymous access to website content only, you can instead assign permissions to the IUSRS group.

The Remote Desktop app uses Secure Socket Tunneling Protocol (SSTP) to transfer desktop graphics, keystrokes, and mouse movements to and from the remote access server.

False The Remote Desktop app uses Remote Desktop Protocol (RDP) to transfer desktop graphics, keystrokes, and mouse movements to and from the remote access server.

Remote users must manually initiate a VPN connection each time they wish to connect to the resources in their organization when using DirectAccess.

False When using VPN, remote users must manually initiate a VPN connection each time they wish to connect to the resources in their organization.

The terms "program" and "process" are one and the same.

False Program and process are not the same even though they are used interchangeably. Program is an executable file, whereas a process is a program that is being executed on the system.

What is Group Policy, and why is it used?

Group Policy is an administrative feature in Active Directory. It can be used to automatically configure software, Windows features, security/program/interface settings on PCs in the AD domain based on the user/computer account location in the AD database.

The hard disk of a Windows Server 2019 system in your organization has crashed. Unfortunately, the boot volume was on the hard disk, and you happen to not have a backup of the operating system. What will you do in this situation?

I would replace the failed storage device, boot the system using the installation media, recreate the same volumes that were on the original system, and perform a new Windows Server 2019 installation. I would configure the system with the original computer name and reset the existing AD account, join the system to the AD domain, and restore the original user data.

How will you troubleshoot a performance issue if the information available in Task Manager is not sufficient for you to identify the root cause of the problem?

I would start with running Resource Monitor and Performance Monitor. If needed, I would review the logs in Event Viewer to see if there is anything potentially related to the performance issue there.

What is the purpose of adding entries for each RADIUS client on the RADIUS server when configuring remote access servers to use RADIUS?

It allows the NPS proxy to receive messages from the NAS and communicate throughout authentication.

Which of the following is true of WINS? ​ It is enabled by default on all Windows Server systems. It can only resolve NetBIOS names to IPv4 addresses. If NetBIOS is enabled, a WINS server does not need to be installed on the network. If a computer is configured to use WINS, it resolves NetBIOS names using broadcasts.

It can only resolve NetBIOS names to IPv4 addresses.

Alya runs the following command in Windows PowerShell: docker run -d -p --name cont1 kerinapp. What does the -d option do in this scenario?

It detaches the container from your Windows PowerShell session and keeps it running in the background until you stop it using the docker stop command.

Aria is setting up a Remote Desktop Services server to allow users remote access to the server. At what point in the installation process should Aria reboot the server? Before installing the Remote Desktop Services server role After selecting the role services that Aria wants to install After choosing the desktop deployment type After selecting deployment options

After selecting the role services that Aria wants to install

Explain the use of virtual NAT routers by Docker EE to allow users access to Web apps running in containers.

It simplifies the process of connecting to multiple Web apps running on a cloud provider, because clients only need to know the host name of the underlying operating system and the port number for their copy of the Web app.

Carlos is configuring a DHCP server in his organization. Some of the computers in his organization contain manually configured IP addresses. Currently, he is setting up the new server to configure IP addresses for users who operate their mobile devices on the organization's network. Which of the following decisions should Carlos reevaluate? Carlos sets the subnet mask as 255.255.255.0. Carlos provides a subnet delay of 100 milliseconds. Carlos sets the lease duration to 7 days. Carlos excludes certain IP addresses.

Carlos sets the lease duration to 7 days.

Quiz M06 Part 2

Chapter 10: Configuring Web Services and Cloud Technologies

Quiz M07 Part 1

Chapter 11: Managing and Securing Windows Networks

Quiz M07 Part 2

Chapter 12: Monitoring and Troubleshooting Windows Server 2019

Quiz M05 Part 1

Chapter 7: Configuring and Managing Data Storage

Quiz M05 Part 2

Chapter 8: Configuring and Managing Network Services

Quiz M06 Part 1

Chapter 9: Configuring and Managing Remote Access Services

Margret is a support technician working at Mercorp Inc. She tells the interns that the easiest way to stop a rogue process from causing performance issues is to right click the process in Task Manager and click End Task. An intern asks her what he should do if the specific process restarts even after selecting End Task. What can Margret tell the intern if the process issue is caused by a third-party application and it has no solution yet? Run the same process under a different user Use the process ID and search online for information regarding the process Create a dump file and share it with the in-house development team Check with the program vendor for an update

Check with the program vendor for an update

What is the first step in troubleshooting an issue where a single computer is unable to lease an address? Ensuring that the DHCP service is running Verifying that the DHCP server is authorized Confirming that the computer has a physical connection to the network Checking if the computer was manually configured with an IP address

Confirming that the computer has a physical connection to the network

Explain continuous deployment.

Continuous Deployment is the process by which new versions of a web app are tested on the cloud provider. Each new version requires a new container or VM be created using build automation software. Additional software is required to move the app from the developer workstation to the new container or VM and also ensure the app is ready for execution.

Britta, a system administrator, is managing a website that is running on an IIS web server. Recently, the website was redesigned, and some portions of the website were deleted. Search engines carry links to these deleted portions for specific searches. Britta wants to ensure that when users click on links to deleted portions of the website, they're redirected to a section of the website. Which of the following IIS configuration features should Britta use? Directory Browsing Request Filtering Handler Mappings Error Pages

Error Pages

Imran is associating a drive letter to a filesystem so that the drive letter can be accessed by the operating system. What is the term given to the process that Imran is carrying out? Journaling Formatting Mounting Spanning

Mounting

When implementing a VPN server on Windows Server 2019, what are the four remote access tunneling protocols available for use, and how do they differ?

