ITN 200 Exam 3 (Module 9-12)

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

After a container is running, you cannot configure its contents until the container is stopped. (T/F)

False

Block storage is a cheaper alternative to object storage on public cloud providers. (T/F)

False

Committed memory refers to the memory that is used by the Windows kernel and device drivers. (T/F)

False

DirectAccess supports Windows 7 and later remote access clients by default. (T/F)

False

Only schema version 1 certificate templates can be configured for auto-enrollment. (T/F)

False

Organizations that allow Remote Desktop sessions from remote access clients that are not licensed by the organization should choose a Per Device licensing mode when configuring Remote Desktop Services. (T/F)

False

Performance baselines are typically created only after installing a new Windows Server 2019 system. (T/F)

False

Reliability Monitor displays a system stability index value for each day based on the values of specific performance counters. (T/F)

False

Split tunneling is used to ensure that all network traffic generated by a remote access client passes through a VPN to a remote access server. (T/F)

False

The Linux Containers on the Windows (LCOW) feature of Windows Server 2019 allows you to run Linux containers only if Docker EE was obtained using the DockerMsftProvider Windows PowerShell module. (T/F)

False

The Remote Access role service in Windows Server 2019 provides for DirectAccess and VPN remote access, as well as RADIUS. (T/F)

False

The Remote Desktop Licensing role service cannot be installed on the same computer as the Remote Desktop Session Host service. (T/F)

False

The Windows Subsystem for Linux (WSL) allows you to execute Web apps in a virtual machine on Windows Server 2019. (T/F)

False

The docker command is also called the Docker daemon. (T/F)

False

There are five event levels available in an event log: Information, Warning, Error, Audit Success, and Audit Failure. (T/F)

False

There are no GPOs created in an Active Directory domain by default. (T/F)

False

You must enroll each WAP for a certificate based on the RAS and IAS Server certificate template before they can be configured for 802.1X Wireless. (T/F)

False

A baseline is a set of performance information for a system during normal times of operation. (T/F)

True

DirectAccess uses HTTPS to authenticate remote access users, and IPSec to create an encrypted tunnel for network traffic between the remote access client and server. (T/F)

True

Each Linux container run on Windows Server 2019 using LCOW is automatically run as a Hyper-V container that executes on a Linux kernel provided by the LinuxKit component of Docker EE. (T/F)

True

Each server role and feature that is added to a Windows Server 2019 system also adds additional performance objects and counters. (T/F)

True

Firewall profiles contain a series of firewall rules that apply to a computer when it is connected to a particular type of network (public, private, domain). (T/F)

True

Group Policy can be configured to auto-enroll certificates for users and computers based on the permissions in a certificate template on an enterprise CA. (T/F)

True

Group Policy preferences can be used to configure Windows features, but are only interpreted by Windows 7, Windows Server 2008, and later computers by default. (T/F)

True

Many organizations store system documentation in help desk ticketing software. (T/F)

True

Nano Server containers must be run as a Hyper-V container on Windows Server 2019. (T/F)

True

Remote access servers can be configured as RADIUS clients. (T/F)

True

Resource Monitor allows you to identify the storage devices and files that a single process is accessing. (T/F)

True

Searching an event description or event ID online can generate a list of possible causes and associated solutions for a problem. (T/F)

True

The user permission necessary for VPN remote access can be granted in the properties of a user account or remote access policy. (T/F)

True

To reduce the amount of storage that is consumed by updates on a WSUS server, you should configure the WSUS server to only synchronize updates for products that are deployed in your organization. (T/F)

True

Websites on a Web server provide the front end for most Web apps. (T/F)

True

You can import administrative template files into a GPO to allow Group Policy to configure third-party software settings. (T/F)

True

Which of the following VPN protocols uses IPSec to encrypt network traffic? (Choose all that apply.) a. IKEv2 b. PPTP c. SSTP d. L2TP

a. IKEv2 d. L2TP

On which part of the maintenance cycle do server administrators spend the most time? a. Monitoring b. Proactive maintenance c. Reactive maintenance d. Documentation

a. Monitoring

You have created a new Group Policy Object (GPO). To which of the following objects can this GPO be linked? (Choose all that apply.) a. OU b. Group c. Site d. Domain

a. OU c. Site d. Domain

Which two tools are commonly used to create performance baselines? (Choose two answers.) a. Performance Monitor b. Task Manager c. Data Collector Sets d. Event Viewer

a. Performance Monitor c. Data Collector Sets

Which of the following can be included in a data collector set? (Choose all that apply.) a. Performance counter b. Dump files c. Event trace provider d. Windows Registry key

a. Performance counter c. Event trace provider d. Windows Registry key

You wish to configure a GPO that allows users in your organization to install a package using the Programs and Features section of Control Panel. Which software deployment method should you choose when configuring the Software Settings section of a GPO? a. Publish the software in the User Configuration b. Assign the software in the User Configuration c. Publish the software in the Computer Configuration d. Assign the software in the Computer Configuration

