Cite 104/105 Mod 1, Cite 104/105 Mod 5, Cite 104/105 Mod 4, Cite 104/105 Mod 3, Cite 104/105 Mod 6, Cite 104/105 Mod 2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

17. Which of the following organizations should consider using Azure Active Directory? a. An organization that subscribes to Office 365 services b. An organization that has a substantially on site workforce c. An organization that uses IIS as a web server d. An organization that deploys Internet accessible services, such as FTP or DNS

a. An organization that subscribes to Office 365 services

1. Azure Active Directory can be configured to trust an organization's Active Directory forest, or mirror it using asynchronization service. a. True b. False

a. True

27. Kiora is setting up an RODC for the first time at one of her organization's branch offices. She creates a prestaged RODC computer account. Next, she installs a Windows Server 2019 system that will function as the RODC. What is the most appropriate step that Kiora should take next? a. Run the Active Directory Domain Services Installation Wizard b. Add branch office user accounts to the Allowed RODC Password Replication Group c. Create new user accounts for the branch office users d. Use the Active Directory Domain Services Configuration Wizard to configure the RODC

b. Add branch office user accounts to the Allowed RODC Password Replication Group

1. Within a workgroup environment, if EFS keys are not backed up, you can still access EFS files when they are restored after a recovery, provided you are a member of the Administrators group. a. True b. False

b. False

22. Laurel creates a shared folder on a ReFS filesystem using NFS. She grants Read-Only permission to MSmark. When her colleague Mark tries to access the folder from his computer, he cannot access it. Which of the following is the most likely reason that Mark cannot access the folder? a. The default permission is Read-Only, but Mark needs the Read-Write permission. b. MSmark is a computer name and not Mark's user account name. c. Laurel forgot to click the Allow root access option for Mark. d. The ReFS permission is Read/Write, whereas the NFS permission is Read.

b. MSmark is a computer name and not Mark's user account name.

11. Nadira is testing an application that needs to work on multiple operating systems. For this purpose, she uses Hyper-V to set up a Windows Server 2019 virtual machine (named VM1) and a Linux-based virtual machine (named VM2) on her host Windows 10 operating system. She sets up a third virtual machine, Windows Server 2012 (named VM3), to test the compatibility of the application between Windows Server 2019 and 2012 versions. Which of the following must be true if VM3 was set up successfully using nested virtualization? a. Nadira removed VM2 to accommodate VM3. b. Nadira powered off VM1, ran a PowerShell command, and powered on VM1. c. Nadira ran the following PowerShell command: Get-VMNetworkAdapter -VMName VM3 | Set-VMNetworkAdapter -MacAddressSpoofing On. d. Nadira enabled nested virtualization in Windows 10 using a PowerShell command.

b. Nadira powered off VM1, ran a PowerShell command, and powered on VM1.

5. Which of the following statements is true of a client on a computer network? a. It is a server that is located within the physical premises of an organization. b. It is a computer that shares resources in response to a request from another computer. c. It is a computer that requests for resources from another computer on the network. d. It is a server that is located outside an organization's premises and accessed via the Internet.

c. It is a computer that requests for resources from another computer on the network.

18. Which of the following statements is true of the ownership of a file or folder? a. An administrator can take ownership of a file or folder without being granted the permission to do so. b. The account that creates a file or a folder gets its ownership only when the administrator grants ownership to that account. c. Ownership of individual files and folders cannot be transferred by anyone with the Take ownership permission. d. The owner of a file or folder cannot modify all the permissions for that file or folder.

a. An administrator can take ownership of a file or folder without being granted the permission to do so.

13. Pavel is an IT project lead at Krystal Engineering. Because of his role, he is part of multiple groups, including the Developer group as well as the Project Manager group. One of the files that he is trying to access, PLStatus.xls, is not opening. Upon investigation, you find that Pavel's user account has Full control permission over the file. The Project Manager group has Modify access but not Full control. The Developer group has Write access but no Read access. What is the most likely reason that Pavel is not able to open the file? a. Another group has the Deny box checked for Read access. b. The Developer group restricts Pavel's ability to view the file. c. The Project Manager group restricts Pavel's ability to view the file. d. The group permissions override permissions granted to Pavel's user account.

a. Another group has the Deny box checked for Read access.

22. You are in the process of installing Windows Server 2019 Standard Edition on your computer. You have downloaded the corresponding ISO file and burned it to a DVD. Which of the following steps should you take next? a. Change the boot order in the BIOS. b. Insert the DVD after turning on your computer. c. Copy the ISO image to a bootable USB drive. d. Download Burnaware or Rufus.

a. Change the boot order in the BIOS.

10. Which of the following statements about directory partitions is true? a. Changes to a domain partition on a domain controller are only replicated to domain controllers within the same domain. b. The largest section of the Active Directory database is the configuration partition. c. Schema partitions store the structure and layout of the forest, including the names of each domain and their trust relationships. d. If any change is made to a configuration partition, the change is also replicated in the schema partition.

a. Changes to a domain partition on a domain controller are only replicated to domain controllers within the same domain.

