Client Install & Configuration: Final

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

List the sequence of events that takes place to ensure that data is encrypted during the transfer when someone accesses a website.

-starts as plaintext -key -cyphertext

You are configuring a Windows Server 2016 VPN server using L2TP and NAT. Which of the following is one of the ports that needs to be opened on the firewall for this configuration to work?

1701/TCP

Monitoring is a time-consuming task. Group of answer choices

True

Margret is a support technician working at Mercorp Inc. She tells the interns that the easiest way to stop a rogue process from causing performance issues is to right click the process in Task Manager and click End Task. An intern asks her what he should do if the specific process restarts even after selecting End Task. What can Margret tell the intern if the process issue is caused by a third-party application and it has no solution yet?

Check with the program vendor for an update

Lea's organization develops a cloud-based storage application. While running the application on the local server, she notices that a process run by the application consumes excess amounts of memory, which in turn leads to new performance issues. She gets the process ID from Task Manager to search for possible solutions online. However, she is not successful. What should Lea have done instead?

Create a dump file and share it with the development team so that they can fix the issue

When a CA public/private key pair expires, a system administrator must generate a new CA public/private key pair the same day to ensure a smooth transition.

False

If a newly created firewall allows connection to a program only if the connection is authenticated by IPSec, which of the following options was most likely selected in the Action pane in the New Inbound Rule Wizard at the time of creating the rule?

Allow the connection if it is secure

Kenshin builds a collaboration tool using ASP.NET that allows users to discuss and share files with each other. The files are stored in a Web server on a platform managed by a cloud service provider. Which of the following IIS role services is integral to the file-sharing feature in Kenshin's Web app?

FTP server

If multiple GPOs are linked to the same site, domain, or OU, they will be applied in a random order.

False

Remote users must manually initiate a VPN connection each time they wish to connect to the resources in their organization when using DirectAccess.

False

The IUSRS group in an Active Directory domain or workgroup is used to provide anonymous access to both website and Web app content.

False

The Remote Desktop app uses Secure Socket Tunneling Protocol (SSTP) to transfer desktop graphics, keystrokes, and mouse movements to and from the remote access server.

False

The terms "program" and "process" are one and the same.

False

To run a Windows Web app in a public cloud using SaaS, you will need to create, configure, and maintain the associated Windows Server 2019 virtual machine on the public cloud provider's hypervisor.

False

When configuring the authentication methods for a remote access server, you should select the option Allow remote systems to connect without authentication.

False

Why does IIS contain an FTP server service? What is the alternative option for Web app developers who do not want to use this service?

It is used to transfer files. WebDAV is the alternative.

Aria is setting up a Remote Desktop Services server to allow users remote access to the server. At what point in the installation process should Aria reboot the server?

After selecting the role services that Aria wants to install

Yosef has configured Windows Server 2019 as an enterprise CA and deployed a GPO to enroll all the users for certificates. He chooses the setting that will enroll the users when they boot their computers. When he checks whether all users and computers have been enrolled, he finds that five users were not enrolled for the certificate. Yosef was able to manually enroll those users for certificates. Which of the following permissions to the certificate template is most likely to be missing for the five users who did not get enrolled?

Autoenroll

Britta, a system administrator, is managing a website that is running on an IIS web server. Recently, the website was redesigned, and some portions of the website were deleted. Search engines carry links to these deleted portions for specific searches. Britta wants to ensure that when users click on links to deleted portions of the website, they're redirected to a section of the website. Which of the following IIS configuration features should Britta use?

Error Pages

How will you troubleshoot a performance issue if the information available in Task Manager is not sufficient for you to identify the root cause of the problem?

Event viewer

After configuring the role services on the Remote Desktop server, Jabez creates a collection for the Marketing group in the organization. He specifies multiple remote access servers for the collection. One of the users, Marion, complains to Jabez that whenever she connects to a Remote Desktop session and customizes the settings, these settings are not available to her on her next Remote Desktop session. If Jabez is able to fix this issue while maintaining load balancing, which of the following statements is true?

