CPT 176 Final

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Type of IPv6 address used for communication between neighboring nodes on the same link, and equivalent to IPv4 addresses configured using APIPA

Link-local IPv6 address

By default, which GPO is applied first? Question 36 options: Site Organizational Unit Domain Local

Local

A printer that is connected directly to a computer

Local printer

A printer setting that enables a user with a portable computer to print to a printer physically located close to her computer

Location-aware

The Layer 2 address assigned to a network adapter

MAC address

The partition style that uses a partition table that describes the location of the partitions on the disk, and on which the first sector contains a hidden binary code file that is used for booting the system is called _________.

MBR

A collection of management tools known as snap-ins that are organized under a single management tool. The tool is used for both local and remote administration.

MMC

Technology that enables UNIX to share files and applications across the network

NFS

Uses up to two virtual network adapters up to two virtual network switches

NIC team

A ________ is a printer that is equipped with its own network adapter card and connected to the network. Question 23 options: Bluetooth None of the answers are correct Network Local

Network

The Hyper-V connection setting that is like having your network cable unplugged is ________. Question 2 options: Private network Specific Network Interface card None of these answers are correct Not connected

Not connected

Similar to a Telnet session, the PowerShell cmdlet ________creates a persistent connection to a remote computer.

PSSession

Allows you to isolate specific virtual machines on a port based on the virtual switch

PVLAN

A virtual disk method used to enable the virtual operating system to access a physical disk on the host directly

Pass through disk

Enables you to grant or deny access to software located in a specific folder for each user

Path Rule

Enables you to grant or deny access to software located in a specific folder for each user

Path rule

When you configure inbound or outbound rules using Windows Firewall with Advanced Security, you determine programs or ________ that are allowed to pass through the firewall.

Ports

The hardware device that produces the printed output

Print device

The program that converts graphics commands into instructions that a type of print device can understand

Print driver

The act of setting up two or more physical printers (print devices), each associated with a single printer

Print pooling

An area on a computer's hard drive where documents to be printed are stored while awaiting printing

Print spooler

The software interface between the operating system and the print device that determines various aspects of the printing process

Printer

A number from 1 to 99 that determines which document is printed first

Printer priority

The three virtual switch types to select from are External, Internal, and ________. Question 21 options: Private Normal Physical Cloud

Private

VM connection setting where your network adapter is connected to a virtual switch that is accessible only by the VMs and is helpful in lab/testing environments

Private network

The hardware and shared computing environment that the hosting company or IT department within a company owns

Provider address space

Using AppLocker, You can restrict applications according to ________ rules, which limit application execution according to the application's digital signature. Question 49 options: Publisher None of these answers are correct Administrative Transfer

Publisher

DNS name-resolution process by which an IP address is resolved to a hostname

Reverse lookup query

List of the names and IP addresses of DNS servers that are authoritative for the Internet root domains

Root Hints

Series of settings included in Group Policy that you can use to limit the types of software that can be run on any computer running Windows XP or later

Software restriction policies

Branch Office Direct Printing is a new technology included in Windows Server 2012 and updated in Windows Server 2012 R2.

T

Provides connection-oriented, reliable communication between two hosts, typically involving large amounts of data

TCP

The folder hierarchy is composed of the Group Policy __________ folder at the top and subfolders under it. This structure holds all the information for a given GPO.

Templates

The Winrm quickconfig command-line tool determines whether a WS-Management implementation is running on a remote machine. Question 19 options:TrueFalse

False

The folder hierarchy composed of the Group Policy Containers folder at the top and subfolders under it holds all the information for a given GPO. Question 39 options:TrueFalse

False

Using the dcpromo tool, you can redirect the default container for newly created computers to a specific OU. Computers joined will be created in the target OU instead of the default Computers container.

