IST-257 Written Final Exam Review
FAT32 on a Windows 7 system
Alaska, a system administrator, copies important and sensitive encrypted files from an NTFS filesystem to various locations on the network. As the files are encrypted, she is not worried about anyone accessing the files. However, the file copy in one of the locations is no longer secure as it has been decrypted and can be read by anyone who has access to the folder. Which of the locations is most vulnerable to theft among the locations where the files have been copied?
All (system and user environment variables, startup and recovery settings, and power options)
Which of the following features can be configured within Control Panel? (Choose all that apply.)
False
Windows Server 2019 supports up to 64 physical processors and 128 logical processors. True or False?
[a] caching [b] only
A DNS server containing no zones is a [a] ________________________ [b]_________________ DNS Server
authoritative
A DNS server that contains resource records for one or more zones is _____________ for those zones
[a] Active [b] Directory [c] integrated
A [a] _________________ - [b] __________________ [c] _________________ Primary DNS Server contains a read-write copy of a zone file in its Active Directory Database
[a] reverse [b] lookup
A [a]___________ [b]__________ is when DNS Servers resolve an IP Address to a FQDN
primary
A _____________ DNS server contains a read-write copy of a zone
True
A baseline is a set of performance information for a system during normal times of operation. True or False?
[a] print [b] device
A physical printer is called a [a]___________ [b] ___________ (two words)
Using hardware RAID externally to provide fault tolerance.
A server rack containing data files, databases, web content, etc. is stored on an external SAN, which is connected to the Windows Server 2019 operating system via iSCSI. Which of the following is not likely to be achieved with this configuration?
Read
A user is attempting to access a shared file. The file has Full control NTFS permissions and Read permissions at the share level. What is the effective permission for the user on the file?
secondary
A___________ DNS server contains a read-only copy of a zone
True
Access to a shared folder on the network will use the most restrictive permissions, regardless of whether they are NTFS or share permissions. True or false?
[a] print [b] job
After a document is converted to a format that the print device understands, it is called a [a]_____________ [b]____________(two words)
Apply
After creating a production checkpoint of a virtual machine, you would like to revert the virtual machine to the state it was in prior to the checkpoint. What should you select within the Actions pane of Hyper-V Manager after selecting your checkpoint within the Checkpoints pane?
True
After importing a virtual machine template to create a new virtual machine, you should rename the new virtual machine. True or False?
True
Any changes to a guest operating system made following the creation of a checkpoint are stored within a.avhdx file in the same directory as the associated .vhdx file. True or False?
[a] stub [b] DNS [c] server
As with conditional forwarders, a [a]______________ [b]_____________[c] _____________forwards request for a target directly to a DNS server in the target organization
Configuring user quota
Barry, a system administrator, finds that a shared drive on his organization's network is slow because of the huge amount of data stored in it. He realizes that most employees of the company back up all their data on this drive. He wants to restrict the amount of data that each employee stores on the drive. Which of the following steps will help Barry limit employees' space usage?
[a] spool [b] folder
Because Print Servers use a large amount of storage it is good practice to ensure that the [a] __________ [b] __________ is located on a separate storage device
True
Before installing Active Directory on a Windows Server system to function as an additional domain controller within a forest, you must first ensure that the Windows Server is configured to contact a DNS server that contains the appropriate service records for the forest. True or False?
False. (only Generation 2 VMs support Secure Boot)
Both Generation 1 and Generation 2 virtual machines support Secure Boot. True or False?
046
Changes the node type for NetBIOS name resolution 0x08 says query the WINS Server first for NetBIOS name resolution and if that doesn't work broadcast the query
True
Clustering may be used with multiple Windows Server 2019 systems to enhance speed and fault tolerance for network services. True or False?
True
Commands within Windows PowerShell are referred to as cmdlets. True or False?
False
Committed memory refers to the memory that is used by the Windows kernel and device drivers. True or False?
True
Containers are often used to host Web apps within cloud environments. True or False?
False
Creating OUs within the Active Directory database is also called prestaging. True or False?
[a] root [b] hints
DNS Servers contain a [a]________________ [b] _____________ file that contains IP addresses of DNS servers holding top-level DNS zones
Modify
Denji has access to a shared folder on his company's network drive. He updates the data in some files and replaces one of the existing files on the shared folder with a new version. He wants to share the updated files with a colleague who must verify the updated data and make changes if necessary. However, the colleague can only view the file contents, and Denji does not have the rights to grant the required permission. Which of the following NTFS/ReFS folder and file permissions does Denji most likely have that allows him to make the changes mentioned in the scenario but does not allow him to grant the required permissions?