PPTP: oldest, most widely supported protocol. Encrypts data using MPPE. L2TP/IPSec: developed by Microsoft and Cisco, provides tunneling only and replies on IPSec for encryption using keys varying between 56 to 256 bits SSTP: tunnels data through HTTPS packets on a network, originally used SSL encryption with 128 bit keys IKEv2: enhancement of IPSec that provides faster speeds. Uses 256 bit keys with TLS

Mateo uses the following command to search Docker Hub for containers that have IIS installed: PS C:\> docker search iis. The search returns the following options: microsoft/aspnet, microsoft/iis, nanoserver/iis. Mateo wants to download the latest version of the microsoft/iis container from Docker Hub. Which of the following commands can Mateo run to achieve this result? PS C:\> docker tag microsoft/iis latest PS C:\> docker pull microsoft/iis PS C:\> latest docker pull microsoft/iis PS C:\> docker tag microsoft/iis iis

PS C:\> docker pull microsoft/iis

XM GraFix, a graphics design company, has bought new design software. Mason, the system administrator, wants to install the software on all the computers in the design department. However, not all the designers need the software. Using the GPO, Mason uses a deployment method that allows the users to install the program from the network when they need it. Which of the following methods of deployment has Mason most likely used in the given scenario? Published the software under Software Settings in the Computer Configuration Published the software under Software Settings in the User Configuration Assigned the software under Software Settings in the Computer Configuration Assigned the software under Software Settings in the User Configuration

Published the software under Software Settings in the Computer Configuration

How do you create a RAID level 1 volume with two disks in the Disk Management tool? Right-click on the disk that you want to configure as a RAID volume and then click New Mirrored Volume to create a RAID level 1 volume with two disks Right-click on the disk that you want to configure as a RAID volume and then click New Spanned Volume to create a RAID level 1 volume with two disks Right-click on the disk that you want to configure as a RAID volume and then click New Striped Volume to create a RAID level 1 volume with two disks Right-click on the disk that you want to configure as a RAID volume and then click Shrink Volume to create a RAID level 1 volume with two disks

Right-click on the disk that you want to configure as a RAID volume and then click New Mirrored Volume to create a RAID level 1 volume with two disks

Christopher sets up multiple WINS servers in his organization and configures users' computers to use the WINS server. During testing, he attempts to access a folder called Share on the computer SERVERA. He enters the following statement into File Explorer: \\serverA\share. However, Christopher is unable to access the shared folder. What is the most likely reason for this issue? SERVERA does not have a NetBIOS name record on any WINS server. Christopher has not set up replication. The user computer is connect to the LAN but not to the Internet. The UNC syntax entered is incorrect and is missing arguments.

SERVERA does not have a NetBIOS name record on any WINS server.

Identify a vital service provided by secondary DNS servers. Secondary DNS servers contain read-write copies of a primary DNS server's data. Secondary DNS servers respond to DNS lookup requests using read-only zone files. Secondary DNS servers improve security by preventing access to primary DNS servers. Secondary DNS servers divert all traffic to primary DNS servers to reduce load.

Secondary DNS servers respond to DNS lookup requests using read-only zone files.

What logs are created by Windows for reporting general operating system and software application events?

System stores operating system related events, and Application stores events from software applications on the system.

Raymond and Lin are facing network issues on their computers. Rayna, the administrator, is troubleshooting the issue. She notices that Raymond and Lin's computers are using the same IP address, 192.167.1.85. If the organization's network uses a DHCP server, which of the following most likely caused this issue? The IP addresses were configured automatically. The IP addresses were configured manually. The IP addresses were configured by the DHCP server. The IP addresses on both computers have expired.

The IP addresses were configured manually.

Which of the following is a necessary condition if you want to configure a reverse proxy instead of port forwarding on a NAT router to enable access to a remote access server? The remote access server should be outside the DMZ. The NAT router must be configured to forward remote access requests. The NAT router should be a Next Generation Firewall. The remote access server should be connected directly to the demarc.

The NAT router should be a Next Generation Firewall.

Lashonda sets up a DNS server, SERVER1, with a forward lookup zone called domainA.com. It hosts the resource records for the domainX.com Active Directory domain. It contains host (A) records for two network interfaces on SERVER1 (172.16.0.10 and 192.168.1.50). The host records are associated with the FQDNs server1.domainA.com and domainA.com. There is also an SOA record and an NS record for the zone. Which of the following records identifies SERVER1 as an authoritative DNS server? The SOA record The NS record The A record for 172.16.0.10 The A record for 192.168.1.50

The NS record

The hard disk of a computer running the Windows Server 2019 operating system fails. A colleague tells you that the data on the hard disk can be regenerated as soon as it is replaced with a new one. Can you identify why this solution is feasible? The system need not be powered down to replace the hard disk. The operating system was backed up prior to the disk failure. The Windows system uses a RAID level 5 configuration. The corrupt hard disk contained the boot volume.

The Windows system uses a RAID level 5 configuration.

The programs running on the client systems in your organization are not able to access a service on the server. The problem is not with the server because the network services are running and you are able interact with the network service on your local machine. What do you see as other possible issues with the server access? The client programs are not using the non-standard port number used by the network service. The network service might have failed to start when the client systems were requesting the service. The network service is not responding to the requests from a local machine. There were other client systems that were accessing the network service.

The client programs are not using the non-standard port number used by the network service.