False

With the Default AppLocker Rules, for the Everyone group, the Executable Rule is that all files are located on the C:\ drive. Question 44 options:TrueFalse

False

You can assign permissions to printers, but not audit their usage Question 48 options:TrueFalse

False

When configuring Windows firewall with advanced security, the monitoring property contains a link called ________displays IPsec main mode and quick mode associations.

Firewall

The first domain installed is the root domain in its ____________.

Forest

Relaying of a DNS request from one server to another one when the first server cannot process the request

Forwarding

A DHCP server and a DHCP client both need to go through a ____-phase process before DHCP configures the client with a working set of TCP/IP parameters.

Four

A(n) _______ is used to collect a set of users who need to share a particular set of permissions to a resource, such as a file, folder, or printer.

Groups

The _________profile setting specifies the most restrictive default firewall settings

Guest or public

Identifies software to be allowed or prohibited according to a fixed-length series of bytes that uniquely identifies the application

Hash rule

In DNS, the first or most-specific name assigned to an individual computer

Hostname

The infrastructure responsible for creating shared computing environments using Hyper-V

Hyper-V Network Virtualization

Mechanism that is responsible for managing virtual machines

Hypervisor

An IPv6 address represented in the form 0:0:0:0:0:0:w.x.y.z, where w.x.y.z is the IPv4 address in dotted-decimal

IPv4 compatible address

An IPv4-only node is represented as :ffff:.w.x.y.z to an IPv6 node and used only for internal representation

IPv4 mapped address

A tunneling technology that enables unicast IPv6 connectivity between IPv6/IPv4 hosts over an IPv4 intranet

ISATAP

The Winrm ______ command-line command executes a method on a management resource.

Invoke

Tunneling communication protocol that enables IPv6 connectivity between IPv6/IPv4 nodes across network address translation (NAT) interfaces

Teredo

A hash is a fixed-length series of bytes that uniquely identifies an application or file. Question 48 options:True False

True

A profile is a means of grouping firewall rules so that they apply to the affected computers dependent on where the computer is connected.

True

A user principal name (UPN) is a logon name formatted in a manner similar to that of an email address, such as [email protected]. Question 27 options:TrueFalse

True

Active Directory Certificate Services is the Server role responsible for public key infrastructure (PKI). Question 30 options:TrueFalse

True

After a VM is created, you cannot change its generation. Question 4 options:TrueFalse

True

All NTFS permissions are inherited, that is, they pass down through the folder hierarchy from parent to child.

True

By default, no VLAN is associated with a virtual switch port.

True

DISM enables an administrator to mount an image file, similar to mounting a hard disk, and issue commands to update the image. Question 41 options:TrueFalse

True

Disabling or deleting an account is referred to as deprovisioning the account.

True

Dynamic Host Configuration Protocol is a service that enables an administrator to specify a range of valid IP addresses to be used on a network, as well as exclusion IP addresses that should not be assigned (for example, if they were already statically assigned elsewhere).

True

Group Policy is a set of configuration settings that can be applied to one or more Active Directory Domain Services (AD DS) objects to define the behavior of the object and its child objects

True

Group Policy is a set of configuration settings that can be applied to one or more Active Directory Domain Services (AD DS) objects to define the behavior of the object and its child objects.

True

If you use differencing disks for testing, you have the ability to commit the changes back to the parent disk.

True

In Active Directory Administrative Center, a resource property describes or classifies a specific characteristic of a resource such as a file or folder.

True

In Password policy settings, if the password must meet complexity requirements, it must contain three of these four criteria: English lowercase letters, English uppercase letters, numerals, and nonalphanumeric characters such as $ ; [ ] { } ! . A. True B. False

True

MMC is designed to be used in a domain environment; however, in a workgroup environment with different security boundaries, you might be required to use the Run As function for a custom MMC console. Question 8 options:TrueFalse

True

Pointer records are created automatically if you have specified this option in the New Host dialog box or if the appropriate option has been configured at the DHCP server for dynamic DNS. Question 31 options:TrueFalse

True

Server Core is the default install option and is recommended by Microsoft. A. True B. False

True

TCP/IP is not a single networking protocol but a suite of protocols. Question 13 options:TrueFalse

True

The DHCP option 003 Router specifies the IP address of the default gateway. Question 23 options:TrueFalse

True

The Isolation connection security rule enables you to limit connections according to authentication criteria that you define.