a. Publish the software in the User Configuration

You have configured a remote access server in your DMZ for IKEv2 VPN access. Which ports on your NAT router must you configure for port forwarding to this remote access server? (Choose all that apply.) a. TCP port 1723 b. TCP port 1701 c. UDP port 500 d. UDP port 4500

b. TCP port 1701 c. UDP port 500 d. UDP port 4500

Which of the following commands can be used to start the Apache Web server in a Linux container or WSL Linux distribution on a Windows Server 2019 system? a. httpstart b. apachectl start c. apt-get start apache d. apt-get start http

b. apachectl start

Which command can you execute to create a container from the microsoft/iis container image that runs in the background and automatically maps port 80 in the container to a port above 32767 on the underlying operating system? a. docker run -d -P microsoft/iis b. docker run -d -p *:80 microsoft/iis c. docker exec -it -P microsoft/iis d. docker exec -it -p *:80 microsoft/iis

a. docker run -d -P microsoft/iis

Which of the following performance counters can be used to identify jabbering hardware? a. Pages/sec b. % Interrupt Time c. Committed Bytes d. Bytes Total/sec

b. % Interrupt Time

Which section of a GPO contains the most security-related settings for the Windows operating system? a. User Configuration, Windows Settings b. Computer Configuration, Windows Settings c. User Configuration, Administrative Templates d. Computer Configuration, Administrative Templates

b. Computer Configuration, Windows Settings

What can you configure in the Windows Defender Firewall with Advanced Security tool to automatically protect network traffic between computers using IPSec? a. Firewall profiles b. Connection security rules c. IPSec rules d. Security Associations

b. Connection security rules

What can you create in Event Viewer to display specific types of events from one or more event logs? a. Event filter b. Custom view c. Data collector set d. Event alert

b. Custom view

What can you configure on a router to protect traffic destined for another network in the organization as it passes over the Internet? a. Port forwarding b. Demand-dial interface c. Reverse proxy d. DirectAccess

b. Demand-dial interface

Which term refers to the process whereby a user or computer obtains a certificate from a CA? a. PKI b. enrollment c. revocation d. hashing

b. enrollment

Which of the following cloud delivery models uses containers exclusively to run Web apps? a. SaaS b. PaaS c. IaaS d. XaaS

b. PaaS

Which of the following is not included in a certificate? a. Public key b. Private key c. Digital signature d. CRL location

b. Private key

Which of the following Remote Desktop Services role services uses HTTPS to provide encryption for all RDP packets? a. Remote Desktop Connection Broker b. Remote Desktop Gateway c. Remote Desktop Session Host d. Remote Desktop Virtualization Host

b. Remote Desktop Gateway

What must you configure in IIS Manager to allow users to access a help desk ticketing system Web app using the URL https://www.sample.com/helpdesk? (Choose all that apply.) a. A helpdesk virtual directory b. Request filtering c. An HTTPS protocol binding d. The WebSocket protocol

a. A helpdesk virtual directory c. An HTTPS protocol binding

What features does RADIUS provide for remote access connections? a. Centralized logging b. Remote access policies c. Centralized authentication d. Centralized encryption

a. Centralized logging b. Remote access policies c. Centralized authentication

Which of the following VPN authentication methods is considered the most secure? a. EAP b. CHAP c. MS-CHAPv2 d. PAP

a. EAP

Which of the following network topologies should you choose if your DirectAccess remote access server is connected directly to the demarc, as well as to the DMZ? a. Edge b. Connection Broker c. Behind an edge device (with two network adapters) d. Behind an edge device (with a single network adapter)

a. Edge

Which of the following Linux distributions are supported for use with WSL? (Choose all that apply.) a. Fedora b. Ubuntu c. OpenSUSE Leap d. Debian GNU/Linux

a. Fedora b. Ubuntu c. OpenSUSE Leap d. Debian GNU/Linux

Your organization develops a containerized Linux Web app that is run on a public cloud provider. To minimize cloud costs, a continuous deployment process is not used. Instead, Web app developers must add new versions of their Linux Web app to a container and test its functionality locally before running it on the public cloud provider. What could you configure on an existing Windows Server 2019 system to allow the Web app developers in your organization to test new versions of their containerize

a. Hyper-V c. Docker EE d. LCOW

Which certificate template permissions must you grant to a user or computer before they are auto-enrolled for a certificate using Group Policy? (Choose all that apply.) a. Read b. Write c. Enroll d. Autoenroll

a. Read c. Enroll d. Autoenroll

At minimum, which Remote Desktop Services role services must you install to provide session-based desktop deployment across multiple remote access servers? (Choose all that apply.) a. Remote Desktop Session Host b. Remote Desktop Connection Broker c. Remote Desktop Licensing d. Remote Desktop Virtualization Host

a. Remote Desktop Session Host b. Remote Desktop Connection Broker c. