CPT 176 Final

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Type of IPv6 address used for communication between neighboring nodes on the same link, and equivalent to IPv4 addresses configured using APIPA

Link local IPv6 address

A printer that is connected directly to a computer

Local Printer

A printer setting that enables a user with a portable computer to print to a printer physically located close to her computer

Location-aware Printing

The Layer 2 address assigned to a network adapter

MAC address

A collection of management tools known as snap-ins that are organized under a single management tool. The tool is used for both local and remote administration

MMC

The partition style that uses a partition table that describes the location of the partitions on the disk, and on which the first sector contains a hidden binary code file that is used for booting the system is called _________.

Master boot record(MBR)

By doing some planning, an administrator can ________roles, features, operating system settings, user data, and shares from a previous installation to Windows Server 2012 R2.

Migrate

Address that enables the delivery of packets to each of multiple interfaces

Multicast IPv6 address

An advanced feature that enables guests to take advantage of redundant links to access storage area networks

Multipath I/O (MPIO)

Uses up to two virtual network adapters up to two virtual network switches

NIC team(virtual)

Technology that enables UNIX to share files and applications across the network

Network File System(NFS)

The file system originally provided with Windows NT and present in modern server versions that supports volume mounting, compression, encryption, and security

New Technology File System(NTFS)

Enables you to cache locally stored copies of shared files and folders, so that you can work with them while offline and resynchronize your changes when you go back online

Offline Files

At startup, Windows Server 2012 Core presents _______.

Only a command window

By default, which GPO is applied first

Organizational Unit

Similar to a Telnet session, the PowerShell cmdlet ________creates a persistent connection to a remote computer.

PSSession

Allows you to isolate specific virtual machines on a port based on the virtual switch

PVLAN

A virtual disk method used to enable the virtual operating system to access a physical disk on the host directly

Pass-through disk

A set of APIs that enable software vendors to create applications to filter and modify TCP/IP packets, monitor, or even authorize connections

Port Mirroring

The program that converts graphics commands into instructions that a type of print device can understand

Print Driver

The act of setting up two or more physical printers (print devices), each associated with a single printer

Print Pooling

The hardware device that produces the printed output

Print device

The software interface between the operating system and the print device that determines various aspects of the printing process

Printer

A number from 1 to 99 that determines which document is printed first

Printer Priority

An area on a computer's hard drive where documents to be printed are stored while awaiting printing

Printer Spooler

The three virtual switch types to select from are External, Internal, and ________.

Private

Virtual Machine connection setting where your network adapter is connected to a virtual switch that is accessible only by the VMs and is helpful in lab/testing environments

Private Network

The hardware and shared computing environment that the hosting company or IT department within a company owns

Provider address space

Using AppLocker, You can restrict applications according to ________ rules, which limit application execution according to the application's digital signature.

Publisher

Default mode of remote management using Server Manager

RSAT

When you create a new GPO or edit an existing one, and if you have configured new settings in the Computer Configuration node, users affected by the GPO must _______.

Reboot their computers

Name-resolution technique wherein a DNS server queries other DNS servers on behalf of the requesting client to obtain the required FQDN, which it returns to the client

Recursion queries

A series of Windows Server 2012 R2 administrative utilities that you can download from Microsoft and install on a Windows 8.1 computer

Remote Server Administration Tool (RSAT)

Process that tracks virtual machine resource usage for reporting purposes

Resource Metering

DNS name-resolution process by which an IP address is resolved to a hostname

Reverse Lookup Query

List of the names and IP addresses of DNS servers that are authoritative for the Internet root domains

Root hints

When configuring Windows firewall with advanced security, the monitoring property contains a link called ________displays IPsec main mode and quick mode associations.

Security Associations

A network file sharing protocol that enables applications to read and write data and request information from programs on network servers

Server Message Block(SMB)

The section of Group Policy from which administrators can configure settings that are applied to users' desktops, specify programs that users can run, and so on is called ________.