Shaw, a server administrator, uses an iSCSI SAN protocol to transfer data to and from SAN devices at a speed of up to 40 Gb/s. He configures one of the SAN devices to provide storage to Jasper's Windows Server 2019 system. What should Jasper configure in his system to be able to connect to the storage? ​ The iSCSI target The iSCSI initiator HBA MPIO

The iSCSI target

You enable LCOW on a Windows Server 2019 system that already has IIS installed. The server is also used to run Windows containers. Next, you download and run some Linux containers. You disable LCOW and run the docker images command. What will be the result in this scenario? The list of Windows container images will be displayed. The list of Linux container images will be displayed. All container images on the system will be displayed. None of the container images on the system will be displayed.

The list of Windows container images will be displayed.

Which of the following settings in Windows defender should be enabled to prevent malware and network attacks from accessing high-security processes in systems that support core isolation? The Block Inheritance setting The firewall rules setting The controlled folder access setting The memory integrity setting

The memory integrity setting

You are using the Performance Monitor in Windows Server 2019 to collect information regarding the system's performance. What does the % Idle Time counter indicate? The percentage of time a storage device was not performing a read or write function The percentage of time the processor spends executing processes that do not require privileged access The percentage of free space on a volume The percentage of time the processor spends responding to interrupts

The percentage of time a storage device was not performing a read or write function

The subnet mask cannot be modified once a scope is created.

True

When some computers have incorrect address information, you should check for the presence of unauthorized DHCP servers on the network running a non-Windows operating system and remove them if found.

True

Container images that are based on Nano Server must be run as Hyper-V containers.

True Hyper-V can be used to provide each container with a separate copy of the kernel for greater stability, performance, and security. Container images that are based on Nano Server must be run as Hyper-V containers.

LCOW requires that each Linux container run on a separate Linux kernel and achieves this by automatically running each Linux container as a Hyper-V container.

True LCOW requires that each Linux container run on a separate Linux kernel. To achieve this, LCOW automatically runs each Linux container as a Hyper-V container to ensure that each Linux container receives a separate Linux kernel provided by LinuxKit.

Amina, who works for a pharmaceutical company, configures and issues the Smartcard Logon certificate template with schema version 2. While most of the users get auto-enrolled, some of the users fail to obtain the certificate. Identify the most likely reason auto-enrollment failed for these users. Their operating system is Windows XP. They have the Block Inheritance setting at the OU level. The template did not have the Enforced setting. Their operating system is Windows 2000.

Their operating system is Windows 2000.

While configuring Windows Server 2019 as a WSUS server, which of the following role services would you select to store information about updates in the Windows Internal Database? WID connectivity WSUS services SQL server connectivity Certification authority

WID connectivity

The system administrator working in your organization always stores documentation on a separate computer. What do you think is the motive behind the administrator's actions?

They store the documentation on a separate computer so that the documentation is not lost in the event of a system failure. They also back the information up regularly.

Performance Monitor allows one to track how individual system resources are being used.

True Performance Monitor can be used to collect real time data on system performance. It can be used to track how individual resources are being used.

What command can you use to determine if a network service is listening on the correct port number? netstat -a tracert ping Test-NetConnection

netstat -a

Which of the following is the most likely cause for missing resource records in a secondary zone? Zone transfer issues An invalid entry in the DNS cache Zones that allow dynamic updates Manual DNS cache flushing

Zone transfer issues

List the sequence of events that takes place to ensure that data is encrypted during the transfer when someone accesses a website.

1. Web browser downloads the public key of the web server 2. Web browser generates a symmetric key that will be used to encrypt traffic 3. Web browser encrypts a copy of the symmetric key using the Web server's public key 4. Web browser sends the encrypted symmetric key across the network 5. Web server uses private key to decrypt the symmetric key that was encrypted with the public key 6. Web browser and web server both have a copy of the same symmetric key and use it to encrypt all traffic

You are configuring a Windows Server 2016 VPN server using L2TP and NAT. Which of the following is one of the ports that needs to be opened on the firewall for this configuration to work? 1723/TCP 443/TCP 500/TCP 1701/TCP

1701/TCP

What is the level of encryption of the public/private key pair that is contained in the domain-server-CA in Microsoft Server 2019? 256-bit encryption 257-bit encryption 1024 -bit encryption 2048-bit encryptio

2048-bit encryption

Which of the following is a requirement for using Storage Spaces Direct? A 10 GB Ethernet network interface with remote-direct memory access (RDMA) support is a must. More than 20 servers must be available. The number of SSDs used should not be more than one. The servers should be from different Active Directory domains.

A 10 GB Ethernet network interface with remote-direct memory access (RDMA) support is a must.

Amber is a hacker who steals information when people enter their personal details on specific websites. She intercepts the public key as it is sent from the Web server to the Web browser and substitutes her own public key in its place. This enables her to intercept the communication and decrypt the symmetric encryption key using her private key. Which type of hacking attack is Amber perpetrating? A denial-of-service attack A man-in-the-middle attack A drive-by attack A malware attack

A man-in-the-middle attack

Sam, an administrator, sends out an HR policy file to Vicky, Mohammad, Charle, and Reena. They save the HR policy file on their home directories under a shared folder of Windows Server 2019 with different file names. As a result, the same copies of the file are present multiple times with different names. Reena opens and saves the file after making minor changes. What will happen to the files when Sam enables the Data Deduplication Service on Windows Server 2019? A copy of Reena's file is created with a new file name. All the files get deleted when the Data Deduplication Service is enabled. A new copy of Reena's file is created and associated with the same file name. None of the files are deleted as they have different file names.

A new copy of Reena's file is created and associated with the same file name.