Jabez created a shared folder that is accessible to remote servers in the collection.

You are attempting to troubleshoot an issue that is preventing you from logging in to your Windows Server 2019 system by using the information in the Windows Registry used the last time the system successfully booted. Which of the following options would you choose from the Advanced Boot Options menu?

Last Known Good Configuration

What is the purpose of adding entries for each RADIUS client on the RADIUS server when configuring remote access servers to use RADIUS?

Authentication and maintenance purposes

WPA3 is immune to wireless cracking tools because it uses a Wi-Fi password in a different way than WPA2 does.

False

Block storage can easily be shared by several different Web apps, virtual machines, or containers

False

What is Group Policy, and why is it used?

Group Policy is a hierarchical infrastructure mainly used for security purposes.

Your organization has a Windows Server 2019 system called SERVERX. It has come to your notice that several computers have tried to access a file in the server and failed in the attempt. You check the Security event log to check how many of such events attempts have been made in the past six months. The log has only stored information pertaining to the past few days. What can you do to ensure that the log stores more information?

Increase the size limit of the event log

Can you distinguish between proactive and reactive maintenance with examples?

Proactive Maintenance: manage and update software to prevent malware Reactive Maintenance: have software fixed after detecting malware

What are the situations in which a GPO does not apply to a user or computer account?

Scope Security settings WMI filters

What makes Nano Server container images great for Web Apps?

They are smaller and more convenient for storing, transferring, and backing up

Isabella installs a Fedora Linux distribution on a Windows Server 2019 server. Next, she installs the Apache Web server on this system. Because the server is also running IIS that uses port 80, Isabella modifies the port number for the Apache Web server. Which of the following commands must Isabella run to ensure that she did not make a syntax error during the recent change?

apachect1 configtest

Stephen sets up manual enrollment for a user certificate from an enterprise CA. However, as he completes the process, he realizes that he has accidently set up the enrollment for a computer certificate rather than a user certificate. Which of the following commands did Stephen most likely type in the Command Prompt window?

certlm.msc

You download multiple container images from Docker Hub and create containers using the docker run command. After a few days, you notice that the list of containers that you have run is quite large. Which of the following commands can you use to shorten this list?

docker container prune

What command can you use to determine if a network service is listening on the correct port number?

netstat -a

When implementing a VPN server on Windows Server 2019, what are the four remote access tunneling protocols available for use, and how do they differ?

PPTP: used in the 90s/old L2TP/IPsec: No built in encryption. Together OpenVPN: supported by large operating systems SSTP: created by Microsoft

After downloading a container image from Docker Hub, you create multiple containers using the docker run command. After a few minutes, you download another container image and create multiple containers. Upon noticing that you are running out of system resources, you decide to stop some containers. Which of the following commands is the best choice to view the containers that are currently running?

PS C:\> docker ps

Mateo uses the following command to search Docker Hub for containers that have IIS installed: PS C:\> docker search iis. The search returns the following options: microsoft/aspnet, microsoft/iis, nanoserver/iis. Mateo wants to download the latest version of the microsoft/iis container from Docker Hub. Which of the following commands can Mateo run to achieve this result?

PS C:\> docker pull microsoft/iis

Skyfelt Graphics is a company that does not own any of the hardware or operating systems on which it creates and runs its Web app containers. These components are owned, maintained, and operated by a cloud provider. Which of the following cloud delivery models is Skyfelt using?

Platform as a Service

XM GraFix, a graphics design company, has bought new design software. Mason, the system administrator, wants to install the software on all the computers in the design department. However, not all the designers need the software. Using the GPO, Mason uses a deployment method that allows the users to install the program from the network when they need it. Which of the following methods of deployment has Mason most likely used in the given scenario?

Published the software under Software Settings in the User Configuration

What logs are created by Windows for reporting general operating system and software application events?

SQL Server IISp

A computer is running multiple applications simultaneously. They all demand large amounts of processor time, which affects the processing speed of the system. Which of the following options will you use to identify and terminate the process that is consuming the highest processor time?