27. Fayola realizes that many of her colleagues use folders on the network drive to store videos, and this consumes a lot of space on the drive. She asks the employees to delete their videos from the network drive. Which of the following steps can Fayola take to maintain a log whenever a video file is saved on the drive in the future? a. Configure passive screening b. Configure active screening c. Enable the encrypt attribute d. Enable the archive attribute

a. Configure passive screening

26. Barry, a system administrator, finds that a shared drive on his organization's network is slow because of the huge amount of data stored in it. He realizes that most employees of the company back up all their data on this drive. He wants to restrict the amount of data that each employee stores on the drive. Which of the following steps will help Barry limit employees' space usage? a. Configuring user quota b. Configuring folder quota c. Configuring active screening d. Configuring passive screening

a. Configuring user quota

23. Which of the following is a component that enables users to search and locate a shared folder in the Active Directory? a. LDAP b. RAP c. SMB d. NFS

a. LDAP

18. Kettle Inc. from Florida merges with Blue Clu Networks from Minneapolis. Minisha, a system administrator, is granted the responsibility of configuring Active Directory across both locations to enable users from both locations to access common resources. If Minisha is able to accomplish this task successfully, which of the following must be true? a. Minisha is a member of the Enterprise Admins group in both organizations. b. Minisha is a member of the Domain Admins group in both organizations. c. Minisha has run the following command: Get-ADForest | select SchemaMaster,DomainNamingMaster. d. Minisha has run the following command: Set-ADDomainMode -Identity domainX.com -DomainModeWindows2012R2Domain.

a. Minisha is a member of the Enterprise Admins group in both organizations.

15. Raven is adding FSMO roles to domain controllers in the domain1.com forest. The forest contains a single domain and three domain controllers, DC1, DC2, and DC3. DC1 contains a copy of the global catalog, and all three domain controllers have the latest version of Windows Server 2019 installed. Which of the following is a best practice that Raven should follow? a. She should create the Domain Naming Master role on DC1. b. She should use DC2 or DC3 as the Domain Naming Master. c. She does not need to create the Domain Master role because DC1 contains a copy of the global catalog. d. She should create three Domain Naming Master roles, one for each domain controller.

a. She should create the Domain Naming Master role on DC1.

6. Nora is a data scientist and works with programs that routinely acquire a lot of data. After data analysis, she stores the raw data for future use. However, she does not want the Windows Search Service to include the data files every time she performs a search function. Which of the following attributes should Nora deactivate to exclude the data files from searches? a. The index attribute b. The compress attribute c. The archive attribute d. The hidden attribute

a. The index attribute

15. What are users who only have the List folder contents permission allowed to do? a. They can list files in the folder or switch to a subfolder, view folder attributes and permissions, and execute files, but cannot view file contents. b. They can read, add, delete, execute, and modify files, but cannot delete subfolders and their file contents, change permissions, or take ownership. c. They can view file contents, view folder attributes and permissions, traverse folders, but cannot execute files. d. They can traverse folders, view file contents, view attributes and permissions, and execute files.

a. They can list files in the folder or switch to a subfolder, view folder attributes and permissions, and execute files, but cannot view file contents.

1. Installing the Hyper-V role will install the Hyper-V hypervisor, Hyper-V Manager console, and Hyper-V PowerShell cmdlets. a. True b. False

a. True

2. Access to a shared folder on the network will use the most restrictive permissions, regardless of whether they are NTFS or share permissions. a. True b. False

a. True

3. Access-based enumeration limits the shares a user can see to only the shares for which the user has at least Read permission. a. True b. False

a. True

3. Hyper-V supports nested virtualization that can be used to create virtual machines within another virtual machine. a. True b. False

a. True

13. If a site cannot hold a copy of the global catalog, which of the following features can be enabled on the site to provide fast authentication? a. Universal Group Membership Caching b. Flexible Single Master Operations c. Role seizure d. User Principle Name

a. Universal Group Membership Caching

17. Andrei enabled the Live Migration feature of Hyper-V during its installation. He selects a virtual machine called VM1 within Hyper-V Manager and clicks on Move within the Actions pane. Next, he selects "Move the virtual machine's storage." Which of the following is true of this scenario? a. VM1's virtual hard disk files will be moved to the destination server. b. VM1's virtual machine configuration files will be moved to the destination server. c. VM1's virtual hard disk files and virtual machine configuration files will be moved to the destination server. d. VM1 will be copied to the destination server and renamed as VM2.

a. VM1's virtual hard disk files will be moved to the destination server.

13. Walter Wells, Inc., a company that builds robotic process automation (RPA) applications, uses Windows Server 2016 to run several Linux and Windows virtual machines. Which of the following statements, if true, would make upgrading to Windows Server 2019 a good choice? a. Walter Wells spends a considerable amount of money on encrypting Linux virtual machines. b. Walter Wells does not use storage replicas or storage spaces. c. Walter Wells is considering removing all the Linux virtual machines and switching entirely to Windows. d. Walter Wells currently outsources its hardware maintenance operations to an external vendor.

a. Walter Wells spends a considerable amount of money on encrypting Linux virtual machines.

20. Anahira is the system administrator at an organization that has offices in two different locations, New York and Sao Paulo. She decides to create sites for each location, NewYorkSite and SaoPauloSite, to improve Active Directory replication. Once she creates the sites, she associates NewYorkSite with the IP address 10.1.0.0/16. Which of the following is true of this scenario? a. When new domain controllers are added to this network, they will be added to NewYorkSite by default. b. Assigning an IP address to a site indicates that domain controllers within this site contain the global catalog. c. Anahira will not be able to install or use Simple Mail Transfer Protocol (SMTP) to perform Active Directory replication. d. This restricts the creation of bridgehead servers, and only NewYorkSite will contain bridgehead servers.

a. When new domain controllers are added to this network, they will be added to NewYorkSite by default.