Full control
Devika copies a file, TFPresentation, from a folder titled "Mach-2" to a folder titled "Mach-3" on the same NTFS disk volume. The Mach-2 folder allows Read access to the Editor group, while explicitly denying Write permission to the same group. The Mach-3 folder allows Full control to the Editor group. TFPresentation, the original file, has Modify permissions for the Editor group. What is the effective access of the Editor group on the copied file?
No
Do you think the Keep printed documents setting is a good option to use?
False
Domain controllers store local user accounts within a SAM database and domain user accounts within Active Directory. True or False?
[a] symmetric [b] asymmetric
EFS uses both [a] __________ and [b] __________________ encryption
zone
Each part of a namespace is a _________________________
True
Each server role and feature that is added to a Windows Server 2019 system also adds additional performance objects and counters. True or False?
Configure passive screening
Fayola realizes that many of her colleagues use folders on the network drive to store videos, and this consumes a lot of space on the drive. She asks the employees to delete their videos from the network drive. Which of the following steps can Fayola take to maintain a log whenever a video file is saved on the drive in the future?
The system uses an SSD and not an HDD.
Gabriela attempts to create a virtual disk on a storage pool using Server Manager. However, she is unable to select the Create storage tiers on this virtual disk option. Why do you think she is not able to use the option?
True
Guest operating systems require VMBus drivers to support the virtualized hardware within a Generation 2 virtual machine. True or False?
[a] public [b] symmetric
HTTPS uses a [a] __________ key and a [b]__________ key
Right-click on the disk that you want to configure as a RAID volume and then click New Mirrored Volume to create a RAID level 1 volume with two disks
How do you create a RAID level 1 volume with two disks in the Disk Management tool?
1 MB
How much storage space is reserved on a storage device to convert a storage disk to a dynamic disk using a Windows tool?
[a] HTTP [b] HTTPS
IPP uses [a]____________ or [b]_______________ to print documents to a shared printer that has IPP installed.(use the 4 letter abbreviation and not the entire name for the services)
MX
Identifies the email server
Storage Spaces Direct
Identify the option that can be used to create storage pools that include storage devices from different servers on a network.
Enforced
If a GPO link is configured with the _______________ setting, the GPO settings will be applied to the containers that have Block Policy Inheritance configured
True
If a RODC is stolen, you can delete the computer account to reset affected user and computer accounts. True or False?
True
If a global catalog cannot be placed within a branch office site, you can enable UGMC on the site to ensure branch office domain controllers provide fast authentication. True or False?
cipher.exe
Imala, a research scientist, wants to encrypt a document that contains her research data as she does not want the content to be made public before it is published. She is using the Command Prompt window to configure the encrypt attribute. Which of the following commands should Imala use to configure the encrypt attribute?
Add KettleApp as a keyword in the folder's properties.
Iqbal publishes a shared folder named KettleProgram to Active Directory. He wants other users to be able find the folder using the search feature on File Explorer. However, in addition to finding the folder when searching for KettleProgram, he also wants the folder to show up when users search for "KettleApp." What is the most efficient method that Iqbal can use to enable this?
Read
Joe has the Read Share Permission as a member of the Users group to a file in a shared folder. That folder is on an NTFS formatted volume and Joe has Full Control NTFS permissions to that file. Joe's resulting permission on the file when accessing the file over the network will be ___________? (reference NTFS and share permssion names).
Full Control
Joe has the Read Share Permission as a member of the Users group to a file in a shared folder. That folder is on an NTFS formatted volume and Joe has Full Control NTFS permissions to that file. Joe's resulting permission on the file when accessing the file locally will be ___________? (reference NTFS and share permssion names).
1. On the print client, the user of a software application, such as Microsoft Word, chooses to print their document to a shared printer. 2. The software application contacts a print API (GDI or XPS) on the print client, which stores the document within a spool folder (under C:\Windows\System32\spool\PRINTERS) using the appropriate format, such as EMF or XPS. 3. The documents within the spool folder on the print client may be converted between EMF and XPS formats (to match the requirements of the print device) and rendered using the printer driver to produce a print job. 4. The print job is sent from the print client to the print server across the network using the correct protocol (SMB, IPP, or LPD). 5. The print server stores the print job within a spool folder under C:\Windows\System32\spool\PRINTERS. 6. The print server sends the print job to the locally attached or network-attached print device after the print device acknowledges that it is ready to receive it. 7. The print device proceeds to print the document and notifies the print server that the print job has completed. 8. The print server notifies the print client that the print job has completed. 9. The print client notifies the user that the print job has completed.
List the 9 steps of the printer process of a shared printer in order
True
Many organizations store system documentation in help desk ticketing software. True or False?
Every backup only backs up data that has been modified since the previous backup.
Merjem, a PhD student, is writing her thesis. She takes regular backup of her files and data. When taking backup, she chooses the Faster backup performance option in the Optimize Backup Performance window. Which of the following is true of the backup process in the given scenario?
[a] default [b] forwarders
Most organizations will configure DNS servers as [a]______________ [b]_____________ to relay lookup request that they cannot resolve to ISP DNS servers
1. Discover 2. Offer 3. Request 4. Acknowledge
Move the terms in the correct order to demonstrate the DHCP Lease process.
The performance of file sharing applications will increase.
Nadia uses the Disk Management tool to create a simple volume in one of the disks. She specifies the simple volume size and chooses a drive letter. While selecting the formatting options, she modifies the default allocation unit size. What will happen if the allocation unit size is large?
Right-click the folder, click Properties, highlight the Sharing tab, and click the Advanced Sharing button.
Nodin is a system administrator in training. He is trying to grant the user, Becky Winters, shared folder permissions using Server Message Block. Help Nodin identify the correct sequence to grant Becky Winters Full control shared folder permissions.
Monitoring
On which part of the maintenance cycle do server administrators spend the most time?
Right-click the volume on that disk and click Extend Volume to increase the size of the volume using the unallocated space
One of the disks on your computer is running low on storage space. You notice that there is unallocated space in the spanned volume. How will you use the unallocated space to increase storage space?
Right-click the volume, click Properties, highlight the Tools tab, and click the Optimize button.
Pablo is a system administrator in training. He is trying to manually defragment the F: volume in Becky's system. Help Pablo identify the correct method to perform manual defragmentation.
Another group has the Deny box checked for Read access.
Pavel is an IT project lead at Krystal Engineering. Because of his role, he is part of multiple groups, including the Developer group as well as the Project Manager group. One of the files that he is trying to access, PLStatus.xls, is not opening. Upon investigation, you find that Pavel's user account has Full control permission over the file. The Project Manager group has Modify access but not Full control. The Developer group has Write access but no Read access. What is the most likely reason that Pavel is not able to open the file?
False
Performance baselines are typically created only after installing a new Windows Server 2019 system. True or False?
False
PowerShell console files use the .ps1 extension. True or False?
driver
Print Clients check the printer ________________ each time they connect to the shared printer and automatically update it if there is a more recent copy.
Security
Print permissions are set on the ___________________ tab.
006
Provides the IP address of the DNS server to the client
044
Provides the IP address of the WINS server to the client
003
Provides the IP address of the default gateway to the client
[a] spooling [b] spool
Queuing or [a]______________ is the process of converting a document and storing it in the [b] _____________ folder.
RAID level 0
Rebecca is configuring a RAID with three storage devices. If she saves a file, the file will be divided into three sections, with each section written to separate storage devices concurrently, in a third of the amount of time it would take to save the entire file on one storage device. Which of the following RAID levels is Rebecca configuring?
False
Reliability Monitor displays a system stability index value for each day based on the values of specific performance counters. True or False?
False. (Replication must be enabled on the TARGET Hyper-V host, not your own Hyper-V host)
Replication must be enabled on your Hyper-V host before you are able to copy the contents of a virtual machine to a target Hyper-V host. True or False?
A
Resolves FQDN to an IP address
PTR
Resolves and IP address to an FQDN
CNAME
Resolves one FQDN to another FQDN; also called an alias
True
Resource Monitor allows you to identify the storage devices and files that a single process is accessing. True or False?
Click Set Deduplication Schedule
Rishab is looking for ways to manage duplicate file content on his organization's shared drive. He enables data deduplication for this purpose. To save computing resources, he wants to change the settings such that data deduplication occurs in the evening. What must Rishab do to make this change?
True
Searching an event description or event ID online can generate a list of possible causes and associated solutions for a problem. True or False?
True. (You can add other Windows Server 2008 and later systems to a Server Manager console within Windows Server 2019.)
Server Manager can be used to monitor and manage other Windows Server 2008 and later systems. True or False?
True
Server Manager is typically used to perform most post-installation tasks on a graphical Windows Server 2019 system. True or False?
False
Servers that exist within a data center that is publicly accessible on the Internet are referred to as on-premises servers. True or False?
assigned
Software that is ___________________ under software settings is automatically installed
True
Some software issues require that you modify the value of an entry within the Windows Registry to fix a system problem. True or False?
12 TB
Sonia is configuring a RAID level 5 array with five disks. Each disk has the capacity to store 3 TB of data. What is the total storage size that Sonia can use to store data?
Take
Susan has set the file permissions so that only her account has access to the file. The administrator could change the permissions and gain access since he has the __________ Ownership user right in Group Policy
True
System environment variables apply to any user logged onto the system. True or False?
Create several thin-provisioned virtual disks
Tara, an administrator, has added storage devices to the storage pool and selected the RAID level for the virtual disk using Server Manager. She wishes to allocate more space than is required for the current amount of data such that the system only uses the actual space it needs, enabling the actual size to grow with data. What would you do to achieve Tara's wish?
True
The 192.168.100.0 network falls within the private network range. True or False
False
The Active Directory Recycle Bin can be enabled using the Active Directory Domains and Trusts tool. True or False?
5
The CA public/private key pair expires every ____________ years. (provide number) by default
publish
The List in the directory box allows you to ______________ a printer in the directory ( Active Directory)
False
The Sigverif tool can be used to verify and repair corrupt system files. True or False?
True
The Tab key can be used to auto complete a PowerShell cmdlet as you are typing it. True or False?
True
The Test-NetConnection cmdlet can be used to test network connectivity to a target computer. True or False?
True
The Windows Admin Center allows you to obtain a Windows PowerShell session within your Web browser. True or False?
[a] Manage [b] Documents
The [a]__________ [b] ___________ permission allows users to pause and restart and cancel the print jobs submitted by other users but not delete the printer
[a] Manage [b] Printers
The [a]__________ [b] ___________ permission allows users to pause and restart the printer
The [a]__________ permission allows users to pause, restart and cancel their own print jobs but not those of others
[a] dynamic [b] update
The [a]____________________ [b] _____________________ feature of DNS is used to create SRV records to locate Active Directory Services
Print spooled documents first
The _________________ option allows print jobs that are complete to print regardless of their priority
scope
The ____________________ has the IP configuration for your clients on your network
root
The first CA deployed is known as the ________________ CA
nslookup
The first step in troubleshooting DNS typically involves testing the forward lookup zone with _______________________ (not PING)
False
The minimum memory required for a graphical Windows Server 2019 installation is 512 MB. True or False?
False
The modern partition table is called the Master Boot Record (MBR) and uses storage devices that are larger than 2 TB.
True
The owner of a file can always modify permissions.(True/False)
Security Settings
The password policy container is in the [a] __________ [b]__________ subfolder in the computer configuration folder.
True
The physical network interface used by an external virtual switch is not configured using IP. Instead, it uses the Hyper-V Extensible Virtual Switch protocol to allow virtual network interfaces attached to the external virtual switch to use the physical network interface. True or False?
True
The schema and configuration partitions of the Active Directory database are replicated forest-wide. True or False?
False
There are five event levels available in an event log: Information, Warning, Error, Audit Success, and Audit Failure. True or False?
True
There is also a Local Computer GPO. True or False?
Group Policy Management
To configure GPOs in Active Directory you can use [a] __________ [b]__________ [c] __________ in the tools menu of server manaager
activate
To configure a 2019 server as a DHCP server you must ___________________ the scope
- Create a new virtual machine and install a guest operating system within it - Run the System Preparation Tool within the guest operating system to remove unique identifiers - Export the virtual machine to a folder on the filesystem
To create a virtual machine template, what actions must you perform at minimum? (Choose all that apply.)
MMC
To edit the local GPO you can add the Group Policy Object editor to the _______________(use abbreviation)
gpudate /force
To ensure that the computer and user configuration settings are applied, you can run _____________ at the command prompt window
[a] ipconfig [b] registerdns
To fix missing or mis-configured DNS records you can use [a]______________ / [b]_____________ at the command prompt
True
To prevent a Man-In-The-Middle attack, use public keys endorsed by a certificate authority. True or false?