Select the Processes tab of Task Manager and click the CPU column

Maqsud installs IIS on a Windows Server 2019 server. To allows users to connect to Default Web Site using HTTPS, he installs an HTTPS encryption certificate on the Web server. Next, he configures Default Web Site to respond to HTTPS requests. However, when users connect to the website using HTTPS, they receive a security warning. Which of the following is most likely causing this issue?

The FQDN in the HTTPS certificate does not match the Web server FQDN.

You set up a Windows Server 2019 system and install the Docker EE package. The server also has IIS installed. Next, you enable LCOW and run a Linux container. Which of the following is true of this scenario?

The Linux kernel provided by Docker runs on the Hyper-V hypervisor.

Which of the following is a necessary condition if you want to configure a reverse proxy instead of port forwarding on a NAT router to enable access to a remote access server?

The NAT router should be a Next Generation Firewall.

Sasha is configuring Windows Server 2019 as an enterprise CA. She installs the Active Directory Certificate Services server role and is prompted to choose the role services that she wishes to install. Which of the following role services should Sasha select to ensure that routers are allowed to obtain certificates?

The Network Device Enrollment Service role service

The hard disk of a computer running the Windows Server 2019 operating system fails. A colleague tells you that the data on the hard disk can be regenerated as soon as it is replaced with a new one. Can you identify why this solution is feasible?

The Windows system uses a RAID level 5 configuration.

Your organization has installed a new application that fetches project details from a database installed on a Windows Server 2019 system to perform financial computations. A bug in the application causes the program to fetch details of incorrect project IDs. The network administrator tries reinstalling the operating system, but the issue remains to be fixed. Can you identify why reinstalling the operation system did not work?

The issue was with the software and not the operating system.

You enable LCOW on a Windows Server 2019 system that already has IIS installed. The server is also used to run Windows containers. Next, you download and run some Linux containers. You disable LCOW and run the docker images command. What will be the result in this scenario?

The list of Windows container images will be displayed

Which of the following settings in Windows defender should be enabled to prevent malware and network attacks from accessing high-security processes in systems that support core isolation?

The memory integrity settings

You are using the Performance Monitor in Windows Server 2019 to collect information regarding the system's performance. What does the % Idle Time counter indicate?

The percentage of time a storage device was not performing a read or write function

A 257-bit encryption key is twice as difficult to guess compared to a 256-bit encryption key.

True

Container images that are based on Nano Server must be run as Hyper-V containers.

True

LCOW requires that each Linux container run on a separate Linux kernel and achieves this by automatically running each Linux container as a Hyper-V container.

True

The ping utility is used to test the connectivity between two devices on a network.

True

You can obtain a Remote Desktop session by navigating to https:// server/RdWeb in a Web browser, where server is the FQDN of the Remote Desktop Web Access server.

True

Noortje, an employee of Cutleaf Productions, is working from home. She restarts her laptop to install an operating system update. After the restart, the Noortje is able to access the organization's file server without initiating a connection to the VPN. Which of the following is true of this scenario?

The remote access server also contains a network location server.

Giselle, a systems administrator, creates a file redirection GPO, in the User Configuration section that automatically saves files created by her colleagues to a shared network device instead of the local drives in their computers. However, the computers do not receive the configuration specified in the GPO. She runs the gpupdate /force command in the Command Prompt window of one of her colleagues' computer. Despite her effort, the computer does not receive the GPO, and she decides to rectify the issue the next day. To her surprise, she sees that the computer has been configured as per the GPO. What do you see as the issue with the GPO configuration?

The settings can only be applied at the next login

Amina, who works for a pharmaceutical company, configures and issues the Smartcard Logon certificate template with schema version 2. While most of the users get auto-enrolled, some of the users fail to obtain the certificate. Identify the most likely reason auto-enrollment failed for these users.