Server Policies

Folders that are made available for access by users who are working at another computer on the network

Shared folders

Hyper-V function that allows for temporary paging of virtual machine memory to a disk

Smart Paging

The concept of creating a point-in-time copy of a file or virtual machine

Snapshot

A new feature for Server 2012 R2 that enables administrators to monitor and control virtual disk performance

Storage Quality of Service (QoS)

A tool used to schedule and automate tasks to perform a specific function at a specific time

Task Scheduler

A specific customer that owns or rents resources from the shared computing environment

Tenant

Tunneling communication protocol that enables IPv6 connectivity between IPv6/IPv4 nodes across network address translation (NAT) interfaces

Teredo

The folder hierarchy composed of the Group Policy Containers folder at the top and subfolders under it holds all the information for a given GPO.

False

When you configure software restriction policies in Group policy, you can control executables, DLL files, scripts, and Windows Installer files, and you can control each file type separately.

False

With the Default AppLocker Rules, for the Everyone group, the Executable Rule is that all files are located on the C:\ drive.

False

You can assign permissions to printers, but not audit their usage

False

___ is a set of tools that enable you to manage resources used by files and folders on your server by performing such tasks as limiting the amount of space used by users, restriciting the types of files being saved, and monitoring the amount of storage used.

File Server Resource Manager (FSRM)

__________ is a set of tools that enable you to manage resources used by files and folders on your server by performing such tasks as limiting the amount of space used by users, restricting the types of files being saved, and monitoring the amount of storage used.

File Server Resource Manager (FSRM)

A server role that provides utilities that enable you to manage files, folders, and other shared resources. It's installed by default when you install Windows Server 2012 R2.

File and Storage Services role

A VHD type that uses a preconfigured disk size that allocates physical storage matching the size of the configured virtual disk from the point at which the disk is created

Fixed-size disks

The first domain installed is the root domain in its ____________.

Forest

DNS name-resolution process by which a hostname is resolved to an IP address

Forward lookup query

Relaying of a DNS request from one server to another one when the first server cannot process the request

Forwarding

The combination of a hostname, an organization's domain name, and the Internet top-level domain name creates a ________ that is unique across the Internet.

Fully Qualified Domain Name(FQDN)

DNS domain name that unambiguously describes the location of the host within a domain tree

Fully qualified domain name (FQDN)

Virtual machine that runs on a specific physical host

Guest

Suite of services available for installation after a virtual machine has been created

Guest Integration Services

The interface card that enables Hyper-V hosts to connect to and communicate with storage area networks

Host Bus Adapter (HBA)

Physical server that provides physical resources such as CPU and memory to a virtual machine

Host(Hyper-V)

In DNS, the first or most-specific name assigned to an individual computer

Hostname

Microsoft's version of a Virtual Machine Manager

Hyper-V

The infrastructure responsible for creating shared computing environments using Hyper-V

Hyper-V Network Virtualization

Mechanism that is responsible for managing virtual machines

Hypervisor

An IPv6 address represented in the form 0:0:0:0:0:0:w.x.y.z, where w.x.y.z is the IPv4 address in dotted-decimal

IPv4-compatible address

An IPv4-only node is represented as :ffff:.w.x.y.z to an IPv6 node and used only for internal representation

IPv4-mapped address

A tunneling technology that enables unicast IPv6 connectivity between IPv6/IPv4 hosts over an IPv4 intranet

Intra-Site Automatic Tunnel Addressing Protocol(ISATAP)

Provides connection-oriented, reliable communication between two hosts, typically involving large amounts of data

Transmission Control Protocol(TCP)

.Using the dcpromo tool, you can redirect the default container for newly created computers to a specific OU. Computers joined will be created in the target OU instead of the default Computers container

True

A hash is a fixed-length series of bytes that uniquely identifies an application or file.

True

A printer is the physical (hardware) device that produces the printed output.

True

A profile is a means of grouping firewall rules so that they apply to the affected computers dependent on where the computer is connected.

True

A user principal name (UPN) is a logon name formatted in a manner similar to that of an email address, such as [email protected].

True

Account operators, server operators, print operators, and backup operators are built-in security groups that enable members to perform limited administrative capabilities within the domain in which they are located.

True

Active Directory Certificate Services is the Server role responsible for public key infrastructure (PKI).