True

The VHDX format can support up to 64-TB disks.

True

The command-line tool dsget provides information about objects in Active Directory.

True

The default gateway is the location on the local subnet to which the local computer sends all data meant for other subnets.

True

The first domain installed is the root domain in its forest

True

The forest administrators, who are members of the Enterprise Admins group, are automatically granted the ability to create an OU hierarchy in any domain within the entire forest.

True

The only tool you can use to configure audit policy on a Server Core computer is Auditpol.exe.

True

The virtual switch type that requires a physical network adapter on the host machine is called External. Question 46 options:TrueFalse

True

There is a GUI version of the Active Directory Recycle Bin feature. By default, the Recycle Bin is disabled, but you can enable it from within AD Administrative Center. After the recycle bin is enabled, you cannot disable it.

True

To make use of the functionality provided by Windows Server 2012 Active Directory, you must upgrade all domain controllers to Windows Server 2012 and upgrade the functional levels accordingly.

True

To use MMC to manage server core, you must first create Advanced Firewall rules to permit access

True

Virtual Hard Disks (VHDs) are stored on local physical drives. You can create as many VHDs as your physical storage allows, or until you run out of drive letters.

True

When installing Windows Server 2012 R2 you can choose between Server Core Installation and Server with a GUI. Question 11 options:TrueFalse

True

When pooled, storage can be allocated as one large volume, or it can be carved up into smaller segments known as storage spaces. Storage spaces enable you to configure smaller virtual hard disks (VHDs) and allocate virtual disks to different servers or as separate volumes within the same server. Question 33 options:TrueFalse

True

What is the main reason not to employ a single tree in all multiple domain enterprises? Question 31 options: Two companies merge and want to maintain their separate identities. Fewer organizational units. Who cares? I'm not planting any trees anyway. Centralized administration.

Two companies merge and want to maintain their separate identities

Provides fast, nonconnection-oriented communications with no guarantee of delivery and no error checking

UDP

A(n) _______ is a convenient means of logging on to a domain from a computer located in another domain in the forest or a trusted forest.

UPN

Security group that can be used anywhere within a domain tree or forest

Universal group

Control is a feature that was designed to protect your computer from unauthorized changes. It is designed to enable all users, even administrators, to run with a standard access token.

User Account

________ Control is a feature that was designed to protect your computer from unauthorized changes. It is designed to enable all users, even administrators, to run with a standard access token.

User Account

MMC configuration that prevents users from accessing areas of the tree that are not visible in the snap-in console windows

User mode (limited access, multiple window)

MMC configuration that prevents users from adding or removing snap-ins or changing snap-in properties.

User mode Full Access

Share permissions can be assigned to _____________. Question 22 options: Groups only Both users and groups None of the answers are correct Individual users only

Users and Groups

You might need to convert a Virtual Hard Drive to a format so that it can be supported under an older operating system. Question 9 options: .VDIR .VHX .VHD .VIR

VHD

The virtual interface that enables communication between the guest, Hyper-V host, and storage area networks

Virtual Fibre Channel Adapter

The mechanism used to identify a specific physical SAN by name and associate the connection to it with one or more Host Bus Adapters installed on the Hyper-V host

Virtual SAN

A set of APIs that enable software vendors to create applications to filter and modify TCP/IP packets, monitor, or even authorize connections

WFP

Microsoft's version of the WS- Management protocol

WinRM

The client component used to executed commands against a server running the Windows Remote Management service

WinRS

Enables you to control the installation of applications packaged into .msi files

Windows Installer

The subcontainer found under both the subcontainer found under both the Computer and User Configuration Policies and Preferences containers that holds script and security settings is called _________. Question 32 options: Administrative templates Windows Settings Policies Preferences