Their operating system is Windows 2000

Theodore installs a Fedora Linux distribution on a Windows Server 2019 server. He initially uses the sudo command to perform system administration on the Linux system. Later, he opens a new command prompt and runs some more administrative commands. Which of the following must be true if Theodore did not use the sudo command during the second round of administrative changes?

Theodore used the sudo passwd root command.

While configuring Windows Server 2019 as a WSUS server, which of the following role services would you select to store information about updates in the Windows Internal Database?

WID connectivity

Which of the following is true of Group Policy Objects (GPOs)?

They do not apply to Active Directory groups.

How do last mile technologies impact the speed at which an organization can transfer information over the Internet?

They make things faster

Trang, a system administrator, is configuring a DHCP relay on the remote access server. She needs to configure the DHCP relay agent to listen for DHCPDISCOVER packets on a network interface. Which of the following statements is true of this scenario?

Trang should select the network interface that is connected to the DMZ.

What is the level of encryption of the public/private key pair that is contained in the domain-server-CA in Microsoft Server 2019?\

2048-bit encryption

Amber is a hacker who steals information when people enter their personal details on specific websites. She intercepts the public key as it is sent from the Web server to the Web browser and substitutes her own public key in its place. This enables her to intercept the communication and decrypt the symmetric encryption key using her private key. Which type of hacking attack is Amber perpetrating?

A man-in-the-middle attack

Fatima is configuring a Windows Server 2019 system as a RADIUS server for use with 802.1X Wireless. She has configured the Network Policy and Access Services server role. What is the next step Fatima should take once the server role has been configured?

Activate the server in Active Directory

David, a system administrator, has created specific GPOs for every department in his organization based on the permissions required by the various departments. However, he needs to apply the Default Domain Policy for some managers but not for the rest of the users. How can David ensure that the Default Domain Policy is applied only to specific managers' accounts?

By removing the Authenticated Users group from the Security Filtering section and adding the managers' accounts

Ramona, the chief technical officer of an engineering company, needs to install software on 32-bit computers using GPO. The system network consists of over 500 computers and has a mix of 32-bit and 64-bit computers. How can Ramona ensure that the software is installed only on the 32-bit computers?

By using a WMI filter

Damien is configuring DirectAccess for a group of users in his organization. One of the requirements is that the users should be able to access the resources in their organization's network through VPN, but they should use the default gateway on their physical network interface to access websites that are not on the organization's network. Which of the following options should Damien configure on the Enable DirectAccess Wizard?

Damien should not select the Use force tunneling option.

An organization separates its client computers from its servers in a DMZ. The client computers are allowed access to the Internet by connecting to the DMZ. The DMZ is connected to a NAT router. In this scenario, what is the device that will allow the NAT router to connect to the ISP using a last mile technology?

Demarcation point

The users at Trembot Information Systems currently need to manually initiate a VPN connection when remotely accessing the organization's servers. Samir, a system administrator at Trembot, receives a request from multiple remote users to simplify the process of accessing the organization's servers. Which of the following options should Samir use?

DirectAccess

After experiencing several issues with an Active Directory domain controller, you have decided to perform a restore operation on the Active Directory. Which of the following options on the Advanced Boot Options menu should be used to perform the restoration?

Directory Services Repair Mode

Asher, a system administrator, wants to run containers on Windows Server 2019. He chooses to install Docker using the Windows containers component. Which of the following is a service that will help Asher manage and run Docker containers on the server?

Docker daemon

Emory install the WSL feature on a Web server. Next, she installs an Ubuntu Linux distribution and creates a new Linux user account, EmoryJ. She logs into the Ubuntu system using this user account. Which of the following is true of this scenario?

Emory can use the EmoryJ user account to run administrative commands as the root user.

What key should be pressed as soon as the computer boots to enter Safe Mode?

F8

Kyra has set up a remote access server (RAS) in her organization. She has also configured VPN access on the NAT router. Next, she needs to set up the client systems that will be allowed to access the RAS. Kyra wants to ensure that the client and server communicate using the most secure authentication method. Which of the following methods should Kyra ensure is supported on both the client and the server?