Group Policy
To simplify the adding of printers on client computers you can use ______________ _______________ to automatically add them to client computers
Group Policy
To use [a] __________ [b]__________ you configure GPOs that have the appropriate settings
Internal External
To which of the following virtual switches can a host operating system connect? (Choose all that apply.)
[a] \\ [b] bluedog [c] \ [d] QTR1
Type in the UNC including the slashes in the correct direction to access the QTR1 folder on the server with the NetBIOS name bluedog (no space) [a]Slash(es)______________ [b]text_____________[c] Slash(es) _____________[d]text__________
Users with the __________________ permission can manage their own print jobs but not those of others
\\servername\sharedprintername
Using SMB you can connect to a shared printer using which of the following?
True
Virtual machine checkpoints are often used prior to making an important configuration change within a guest operating system, such as installing software or device drivers. True or False?
False
Virtual machine settings are stored within a .vhdx file. True or False?
True
WDS can be used to install multiple physical or virtualized systems at the same time, provided those systems can boot from the network using PXE. True or False?
They can list files in the folder or switch to a subfolder, view folder attributes and permissions, and execute files, but cannot view file contents.
What are users who only have the List folder contents permission allowed to do?
Custom view
What can you create in Event Viewer to display specific types of events from one or more event logs?
help Get-WMIObject Get-Help Get-WMIObject get-help Get-WMIObject Get-Help Get-WMIObject -online
What command could you execute within PowerShell to learn about the syntax of the Get-WMIObject cmdlet? (Choose all that apply.)
The file is decrypted and placed onto the FAT32 volume.
What happens if an encrypted file in an NTFS partition on a Windows 10 system is moved to a FAT32 partition on a Windows 7 system?
The folder inherits the share permissions but loses the NTFS permissions.
What happens when a folder with NTFS permissions is copied to a shared folder on a FAT volume?
A domain is a logical grouping of computers that authenticate to a central database of users stored on special servers called domain controllers. When you join a computer to a domain, groups that contain IT administrator user accounts (e.g., Domain Admins) are given administrative access to your computer. This allows IT administrators to easily configure any computer within the domain.
What is a domain, and how does it affect computers and users that are members of the domain?
Domain
What term is used to refer to a logical grouping of computers that participate in Active Directory single sign-on?
Ubuntu 14.04 FreeBSD 9.1
Which of the following operating systems are supported for use within a Generation 2 virtual machine? (Choose all that apply.)
Last Known Good Configuration (advanced)
Which of the following options on the Advanced Boot Options menu can be used to start a system that failed to boot previously due to incorrect settings in the Windows Registry, or a recently added device driver?
Distributed File System (DFS) replication
Which of the following options provided by Windows Server 2019 helps configure folders that are on different servers to synchronize contents?
% Interrupt Time
Which of the following performance counters can be used to identify jabbering hardware?
SAN devices are functionally like an external USB drive.
Which of the following statements is true of SAN devices?
An administrator can take ownership of a file or folder without being granted the permission to do so.
Which of the following statements is true of the ownership of a file or folder?
Delegate responsibility
Which of the following steps is not a common troubleshooting procedure?
- verify the correct time and time zone information - activate the Windows Server 2019 operating system - configure the appropriate computer name & domain membership - set IP configuration on network interfaces
Which of the following tasks are typically performed following a Windows Server 2019 installation? (Choose all that apply.)
System Insights
Which of the following tools within the navigation pane of the Windows Admin Center can be used to perform capacity planning?
External trusts
Which of the following trust relationships can be created between two domains in separate Active Directory forests?
Devices and Printers utility
Which of the following utilities can be used to manually install a new device that is not fully PnP-compliant?
Right-click the process and click Create dump file
Which task should you perform in Task Manager before stopping a problematic process for a program that was created by your organization?
install.wim boot.wim
Which two files must you import within the Windows Deployment Services tool to provide for remote installation?
Block Inheritance
You can configure [a] __________ [b]__________ to prevent user and group accounts in an OU from apply GPO settings
Windows Internet Name Service (WINS)
You can configure a __________________ server for NetBIOS name resolution
Available from
You can limit the printer to only accept print jobs to certain hours by selecting the ______________ option and specifying the time range
Revoked Certificates
[a] __________ [b]__________ lists certificates that have a future expiration date but should not be used.