Windows settings

Role service in the Windows Server 2012 R2 File and Storage Services server role that enables users to access data on a file server from any remote location without the need for a VPN connection

Work folders

A technology used to create a point-in-time backup of the virtual machine configuration and data

checkpoint

To perform unattended installations of AD DS (or to script the installation of multiple domain controllers, you can use the ________ command.

dcpromo.exe

DNS name-resolution process by which a hostname is resolved to an IP address

forward lookup

Enables you to control who can run files with extensions such as *.js, *.ps1, *.vbs, *.cmd, and *.bat

script rule

Name-resolution technique wherein a DNS server queries other DNS servers on behalf of the requesting client to obtain the required FQDN, which it returns to the client

recursion

Address that is utilized only for a destination address assigned to a router

Anycast IPv6 address

Tool that enables you to control which files and applications users can run, including executable files, scripts, Windows Installer files, DLLs, packaged apps, and packaged app installers

App Locker

Group Policy enables you to deploy printers in an AD DS domain environment, automatically making printer connections available to users and computers in the domain or organizational unit (OU). What is the process to do this? Question 40 options: Sharing Policy Assigning None of the answers are correct

Assigning

Windows firewall with advanced security provides a connections security rule called _______________ that enables specified computers to communicate with computers in an isolated domain without authentication.

Authentication exemption

At startup, Windows Server 2012 Core presents _______. Question 2 options: Task Manager None of the answers A start menu Only a command window

A command window

To run the Adprep /forestprep command, you must be a member of the _________ group. Question 25 options: Enterprise Admins Schema Admins A, B, and C Domain Admins

A,B,C

An Active Directory snap-in in Windows Server 2012 R2 that enables the administration of most Active Directory functions from a single console

ADAC

The dynamic IPv4 addressing system used when DHCP is unavailable

APIPA

Multicast IPv6 address

Address that enables the delivery of packets to each of multiple interfaces

Enabling applications to receive unsolicited Internet traffic through a Network Address Translation (NAT) device is an option called __________. Question 24 options: Allow edge traversal Defer to application Block edge traversal Defer to user

Allow edge traversal

A new Offline Files mode in Windows Server 2012 R2 that enables faster access to cached files and redirected folders in an AD DS environment

Always Offline Mode

Group policy is a group of policies that are applied together. It is a set of configuration settings that can be applied to one or more Active Directory Domain Services (AD DS) objects to define the behavior of the object and its ______________.

Child objects

The Windows Remote Shell (WinRS) is the server component used with WinRM. Question 40 options:TrueFalse

False

In Password policy settings, if the password must meet complexity requirements, it must contain _________ of these four criteria: English lowercase letters, English uppercase letters, numerals, and nonalphanumeric characters such as $ ; [ ] { } ! .

3

Which of these is a built-in security group designed to enable members to perform limited administrative tasks within the domain in which they are located?

Backup operators

Security level that enables the user to run applications as a normal user only

Basic user

A printer setting that is designed to conserve bandwidth and allow client printing if a print server failure occurs

Branch Office Direct Printing

Which tool enables you to automate the creation of new accounts by importing data to AD DS from files containing information in the comma-separated (CSV) format?

CSVDE

Identifies software to be allowed or prohibited according to an application's signing certificate

Certificate rule

The ________ Protocol resolves hostnames on the Internet and local networks to IP addresses. Question 9 options: Domain name system Dynamic host configuration File transfer Hypertext transfer

DNS

The User Object holds attributes for all the password policy and account lockout policy settings.

False

The Microsoft Management Console (MMC) snap-in from which you can manage most of the activities associated with operating a DNS server

DNS Manager

Adds security to the DNS protocol by providing origin authority, data integrity, and authenticated denial of existence

DNSSEC

Which of the following subcategories of Advanced Audit Policies tracks all attempts at accessing AD DS objects whose system access control lists (SACLs) have been configured for auditing?

