CPT 176 Final
Type of IPv6 address used for communication between neighboring nodes on the same link, and equivalent to IPv4 addresses configured using APIPA
Link-local IPv6 address
By default, which GPO is applied first? Question 36 options: Site Organizational Unit Domain Local
Local
A printer that is connected directly to a computer
Local printer
A printer setting that enables a user with a portable computer to print to a printer physically located close to her computer
Location-aware
The Layer 2 address assigned to a network adapter
MAC address
The partition style that uses a partition table that describes the location of the partitions on the disk, and on which the first sector contains a hidden binary code file that is used for booting the system is called _________.
MBR
A collection of management tools known as snap-ins that are organized under a single management tool. The tool is used for both local and remote administration.
MMC
Technology that enables UNIX to share files and applications across the network
NFS
Uses up to two virtual network adapters up to two virtual network switches
NIC team
A ________ is a printer that is equipped with its own network adapter card and connected to the network. Question 23 options: Bluetooth None of the answers are correct Network Local
Network
The Hyper-V connection setting that is like having your network cable unplugged is ________. Question 2 options: Private network Specific Network Interface card None of these answers are correct Not connected
Not connected
Similar to a Telnet session, the PowerShell cmdlet ________creates a persistent connection to a remote computer.
PSSession
Allows you to isolate specific virtual machines on a port based on the virtual switch
PVLAN
A virtual disk method used to enable the virtual operating system to access a physical disk on the host directly
Pass through disk
Enables you to grant or deny access to software located in a specific folder for each user
Path Rule
Enables you to grant or deny access to software located in a specific folder for each user
Path rule
When you configure inbound or outbound rules using Windows Firewall with Advanced Security, you determine programs or ________ that are allowed to pass through the firewall.
Ports
The hardware device that produces the printed output
Print device
The program that converts graphics commands into instructions that a type of print device can understand
Print driver
The act of setting up two or more physical printers (print devices), each associated with a single printer
Print pooling
An area on a computer's hard drive where documents to be printed are stored while awaiting printing
Print spooler
The software interface between the operating system and the print device that determines various aspects of the printing process
Printer
A number from 1 to 99 that determines which document is printed first
Printer priority
The three virtual switch types to select from are External, Internal, and ________. Question 21 options: Private Normal Physical Cloud
Private
VM connection setting where your network adapter is connected to a virtual switch that is accessible only by the VMs and is helpful in lab/testing environments
Private network
The hardware and shared computing environment that the hosting company or IT department within a company owns
Provider address space
Using AppLocker, You can restrict applications according to ________ rules, which limit application execution according to the application's digital signature. Question 49 options: Publisher None of these answers are correct Administrative Transfer
Publisher
DNS name-resolution process by which an IP address is resolved to a hostname
Reverse lookup query
List of the names and IP addresses of DNS servers that are authoritative for the Internet root domains
Root Hints
Series of settings included in Group Policy that you can use to limit the types of software that can be run on any computer running Windows XP or later
Software restriction policies
Branch Office Direct Printing is a new technology included in Windows Server 2012 and updated in Windows Server 2012 R2.
T
Provides connection-oriented, reliable communication between two hosts, typically involving large amounts of data
TCP
The folder hierarchy is composed of the Group Policy __________ folder at the top and subfolders under it. This structure holds all the information for a given GPO.
Templates
The Winrm quickconfig command-line tool determines whether a WS-Management implementation is running on a remote machine. Question 19 options:TrueFalse
False
The folder hierarchy composed of the Group Policy Containers folder at the top and subfolders under it holds all the information for a given GPO. Question 39 options:TrueFalse
False
Using the dcpromo tool, you can redirect the default container for newly created computers to a specific OU. Computers joined will be created in the target OU instead of the default Computers container.
False
With the Default AppLocker Rules, for the Everyone group, the Executable Rule is that all files are located on the C:\ drive. Question 44 options:TrueFalse
False
You can assign permissions to printers, but not audit their usage Question 48 options:TrueFalse
False
When configuring Windows firewall with advanced security, the monitoring property contains a link called ________displays IPsec main mode and quick mode associations.
Firewall
The first domain installed is the root domain in its ____________.
Forest
Relaying of a DNS request from one server to another one when the first server cannot process the request
Forwarding
A DHCP server and a DHCP client both need to go through a ____-phase process before DHCP configures the client with a working set of TCP/IP parameters.
Four
A(n) _______ is used to collect a set of users who need to share a particular set of permissions to a resource, such as a file, folder, or printer.