6. Linwood is the IT manager of a small organization, Turtle Designs, with less than 50 employees. Caroline, his boss, asks him to set up a computer that will act as the central repository for the company's data. Linwood estimates the costs and suggests using an Internet-based service instead. What is Linwood recommending in this scenario? a. An on-premise server b. A cloud-based server c. A client d. A network

b. A cloud-based server

28. After an RODC gets stolen along with a few other computers, Shania, the system administrator, resets the computer accounts of the stolen computers that were cached on the RODC. She accomplishes this task by using the Reset all passwords for computer accounts that were cached on this Read-only Domain Controller option. Which of the following is true of this scenario? a. The stolen computers can rejoin the domain after resetting their passwords. b. Any computers that were not stolen will need to rejoin the domain. c. Shania does not need to delete the stolen RODC computer account if the other computer accounts are reset. d. The Active Directory database on the stolen RODC is deleted automatically.

b. Any computers that were not stolen will need to rejoin the domain.

25. Raphael has successfully installed the Essentials Edition of Windows Server 2019 on his computer. He's completing some post-installation configuration tasks including naming the server. He has four options. Which of the following names should Raphael pick for the newly installed server and why? a. Home-FileServer-Raphael because it contains his name and is at least 15 characters b. COR-WEB-12 because it contains allowed characters and is shorter than 15 characters c. TEL COMP F3 because it contains a mix of letters, numbers, and spaces d. W@$h!nGT0n, because it contains special characters, numbers, upper case letters, and lower case letters

b. COR-WEB-12 because it contains allowed characters and is shorter than 15 characters

11. Deion is creating a new virtual machine using the New Virtual Machine Wizard. After choosing the generation for his virtual machine, he is prompted to select the memory and an optional choice to enable the use of dynamic memory. He consults a colleague, Kanesha, and they decide against enabling dynamic memory. What is the most likely reason that prompted this decision? a. Deion chose Generation 2 in the previous step. b. Deion intends to use this virtual machine in a nested virtualization configuration. c. Deion allocates 1024 MB of startup memory, which is sufficient to run most operating systems. d. Deion intends to run Windows Server 2019 on this virtual machine.

b. Deion intends to use this virtual machine in a nested virtualization configuration.

25. Which of the following options provided by Windows Server 2019 helps configure folders that are on different servers to synchronize contents? a. Distributed File System (DFS) namespaces b. Distributed File System (DFS) replication c. Client for Network File System (NFS) d. File Server Resource Manager (FSRM)

b. Distributed File System (DFS) replication

1. Storage pinning is the process of planning hardware for a specific server within an organization. a. True b. False

b. False

2. If domain1.com is the forest root domain, you can use the command Set-ADForestMode Windows2012R2Domain to raise the forest functional level to Windows Server 2012 R2. a. True b. False

b. False

2. Live Migration cannot be enabled if the Hyper-V host operating system is joined to an Active Directory domain. a. True b. False

b. False

2. The Windows 10 Education edition supports Hyper-V but not nested virtualization. a. True b. False

b. False

3. By default, the only site created within a new forest does not contain any domain controller. a. True b. False

b. False

3. To replicate a virtual machine, it is sufficient that replication is enabled on the Hyper-V host of the virtual machine that is being replicated. a. True b. False

b. False

4. By default, a new domain has six organizational units: Domain Controllers, Builtin, Computers, ForeignSecurityPrincipals, Managed Service Accounts, and User. a. True b. False

b. False

4. Jonathan has access to the files and folders in a newly created DFS namespace. The files and folders that he does not have access to are hidden. This indicates that the access-based enumeration is enabled by default. a. True b. False

b. False

4. You need multiple boot images on a WDS server, one for each operating system. a. True b. False

b. False

5. The DFS Replication role needs to be installed to configure folder quotas and file screens. a. True b. False

b. False

12. Fareeda, a system administrator, is configuring the security settings for a Generation 2 virtual machine called VM1.She enables the Trusted Platform Module (TPM). Next, she wants to encrypt the virtual hard disks for VM1 so that other virtual machines are restricted from using these hard disks. If the virtual hard disks are successfully encrypted, which of the following statements must be true? a. Secure Boot is disabled by default in Generation 2 virtual machines. b. Fareeda enabled shielding in the security settings for VM1. c. Fareeda selected the option to Encrypt state and virtual machine traffic. d. BitLocker contains the encryption keys.

b. Fareeda enabled shielding in the security settings for VM1.

14. What is the term for domain and forest functions that must be coordinated from a single domain controller? a. Universal Group Membership Caching b. Flexible Single Master Operations c. Role seizure d. User Principle Name

b. Flexible Single Master Operations

13. Freya notices some performance issues with an important Generation 2 virtual machine. She realizes that the issue is caused by the presence of other virtual hard disks on the same physical disk. She has another physical hard disk on her system that is currently underutilized. She decides to use this disk as a pass-through disk to enhance the performance of the virtual machine. If Freya was able to accomplish this task successfully, which of the following must be true? a. Freya deleted the virtual disk from her system. b. Freya changed the physical disk's settings to take it offline. c. Freya removed the virtual hard drive from the virtual machine. d. Freya used the Browse option under the virtual hard drive settings.

b. Freya changed the physical disk's settings to take it offline.

