IS 4440 Final Exam Study
Having heard the data theft suffered by a competing company by a man-in-the-middle attack, Finn asks Talia, his server admin, to implement measures to prevent such attacks what should she do
Hire the services of a third-party Certification Authority
Which of the following is a component that enables users to search and locate a shared folder in the Active Directory
LDAP
Lin chooses to run a windows web app in a public cloud environment using IaaS. She wants to optimize the cost of running the application on the cloud Which of the following options should Lin choose
She should install a small footprint virtual machine
You are troubleshooting a DHCP server adn discover that it is not dynamically updating DNS records for DHCP clients what is the most likely cause for this issue
The DNS server and DHCP server are in different domains
Which service is a faster replacement for the windows indexing service that is available on windows server 2019?
The windows search service
Which of the following is true of Group Policy Objects (GPOs)
They do not apply to active directory groups
Access to a shared folder on the network will use the most restrictive permissions, regardless of whether they are NTFS or share permissions
True
The subnet mask cannot be modified once a scope is created
True
Andrei enabled the live migration feature of Hyper-V during its installation. he selects a virtual machine called VM1 within Hyper-V Manager and clicks on move within the actions pane. Next, he selects "Move the virtual machine's storage" Which of the following is true of this scenario?
VM1's virtual hard disk files will be moved to the destination server
Which of the following organizations does not need to install a WINS server?
an organization that has disabled NetBIOS on its computers
Kenshin builds a collaboration tool using ASP.NET that allows users to discuss and share files with each other. the files are stored in a web server on a platform managed by a cloud service provider Which of the following IIS role services is integral to the file-sharing feature in Kenshin's web app?
FTP server
Live Migration cannot be enabled if the Hyper-V host operating system is joined to an Active Directory domain.
False
which of the following statements is true of the ownership of a file folder
An administrator can take ownership of a file folder without being granted the permission to do so
Pavel is an IT project leader at Kyrstal Engineering. Because of his role, he is part of multiple groups, including the Developer group as well as the Project Manager group. one of the files that he is trying to access is not opening. Upon investigation, you find that Pavel's user account has Full control permission over the file. The project Manager group has Modify access but not Full control. The Developer group has Write access but no Read access. What is the most likely reason that Pavel is not able to open the file?
Another group has the Deny box checked for Read acess
Imran is associating a drive letter to a filesystem so that the drive letter can be accessed by the operating system. What is the term given to the process that Imran is carrying out?
Mounting
You are investigating strange traffic on your network and wish to resolve an IP address to a DNS name What resource record should you use to perform a reverse lookup
PTR
a user, Petra T, is trying to access their system while the global catalog server for the domain is offline What is the most likely outcome?
Petra T will be allowed to log into the system with cached credentials
Identify a vital service provided by a secondary DNS server
Secondary DNS servers respond to DNS lookup requests using read-only zone files
Alonso, a system admin, has configured and deployed a new GPO at the domain level in his organization. However, when he checks after a few hours, two of the OUs in the active directory do not reflect the change What is the most likely reason why
The block inheritance setting prevented the OUs from applying the GPOs
Viola, a system admin, installs IIS on a web server and creates two websites. She installs the necessary HTTPS encryption certificate on the server and proceeds to bind the HTTPS protocol to the first website using default settings. This binding is successful. Next, she proceeds to bind the HTTPS protocol to the second website which of the following is most likely to cause an issue when binding the HTTPS protocol to the second website
The first website is using port 443, so the second website cannot use the same port
a 257-bit encryption key is twice as difficult to guess compared to a 256-bit encryption key
True
azure active directory can be configured to trust an organization's active directory forest, or mere it using a synchronization device
True
Giselle, a systems admin, creates a file redirection GPO, in the user configuration section that automatically saves files created by colleagues to a shared network device instead of the local drives in their computers. However, the computers do not receive the configuration specified in the GPO. She runs the gpuupdate /force command in the command prompt window of one of her colleagues' computer. Despite her effort, the computer does not receive the GPO, and she decides to rectify the issue the next day. To her surprise, she sees that the computer has been configured as per the GPO Why
The settings can only be applied at next login
What are users who only have the List folder contents permission allowed to do?
They can list files in the folder or switch to a subfolder, view folder attributes and permissions, and execute files, but cannot view file contents
There are two types of event logs in windows server 2019, Microsoft logs and windows logs
false
the term program and process are one and the same
false
to replicate a virtual machine, it is sufficient that replication is enabled on the Hyper-V host of the virtual machine that is being replicated
false
Your organization has installed a new application that fetches project details from a database installed on a windows server 2019 system to perform financial computation. A bug in the application causes the program to fetch details of incorrect project IDs. The network administrator tries reinstalling the operating system, but the issue remains to be fixed can you identify why reinstalling the operation system did not work
the issue was with the software and not the operating system
Miguel is using the new virtual machine wizard to create a new virtual machine for the first time. Which of the following statements is true if Miguel creates a virtual machine with default
the virtual machine will have one GB of memory
Dimitry installs the Hyper-V role using the Add Roles and Features Wizard. Upon completion, he is prompted to reboot the computer. However, his computer reboots twice. Why does dimitry's computer reboot the second time
to allow Hyper-V to start the host operating system
Wat resource record type defines an IPv6 host address in DNS
AAAA record`
Radha has changed the IP address for severy.zone1.com and updated the primary DNS server. She is using nslookup to troubleshoot DNS-related issues on SERVER1. She uses the command prompt and types in the statement nslookup severy.zone1.com. SERVER1 returns an incorrect result If SERVER1 is non-authoritative for this lookup, what should Radha do to resolve this issue?