Groups
The _________profile setting specifies the most restrictive default firewall settings
Guest or public
Identifies software to be allowed or prohibited according to a fixed-length series of bytes that uniquely identifies the application
Hash rule
In DNS, the first or most-specific name assigned to an individual computer
Hostname
The infrastructure responsible for creating shared computing environments using Hyper-V
Hyper-V Network Virtualization
Mechanism that is responsible for managing virtual machines
Hypervisor
An IPv6 address represented in the form 0:0:0:0:0:0:w.x.y.z, where w.x.y.z is the IPv4 address in dotted-decimal
IPv4 compatible address
An IPv4-only node is represented as :ffff:.w.x.y.z to an IPv6 node and used only for internal representation
IPv4 mapped address
A tunneling technology that enables unicast IPv6 connectivity between IPv6/IPv4 hosts over an IPv4 intranet
ISATAP
The Winrm ______ command-line command executes a method on a management resource.
Invoke
Tunneling communication protocol that enables IPv6 connectivity between IPv6/IPv4 nodes across network address translation (NAT) interfaces
Teredo
A hash is a fixed-length series of bytes that uniquely identifies an application or file. Question 48 options:True False
True
A profile is a means of grouping firewall rules so that they apply to the affected computers dependent on where the computer is connected.
True
A user principal name (UPN) is a logon name formatted in a manner similar to that of an email address, such as [email protected]. Question 27 options:TrueFalse
True
Active Directory Certificate Services is the Server role responsible for public key infrastructure (PKI). Question 30 options:TrueFalse
True
After a VM is created, you cannot change its generation. Question 4 options:TrueFalse
True
All NTFS permissions are inherited, that is, they pass down through the folder hierarchy from parent to child.
True
By default, no VLAN is associated with a virtual switch port.
True
DISM enables an administrator to mount an image file, similar to mounting a hard disk, and issue commands to update the image. Question 41 options:TrueFalse
True
Disabling or deleting an account is referred to as deprovisioning the account.
True
Dynamic Host Configuration Protocol is a service that enables an administrator to specify a range of valid IP addresses to be used on a network, as well as exclusion IP addresses that should not be assigned (for example, if they were already statically assigned elsewhere).
True
Group Policy is a set of configuration settings that can be applied to one or more Active Directory Domain Services (AD DS) objects to define the behavior of the object and its child objects
True
Group Policy is a set of configuration settings that can be applied to one or more Active Directory Domain Services (AD DS) objects to define the behavior of the object and its child objects.
True
If you use differencing disks for testing, you have the ability to commit the changes back to the parent disk.
True
In Active Directory Administrative Center, a resource property describes or classifies a specific characteristic of a resource such as a file or folder.
True
In Password policy settings, if the password must meet complexity requirements, it must contain three of these four criteria: English lowercase letters, English uppercase letters, numerals, and nonalphanumeric characters such as $ ; [ ] { } ! . A. True B. False
True
MMC is designed to be used in a domain environment; however, in a workgroup environment with different security boundaries, you might be required to use the Run As function for a custom MMC console. Question 8 options:TrueFalse
True
Pointer records are created automatically if you have specified this option in the New Host dialog box or if the appropriate option has been configured at the DHCP server for dynamic DNS. Question 31 options:TrueFalse
True
Server Core is the default install option and is recommended by Microsoft. A. True B. False
True
TCP/IP is not a single networking protocol but a suite of protocols. Question 13 options:TrueFalse
True
The DHCP option 003 Router specifies the IP address of the default gateway. Question 23 options:TrueFalse
True
The Isolation connection security rule enables you to limit connections according to authentication criteria that you define.
True
The VHDX format can support up to 64-TB disks.
True
The command-line tool dsget provides information about objects in Active Directory.
True
The default gateway is the location on the local subnet to which the local computer sends all data meant for other subnets.
True
The first domain installed is the root domain in its forest
True
The forest administrators, who are members of the Enterprise Admins group, are automatically granted the ability to create an OU hierarchy in any domain within the entire forest.
True
The only tool you can use to configure audit policy on a Server Core computer is Auditpol.exe.
True
The virtual switch type that requires a physical network adapter on the host machine is called External. Question 46 options:TrueFalse
True
There is a GUI version of the Active Directory Recycle Bin feature. By default, the Recycle Bin is disabled, but you can enable it from within AD Administrative Center. After the recycle bin is enabled, you cannot disable it.