5. Sanya, an IT administrator for an organization, installs a new application on 150 computers used by programmers in the organization. She does this with a few clicks only for this specific set of users without impacting the rest of the organization. Which of the following features of Active Directory is exemplified by Sanya's actions in this scenario? a. A member server b. Group Policy c. A standalone server d. Access Control List

b. Group Policy

11. Hiroshi is the system administrator at an organization that has offices spread across three locations, Boston, London, and Paris. The organization has an Active Directory domain, domainA.com, with two domain controllers in each location for the marketing business unit. The company expanded recently and added over 3000 new users across these locations. Hiroshi notices that this surge in users is causing Internet congestion because of the Active Directory replication. What is a cost-effective method of dealing with this issue? a. Hiroshi should create separate domains for each location to avoid the need for replication. b. Hiroshi should create site objects and specify timed intervals for replication using site link objects. c. Hiroshi should reduce the number of domain controllers to just one per physical location. d. Hiroshi should remove all domain controllers and have only one domain controller for the domain.

b. Hiroshi should create site objects and specify timed intervals for replication using site link objects.

22. What is the use of the New-ADReplicationSite Windows PowerShell cmdlet? a. It can be used configure the replication settings within a site link object. b. It can be used to create a new site object. c. It can be used to change the bridgehead server in a site. d. It can be used to launch the Active Directory Sites and Services tool.

b. It can be used to create a new site object.

8. Which of the following statements regarding a domain functional level is accurate? a. Unlike forest functional levels, you can revert to a previous domain functional level after it has been raised. b. It represents the oldest Windows Server version that can be used on a domain controller. c. A server containing Windows Server 2016 cannot run on a domain at the Windows Server 2019 functional level. d. It applies to domain controllers, clients, and other servers that are present in the domain.

b. It represents the oldest Windows Server version that can be used on a domain controller.

25. Latanya, a system administrator, is creating computer objects. She uses the Active Directory Users and Computer stool instead of the Active Directory Administrative Center. What is the most likely reason for not using the Active Directory Administrative Center? a. It does not support features introduced within Windows Server 2008 R2 and later functional levels. b. It uses a minimal color interface that is similar to the one provided by Server Manager. c. It can only be used to manage OU, user, group, and computer objects, but not to create these objects. d. It is a command line tool similar to Windows PowerShell that requires the use of cmdlets.

b. It uses a minimal color interface that is similar to the one provided by Server Manager.

26. Janice has set up a Windows Server 2019 lab environment to practice labs related to her training. The base operating system is Windows 10. She has three Windows Server virtual machines running. If one of the virtual machines is running inside another virtual machine, which of the following must also be true? a. Janice is using a Type-2 hypervisor to control both virtual machines. b. Janice has enabled nested virtualization on the Windows 10 operating system. c. Janice has enabled nested virtualization on the Windows Server operating system. d. Janice is using the Windows Server 2012 R2 Edition in the virtual machines.

b. Janice has enabled nested virtualization on the Windows 10 operating system.

12. Denji has access to a shared folder on his company's network drive. He updates the data in some files and replace some of the existing files on the shared folder with a new version. He wants to share the updated files with a colleague who must verify the updated data and make changes if necessary. However, the colleague can only view the file contents, and Denji does not have the rights to grant the required permission. Which of the following NTFS/ReFS folder and file permissions does Denji most likely have that allows him to make the changes mentioned in the scenario but does not allow him to grant the required permissions? a. Read and execute b. Modify c. Full control d. Write

b. Modify

7. Natalie is a graphic designer who frequently works with large files. These files, which are stored on an NTFS file system, measure 500 MB on average. She uses a software application to create backups of her work, and she had not faced any issues with backing up her files until recently. During a recent backup, she noticed that a newly created folder was not backed up. Identify the most likely cause for this issue. a. The software does not back up files larger than 500 MB. b. Natalie did not enable the archive attribute on the folder. c. Natalie did not enable the index attribute on the folder. d. NTFS filesystems do not support the backup of large files.

b. Natalie did not enable the archive attribute on the folder.

7. Isabella configures three virtual machines, VM1, VM2, and VM3, on a Windows Server 2019 host. The host and VM1 are connected to a physical switch (external virtual switch). VM1 and VM2 are connected to a private virtual switch. VM2 and the host are connected to an internal virtual switch. VM3 is not connected to any switch. Isabella is building an application that provides clients access to confidential financial information in a secure database. Isabella chooses to run the application on the host server and decides to implement an N-tier security design to protect the database. Where should Isabella place the database? a. On the host server b. On VM1 c. On VM2 d. On VM3

b. On VM2

21. Nodin is a system administrator in training. He is trying to grant the user, Becky Winters, shared folder permissions using Server Message Block. Help Nodin identify the correct sequence to grant Becky Winters Full control shared folder permissions. a. Right-click the folder, click Properties, highlight the Sharing tab, and click the Share button. b. Right-click the folder, click Properties, highlight the Sharing tab, and click the Advanced Sharing button. c. Click File and Storage Services, highlight Shares, select the Tasks drop-down box, and click New Share. d. Click File and Storage Services, select SMB Share - Quick, select Type a custom path, and specify the path to an existing shared folder that must be shared.

b. Right-click the folder, click Properties, highlight the Sharing tab, and click the Advanced Sharing button.