Rendering
___________________ is converting the document to a format that the print device understands
Mounting
Imran is associating a drive letter to a filesystem so that the drive letter can be accessed by the operating system. What is the term given to the process that Imran is carrying out?
False
In the following example, three loops will be executed. True or False? $args = "one","two","three","four" foreach ($i in $args) {write $i -foregroundcolor magenta}
Site Domain OU
A GPO can be linked to a- pick all that apply
Group Policy Object
A GPO is a [a] __________ [b]__________ [c] ________________(type in the meaning of the letters in the abbreviation)
[a] Dynamic [b] Host [c] Configuration [d] Protocol
A [a] _____________ [b] ____________ [c] _______________ [d] ____________ server configures a network interface (on the clients) with the IP address automatically(use complete words)
[a] forward [b] lookup
A [a]___________ [b]__________ is when DNS Servers resolve a FQDN to an IP Address
True
To install a Windows Server 2019 virtual machine, you typically attach an ISO image file that contains the installation media to a virtual DVD drive within the virtual machine settings. True or False?
Right-click the Unknown device within Device Manager and choose Update driver. Select the manufacturer-provided driver files if prompted.
What should be your first course of action when you see a device marked Unknown within Device Manager?
Restart - Service spooler
When troubleshooting your printer, and there is a print job stuck in the que, for example; you may need to restart the print spooler service. What command would you enter from PowerShell?
Nested virtualization
Which Hyper-V feature allows you to install a virtual machine within another virtual machine?
Standard
Which Windows Server edition supports Windows Containers and up to two Hyper-V Containers?
Connect
Which action should you choose for a virtual machine within the Actions pane in order to obtain the Virtual Machine Connection window?
ATP
Which component of Microsoft Defender can be used to provide cloud-based threat analysis within Windows Server 2019?
Users
Which default folder under a domain within Active Directory Users and Computers contains the Administrator user account and Domain Admins group?
Storage Spaces
Which filesystem feature of Windows Server 2019 allows you to create large volumes that span multiple physical storage devices?
Fast object searching Universal group membership Domain authentication using UPNs
Which functions does the global catalog provide? (Choose all that apply.)
PDC Emulator RID Master Infrastructure Master
Which of the following FSMO roles are stored on one domain controller within each domain? (Choose all that apply.)
Dynamic memory
Which of the following Hyper-V features allows a virtual machine to use additional physical memory within a server, provided that it is available?
Live migration Replication
Which of the following Hyper-V features requires that your host operating system be joined to an Active Directory domain? (Choose all that apply.)
Security
Which of the following Logs stores auditing events?
Move-ADDirectoryServerOperationMasterRole
Which of the following PowerShell cmdlets can be used to move or seize a FSMO role?
switch
Which of the following PowerShell constructs is best to use when you wish to perform a specific action based on the value of a single variable?
RAID level 2
Which of the following RAID level configurations is not supported by Windows Server 2019?
Standard Datacenter
Which of the following Windows Server 2019 editions are licensed per processor core? (Choose all that apply.)
Stop and disable unnecessary services Move applications to other systems Add additional hardware Upgrade hardware devices with bus mastering versions
Which of the following actions can be performed to solve a performance problem? (Choose all that apply.)
sl
Which of the following aliases can be used to switch to a different PowerShell provider?
Processor with Intel VT or AMD-V and SLAT
Which of the following are hardware requirements for Hyper-V?
Performance Events Roles and Features Services
Which of the following are panes that you will see listed for a server, server group, or server role within Server Manager? (Choose all that apply.)
C:\Scripts\superscript.ps1 ./superscript.ps1 .\superscript.ps1
Which of the following are valid methods for executing the superscript.ps1 file within PowerShell, assuming it is in your current directory, C:\Scripts? (Choose all that apply.)
Public Key Digital Signature CRL location the location of the CAs public key certificate name a serial number
Which of the following are/ can be included in a certificate(all that apply)
Rogue processes and memory leaks
Which of the following can be easily identified on the Processes tab of Task Manager? (Choose all that apply.)
Performance counter Event trace provider Windows Registry key
Which of the following can be included in a data collector set? (Choose all that apply.)