True
To make use of the functionality provided by Windows Server 2012 Active Directory, you must upgrade all domain controllers to Windows Server 2012 and upgrade the functional levels accordingly.
True
To use MMC to manage server core, you must first create Advanced Firewall rules to permit access
True
Virtual Hard Disks (VHDs) are stored on local physical drives. You can create as many VHDs as your physical storage allows, or until you run out of drive letters.
True
When installing Windows Server 2012 R2 you can choose between Server Core Installation and Server with a GUI. Question 11 options:TrueFalse
True
When pooled, storage can be allocated as one large volume, or it can be carved up into smaller segments known as storage spaces. Storage spaces enable you to configure smaller virtual hard disks (VHDs) and allocate virtual disks to different servers or as separate volumes within the same server. Question 33 options:TrueFalse
True
What is the main reason not to employ a single tree in all multiple domain enterprises? Question 31 options: Two companies merge and want to maintain their separate identities. Fewer organizational units. Who cares? I'm not planting any trees anyway. Centralized administration.
Two companies merge and want to maintain their separate identities
Provides fast, nonconnection-oriented communications with no guarantee of delivery and no error checking
UDP
A(n) _______ is a convenient means of logging on to a domain from a computer located in another domain in the forest or a trusted forest.
UPN
Security group that can be used anywhere within a domain tree or forest
Universal group
Control is a feature that was designed to protect your computer from unauthorized changes. It is designed to enable all users, even administrators, to run with a standard access token.
User Account
________ Control is a feature that was designed to protect your computer from unauthorized changes. It is designed to enable all users, even administrators, to run with a standard access token.
User Account
MMC configuration that prevents users from accessing areas of the tree that are not visible in the snap-in console windows
User mode (limited access, multiple window)
MMC configuration that prevents users from adding or removing snap-ins or changing snap-in properties.
User mode Full Access
Share permissions can be assigned to _____________. Question 22 options: Groups only Both users and groups None of the answers are correct Individual users only
Users and Groups
You might need to convert a Virtual Hard Drive to a format so that it can be supported under an older operating system. Question 9 options: .VDIR .VHX .VHD .VIR
VHD
The virtual interface that enables communication between the guest, Hyper-V host, and storage area networks
Virtual Fibre Channel Adapter
The mechanism used to identify a specific physical SAN by name and associate the connection to it with one or more Host Bus Adapters installed on the Hyper-V host
Virtual SAN
A set of APIs that enable software vendors to create applications to filter and modify TCP/IP packets, monitor, or even authorize connections
WFP
Microsoft's version of the WS- Management protocol
WinRM
The client component used to executed commands against a server running the Windows Remote Management service
WinRS
Enables you to control the installation of applications packaged into .msi files
Windows Installer
The subcontainer found under both the subcontainer found under both the Computer and User Configuration Policies and Preferences containers that holds script and security settings is called _________. Question 32 options: Administrative templates Windows Settings Policies Preferences
Windows settings
Role service in the Windows Server 2012 R2 File and Storage Services server role that enables users to access data on a file server from any remote location without the need for a VPN connection
Work folders
A technology used to create a point-in-time backup of the virtual machine configuration and data
checkpoint
To perform unattended installations of AD DS (or to script the installation of multiple domain controllers, you can use the ________ command.
dcpromo.exe
DNS name-resolution process by which a hostname is resolved to an IP address
forward lookup
Enables you to control who can run files with extensions such as *.js, *.ps1, *.vbs, *.cmd, and *.bat
script rule
Name-resolution technique wherein a DNS server queries other DNS servers on behalf of the requesting client to obtain the required FQDN, which it returns to the client
recursion
Address that is utilized only for a destination address assigned to a router
Anycast IPv6 address
Tool that enables you to control which files and applications users can run, including executable files, scripts, Windows Installer files, DLLs, packaged apps, and packaged app installers
App Locker
Group Policy enables you to deploy printers in an AD DS domain environment, automatically making printer connections available to users and computers in the domain or organizational unit (OU). What is the process to do this? Question 40 options: Sharing Policy Assigning None of the answers are correct
Assigning
Windows firewall with advanced security provides a connections security rule called _______________ that enables specified computers to communicate with computers in an isolated domain without authentication.