Extensible Authentication Protocol (EAP)

Ezra wants to install Docker on a Windows Server 2019 server. He has two options to download and install the Docker Enterprise Edition—either Microsoft or Docker. He chooses to download the package using the DockerProvider Windows PowerShell module. Which of the following justifies Ezra's choice?

Ezra intends to run Linux containers on the server.

Andrade is a systems administrator. He goes through several event logs with thousands of events on a regular basis to troubleshoot system issues. What is the easiest way to limit the events to only those that are relevant to a specific problem?

He can use the Filter Current Log option in the Actions pane in Event Viewer.

Having heard the data theft suffered by a competing company by a man-in-the-middle attack, Finn asks Talia, his server administrator, to implement measures to prevent such attacks in his company. Which of the following should Talia do to ensure that Finn's company is protected from such attacks?

Hire the services of a third-party Certification Authority

VLX Learning Media provides IT training solutions to corporates. For the lab activities in these training sessions, the company runs the lab setup on virtual machines. These virtual machines are hosted by another company, VirtualFMZ, on its servers, but VLX installs and manages the virtual machines, including the different software applications that are required for various training offerings. Which of the following cloud delivery models is exemplified in this scenario?

Infrastructure as a Service

Describe Windows Subsystem for Linux (WSL).

It is a tool used to run Linux

You are configuring a remote access server in your organization. You install the Direct Access and VPN (RAS) role service along with the Routing role service. On the next configuration screen, which of the following services should you select?

LAN routing

Michaela is configuring Remote Desktop Services in her organization. She specifies the Remote Desktop Licensing server and proceeds to select the licensing mode. If Michaela selects the Per User licensing mode, which of the following statements is true?

Michaela's organization allows users to connect remotely using their personal computers.

By default, where are updates synchronized from in WSUS?

Microsoft Update servers on the Internet

Kelsan Informatics has its client computers connected to a router through which the clients can access the organization's servers in the DMZ. The DMZ is connected to a NAT router that is connected to the Internet. In addition to providing access to the Internet, the NAT router also offers additional capabilities, such as traffic throttling, intrusion prevention, and malware filtering. What is the term for this type of NAT router?

Next Generation Firewall

Runako wants to build a social networking website and host it using a PaaS provider. The social networking website will have users posting and sharing large quantities of media such as videos and images. He is currently evaluating the storage options that the app will need. Which of the following storage options should Runako use and why?

Object storage, because it allows a Web app to directly store objects

You are troubleshooting a network latency issue in your organization. You identify a router as the root cause of the problem. The router was rejecting IP packets sent from computers requesting a service from a Windows Server 2019 system. What will you do to solve this issue?

Reboot the router

Kim has completed configuring DirectAccess on a remote access server in his organization. He also configures the users' computers and enables DirectAccess. While the laptop users are able to use DirectAccess, desktop users email Kim to let him know that they're unable to use DirectAccess. If Kim is able to resolve this issue successfully, which of the following options on the Remote Access Setup pane did Kim use?

Remote Clients

What role service available through Remote Desktop Services enables clients to establish an encrypted connection to virtual desktops and RemoteApp programs to an RDS server through the Internet using HTTPS?

Remote Desktop Gateway

Zahara is accessing an application installed on her organization's remote access server from her laptop. She saves output from the application into a file on the server. She opens the saved file on the server and prints it using her local printer. Which of the following protocols is employed in this scenario?

Remote Desktop Protocol

Asa is working from home. She launches an application from the Start menu on her computer. The application is running on the remote access server in her organization. She is able to see and manipulate the application's graphical interface on her computer without running a full graphical desktop of the remote server. Which of the following Remote Desktop services server role allows this behavior of the application?

Remote Desktop Web Access

How does Remote Desktop differ from VPNs and DirectAccess?

Remote Desktop is less complex then VPNs and DirectAccess.