12. Mahmood works as a full stack web developer at Insignia Informatics. As one of the senior developers, Mahmood is often tasked with testing web applications built by his team. Often, he finds himself testing multiple web applications simultaneously over a short period. Mahmood uses a separate virtual machine to run each application in isolation. This often causes a resource crunch because each virtual machine uses large amounts of system resources, and Mahmood cannot be as productive as he wants to be. What would you advise Mahmood? a. Avoid sandboxing in a testing environment b. Run these web applications in containers c. Increase the scalability of the system d. Use nested virtualization instead

b. Run these web applications in containers

16. Arpita is adding FSMO roles to domain controllers in the domainG.com forest. The forest contains other domains. domainG.com contains two domain controllers, DC1 and DC2. DC1 contains a copy of the global catalog. Which of the following is a best practice that Arpita should follow? a. She should create the Domain Naming Master role on DC2. b. She should create the Infrastructure Master role on DC1. c. She does not need to create the Domain Master role because DC1 contains a copy of the global catalog. d. She does not need to create the Infrastructure Master role because the forest contains multiple domains.

b. She should create the Infrastructure Master role on DC1.

8. Minato has created multiple virtual machines. He is using the Virtual Switch Manager to configure virtual switches. He wants to create an external virtual switch that will allow Hyper-V to manage network requests from these different machines. The purpose of this is to optimize performance across the network. Which of the following options should Minato enable? a. N-tier security b. Single-root I/O virtualization c. Hyper-V Extensible Virtual Switch protocol d. Credential Security Support Provider

b. Single-root I/O virtualization

17. Candace works as a system administrator at Capnia Systems, a product company with over 250 employees. She receives an email from her boss that says that one of the servers is running slow. The server is running the Standard Edition of Windows Server 2019, and the hardware includes HDDs and SSDs. Upon investigation, she finds that some frequently accessed files are being stored on HDDs, while other smaller and infrequently used files are stored on SSDs. Which feature should Candace enable to improve the efficiency of the server? a. Storage pinning b. Storage tiering c. Capacity planning d. Data deduplication

b. Storage tiering

8. Which service is a faster replacement for the Windows Indexing Service that is available on Windows Server 2019? a. Common Internet File System b. The Windows Search Service c. Windows Run d. A discretionary access control list

b. The Windows Search Service

19. What happens when a folder with NTFS permissions is copied to a shared folder on a FAT volume? a. The folder loses all NTFS and share permissions associated with it. b. The folder inherits the share permissions but loses the NTFS permissions. c. The folder is copied along with all NTFS and share permissions. d. The folder is set to read-only until the user performing the move changes the attribute.

b. The folder inherits the share permissions but loses the NTFS permissions.

10. Lehana is creating a new virtual machine using the New Virtual Machine Wizard. After choosing the name WindowsServer2019VM for her virtual machine, she proceeds to the next step. She chooses Generation 1 when prompted to pick the generation for the virtual machine. Which of the following reasons justifies Lehana's choice? a. The generation of the virtual machine can be changed later, so this choice does not matter. b. The guest operating system on the virtual machine is a 32-bit version of Windows 7. c. The virtual machine will need to emulate a UEFI BIOS to provide faster boot time. d. The virtual machine will need to emulate a Serial Attached SCSI disk.

b. The guest operating system on the virtual machine is a 32-bit version of Windows 7.

23. You are attempting to upgrade a server from Windows Server 2008 R2 to Windows Server 2019 Standard Edition. What must be done in order to accomplish the upgrade? a. The Windows Server 2019 disc provides a direct upgrade path for Server 2008 R2, so no additional steps are required to perform the upgrade. b. The server should be updated to the latest service pack for 2008 R2 and then upgraded to Server 2012 R2,after which the server can be upgraded to Server 2019. c. The server must run a special upgrade while Server 2008 R2 is running, requiring the migration of server roles to the new OS and merging of configuration files. d. The server can't be upgraded to Server 2019, as no upgrade path exists. You must perform a clean install.

b. The server should be updated to the latest service pack for 2008 R2 and then upgraded to Server 2012 R2,after which the server can be upgraded to Server 2019.

24. A recently promoted employee at your company has called you because they attempted to log in to their computer several times with a password created after a password expiry notice, but the attempts made were unsuccessful. You have reset the user's account password, but the user is still unable to log in. What is most likely the cause of the failure? a. The user is in a new OU and lacks permission to log into the computer used. b. The user's account has been locked because of frequent failed password attempts. c. The computer is having issues communicating with the domain and is attempting to use cached credentials. d. The global catalog server has not replicated the user's account information to the rest of the domain.

b. The user's account has been locked because of frequent failed password attempts.