True

After a VM is created, you cannot change its generation

True

All NTFS permissions are inherited, that is, they pass down through the folder hierarchy from parent to child.

True

Branch Office Direct Printing is a new technology included in Windows Server 2012 and updated in Windows Server 2012 R2.

True

DISM enables an administrator to mount an image file, similar to mounting a hard disk, and issue commands to update the image.

True

DNS server software cannot refer queries to other DNS servers as required.

True

Disabling or deleting an account is referred to as deprovisioning the account

True

Dynamic Host Configuration Protocol is a service that enables an administrator to specify a range of valid IP addresses to be used on a network, as well as exclusion IP addresses that should not be assigned (for example, if they were already statically assigned elsewhere).

True

If you use differencing disks for testing, you have the ability to commit the changes back to the parent disk.

True

In Active Directory Administrative Center, a resource property describes or classifies a specific characteristic of a resource such as a file or folder.

True

In Active Directory Users and Computers to view the effective OU permissions granted to a user or group, the Effective Permissions tab shows all granted permissions, including inherited permissions.

True

In Windows Server 2012 R2, Hyper-V does not enable you to share a VHD between multiple VMs.

True

MMC configuration that prevents users from accessing areas of the tree that are not visible in the snap-in console windows

True

MMC is designed to be used in a domain environment; however, in a workgroup environment with different security boundaries, you might be required to use the Run As function for a custom MMC console.

True

Pointer records are created automatically if you have specified this option in the New Host dialog box or if the appropriate option has been configured at the DHCP server for dynamic DNS

True

Server Core is the default install option and is recommended by Microsoft.

True

Share permissions are more granular than Security permissions.

True

TCP/IP is not a single networking protocol but a suite of protocols.

True

The DHCP option 003 Router specifies the IP address of the default gateway.

True

The Isolation connection security rule enables you to limit connections according to authentication criteria that you define.

True

The VHDX format can support up to 64-TB disks

True

The Windows Server 2012 R2 Standard Edition is a robust, ideal platform for medium-sized offices that are designed upon a physical or minimally virtualized environment.

True

The command-line tool dsget provides information about objects in Active Directory.

True

The default gateway is the location on the local subnet to which the local computer sends all data meant for other subnets.

True

The forest administrators, who are members of the Enterprise Admins group, are automatically granted the ability to create an OU hierarchy in any domain within the entire forest.

True

The only tool you can use to configure audit policy on a Server Core computer is Auditpol.exe.

True

There is a GUI version of the Active Directory Recycle Bin feature. By default, the Recycle Bin is disabled, but you can enable it from within AD Administrative Center. After the recycle bin is enabled, you cannot disable it.

True

To make use of the functionality provided by Windows Server 2012 Active Directory, you must upgrade all domain controllers to Windows Server 2012 and upgrade the functional levels accordingly.

True

To use MMC to manage Server Core, you must first create Advanced Firewall rules to permit access.

True

Virtual Hard Disks (VHDs) are stored on local physical drives. You can create as many VHDs as your physical storage allows, or until you run out of drive letters.

True

When installing Windows Server 2012 R2 you can choose between Server Core Installation and Server with a GUI.

True

When pooled, storage can be allocated as one large volume, or it can be carved up into smaller sgments known as storage spaces. Storage spaces enable you to configure smaller virtual hard disks(VHDs) and allocate virtual disks to different servers or as separate volumes within the same server

True

You can have only one double-colon notation within any IPv6 address.

True

You cannot upgrade a Window Server 2003 or older computer or a computer running any client version of Windows to Windows Server 2012 R2.

True

What is the main reason not to employ a single tree in all multiple domain enterprises?

Two companies merge and want to maintain their separate identities

A(n) _______ is a convenient means of logging on to a domain from a computer located in another domain in the forest or a trusted forest.

UPN

Provides fast, nonconnection-oriented communications with no guarantee of delivery and no error checking

User Datagram Protocol(UDP)

You might need to convert a VHD to a VHDX format so that it can be supported under an older operating system.