Directory Service access

Security level that prevents all applications from running except those you have specified using additional rules

Disallowed

Hierarchical name-resolution system that resolves hostnames into IP addresses, and vice versa

Domain Name System

Using the ________ update method, as a DHCP server hands out IP addresses, it registers the client hostname or FQDN and IP address with the DNS server. If the hostname or IP address changes, the DNS record is updated accordingly.

Dynamic

A universal cross-platform-compatible used to simplify driver management when using Remote Desktop Services

Easy Printer Driver

Uses a legacy driver to support legacy operating systems also used to perform network-based installations of the guest operating system or when integration services are not installed on the operating system

Emulated network adapter

You can use the Ctrl+Alt+________ combination on the Host to send the Ctrl+Alt+Delete sequence to the VM. Question 29 options: Home End Backspace Insert

End

Enables you to control classic executable programs (as opposed to the newer Windows 8 packaged apps) that are typically located in the Program Files default folder

Executable rule

DNS domain name that unambiguously describes the location of the host within a domain tree

FQDN

The combination of a hostname, an organization's domain name, and the Internet top-level domain name creates a ________ that is unique across the Internet. Question 26 options: None of these answers are correct Local Area Network Name NetBIOS Name Fully Qualified Domain Name (FQDN)

FQDN

__________ is a set of tools that enable you to manage resources used by files and folders on your server by performing such tasks as limiting the amount of space used by users, restricting the types of files being saved, and monitoring the amount of storage used.

FSRM

A DHCP server leases an IP address to the DHCP client for only a specified term. The default term is 4 days.

False

A Windows Server 2012 R2 Datacenter cannot act as a domain controller. Question 28 options:TrueFalse

False

A dynamic disk may contain as many as four partitions or logical drives. Question 7 options:TrueFalse

False

A mirrored volume cannot provide fault tolerance for the system and boot volumes. Question 47 options:TrueFalse

False

A printer is the physical (hardware) device that produces the printed output.

False

The Distributed File System (DFS) feature enables file sharing among servers running Windows and UNIX. Added in Windows Server 2012 R2 is an NFS module for Windows PowerShell with several new cmdlets specific to NFS. Question 10 options:TrueFalse

False

The Hyper-V connection setting that is helpful for lab/testing environments is called Specific Network Interface Card.

False

DNS server software cannot refer queries to other DNS servers as required.

False

Dynamic Hyper Configuration Protocol is a service that allows a server to assign IP addresses to host computers on a subnet.

False

Even though the FQDN contains both the hostname and domain name, two hosts from different domains cannot share the same hostname. Question 16 options:TrueFalse

False

Generation 2 virtual machines support Legacy Network Adapters.

False

Password settings are stored in a Password Settings Container (PSC) in the domain.

False

Share permissions are more granular than Security permissions.

False

Created by default when Windows or Active Directory is installed on a computer

Built-in group

When you configure software restriction policies in Group policy, you can control executables, DLL files, scripts, and Windows Installer files, and you can control each file type separately. Question 12 options:True False

False

A server role that provides utilities that enable you to manage files, folders, and other shared resources. It's installed by default when you install Windows Server 2012 R2.

File and Storage Services

________ action refers to a configured set of actions within a firewall rule that determines whether the firewall will permit or block traffic attempting to cross it. Dynamic Filter Static None of these answers are correct

Filter

A VHD type that uses a preconfigured disk size that allocates physical storage matching the size of the configured virtual disk from the point at which the disk is created

Fixed-size

Can contain users from the same domain in which the global group is located, and global groups can be added to domain local groups to control access to network resources

Global group

Virtual machine that runs on a specific physical host

Guest

Suite of services available for installation after a virtual machine has been created

Guest Integration Services

A series of Windows Server 2012 R2 administrative utilities that you can download from Microsoft and install on a Windows 8.1 computer