Clear the DNS Server cache, and clear the DNS cache on the resolver
Asher, a system admin, wants to run containers on windows server 2019. He choooses to install docker using the windows containers component which of the following is a service that will help Asher manage and run docker containers on the server?
Docker Daemon
Amaya is uninstalling the Hyper-V role on a server. When prompted for the location of the virtual machine files, she changes the location from the default to E:\VMs Where will the virtual machine configuration files be stored
E:\VMs\Virtual machines
Hasad is the system admin for a marketing company. The company stores sensitive data in a folder named Assets on the company's network drive. Hasad is asked to identify the users who access the files within the folder or make changes to them. Which of the following step should Hasad take to track all the activity within the folder Assets?
Edit the Default Domain Policy object to enable auditing functionality
Hiroshi is a system administrator at an organization that has offices spread across three locations, Boston, London, and Paris. The organization as an active directory domain, domaina.com, with two domain controllers in each location for the marketing business unit. The company expanded recently and added over 3,000 new users across these locations. Hiroshi Notices that the surgeon users is causing internet congestion because of the active directory replication what is it cost-effective method of dealing with this issue
Hiroshi she creates a objects in specified time intervals for replication using sitelink objects
VLX Learning Media provides IT training solutions to corporates. For the lab activities in these mining sessions, the company runs the lab setup on virtual machines. These virtual machines are hosted by another company, VirtualFMZ, on its servers, but VLX installs and manages the virtual machines, including the different software applications that are required for various training offerings. Which of the following cloud delivery models is exemplified in this scenario
Infrastructure as a Service
Kettle Inc. from Florida merges with Blue Clu Networks from Minneapolis. Minisha, a system administrator, is granted the responsibility of configuring act directly across both locations to enable users from both location to access common resources If Minisha is able to accomplish the task successfully, which of the following must be true
Minisha is a member of the Enterprise admins group in both organizations
While copying files between folders, it is possible to retrace and complete the transfer in case of a power failure if an NTFS-based filesystem is being used. the same cannot be said for a FAT32 filesystem What do you think could be the reason
NTFS is a journaling filesytem, while FAT32 is not
Natalie is a graphic designer who frequently works with large files. These files, which are stored on an NTFS measure 500MB on average. She used a software application to create backups of her work she had. Faced any issues with backing up for files until recently. During a recent backup, she noticed that a newly created folder was not backed up Identify the most likely cause for this issue
Natalie did not enable the archive attribute on the folder
what are the three main container objects within an active directory database
OUs, sites, and domains
Isabella has three virtual machines, VM1, VM2, VM3, on a Windows Server 2019 host. The host and VM1 are connected to a physical switch ( external virtual switch). VM1 AND VM2 are connected to a private virtual switch.VM2 and the hosts are connected to an internal virtual switch. VM3 is not connected to any switch. Isabella is building an application that provides client access to confidential information in a secure database. Isabella chooses to run the application on the host server and decides to implement an N-tier security designed to protect database Where should Isabella place the database?
On VM1
Rebecca is configuring a RAID with two storage devices. If she save a file, the file will be divided into two sections, with each section written to separate storage devices concurrently, in half of the amount of time it would take to save the entire file on one storage device which of the following RAID levels is Rebecca using
RAID level 0
Danielle creates a new scope, Sales LAN, for a DHCP server in her organization. She wants to assign the same IP address to a printer in the sales department every time. WHich of the following folder should Danielle use to configure this option
Reservations
How do you create a RAID level 1 volume with two disks in the disk management tool
Right click on the disk that you want to configure as a RAID volume and then click new mirrored volume to create a RAID level 1 volume with two disks
Identify the option that can be used to create storage pools that include storage devices from different servers on a network
Storage spaces direct
What happens when a folder with NTFS permissions is copied to a shared folder on a FAT volume?
The folder inherits the share permissions but loses the NTFS permissions
Catelin creates a virtual machine template named WindwosServer2019VMTemplate. she wants to import this template, so she opens import virtual machine Wizard and hyper-V manager on SERVERX and proceeds with the process. specify the location D:VMS\Win2019VM1 for the configuration files and virtual hard disks When Catelin clicks finish during the last step in the virtual machine is created, what name will it have?
WindowsServer2019VMTemplate
Fayloa realizes that many of her collogues use the network drive to store videos, and this consumes a lot of space on the drive. She asks the employees to delete their videos from the network drive which of the following steps can Fayola take to maintain a log whenever a video file is saved on the drive in the future
configure passive screening
which of the following options provided by Windows Server 2019 how to configure folders that are on different servers to sync contents
distributed file system (DFS) replication
Block storage can easily be shared by several different Web apps, virtual machines, or containers
false
By default, the only site created within a new forest does not contain any domain controller
false
which of the following statements regarding a domain functional level is accurate?
it represents the oldest Windows Server version that can be used as a domain controller
What happens if an encrypted file in an NTFS partition on a windows 10 system is moved to a FAT32 partition on a windows 7 system?
the file is decrypted and placed onto the FAT32 volume