Authentication exemption
At startup, Windows Server 2012 Core presents _______. Question 2 options: Task Manager None of the answers A start menu Only a command window
A command window
To run the Adprep /forestprep command, you must be a member of the _________ group. Question 25 options: Enterprise Admins Schema Admins A, B, and C Domain Admins
A,B,C
An Active Directory snap-in in Windows Server 2012 R2 that enables the administration of most Active Directory functions from a single console
ADAC
The dynamic IPv4 addressing system used when DHCP is unavailable
APIPA
Multicast IPv6 address
Address that enables the delivery of packets to each of multiple interfaces
Enabling applications to receive unsolicited Internet traffic through a Network Address Translation (NAT) device is an option called __________. Question 24 options: Allow edge traversal Defer to application Block edge traversal Defer to user
Allow edge traversal
A new Offline Files mode in Windows Server 2012 R2 that enables faster access to cached files and redirected folders in an AD DS environment
Always Offline Mode
Group policy is a group of policies that are applied together. It is a set of configuration settings that can be applied to one or more Active Directory Domain Services (AD DS) objects to define the behavior of the object and its ______________.
Child objects
The Windows Remote Shell (WinRS) is the server component used with WinRM. Question 40 options:TrueFalse
False
In Password policy settings, if the password must meet complexity requirements, it must contain _________ of these four criteria: English lowercase letters, English uppercase letters, numerals, and nonalphanumeric characters such as $ ; [ ] { } ! .
3
Which of these is a built-in security group designed to enable members to perform limited administrative tasks within the domain in which they are located?
Backup operators
Security level that enables the user to run applications as a normal user only
Basic user
A printer setting that is designed to conserve bandwidth and allow client printing if a print server failure occurs
Branch Office Direct Printing
Which tool enables you to automate the creation of new accounts by importing data to AD DS from files containing information in the comma-separated (CSV) format?
CSVDE
Identifies software to be allowed or prohibited according to an application's signing certificate
Certificate rule
The ________ Protocol resolves hostnames on the Internet and local networks to IP addresses. Question 9 options: Domain name system Dynamic host configuration File transfer Hypertext transfer
DNS
The User Object holds attributes for all the password policy and account lockout policy settings.
False
The Microsoft Management Console (MMC) snap-in from which you can manage most of the activities associated with operating a DNS server
DNS Manager
Adds security to the DNS protocol by providing origin authority, data integrity, and authenticated denial of existence
DNSSEC
Which of the following subcategories of Advanced Audit Policies tracks all attempts at accessing AD DS objects whose system access control lists (SACLs) have been configured for auditing?
Directory Service access
Security level that prevents all applications from running except those you have specified using additional rules
Disallowed
Hierarchical name-resolution system that resolves hostnames into IP addresses, and vice versa
Domain Name System
Using the ________ update method, as a DHCP server hands out IP addresses, it registers the client hostname or FQDN and IP address with the DNS server. If the hostname or IP address changes, the DNS record is updated accordingly.
Dynamic
A universal cross-platform-compatible used to simplify driver management when using Remote Desktop Services
Easy Printer Driver
Uses a legacy driver to support legacy operating systems also used to perform network-based installations of the guest operating system or when integration services are not installed on the operating system
Emulated network adapter
You can use the Ctrl+Alt+________ combination on the Host to send the Ctrl+Alt+Delete sequence to the VM. Question 29 options: Home End Backspace Insert
End
Enables you to control classic executable programs (as opposed to the newer Windows 8 packaged apps) that are typically located in the Program Files default folder
Executable rule
DNS domain name that unambiguously describes the location of the host within a domain tree
FQDN
The combination of a hostname, an organization's domain name, and the Internet top-level domain name creates a ________ that is unique across the Internet. Question 26 options: None of these answers are correct Local Area Network Name NetBIOS Name Fully Qualified Domain Name (FQDN)
FQDN
__________ is a set of tools that enable you to manage resources used by files and folders on your server by performing such tasks as limiting the amount of space used by users, restricting the types of files being saved, and monitoring the amount of storage used.
FSRM
A DHCP server leases an IP address to the DHCP client for only a specified term. The default term is 4 days.
False
A Windows Server 2012 R2 Datacenter cannot act as a domain controller. Question 28 options:TrueFalse
False
A dynamic disk may contain as many as four partitions or logical drives. Question 7 options:TrueFalse
False
A mirrored volume cannot provide fault tolerance for the system and boot volumes. Question 47 options:TrueFalse
False
A printer is the physical (hardware) device that produces the printed output.
False
The Distributed File System (DFS) feature enables file sharing among servers running Windows and UNIX. Added in Windows Server 2012 R2 is an NFS module for Windows PowerShell with several new cmdlets specific to NFS. Question 10 options:TrueFalse
False
The Hyper-V connection setting that is helpful for lab/testing environments is called Specific Network Interface Card.