Enter-PSSession computername
Which of the following can be used to open a new Windows PowerShell prompt that is connected to a remote computer (provided that winRM is enabled)?
virtmgmt.msc
Which of the following commands may be used to start Hyper-V Manager?
instance
Which of the following components represents a specific hardware device or software component that can be monitored?
Windows Server 2012 Windows Server 2012 R2 Windows Server 2016
Which of the following domain functional levels provides Kerberos armoring? (Choose all that apply.)
Domain local Universal
Which of the following group scopes can contain objects from any domain within the forest? (Choose all that apply.)
IDE hard disk SCSI hard disk (legacy) Serial ports
Which of the following hardware devices does a Generation 1 virtual machine emulate? (Choose all that apply.)
LDAP
Which of the following is a component that enables users to search and locate a shared folder in the Active Directory?
iSCSI initiator
Which of the following is a term given to the software component in the operating system that connects to the SAN device via iSCSI?
Who will be supporting the server?
Which of the following is not a question that should be asked when planning a Windows Server 2019 installation?
Windows Admin Center
Which of the following management tools is NOT installed by default on Windows Server 2019?
The Domain Users group is added to the local Users group. A computer account is created within Active Directory, if one has not been prestaged. The Domain Admins group is added to the local Administrators group.
Which of the following occurs when you join a computer to an Active Directory domain? (Choose all that apply.)
Server Core Nano Server
Which two small footprint installation options are available for Windows Server 2019? (Choose two answers.)
Performance Monitor Data Collector Sets
Which two tools are commonly used to create performance baselines? (Choose two answers.)
NTFS is a journaling filesystem, while FAT32 is not.
While copying files between folders, it is possible to retrace and complete the transfer in case of a power failure if an NTFS-based filesystem is being used. The same cannot be said for a FAT32 filesystem. What do you think could be the reason for this difference?
Create the partitions and label one of the partitions as extended
You are asked to create seven partitions in a storage device that uses an MBR. The device already has two partitions. However, you are also told that you cannot create more than a certain number of partitions on the storage device using an MBR. What would your next step be?
Pause
You can select ___________________ to hold the print job in the print que until you choose to resume it
Sharing
You can share a Printer on the ____________ tab.
True
You can start the Windows Server Configuration Wizard within Server Core by running the sconfig.cmd command. True or False?
False
You can use the Install-ADDSDomain cmdlet within Windows PowerShell to configure a new forest root domain. True or False?
[a] Devices [b] Printers
You can use the [a] _________ and [b] __________ utility to add a printer (just one utilility with 2 words)
Right-click the template user account, and click Copy
You have created a template user account within Active Directory Users and Computers. What must you do to create additional user accounts based on this template user account?
True
You must be a member of the Enterprise Admins group in order to add a trust relationship. True or False?
NTDS Settings
You wish to add a copy of the global catalog to a domain controller within Active Directory Sites and Services. For which object must you right-click and select Properties?
Create a site object for each physical location and ensure that domain controller objects are placed within the correct site object. In the properties of a site link object, configure a replication schedule that excludes business hours.
Your domain consists of two separate physical locations. Each location contains several domain controllers, and you have noticed that domain controller replication traffic consumes a large amount of your Internet bandwidth. What can you do within Active Directory Sites and Services to ensure that replication occurs outside of business hours? (Choose all that apply.)
- Ensure that the SSD is set to an Offline state within the Disk Management tool. - In the properties of the virtual machine, select an existing virtual hard disk, choose Physical hard disk, and select the SSD.
Your server has an additional SSD that you wish to use exclusively within a virtual machine as a pass-through disk to increase performance. What must you do to achieve this? (Choose two answers.)
Create a paging file on the second and third physical storage devices and remove the page file from the first storage device.
Your system has three physical storage devices. Windows Server 2019 is installed on the first physical storage device. What can you do to increase the performance of the system as much as possible?
Administrative Templates
[a] __________ [b]__________ contains several subfolders that can configure different windows components like the control panel and desktop settings
[a] Line [b] Printer [c] Daemon
[a]______________[b]____________[c]_______________ (3 words , no abbreviations) is a UNIX printer sharing protocol
Filtering
________________ GPOs mean you remove the authenticated users and add the users and groups that you wish the GPO settings to apply.
99
________________(enter a number) is a high priority value for a printer. This number is actually the highest priority
1
________________(enter a number) is a low priority value for a printer. This number is actually the lowest priority
Cancel
____________________ removes/deletes a print job from the queue