Leisl configures multiple WINS servers on her organization's network. She wants the WINS servers to be able to share the NetBIOS records with each other. Which of the following features should Leisl use? Nslookup Debug logging A stub zone A replication partner

A replication partner

What is a starter GPO, and how is it created?

A starter GPO is a template that can be used to simplify the configuration of Administrative Templates in new GPOs. To create a starter GPO, right click the Starter GPOs folder in Group Policy Management, click New, specify a GPO name, and edit the GPO to include settings that you want in the template.

Fatima is configuring a Windows Server 2019 system as a RADIUS server for use with 802.1X Wireless. She has configured the Network Policy and Access Services server role. What is the next step Fatima should take once the server role has been configured? Configure the Configure 802.1X wizard Activate the server in Active Directory Edit or remove existing RADIUS clients Choose the EAP authentication method

Activate the server in Active Directory

If a newly created firewall allows connection to a program only if the connection is authenticated by IPSec, which of the following options was most likely selected in the Action pane in the New Inbound Rule Wizard at the time of creating the rule? Authentication exemptio Allow the connection Allow the connection if it is secure Block the connection

Allow the connection if it is secure

Which of the following organizations does not need to install a WINS server? An organization that uses shared folders on computers with NetBIOS names An organization that uses modern operating systems such as Windows 10 An organization that has disabled NetBIOS on its computers An organization that has DNS servers installed

An organization that has disabled NetBIOS on its computers

David, a system administrator, has created specific GPOs for every department in his organization based on the permissions required by the various departments. However, he needs to apply the Default Domain Policy for some managers but not for the rest of the users. How can David ensure that the Default Domain Policy is applied only to specific managers' accounts? By using the Block Inheritance setting on the domain-level GPO By using the Enforced setting on the OU-level GPOs for the OUs that contain the managers' accounts By removing the Authenticated Users group from the Security Filtering section and adding the managers' accounts By using a WMI filter to check for conditions under which the Default Domain Policy must be applied

By removing the Authenticated Users group from the Security Filtering section and adding the managers' accounts

Ramona, the chief technical officer of an engineering company, needs to install software on 32-bit computers using GPO. The system network consists of over 500 computers and has a mix of 32-bit and 64-bit computers. How can Ramona ensure that the software is installed only on the 32-bit computers? By using a WMI filter By using the Security Filtering option By setting Group Policy preferences By modifying Software Settings under Group Policy

By using a WMI filter

Parker runs the net start svsvc command at a Command Prompt to scan volume errors. He finds a corrupted spot on a volume. How can Parker directly go to the corrupted spot identified by the Spot Verifier service? By using the /r option with the chkdsk command By using the /spotfix option with the chkdsk command By using the /c option with the chkdsk command By using the /x option with the chkdsk command

By using the /spotfix option with the chkdsk command

Radha is using nslookup to troubleshoot DNS-related issues on SERVER1. She uses the command prompt and types in the statement nslookup servery.zone1.com. SERVER1 returns an incorrect result. If SERVER1 is non-authoritative for this lookup, what should Radha do to resolve this issue? Ensure that the configuration of any stub zones is correct Configure the IP address of the correct DNS server in network interface properties on the resolver Modify the associated records in the zone on SERVER1 to include the correct information Clear the DNS Server cache, and clear the DNS cache on the resolver

Clear the DNS Server cache, and clear the DNS cache on the resolver

Tara, an administrator, has added storage devices to the storage pool and selected the RAID level for the virtual disk using Server Manager. She wishes to allocate more space than is required for the current amount of data such that the system only uses the actual space it needs, enabling the actual size to grow with data. What would you do to achieve Tara's wish? ​ Create several thin-provisioned virtual disks Create several thick-provisioned virtual disks Create several fixed-provisioned virtual disks of combined capacity smaller than the storage pool Create several virtual disks of combined capacity smaller than the storage pool

Create several thin-provisioned virtual disks

What are the two main tools in Windows Server 2019 that you can use to create and manage local volumes and how do they differ?

Disk Management is used to create and manage partitions, simple volumes, and software RAID volumes that include up to 32 storage devices. Server Manager is used to create and manage partitions and simple volumes, as well as create software RAID volumes on an unlimited number of storage devices using the built-in Storage Spaces component of Windows Server 2019.

Asher, a system administrator, wants to run containers on Windows Server 2019. He chooses to install Docker using the Windows containers component. Which of the following is a service that will help Asher manage and run Docker containers on the server? Docker daemon Docker client Docker Hub DockerProvider

Docker daemon

How will you configure an existing Windows Server 2019 system as an iSCSI SAN device?

Ensure the iSCSI target has been configured using the configuration tools provided by the device manufacturer. Use an iSCSI compatible ethernet cable and configure the iSCSI initiator on the Win19 server to connect to the name or IP of the SA

Merjem, a PhD student, is writing her thesis. She takes regular backup of her files and data. When taking backup, she chooses the Faster backup performance option in the Optimize Backup Performance window. Which of the following is true of the backup process in the given scenario? Every backup overwrites the previous backup. Every backup only backs up data that has been modified since the previous backup. The backup process will provide the fastest option at the time of restoring data. The backup process backs up the all the specified data every time.

Every backup only backs up data that has been modified since the previous backup.

Kyra has set up a remote access server (RAS) in her organization. She has also configured VPN access on the NAT router. Next, she needs to set up the client systems that will be allowed to access the RAS. Kyra wants to ensure that the client and server communicate using the most secure authentication method. Which of the following methods should Kyra ensure is supported on both the client and the server? Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2) Extensible Authentication Protocol (EAP)

Extensible Authentication Protocol (EAP)

Saif wants to create a backup of all his open files on Windows Server 2019. He does not wish to use third-party software to perform a backup on his system. Suggest an alternative for Saif to perform the backup.