False
DNS server software cannot refer queries to other DNS servers as required.
False
Dynamic Hyper Configuration Protocol is a service that allows a server to assign IP addresses to host computers on a subnet.
False
Even though the FQDN contains both the hostname and domain name, two hosts from different domains cannot share the same hostname. Question 16 options:TrueFalse
False
Generation 2 virtual machines support Legacy Network Adapters.
False
Password settings are stored in a Password Settings Container (PSC) in the domain.
False
Share permissions are more granular than Security permissions.
False
Created by default when Windows or Active Directory is installed on a computer
Built-in group
When you configure software restriction policies in Group policy, you can control executables, DLL files, scripts, and Windows Installer files, and you can control each file type separately. Question 12 options:True False
False
A server role that provides utilities that enable you to manage files, folders, and other shared resources. It's installed by default when you install Windows Server 2012 R2.
File and Storage Services
________ action refers to a configured set of actions within a firewall rule that determines whether the firewall will permit or block traffic attempting to cross it. Dynamic Filter Static None of these answers are correct
Filter
A VHD type that uses a preconfigured disk size that allocates physical storage matching the size of the configured virtual disk from the point at which the disk is created
Fixed-size
Can contain users from the same domain in which the global group is located, and global groups can be added to domain local groups to control access to network resources
Global group
Virtual machine that runs on a specific physical host
Guest
Suite of services available for installation after a virtual machine has been created
Guest Integration Services
A series of Windows Server 2012 R2 administrative utilities that you can download from Microsoft and install on a Windows 8.1 computer
RSAT
When you create a new GPO or edit an existing one, and if you have configured new settings in the Computer Configuration node, users affected by the GPO must _______. Question 20 options: Refresh the desktop Do nothing because the settings will automatically apply Log off and log back on again Reboot their computers
Reboot their computers
Process that tracks virtual machine resource usage for reporting purposes
Resource Metering
The virtual switch is a software function of Hyper-V that is responsible for layer ________ switching. Question 6 options: 5 4 3 2
2
Snap-in in Windows Server 2012 R2 that enables the administration of most Active Directory functions from a single console
ADAC
Recommended group nesting strategy when universal groups are not involved
AGDLP
Nesting strategy involving universal groups
AGUDLP
Event that occurs in Task Scheduler after a trigger is set
Action
The section of Group Policy from which administrators can configure settings that are applied to users' desktops, specify programs that users can run, and so on is called ________. Question 29 options: Administrative Templates Group Policy Objects Server Policies None of these answers are correct
Administrative Templates
The Hyper-V connection setting that is helpful for lab/testing environments is called Specific Network Interface Card. Question 33 options:TrueFalse
False
The NIC teaming property that refers to the ability of the NIC Team to manage the connections to the switches and keeps track of the teams' connection state is static teaming. Question 21 options:TrueFalse
False
Which Windows firewall configurable exception allows computers to connect to other computers or the Internet? Question 42 options: Core networking Netlogon service File and Printer sharing Network discovery
Core networking
The default gateway in a virtual network is typically the highest address for the subnet. Question 38 options:TrueFalse
False
The dedicated servers and network assigned to a specific customer in a cloud computing environment
Customer Address Space
Group Policy Templates are objects that are defined within AD DS and are used to store the properties of GPOs, including attributes and version information. Question 15 options:TrueFalse
False
The child disk in a parent/child relationship
Differencing disk
The Print Server role service that enables the server to receive and manage documents that users have scanned from network-based scanners is ________.