RSAT

When you create a new GPO or edit an existing one, and if you have configured new settings in the Computer Configuration node, users affected by the GPO must _______. Question 20 options: Refresh the desktop Do nothing because the settings will automatically apply Log off and log back on again Reboot their computers

Reboot their computers

Process that tracks virtual machine resource usage for reporting purposes

Resource Metering

The virtual switch is a software function of Hyper-V that is responsible for layer ________ switching. Question 6 options: 5 4 3 2

2

Snap-in in Windows Server 2012 R2 that enables the administration of most Active Directory functions from a single console

ADAC

Recommended group nesting strategy when universal groups are not involved

AGDLP

Nesting strategy involving universal groups

AGUDLP

Event that occurs in Task Scheduler after a trigger is set

Action

The section of Group Policy from which administrators can configure settings that are applied to users' desktops, specify programs that users can run, and so on is called ________. Question 29 options: Administrative Templates Group Policy Objects Server Policies None of these answers are correct

Administrative Templates

The Hyper-V connection setting that is helpful for lab/testing environments is called Specific Network Interface Card. Question 33 options:TrueFalse

False

The NIC teaming property that refers to the ability of the NIC Team to manage the connections to the switches and keeps track of the teams' connection state is static teaming. Question 21 options:TrueFalse

False

Which Windows firewall configurable exception allows computers to connect to other computers or the Internet? Question 42 options: Core networking Netlogon service File and Printer sharing Network discovery

Core networking

The default gateway in a virtual network is typically the highest address for the subnet. Question 38 options:TrueFalse

False

The dedicated servers and network assigned to a specific customer in a cloud computing environment

Customer Address Space

Group Policy Templates are objects that are defined within AD DS and are used to store the properties of GPOs, including attributes and version information. Question 15 options:TrueFalse

False

The child disk in a parent/child relationship

Differencing disk

The Print Server role service that enables the server to receive and manage documents that users have scanned from network-based scanners is ________.

Distributed scan server

Used for functions such as email, and which do not have SIDs

Distribution groups

Can include users, computers, and groups from any domain in the forest but cannot be employed to grant permissions to any resource in the forest

Domain local group

Hyper-V function that allows for memory to be pooled within a host

Dynamic memory

A VHD type that starts small and expands automatically to accommodate data growth

Dynamically expanding disk

Default mode of remote management using Server Manager

Enabled

Hyper-V feature that supports redirecting of local resources such as keyboard, video, mouse, audio, printers, clipboard, USB devices, drives, and plug-and-play devices

Enhanced Session Mode

In Windows Server 2012 R2, Hyper-V does not enable you to share a VHD between multiple VMs. Question 24 options:TrueFalse

False

In the application layer of the four-layer TCP/IP model, the protocol that gathers network management information from network devices, such as routers, bridges, and servers that provides this information to network management consoles is Simple Mail Transfer Protocol (SMTP). Question 45 options:TrueFalse

False

Which of the following is not one of the three types of user accounts present in an AD DS network? Question 26 options: Built-in user accounts Domain user accounts Enterprise user accounts Local user accounts

Enterprise

A(n) ________ is a range of IP addresses within a scope that you do not want to have used by DHCP in leasing addresses to clients. Question 14 options: Restriction Exclusion Reservation

Exclusion

is a set of tools that enable you to manage resources used by files and folders on your server by performing such tasks as limiting the amount of space used by users, restricting the types of files being saved, and monitoring the amount of storage used. Question 22 options: Distributed File System (DFS) File Server Resource Manager (FSRM) Data Deduplication Services for Network File System

FSRM

After a differencing disk has been established, the parent disk will still accept write events. Question 46 options:TrueFalse

False

All Group Policy Objects are identified by their PolicyIDs. Question 36 options:TrueFalse

False

Physical server that provides physical resources such as CPU and memory to a virtual machine

Host (Hyper-V)

The interface card that enables Hyper-V hosts to connect to and communicate with storage area networks