He can use the Volume Shadow Copy Service, with the VSS full backup option selected

Ralph uses Docker EE to run his Web apps in containers. He builds a new app to process financial information provided by customers and file taxes. Owing to the sensitive nature of this information, Ralph wants to use secure containers that would also provide greater stability and performance. What should Ralph do?

He should run the container in isolation, using hyper-v

Having heard the data theft suffered by a competing company by a man-in-the-middle attack, Finn asks Talia, his server administrator, to implement measures to prevent such attacks in his company. Which of the following should Talia do to ensure that Finn's company is protected from such attacks? Hire the services of a third-party Certification Authority Configure the Block Inheritance setting at OU-level GPOs Run the gpupdate /force command in a Command Prompt window. Run the gpresult /r command in Windows PowerShell.

Hire the services of a third-party Certification Authority

You notice a critical operating system-related event under the System event log in the Event Viewer. You or your colleagues have not encountered this error before. How will you resolve it?

If the system is able to boot normally, I would check for any critical updates for the OS and software that is used to make sure that everything is up-to-date. If the system will not boot, I would use boot the system using the installation media and select the Repair your computer option on the installation page. From there I would select Troubleshoot > Command Prompt and configure the Windows boot loader to display the Windows Boot Manager at boot time. After shutting down the system, removing the installation media and restarting the system, I would press F8 to access Advanced Boot Options.

Your organization has a Windows Server 2019 system called SERVERX. It has come to your notice that several computers have tried to access a file in the server and failed in the attempt. You check the Security event log to check how many of such events attempts have been made in the past six months. The log has only stored information pertaining to the past few days. What can you do to ensure that the log stores more information? View the event log on a day-to-day basis Increase the size limit of the event log Click Clear Log from the Actions menu Take a backup of the event log every week

Increase the size limit of the event log

VLX Learning Media provides IT training solutions to corporates. For the lab activities in these training sessions, the company runs the lab setup on virtual machines. These virtual machines are hosted by another company, VirtualFMZ, on its servers, but VLX installs and manages the virtual machines, including the different software applications that are required for various training offerings. Which of the following cloud delivery models is exemplified in this scenario? Software as a Service Platform as a Service Infrastructure as a Service Mobile as a Service

Infrastructure as a Service

Kaya is an administrator at Kelvin Computing. Benjamin, a user, wants to access a shared folder on SERVERA, so he uses the UNC \\servera\share to access the folder. His computer then sends out a broadcast to the network to resolve the name SERVERA. Because of the broadcast, all computers on the LAN interpret it and causes additional processing that interferes with other operations. What can Kaya do to avoid this additional overhead? Restart the DNS Server Configure a default forwarder Configure a conditional forwarder

Install a WINS server

You are configuring a remote access server in your organization. You install the Direct Access and VPN (RAS) role service along with the Routing role service. On the next configuration screen, which of the following services should you select? LAN routing Demand-dial connections NAT Dial-up access

LAN routing

While copying files between folders, it is possible to retrace and complete the transfer in case of a power failure if an NTFS-based filesystem is being used. The same cannot be said for a FAT32 filesystem. What do you think could be the reason for this difference? NTFS is a filesystem, while FAT32 is not. FAT32 keeps track of information being written, while NTFS does not. FAT32 is only used as a removable device, while NTFS is not. NTFS is a journaling filesystem, while FAT32 is not.

NTFS is a journaling filesystem, while FAT32 is not.

Kelsan Informatics has its client computers connected to a router through which the clients can access the organization's servers in the DMZ. The DMZ is connected to a NAT router that is connected to the Internet. In addition to providing access to the Internet, the NAT router also offers additional capabilities, such as traffic throttling, intrusion prevention, and malware filtering. What is the term for this type of NAT router? Next Generation Firewall Last mile technology Demarcation point Point-to-Point Protocol over Ethernet (PPPoE)

Next Generation Firewall

Madison is using the Backup Schedule Wizard from the Actions pane of the Windows Server Backup tool. He selects the backup configuration as Custom and specifies the items to be backed up. While adding the items to be backed up, he happens to select the System state option. What does this option create a backup of? Operating system settings The entire system Virtual hard disk files Boot and recovery volumes

Operating system settings

Rebecca is configuring a RAID with three storage devices. If she saves a file, the file will be divided into three sections, with each section written to separate storage devices concurrently, in a third of the amount of time it would take to save the entire file on one storage device. Which of the following RAID levels is Rebecca configuring? RAID level 0 RAID level 1 RAID level 2 RAID level 5

RAID level 0

What are the different RAID levels, and how are they different from each other?

RAID level 0: an individual file is divided into sections and saved concurrently on two or more storage devices, one section per storage device. RAID level 1: provides fault tolerance in the event of a storage device failure. In this RAID configuration, the same data is written to two separate storage devices at the same time. RAID level 2: no longer used, was a variant of RAID 0 that allowed for error and integrity checking on storage devices RAID level 3: striping with a parity bit to indicate what data is where, requires a minimum of three storage devices to function, with one of the storage devices used to store the parity information. RAID level 4: similar to RAID level 3 but with greater access speed because data is stored in blocks RAID level 5: replaces RAID levels 3 and 4, offers better performance and fault tolerance

Which of the following RAID level configurations is not supported by Windows Server 2019? RAID level 0 RAID level 1 RAID level 2 RAID level 5