Hiro is working remotely. His current role requires him to access his organization's resources that are running on the remote access server. He opens the Microsoft Outlook application that is running on the remote access server on his system. He is able to manipulate actions within the application on his system. If Hiro was able to launch Microsoft Outlook directly from his computer, without accessing the desktop of the remote server, which of the following options is he using?

RemoteApp

Valentina decides to install the Docker EE package on a Windows server. She wants to download the latest stable version of the package, so she chooses to install Docker using the DockerMsftProvider module. She enters the following commands in the Windows PowerShell window: PS C:\> Install-Module -Name DockerMsftProvider -XXXX psgallery -Force PS C:\> Install-Package -Name docker -ProviderName DockerMsftProvider Identify the correct code that should replace XXXX.

Repository

Rory is managing the Remote Desktop connections to a collection, CollectionX. Two users, Aaron_T and Kwan_J have active connections. If Rory is able to view and interact with Kwan-J's desktop, which of the following statements is true?

Rory used the Shadow option

Merlyn, a developer at Enigma Designs, wants to host a Windows Web app in a public cloud. She prefers to build the app and host it with a public cloud provider. She does not want to deal with the back-end configuration such as setting up the Windows Server 2019, IIS, and Web app frameworks. Which of the following options should Merlyn choose?

SaaS

You have created a data collector set called SERVERX Data Collector set. As a system administrator, you want to restrict other users from accessing the results of the data set. Which of the following options under the properties dialog box will you use?

Security

Martha is configuring the Network Policy and Access Services server role to configure a Windows Server 2019 system as a RADIUS server so that it can be used with the 802.1X Wireless. After this, she is facing some issues activating the server in Active Directory. She thinks that there were issues with the installation. Which of the following event logs should Martha check to examine events specific to the installation?

Setup

Soha wants to build a Web app that analyzes financial details of users and provides them with investment advice. She will be running this app on a public cloud using IIS. If Soha wants to take advantage of applications pools to improve security of her Web app, which of the following should she do?

She should create the Web app using ASP.NET.

Lin chooses to run a Windows Web app in a public cloud environment using IaaS. She wants to optimize the cost of running the application on the cloud. Which of the following options should Lin choose?

She should install a small footprint virtual machine.

Lashonda, a system administrator, installs a remote access server in her organization. The remote access server is connected directly to the demarc. Additionally, the remote access server is configured as a NAT router. When configuring the remote access server, which of the following is Lashonda most likely to do?

She will select the Demand-dial connections service.

Denali wants to store information about all Windows updates on a specific Microsoft SQL Server for security reasons. Which of the following wizards can Denali use to set up SQL Server Connectivity to store update information?

The Add Role and Features Wizard

Alonso, a system administrator, has configured and deployed a new GPO at the domain level in his organization. However, when he checks after a few hours, two of the OUs in the Active Directory do not reflect the change. What is the most likely reason the new GPO configuration did not apply to the two OUs?

The Block Inheritance setting prevented the OUs from applying the GPOs.

Joshua works as a systems administrator. A computer running Windows 2019 Server crashes. However, he is not able to find the root cause of the problem. If the root cause of the problem is processor overload, which of the following should Joshua investigate to troubleshoot the issue?

The Hardware Events event log

Your organization launches a new web application for video editing. Multiple users can access the application at the same time and edit their videos online. What will you use to monitor the amount of memory being used by the application in real time?

The Performance Monitor

Chynna wants to create two different firewall rules that are applicable depending on whether a computer is connected to a corporate domain or a home network. Which of the following panes in the New Inbound Rule Wizard should Chynna select to specify the conditions that should be met before the rules can be applied?

The Profile pane

TravelBugz is a website that reviews accommodations and holiday destinations. Users of the website can post their own reviews. Users can use the TravelBugz app too instead of the website if they want to. The app and website both directly access the Web app running on the cloud to store and retrieve data. Which of the following is true of this scenario?

The TravelBugz app communicates with the Web app using the TCP/IP protocol.