Distributed scan server
Used for functions such as email, and which do not have SIDs
Distribution groups
Can include users, computers, and groups from any domain in the forest but cannot be employed to grant permissions to any resource in the forest
Domain local group
Hyper-V function that allows for memory to be pooled within a host
Dynamic memory
A VHD type that starts small and expands automatically to accommodate data growth
Dynamically expanding disk
Default mode of remote management using Server Manager
Enabled
Hyper-V feature that supports redirecting of local resources such as keyboard, video, mouse, audio, printers, clipboard, USB devices, drives, and plug-and-play devices
Enhanced Session Mode
In Windows Server 2012 R2, Hyper-V does not enable you to share a VHD between multiple VMs. Question 24 options:TrueFalse
False
In the application layer of the four-layer TCP/IP model, the protocol that gathers network management information from network devices, such as routers, bridges, and servers that provides this information to network management consoles is Simple Mail Transfer Protocol (SMTP). Question 45 options:TrueFalse
False
Which of the following is not one of the three types of user accounts present in an AD DS network? Question 26 options: Built-in user accounts Domain user accounts Enterprise user accounts Local user accounts
Enterprise
A(n) ________ is a range of IP addresses within a scope that you do not want to have used by DHCP in leasing addresses to clients. Question 14 options: Restriction Exclusion Reservation
Exclusion
is a set of tools that enable you to manage resources used by files and folders on your server by performing such tasks as limiting the amount of space used by users, restricting the types of files being saved, and monitoring the amount of storage used. Question 22 options: Distributed File System (DFS) File Server Resource Manager (FSRM) Data Deduplication Services for Network File System
FSRM
After a differencing disk has been established, the parent disk will still accept write events. Question 46 options:TrueFalse
False
All Group Policy Objects are identified by their PolicyIDs. Question 36 options:TrueFalse
False
Physical server that provides physical resources such as CPU and memory to a virtual machine
Host (Hyper-V)
The interface card that enables Hyper-V hosts to connect to and communicate with storage area networks
Host Bus Adapter
Microsoft's version of a Virtual Machine Manager
Hyper-V
By doing some planning, an administrator can ________roles, features, operating system settings, user data, and shares from a previous installation to Windows Server 2012 R2. Reorder None of the answers Rename Migrate
Migrate
The NTFS ________ permission enables the user to delete a folder as well as grant a user the Read permission and the List Folder Contents permission. Question 43 options: Read Write Modify List folder contents
Modify
An advanced feature that enables guests to take advantage of redundant links to access storage area networks
Multipath I/O
The file system originally provided with Windows NT and present in modern server versions that supports volume mounting, compression, encryption, and security
NTFS
Act of creating a hierarchy of groups to provide users from different containers (domains, OUs, and so on) access to the resources they require for their jobs
Nesting
Security-level rules enable you to set a default policy and create exceptions. You can select from the ________ security level, which allows software to run according to a user's access rights. Question 28 options: Power user None of these answers are correct. Basic user Disallowed
None
Windows Server 2012 R2 enables you to audit access by a user to files, folders, or printers. This event is called ________ access. Question 32 options: Object Resource Article Domain
Object
Enables you to cache locally stored copies of shared files and folders, so that you can work with them while offline and resynchronize your changes when you go back online
Offline files
Advanced Adapter feature of Hyper-V that allows network traffic from VMs to be monitored by copying incoming and outgoing packets
Port mirroring
In an Active Directory Domain Services (AD DS) domain, you must authorize the DHCP server in Active Directory before it can lease IP addresses. What type of DHCP server does this prevent from leasing IP addresses? Question 7 options: Rogue Linux legacy vague
Rogue
Used to assign rights and permissions, and which have a SID
Security groups
A network file sharing protocol that enables applications to read and write data and request information from programs on network servers
Server Message Block
Folders that are made available for access by users who are working at another computer on the network
Shared Folders
Hyper-V function that allows for temporary paging of virtual machine memory to a disk
Smart Paging
A new feature for Server 2012 R2 that enables administrators to monitor and control virtual disk performance
Storage QoS
A tool used to schedule and automate tasks to perform a specific function at a specific time
Task Scheduler
A specific customer that owns or rents resources from the shared computing environment
Tenant
The concept of creating a point-in-time copy of a file or virtual machine
The concept of creating a point-in-time copy of a file or virtual machine
A storage pool is a group of physical disks combined to create a shared pool of storage. Question 25 options:TrueFalse
True
Account operators, server operators, print operators, and backup operators are built-in security groups that enable members to perform limited administrative capabilities within the domain in which they are located. Question 30 options:TrueFalse
True
In Active Directory Users and Computers to view the effective OU permissions granted to a user or group, the Effective Permissions tab shows all granted permissions, including inherited permissions. A. True B. False
True
The Windows Server 2012 R2 Standard Edition is a robust, ideal platform for medium-sized offices that are designed upon a physical or minimally virtualized environment. Question 16 options:TrueFalse
True
Windows Firewall with Advanced Security settings is included in a file with the .wfw extension. Question 27 options:TrueFalse
True
You can have only one double-colon notation within any IPv6 address. Question 39 options:True False
True
You cannot upgrade a Window Server 2003 or older computer or a computer running any client version of Windows to Windows Server 2012 R2. A. True B. False
True
The infrastructure required to create copies of files on your server for the purpose of quick restores of previous versions
Volume Shadow Services