RAID level 2

Kim has completed configuring DirectAccess on a remote access server in his organization. He also configures the users' computers and enables DirectAccess. While the laptop users are able to use DirectAccess, desktop users email Kim to let him know that they're unable to use DirectAccess. If Kim is able to resolve this issue successfully, which of the following options on the Remote Access Setup pane did Kim use? Remote Access Server Remote Clients Infrastructure Servers Application Servers

Remote Clients

Zahara is accessing an application installed on her organization's remote access server from her laptop. She saves output from the application into a file on the server. She opens the saved file on the server and prints it using her local printer. Which of the following protocols is employed in this scenario? Remote Desktop Protocol Password Authentication Protocol Point-to-Point Tunneling Protocol Layer Two Tunneling Protocol

Remote Desktop Protocol

Asa is working from home. She launches an application from the Start menu on her computer. The application is running on the remote access server in her organization. She is able to see and manipulate the application's graphical interface on her computer without running a full graphical desktop of the remote server. Which of the following Remote Desktop services server role allows this behavior of the application? Remote Desktop Gateway Remote Desktop Licensing Remote Desktop Virtualization Host Remote Desktop Web Access

Remote Desktop Web Access

Hiro is working remotely. His current role requires him to access his organization's resources that are running on the remote access server. He opens the Microsoft Outlook application that is running on the remote access server on his system. He is able to manipulate actions within the application on his system. If Hiro was able to launch Microsoft Outlook directly from his computer, without accessing the desktop of the remote server, which of the following options is he using? Remote Desktop app Virtual Private Network RemoteApp DirectAccess

RemoteApp

Reno is facing some DNS server issues that he is unable to resolve using nslookup, DNS manager, and other general methods. He decides to use information from the DNS Server log to identify the issue. However, the information that was logged is insufficient to resolve the issue. Reno is able to identify the issue after enabling debug logging. What should Reno do next? Reno should permanently enable debug logging. Reno should turn off debug logging. Reno should delete all the log files. Reno should flush the DNS server cache.

Reno should turn off debug logging.

Valentina decides to install the Docker EE package on a Windows server. She wants to download the latest stable version of the package, so she chooses to install Docker using the DockerMsftProvider module. She enters the following commands in the Windows PowerShell window: PS C:\> Install-Module -Name DockerMsftProvider -XXXX psgallery -Force PS C:\> Install-Package -Name docker -ProviderName DockerMsftProvider Identify the correct code that should replace XXXX. Repository RequiredVersion preview DockerProvider

Repository

Danielle creates a new scope, Sales LAN, for a DHCP server in her organization. She wants to assign an IP address to a printer in the sales department. Which of the following folders should Danielle use to configure this option? Address Pool Address Leases Policies Reservations

Reservations

How is a simple volume created in Server Manager?

Right-click the Unallocated section next to Disk 1 Click New Simple Volume to open the New Simple Volume Wizard Follow the steps in the Wizard

One of the disks on your computer is running low on storage space. You notice that there is unallocated space in the spanned volume. How will you use the unallocated space to increase storage space? Right-click the volume, click Reactivate Volume once the storage device is available, and use the unallocated space Right-click the volume on that disk and click Extend Volume to increase the size of the volume using the unallocated space Right-click a RAID level 1 volume and click Remove Mirror to remove the volume while retaining the data from one disk you specify Right-click the system or boot partition in the Disk Management tool, click Add Mirror, and select the second storage device

Right-click the volume on that disk and click Extend Volume to increase the size of the volume using the unallocated space

Rory is managing the Remote Desktop connections to a collection, CollectionX. Two users, Aaron_T and Kwan_J have active connections. If Rory is able to view and interact with Kwan-J's desktop, which of the following statements is true? Rory used the Log off option. Rory used the Disconnect option. Rory used the Send Message option. Rory used the Shadow option.

Rory used the Shadow option.

You have created a data collector set called SERVERX Data Collector set. As a system administrator, you want to restrict other users from accessing the results of the data set. Which of the following options under the properties dialog box will you use? General Directory Schedule Security

Security

Martha is configuring the Network Policy and Access Services server role to configure a Windows Server 2019 system as a RADIUS server so that it can be used with the 802.1X Wireless. After this, she is facing some issues activating the server in Active Directory. She thinks that there were issues with the installation. Which of the following event logs should Martha check to examine events specific to the installation? Security Application Setup System

Setup

Soha wants to build a Web app that analyzes financial details of users and provides them with investment advice. She will be running this app on a public cloud using IIS. If Soha wants to take advantage of applications pools to improve security of her Web app, which of the following should she do? She should generate a group of dynamic-link libraries. She should allow access to the app only using NFS. She should use object storage instead of block storage. She should create the Web app using ASP.NET.

She should create the Web app using ASP.NET.

Malia configures a primary zone on a DNS server to accept dynamic updates. Whenever a computer is added to the network, resource records for the computer are automatically created. For a computer, NX2001EY, Malia configures resource records manually. On the Zone Aging/Scavenging Properties window, she selects Scavenge stale resource records, sets the No-refresh interval to 14 days, and sets the Refresh interval to 14 days. She also enables automatic scavenging in the DNS server's properties. If Malia removes NX2001EY from the network, what is the most likely outcome in this scenario? The resource records for N2001EY will be deleted within 14 days. All the resource records for N2001EY will be made available for scavenging after 28 days. Some of the resource records for N2001EY will be made available for scavenging after 28 days. Malia will need to manually remove all the resource records for N20001EY.

Some of the resource records for N2001EY will be made available for scavenging after 28 days.