VHDX OR VDIR OR VIR

The mechanism used to identify a specific physical SAN by name and associate the connection to it with one or more Host Bus Adapters installed on the Hyper-V host

Vitrual SAN

The virtual interface that enables communication between the guest, Hyper-V host, and storage area networks

Vitual Fribre Channel Adapter

The infrastructure required to create copies of files on your server for the purpose of quick restores of previous versions

Volume Shadow Services(VSS)

Microsoft's version of the WS- Management protocol

WinRM

The client component used to executed commands against a server running the Windows Remote Management service

WinRS

Uses a legacy driver to support legacy operating systems also used to perform network-based installations of the guest operating system or when integration services are not installed on the operating system

Windows Filtering Platform(WFP)

Role service in the Windows Server 2012 R2 File and Storage Services server role that enables users to access data on a file server from any remote location without the need for a VPN connection

Work folders

Which Windows firewall configurable exception allows computers to connect to other computers or the Internet?

core networking

The Print Server role service that enables the server to receive and manage documents that users have scanned from network-based scanners is ________.

distributed scan server

Using the dcpromo tool, you can redirect the default container for newly created computers to a specific OU. Computers joined will be created in the target OU instead of the default Computers container

false

________ action refers to a configured set of actions within a firewall rule that determines whether the firewall will permit or block traffic attempting to cross it.

filter

The _________profile setting specifies the most restrictive default firewall settings

guest or public

The Hyper-V connection setting that is like having your network cable unplugged is __

not connected

In an Active Directory Domain Services (AD DS) domain, you must authorize the DHCP server in Active Directory before it can lease IP addresses. This is to prevent rogue DHCP servers from leasing improper IP addresses that would result in communication problems.

rogue

By default, which GPO is applied first?

site or local?

A(n) _______ is used to collect a set of users who need to share a particular set of permissions to a resource, such as a file, folder, or printer.

subdomains

A storage pool is a group of physical disks combined to create a shared pool of storage.

true

In Password policy settings, if the password must meet complexity requirements, it must contain three of these four criteria: English lowercase letters, English uppercase letters, numerals, and nonalphanumeric characters such as $ ; [ ] { } !

true

The first domain installed is the root domain in its forest

true

Using the dcpromo tool, you can redirect the default container for newly created computers to a specific OU. Computers joined will be created in the target OU instead of the default Computers container.

true

Windows Firewall with Advanced Security settings is included in a file with the .wfw extension.

true

Event that occurs in Task Scheduler after a trigger is set

An action

Address that is utilized only for a destination address assigned to a router

Anycast IPv6 address

The dynamic IPv4 addressing system used when DHCP is unavailable

Automatic Private IP Addressing(APIPA)

An Active Directory snap-in in Windows Server 2012 R2 that enables the administration of most Active Directory functions from a single console

Active Directory Administrative Center

Enabling applications to receive unsolicited Internet traffic through a Network Address Translation (NAT) device is an option called __________.

Allow edge traversal

A new Offline Files mode in Windows Server 2012 R2 that enables faster access to cached files and redirected folders in an AD DS environment

Always offline mode

The folder hierarchy is composed of the Group Policy __________ folder at the top and subfolders under it. This structure holds all the information for a given GPO.

Containers

Which tool enables you to automate the creation of new accounts by importing data to AD DS from files containing information in the comma-separated (CSV) format?

Csvde

The dedicated servers and network assigned to a specific customer in a cloud computing environment

Customer Address Space

A technology used to create a point-in-time backup of the virtual machine configuration and data

Checkpoint

IPv6 uses a ________-bit addressing scheme.

128

The virtual switch is a software function of Hyper-V that is responsible for layer __ switching

2

A DHCP server and a DHCP client both need to go through a ____-phase process before DHCP configures the client with a working set of TCP/IP parameters.

4

MMC configuration that prevents users from adding or removing snap-ins or changing snap-in properties.

? User mode - full access

The Winrm quickconfig command-line tool determines whether a WS-Management implementation is running on a remote machine.

False

Which of these is a built-in security group designed to enable members to perform limited administrative tasks within the domain in which they are located?