6. Dmitry installs the Hyper-V role using the Add Roles and Features Wizard. Upon completion, he is prompted to reboot the computer. However, his computer reboots twice. Why does Dmitry's computer reboot the second time? a. To allow Hyper-V to start the Kerberos protocol b. To allow Hyper-V to start the host operating system c. To add Hyper-V in a Type 2 configuration d. To add Hyper-V in a Type 1 configuration

b. To allow Hyper-V to start the host operating system

8. Chen is a freelance web developer who uses a Windows 10 computer. When she needs to test her web application on a different operating system, she sends it to her friend who has other operating systems installed on multiple devices. This is a time-consuming process. She's looking for a way to test the web application across different operating systems on her own computer. Which of the following features should she use? a. Journaling b. Virtualization c. Sandboxing d. Deduplication

b. Virtualization

14. A system administrator wants to give NTFS folder permission to a project manager so that the manager can add or remove the read-only, hidden, archive, index, compress, and encrypt attributes. Which of the following permissions should the administrator give to the project manager? a. Read attributes b. Write extended attributes c. Write attributes d. Read extended attributes

b. Write extended attributes

24. What is the IP address that is assigned to the network loopback interface? a. 0.0.0.0 b. 255.255.255.255 c. 127.0.0.1 d. 10.0.0.0

c. 127.0.0.1

23. Censu Technologies wants to enforce a strict timings policy such that users are able to log into their systems only during specific time slots on weekdays. The company also wants to restrict access on weekends. Glenna, a system administrator at Censu, is tasked with enforcing this change. What tab under a user object's properties will allow Glenna to make this change? a. Profile b. General c. Account d. Organization

c. Account

24. Iqbal publishes a shared folder named KettleProgram to Active Directory. He wants other users to be able find the folder using the search feature on File Explorer. However, in addition to finding the folder when searching for KettleProgram, he also wants the folder to show up when users search for "KettleApp." What is the most efficient method that Iqbal can use to enable this? a. Rename the shared folder to KettleProgram/KettleApp. b. Create an empty file called KettleApp within the folder. c. Add KettleApp as a keyword in the folder's properties. d. Transfer ownership of the folder to a user called KettleApp.

c. Add KettleApp as a keyword in the folder's properties.

10. Don is the system administrator for an organization that conducts virtual IT training sessions. Each participant, during these training sessions, creates multiple unique applications to address various problems. The applications have different hardware resource requirements. Don needs to set up a virtual lab with twenty Windows operating systems on 1 TB storage space for two different training programs. Help Don choose the right size of the virtual hard disk files. a. Don should use thin provisioning and fix the size of each virtual disk to 60 GB. b. Don should use thick provisioning and fix the size of each virtual disk to 100 GB. c. Don should use thin provisioning. d. Don should use thick provisioning.

c. Don should use thin provisioning.

5. Ananya is installing the Hyper-V role on a server. When prompted for the location of the virtual machine files, she changes the location from the default value to E:\VMs. Where will the virtual machine configuration files be stored? a. C:\VMs b. E:\VMs c. E:\VMs\Virtual Machines d. E:\VMs\Config Files

c. E:\VMs\Virtual Machines

17. Devika copies a file, TFPresentation, from a folder titled "Mach-2" to a folder titled "Mach-3" on the same NTFS disk volume. The Mach-2 folder allows Read access to the Editor group, while explicitly denying Write permission to the same group. The Mach-3 folder allows Full control to the Editor group. TFPresentation, the original file, has Modify permissions for the Editor group. What is the effective access of the Editor group on the copied file? a. Read b. Modify c. Full control d. No access

c. Full control

21. Faustino is the system administrator at an organization that has offices in multiple locations. The domain controllers in each location are within location-specific sites to improve Active Directory replication. Faustino notices performance issues in the Active Directory replication across sites. Which of the following measures can Faustino use to improve the performance? a. He can restrict the number of domain controllers to one per site. b. He can increase the number of domain controllers to spread the replication load. c. He change the bridgehead server to one with a faster network interface. d. He can use SMTP instead of IP to improve performance.

c. He change the bridgehead server to one with a faster network interface.

18. Which of the following is true of Storage Server 2019? a. It can have a maximum memory of 24 TB. b. It can host unlimited virtual machines. c. It cannot be purchased from Microsoft directly. d. It can be download for free and used in any environment.

c. It cannot be purchased from Microsoft directly.

20. A user is attempting to access a shared file. The file has Full control NTFS permissions and Read permissions at the share level. What is the effective permission for the user on the file? a. Full control b. Modify c. Read d. Read/Write

c. Read

21. Satish wants to install Windows Server 2019 Essentials Edition on his computer. The hardware specifications of his system are as follows: 3 GHz 64-bit processor, 16 GB memory, and 50 GB storage. If Satish installed the server using Rufus, which of the following is most likely true? a. Satish's computer does not meet the minimum storage requirements. b. Satish installed Server Core instead of the full version. c. Satish's computer does not have an optical disk drive. d. Satish has installed the server over the Internet from a remote device.

c. Satish's computer does not have an optical disk drive.

15. Devansh creates a checkpoint on his virtual machine before making some Windows Registry changes. After making these changes, he runs a test to verify that the virtual machine is working as intended. He notices some unintended effects of the Registry changes. Devansh applies the checkpoint to revert the virtual machine to its state before the Registry changes were made. Which of the following is true of this scenario? a. The modifications within the checkpoint file will be merged into the virtual hard disk. b. Devansh can choose to reverse the Windows Registry modifications while retaining other modifications. c. The checkpoint file that is used to reverse the changes will be deleted from the system. d. The checkpoint file will replace the current virtual hard disk file.

c. The checkpoint file that is used to reverse the changes will be deleted from the system.