Denali wants to store information about all Windows updates on a specific Microsoft SQL Server for security reasons. Which of the following wizards can Denali use to set up SQL Server Connectivity to store update information? The Group Policy Results Wizard The Add Roles and Features Wizard The Windows Server Updates Services Configuration Wizard The Certificate Enrollment wizard

The Add Roles and Features Wizard

You are troubleshooting a DHCP server and discover that it is not dynamically updating DNS records for DHCP clients. What is the most likely cause for this issue? The network contains computers with manually configured IP addresses. The DNS server and DHCP server are in different domains. The DNS server is an authoritative, primary DNS server. The DNS server and DHCP server are running on different operating systems.

The DNS server and DHCP server are in different domains.

Maqsud installs IIS on a Windows Server 2019 server. To allows users to connect to Default Web Site using HTTPS, he installs an HTTPS encryption certificate on the Web server. Next, he configures Default Web Site to respond to HTTPS requests. However, when users connect to the website using HTTPS, they receive a security warning. Which of the following is most likely causing this issue? The TCP port number is set to 443 and not 80. The FQDN in the HTTPS certificate does not match the Web server FQDN. The HTTPS encryption certificate is installed on the Web server. The website is already configured to respond to HTTP requests.

The FQDN in the HTTPS certificate does not match the Web server FQDN.

Felicia is drafting an email to her colleague Rhonda. After Felicia types out the email, she enters the email address [email protected] and clicks Send. Felicia's email server uses the email address typed to locate the recipient email server. Which DNS resource record for zoneA.com allows Felicia's email server to locate the recipient email server? The A record The AAAA record The MX record The CNAME record

The MX record

Your organization launches a new web application for video editing. Multiple users can access the application at the same time and edit their videos online. What will you use to monitor the amount of memory being used by the application in real time? The Reliability Monitor Data Collector Sets Event Viewer The Performance Monitor

The Performance Monitor

Chynna wants to create two different firewall rules that are applicable depending on whether a computer is connected to a corporate domain or a home network. Which of the following panes in the New Inbound Rule Wizard should Chynna select to specify the conditions that should be met before the rules can be applied? The Profile pane The Action pane The Rule Type pane The Protocol and Ports pane

The Profile pane

TravelBugz is a website that reviews accommodations and holiday destinations. Users of the website can post their own reviews. Users can use the TravelBugz app too instead of the website if they want to. The app and website both directly access the Web app running on the cloud to store and retrieve data. Which of the following is true of this scenario? The TravelBugz website can be accessed from a browser using the TCP/IP protocol. The TravelBugz app communicates with the Web app using the TCP/IP protocol. The TravelBugz app communicates with the Web app using the HTTPS protocol. The app and website communicate with each other using the TCP/IP protocol.

The TravelBugz app communicates with the Web app using the TCP/IP protocol.

Aspen sets up the round robin feature in DNS for an FQDN server, server.domainA.com. She creates two identical Web servers with IP addresses 192.168.1.75 and 172.6.0.15 and associates two A records on the FQDN server with these IP addresses. The first A record is associated with the Web server having the IP address 192.168.1.75, and the second A record is associated with the Web server having the IP address 172.6.0.15. Aspen uses a client with the IP address 172.6.0.95 to perform a forward lookup of server.domainA.com. Which of the following is true of this scenario? The FQDN server will return both IP addresses, 192.168.1.75 followed by 172.6.0.15. The FQDN server will return one of the IP addresses because of the round robin feature setup. The client will contact the Web server with the address 172.6.0.15. The client will contact the Web server with the address 192.168.1.75.

The client will contact the Web server with the address 172.6.0.15.

Viola, a system administrator, installs IIS on a Web server and creates two websites. She installs the necessary HTTPS encryption certificate on the server and proceeds to bind the HTTPS protocol to the first website using default settings. This binding is successful. Next, she proceeds to bind the HTTPS protocol to the second website. Which of the following is most likely to cause an issue when binding the HTTPS protocol to the second website? The HTTPS encryption certificate should not be installed on the Web server. IIS cannot run multiple websites simultaneously. The first website is using port 443, so the second website cannot use the same port. A Web server cannot be configured to host more than one website with HTTPS binding.

The first website is using port 443, so the second website cannot use the same port.

Ahmed, a network administrator, is looking at the events added to a Windows Server 2019 system log in the Event Viewer. He notices three events being highlighted with a yellow exclamation mark. The events were related to a remote access attempt. If Ahmed were to treat this as a warning sign, what kind of issues should he anticipate? The system may become unstable. The services running on the server may not function properly. Users may be prevented from accessing the system. The functionality of the system can be affected.

The functionality of the system can be affected.

Noortje, an employee of Cutleaf Productions, is working from home. She restarts her laptop to install an operating system update. After the restart, the Noortje is able to access the organization's file server without initiating a connection to the VPN. Which of the following is true of this scenario? ​ The remote access server also contains a network location server. Noortje had established a VPN connection before the system was restarted. Noortje is using a Windows 7 operating system. The client is using IPv4 packets to authenticate to the remote access server.

The remote access server also contains a network location server.

Ava, a system administrator, configures 45 remote access clients to use the VPN server in the organization using the SSTP protocol. On any day, the number of users that work remotely does not exceed 15, so AVA configures the SSTP VPN protocol for 25 connections on the server. One day, owing to extreme weather, many employees are asked to work from home. When more than 25 users try to connect to the organization's servers, they are not allowed access. Ava uses the Routing and Remote Access tool to increase the number of connections for the SSTP protocol to 45. When she asks these additional users to confirm if they have received access, the users tell her that they are unable to connect to the organization's servers. If some or all of these users were able to remotely connect on a previous occasion, what is the most likely issue in this scenario? The number of connections for the SSTP protocol does not exceed the number of remote access clients. The remote access server was not rebooted after the recent changes. The client systems are running the latest version of Windows 10. The other protocols do not have updates to the number of connections.