Backup Operators

A printer setting that is designed to conserve bandwidth and allow client printing if a print server failure occurs

Branch Office Direct Printing

Group policy is a group of policies that are applied together. It is a set of configuration settings that can be applied to one or more Active Directory Domain Services (AD DS) objects to define the behavior of the object and its ______________.

Child Objects

The Microsoft Management Console (MMC) snap-in from which you can manage most of the activities associated with operating a DNS server

DNS Manager

The child disk in a parent/child relationship

Differencing disk

Hierarchical name-resolution system that resolves hostnames into IP addresses, and vice versa

Domain Name System (DNS)

Adds security to the DNS protocol by providing origin authority, data integrity, and authenticated denial of existence

Domain Name System Security Extensions (DNSSEC)

The __ Protocol resolves hostnames on the internet and local networks to IP addresses

Domain name system

The ________ Protocol resolves hostnames on the Internet and local networks to IP addresses.

Domain name system

Using the ________ update method, as a DHCP server hands out IP addresses, it registers the client hostname or FQDN and IP address with the DNS server. If the hostname or IP address changes, the DNS record is updated accordingly

Dynamic

Using the ________ update method, as a DHCP server hands out IP addresses, it registers the client hostname or FQDN and IP address with the DNS server. If the hostname or IP address changes, the DNS record is updated accordingly.

Dynamic

Hyper-V function that allows for memory to be pooled within a host

Dynamic Memory

A VHD type that starts small and expands automatically to accommodate data growth

Dynamic expanding disk

A universal cross-platform-compatible used to simplify driver management when using Remote Desktop Services

Easy Printer Driver

Advanced Adapter feature of Hyper-V that allows network traffic from VMs to be monitored by copying incoming and outgoing packets

Emulated network adapter

Hyper-V feature that supports redirecting of local resources such as keyboard, video, mouse, audio, printers, clipboard, USB devices, drives, and plug-and-play devices

Enhanced Session Mode

Which of the following is not one of the three types of user accounts present in an AD DS network?

Enterprise user accounts

A DHCP server leases an IP address to the DHCP client for only a specified term. The default term is 4 days.

False

A Windows Server 2012 R2 Datacenter cannot act as a domain controller.

False

A dynamic disk may contain as many as four partitions or logical drives.

False

A mirrored volume cannot provide fault tolerance for the system and boot volumes.

False

A printer is the physical(hardware) device that produces the printed output.

False

The Hyper-V connection setting that is helpful for lab/testing environments is called Specific Network Interface Card.

False

After a differencing disk has been established, the parent disk will still accept write events.

False

All Group Policy Objects are identified by their PolicyIDs.

False

Dynamic Hyper Configuration Protocol is a service that allows a server to assign IP addresses to host computers on a subnet.

False

Even though the FQDN contains both the hostname and domain name, two hosts from different domains cannot share the same hostname.

False

Generation 2 virtual machines support Legacy Network Adapters.

False

Group Policy Templates are objects that are defined within AD DS and are used to store the properties of GPOs, including attributes and version information.

False

In the application layer of the four-layer TCP/IP model, the protocol that gathers network management information from network devices, such as routers, bridges, and servers that provides this information to network management consoles is Simple Mail Transfer Protocol (SMTP).

False

Installing Active Directory requires additional storage of 1000 MB for the Active Directory database and SYSVOL folder, plus at least 100 MB for the transaction log files

False

Password settings are stored in a Password Settings Container (PSC) in the domain.

False

The Distributed File System (DFS) feature enables file sharing among servers running Windows and UNIX. Added in Windows Server 2012 R2 is an NFS module for Windows PowerShell with several new cmdlets specific to NFS.

False

The NIC teaming property that refers to the ability of the NIC Team to manage the connections to the switches and keeps track of the teams' connection state is static teaming.

False

The Windows Remote Shell (WinRS) is the server component used with WinRM.

False


Ensembles d'études connexes

Chapter 6: Body Composition & Chapter 7: Putting Together a Complete Fitness Program

View Set

PrepU Chapter 68: Neurologic Trauma

View Set

AP Psychology: Unit 9 --- Clinical Psychology

View Set

ATI Practice Assessment Questions b

View Set

AP English Literature & Composition Grade Improvement Flash Cards

View Set