15. Remtax offers tax consulting services over the Internet. It assists people in preparing their income tax returns. In which of the following scenarios should Remtax use Windows Server Core or Nano Server? a. The server will not be dedicated to a specific function but will serve multiple functions. b. The server will be managed by a novice administrator that fulfills other roles in the company. c. The server will be dedicated to web services and accessed via the Internet. d. The server will also function as an Active Directory domain controller.

c. The server will be dedicated to web services and accessed via the Internet.

9. Identify the true statement about Type 2 hypervisors. a. They can run independent of a host operating system. b. They can interact with the hardware directly. c. They can run multiple operating systems on a single host. d. They self-contain a small operating system.

c. They can run multiple operating systems on a single host.

6. Ahmad, a system administrator in an organization, is setting up new Active Directory domains for the Marketing and Sales teams in the organization. Previously, all the marketing and sales employees worked as a single team. Recently, the employees in these teams were reorganized into two separate teams. He is setting up Active Directory domains on Windows 2019 Server to reflect the organizational structure. What is the minimum number of domain controllers that Ahmad should add to the Marketing domain? a. Zero b. One c. Two d. Three

c. Two

9. You are the system administrator at an organization. Most of the servers in your organization, including domain controllers, are running Windows Server 2012 and above. Some servers, excluding domain controllers, are running Windows Server 2008 R2. Most of the clients are running Windows 10, but a few systems are running Windows 7. You have been tasked with improving the security measures of the Active Directory forest by restricting malicious access to Active Directory. You decide to use Privilege Access Management. What should you do next? a. Update the clients that are running Windows 7 to Windows 10 b. Update the servers running Windows Server 2008 R2 to Windows Server 2019 c. Update all the domain controllers running Windows Sever 2012 to Windows Server 2016 d. Revert the domain functional level of each domain in the forest to Windows Server 2016

c. Update all the domain controllers running Windows Sever 2012 to Windows Server 2016

19. Orana works for an organization that sets up several virtual machines on a day-to-day basis to be deployed for various clients. Orana is exploring various Hyper-V options that will simplify this process. Which of the following Hyper-V features should Orana use? a. Replication b. Live migration c. Virtual machine templates d. Production checkpoints

c. Virtual machine templates

14. Raymond is a system administrator at Kelly Consulting. He's trying to automate some security features using Windows Server. One of the tasks he's trying to accomplish is automatically blocking any Outlook rules that are set to forward emails. Particularly, he's attempting to write a script that blocks any rules that automatically forward emails to external parties. Which of the following tools would be most effective in completing this task? a. Microsoft Management Console b. Azure Active Directory c. Windows PowerShell d. Windows Admin Center

c. Windows PowerShell

20. Where can the most up-to-date list of compatible hardware available for Windows Server 2019 be found? a. Windows Admin Center b. Microsoft Management Console c. Windows Server Catalog d. Windows Server Configuration Wizard

c. Windows Server Catalog

14. Huong is the system administrator for a virtual machine that is used by over 500 employees. She wants to install some device drivers to enable support for a few hardware components. Before she installs the drivers, she wants to ensure that she can revert to the current version of the virtual machine if something goes wrong with the installation. Which of the following Hyper-V features should Huong use? a. Replication b. Nested virtualization c. Live migration d. Checkpoints

d. Checkpoints

26. Keplez Informatics is headquartered in Sydney, Australia, and has smaller branch offices spread across the world. The RODC in one of the branch offices gets stolen. Shannon is the system administrator at Keplez Informatics. What is the appropriate security measure that Shannon should take? a. Shut down all RODCs b. Create a new RODC c. Disable user accounts in the branch office d. Delete the RODC computer account

d. Delete the RODC computer account

7. Alfons recently received a promotion to lead a team of 35 software engineers, testers, and business analysts. When he needs to send an email or meeting invite to his team, he realizes that he must type out the email IDs for all his team members. He approaches Priyanka from the IT team to help him make this process easier and more efficient. Which of the following features of Active Directory can Priyanka use to provide a solution? a. Universal Group Membership Caching b. User Principle Name c. Selective authentication d. Distribution groups

d. Distribution groups

16. Hasad is the system administrator for a marketing company. The company stores sensitive data in a folder named Assets on the company's network drive. Hasad is asked to identify the users who access the files within the folder or make changes to them. Which of the following steps should Hasad take to track all the activity within the folder Assets? a. Assign the hidden attribute to the folder b. Use a pair of public and private keys that are uniquely generated for a system c. Modify the folder permissions for each user through Advanced Security Settings d. Edit the Default Domain Policy object to enable auditing functionality

d. Edit the Default Domain Policy object to enable auditing functionality

9. Alaska, a system administrator, copies important and sensitive encrypted files from an NTFS filesystem to various locations on the network. As the files are encrypted, she is not worried about anyone accessing the files. However, the file copy in one of the locations is no longer secure as it has been decrypted and can be read by anyone who has access to the folder. Which of the locations is most vulnerable to theft among the locations where the files have been copied? a. FAT32 on a Windows 10 system b. Windows Server 2019 c. Windows Server 2016 d. FAT32 on a Windows 7 system

d. FAT32 on a Windows 7 system

12. A user, Petra.T, is trying to access their system while the global catalog server for the domain is offline. What is the most likely outcome? a. Petra.T will not be allowed to log in to the system because the global catalog server is not available. b. Petra.T will be allowed to log in and access resources across the domain. c. Petra.T will be locked out of their account until the domain controller can access the global catalog. d. Petra.T will be allowed to log in to the system with cached credentials.

d. Petra.T will be allowed to log in to the system with cached credentials.