The remote access server was not rebooted after the recent changes.

Giselle, a systems administrator, creates a file redirection GPO, in the User Configuration section that automatically saves files created by her colleagues to a shared network device instead of the local drives in their computers. However, the computers do not receive the configuration specified in the GPO. She runs the gpupdate /force command in the Command Prompt window of one of her colleagues' computer. Despite her effort, the computer does not receive the GPO, and she decides to rectify the issue the next day. To her surprise, she sees that the computer has been configured as per the GPO. What do you see as the issue with the GPO configuration? The GPO was not backed up before the new settings were applied. The settings can only be applied at the next login. The computer had to be rebooted for the application of the GPO settings. The Block Inheritance setting was enabled for the OU that the computers belonged to.

The settings can only be applied at the next login.

Rahul is a systems administrator in a multinational corporation. As part of the routine auditing process, he checks the Security event log and finds out that there was a failed attempt to view a file on the server. He remembers that there was a similar attempt made a year ago. But he is not able to find the event in the log file. Can you explain the cause of the problem?

The size of the event log needs to be increased, as the oldest events are automatically deleted when the event log reaches the size limit.

Your organization runs several applications that store information on a specific volume on a Windows 2019 Server system. Of late, the applications have become slow and fail to perform as they did earlier. The performance improves after the server administrator defragments the volume. Can you identify what the problem must have been? The applications could not connect to the server. The applications were not configured properly. The hard disk was too slow. The space for file cache was not sufficient.

The space for file cache was not sufficient.

Theodore installs a Fedora Linux distribution on a Windows Server 2019 server. He initially uses the sudo command to perform system administration on the Linux system. Later, he opens a new command prompt and runs some more administrative commands. Which of the following must be true if Theodore did not use the sudo command during the second round of administrative changes? Theodore used the sudo command to open the Linux command prompt. Theodore used the sudo passwd root command. Theodore used the su command to run commands as the root user. Theodore used the pwd command.

Theodore used the sudo passwd root command.

A server rack containing data files, databases, web content, etc. is stored on an external SAN, which is connected to the Windows Server 2019 operating system via iSCSI. Which of the following is not likely to be achieved with this configuration? Connection to Fibre Channel SAN devices Accessing multiple SAN devices Providing storage to other servers Using hardware RAID externally to provide fault tolerance

Using hardware RAID externally to provide fault tolerance

An organization has published applications on its web servers. The applications are accessible to users in the organization when they are authenticated via Active Directory. What RAS capability will allow the organization's applications to be accessible to users outside of the organization? Virtual Private Networks Web Application Proxy DirectAccess RemoteApp

Web Application Proxy

Wilmer is creating a new remote access policy for the sales department in the organization. On the Specify Conditions screen of the wizard to create new policies, Wilmer selects the option to grant or deny access according to user dial-in properties. In which of the following circumstances will this permission be used? When a client is authenticated using an unencrypted authentication method When the Idle Timeout and Session Timeout constraints are set to 5 minutes When the access permission on the same screen is set to Access denied When a user account has the Control access through NPS Network Policy option set

When a user account has the Control access through NPS Network Policy option set

The new system administrator of XYZ company realizes that whenever updates are available for Windows, WSUS redirects computers to the Microsoft Update servers on the Internet to obtain updates instead of storing the update information on the WID. Which of the following is a likely reason for this issue? The WSUS installation is either incomplete or has not been installed properly. While installing WSUS, the option SQL Server Connectivity was selected. While installing WSUS, the option Store updates in the following location was deselected. While configuring WSUS, the option Synchronize from another Windows Server Update Services server was selected.

While installing WSUS, the option Store updates in the following location was deselected.

You are troubleshooting a hard disk error in a Windows Server 2019 system. You are not able to identify the root cause of the problem. A colleague suggests that you look at the system event log for more information. Is your colleague right about the system log? Why? Yes. Events related to hardware issues are usually recorded in the system event log. No. Issues related to hard disk errors are stored in the application event log. Yes. Events from the software applications using the hard disk will be stored in the system event log. No. A Windows Server 2019 system does not use event logs.

Yes. Events related to hardware issues are usually recorded in the system event log.

Describe the need for and process of changing the default folder for downloaded container images.

You should change the default folder to ensure that images are stored on a volume that contains enough space for the number and size of container images you want to use. To modify the default folder used to store container images, you can create the C:\ProgramData\docker\config\daemon.json text file and edit the contents to specify the appropriate path.

Stephen sets up manual enrollment for a user certificate from an enterprise CA. However, as he completes the process, he realizes that he has accidently set up the enrollment for a computer certificate rather than a user certificate. Which of the following commands did Stephen most likely type in the Command Prompt window? certmgr.msc certlm.msc wf.msc gpedit.msc

certlm.msc

You download multiple container images from Docker Hub and create containers using the docker run command. After a few days, you notice that the list of containers that you have run is quite large. Which of the following commands can you use to shorten this list? docker rmi image docker stop container docker rm container docker container prune

docker container prune

Which of the following is a term given to the software component in the operating system that connects to the SAN device via iSCSI? iSCSI target iSCSI initiator HBA MPIO

iSCSI initiator


Kaugnay na mga set ng pag-aaral

PrepU Chapter 48: Management of Patients with Kidney Disorders

View Set

Micro test 4 Respiratory system infectious diseases

View Set

American History 11.4-11.5 Terms

View Set

Psychology Research Methods - Chapter 13

View Set