The programs running on the client systems in your organization are not able to access a service on the server. The problem is not with the server because the network services are running and you are able interact with the network service on your local machine. What do you see as other possible issues with the server access?

The client programs are not using the non-standard port number used by the network service.

How does the cloud differ from the World Wide Web of the 1990s?

The cloud is more advanced, robust, flexible, scalable than the World, Wide, Web of the 1990s.

Viola, a system administrator, installs IIS on a Web server and creates two websites. She installs the necessary HTTPS encryption certificate on the server and proceeds to bind the HTTPS protocol to the first website using default settings. This binding is successful. Next, she proceeds to bind the HTTPS protocol to the second website. Which of the following is most likely to cause an issue when binding the HTTPS protocol to the second website?

The first website is using port 443, so the second website cannot use the same port.

Ahmed, a network administrator, is looking at the events added to a Windows Server 2019 system log in the Event Viewer. He notices three events being highlighted with a yellow exclamation mark. The events were related to a remote access attempt. If Ahmed were to treat this as a warning sign, what kind of issues should he anticipate?

The functionality of the system can be affected.

Ava, a system administrator, configures 45 remote access clients to use the VPN server in the organization using the SSTP protocol. On any day, the number of users that work remotely does not exceed 15, so AVA configures the SSTP VPN protocol for 25 connections on the server. One day, owing to extreme weather, many employees are asked to work from home. When more than 25 users try to connect to the organization's servers, they are not allowed access. Ava uses the Routing and Remote Access tool to increase the number of connections for the SSTP protocol to 45. When she asks these additional users to confirm if they have received access, the users tell her that they are unable to connect to the organization's servers. If some or all of these users were able to remotely connect on a previous occasion, what is the most likely issue in this scenario?

The remote access server was not rebooted after the recent changes.

Your organization runs several applications that store information on a specific volume on a Windows 2019 Server system. Of late, the applications have become slow and fail to perform as they did earlier. The performance improves after the server administrator defragments the volume. Can you identify what the problem must have been?

The space for file cache was not sufficient

What are the advantages of implementing a Windows Server Update Services (WSUS) server in an organization?

Update Microsoft products Manages several computers simultaneously

Navin wants to reduce the chances of a data breach and monitor and control the traffic on his company's website. Instead of using a NAT router, he sets up an external server that acts as a filter between the organization's website and end users. Which of the following options must Navin select and configure when configuring WSUS?

Use a proxy server when synchronizin

An organization has published applications on its web servers. The applications are accessible to users in the organization when they are authenticated via Active Directory. What RAS capability will allow the organization's applications to be accessible to users outside of the organization?

Web Application Proxy

Wilmer is creating a new remote access policy for the sales department in the organization. On the Specify Conditions screen of the wizard to create new policies, Wilmer selects the option to grant or deny access according to user dial-in properties. In which of the following circumstances will this permission be used?

When a user account has the Control access through NPS Network Policy option set

The new system administrator of XYZ company realizes that whenever updates are available for Windows, WSUS redirects computers to the Microsoft Update servers on the Internet to obtain updates instead of storing the update information on the WID. Which of the following is a likely reason for this issue?

While installing WSUS, the option Store updates in the following location was deselected.

The workstations in your organization have been upgraded with the latest GPUs. To save costs, the company has procured a brand that is not widely known in the market. To install the drivers, the system administrator reboots the system using the Disable Early Launch Anti-Malware Driver option in the Advanced Boot Options menu. Why do you think this step was required to install the driver?

Windows Defender may have considered the driver to be suspicious.

You are troubleshooting a hard disk error in a Windows Server 2019 system. You are not able to identify the root cause of the problem. A colleague suggests that you look at the system event log for more information. Is your colleague right about the system log? Why?

Yes. Events related to hardware issues are usually recorded in the system event log.


Ensembles d'études connexes

Chapter 5 Sensation and Perception Review

View Set

Domain 5 (CISA Review Questions, Answers & Explanations Manual, 12th Edition | Print | English)

View Set

ch 24 nutritional care and support

View Set