16. What is the advantage of using production checkpoints over standard checkpoints? a. Production checkpoints are applied without shutting down the guest operating system. b. Unlike production checkpoints, standard checkpoints use a backup service provided by the guest operating system. c. Unlike standard checkpoints, production checkpoints are created automatically whenever a virtual machine starts. d. Production checkpoints cause fewer problems than standard checkpoints when applied.

d. Production checkpoints cause fewer problems than standard checkpoints when applied.

19. You are the system administrator tasked with raising the domain functional level of domainA.com from Windows Server 2008 to Windows Server 2012 R2. First, you upgrade the domain controllers running Windows Server 2008 to Windows Server 2012 R2. Which of the following commands must you run next in Windows PowerShell to complete your task? a. Set-ADForestMode -Identity domainA.com -ForestMode Windows2012R2Domain b. Get-ADDomain | select PDCEmulator,RIDMaster,InfrastructureMaster c. netdom.exe d. Set-ADDomainMode -Identity domainA.com -DomainMode Windows2012R2Domain

d. Set-ADDomainMode -Identity domainA.com -DomainMode Windows2012R2Domain

18. Gyaltsen is a system administrator who is managing the operation of virtual machines at her company. One of her key responsibilities is to ensure maximum uptime of virtual machines. She uses replication to ensure this. She is configuring replication for a virtual machine called VM1 on SERVERX to be replicated to SERVERY. If the replication is successful, which of the following tasks did Gyaltsen most likely complete? a. She enabled replication on SERVERX. b. She enabled the Credential Security Support Provider protocol for replication on SERVERX. c. She enabled the Kerberos protocol for replication on SERVERY. d. She enabled replication on SERVERY.

d. She enabled replication on SERVERY.

19. Tamara wants to install Server Core on a virtual machine on her Windows Server 2019 computer. She tries installing it but fails. Which of the following is most likely to have caused the installation failure? a. Server Core cannot be installed on personal computers. b. Tamara's computer does not contain an optical drive. c. Server Core requires at least a 1.4 GHz 64-bit processor. d. Tamara's computer has 30 GB free hard disk space.

d. Tamara's computer has 30 GB free hard disk space.

7. Rhonda's company has a rack containing one email server, file server, web server, firewall server, UPS, SAN, and management station. Owing to a thunderstorm, a ten-block radius surrounding the company faces a power outage. Rhonda, who is working from home, tries sending an email to a colleague, but the email does not get sent. Which of the following is the most likely cause for this issue? a. The SAN on the rack malfunctioned. b. The management station on the rack malfunctioned. c. The blackout caused all the servers on the rack to shut down because there is no power supply. d. The blackout took down the Internet, so Rhonda can't reach the email server.

d. The blackout took down the Internet, so Rhonda can't reach the email server.

11. What happens if an encrypted file in an NTFS partition on a Windows 10 system is moved to a FAT32 partition on a Windows 7 system? a. The file transfer does not occur because FAT32 cannot store encrypted files. b. The file encryption is maintained on the new location. c. The file is moved but is only visible to Windows systems that can see EFS files. d. The file is decrypted and placed onto the FAT32 volume.

d. The file is decrypted and placed onto the FAT32 volume.

4. Malaika uses the Edge browser on her computer to access a website. The browser sends a request to another computer over the Internet, which returns web page data that is displayed on the browser. Which of these entities is the server? a. Malaika's computer b. The Edge browser c. The website address d. The responding computer

d. The responding computer

9. Miguel is using the New Virtual Machine Wizard to create a new virtual machine for the first time. Which of the following statements is true if Miguel creates a virtual machine with default settings? a. The virtual machine will be a Generation 1 virtual machine. b. The virtual machine will be named VM1. c. The virtual machine will have 4 GB of memory, which is expandable up to 36 GB. d. The virtual machine will have a 127 GB dynamically expanding hard disk.

d. The virtual machine will have a 127 GB dynamically expanding hard disk.

16. Eileen is a Web app developer. All the apps that Eileen builds run in Linux containers on the cloud. She currently uses a Windows 7 operating system. Why should Eileen consider upgrading to Windows 10? a. Windows 10 automatically encrypts Linux containers. b. Windows 10 provides Server Core and Nano Server options. c. Windows 10 has the Windows Server Azure Network Adapter. d. Windows 10 has Windows Subsystem for Linux.

d. Windows 10 has Windows Subsystem for Linux.

10. Imala, a research scientist, wants to encrypt a document that contains her research data as she does not want the content to be made public before it is published. She is using the Command Prompt window to configure the encrypt attribute. Which of the following commands should Imala use to configure the encrypt attribute? a. fsutil.exe b. dfsutil.exe c. compact.exe d. cipher.exe

d. cipher.exe


Ensembles d'études connexes

WTK Unit 1 Definitions and Parts of Speech

View Set

Chapter 11: The Diversity of Bacteria and Archaea

View Set

Biology 2401 Chapter 6 Bones and Skeletal Tissues

View Set

Chapter 5: Option Pricing Models: The Black-Scholes-Merton Model

View Set

Module 6 - Surpluses, Deficits, Debt, and International Trade Economics

View Set