Host Bus Adapter

Microsoft's version of a Virtual Machine Manager

Hyper-V

By doing some planning, an administrator can ________roles, features, operating system settings, user data, and shares from a previous installation to Windows Server 2012 R2. Reorder None of the answers Rename Migrate

Migrate

The NTFS ________ permission enables the user to delete a folder as well as grant a user the Read permission and the List Folder Contents permission. Question 43 options: Read Write Modify List folder contents

Modify

An advanced feature that enables guests to take advantage of redundant links to access storage area networks

Multipath I/O

The file system originally provided with Windows NT and present in modern server versions that supports volume mounting, compression, encryption, and security

NTFS

Act of creating a hierarchy of groups to provide users from different containers (domains, OUs, and so on) access to the resources they require for their jobs

Nesting

Security-level rules enable you to set a default policy and create exceptions. You can select from the ________ security level, which allows software to run according to a user's access rights. Question 28 options: Power user None of these answers are correct. Basic user Disallowed

None

Windows Server 2012 R2 enables you to audit access by a user to files, folders, or printers. This event is called ________ access. Question 32 options: Object Resource Article Domain

Object

Enables you to cache locally stored copies of shared files and folders, so that you can work with them while offline and resynchronize your changes when you go back online

Offline files

Advanced Adapter feature of Hyper-V that allows network traffic from VMs to be monitored by copying incoming and outgoing packets

Port mirroring

In an Active Directory Domain Services (AD DS) domain, you must authorize the DHCP server in Active Directory before it can lease IP addresses. What type of DHCP server does this prevent from leasing IP addresses? Question 7 options: Rogue Linux legacy vague

Rogue

Used to assign rights and permissions, and which have a SID

Security groups

A network file sharing protocol that enables applications to read and write data and request information from programs on network servers

Server Message Block

Folders that are made available for access by users who are working at another computer on the network

Shared Folders

Hyper-V function that allows for temporary paging of virtual machine memory to a disk

Smart Paging

A new feature for Server 2012 R2 that enables administrators to monitor and control virtual disk performance

Storage QoS

A tool used to schedule and automate tasks to perform a specific function at a specific time

Task Scheduler

A specific customer that owns or rents resources from the shared computing environment

Tenant

The concept of creating a point-in-time copy of a file or virtual machine

The concept of creating a point-in-time copy of a file or virtual machine

A storage pool is a group of physical disks combined to create a shared pool of storage. Question 25 options:TrueFalse

True

Account operators, server operators, print operators, and backup operators are built-in security groups that enable members to perform limited administrative capabilities within the domain in which they are located. Question 30 options:TrueFalse

True

In Active Directory Users and Computers to view the effective OU permissions granted to a user or group, the Effective Permissions tab shows all granted permissions, including inherited permissions. A. True B. False

True

The Windows Server 2012 R2 Standard Edition is a robust, ideal platform for medium-sized offices that are designed upon a physical or minimally virtualized environment. Question 16 options:TrueFalse

True

Windows Firewall with Advanced Security settings is included in a file with the .wfw extension. Question 27 options:TrueFalse

True

You can have only one double-colon notation within any IPv6 address. Question 39 options:True False

True

You cannot upgrade a Window Server 2003 or older computer or a computer running any client version of Windows to Windows Server 2012 R2. A. True B. False

True

The infrastructure required to create copies of files on your server for the purpose of quick restores of previous versions

Volume Shadow Services


Ensembles d'études connexes

Chapter 17 - Title of Goods and Risk of Loss

View Set

Stress and Coping - Chapter 42 - Module G

View Set

Acct 230- Chapter 6: Cost-Volume-Profit Relationships

View Set

Respiratory Anatomy: BRS/Michigan Questions

View Set

optimum performance training model power level

View Set

Combine, American Politics: Chapter 9 Pre and Post Test, American Politics Chapter 7 Pre and Post Tests

View Set

CHEM Chapter 2 - Multiple Choice

View Set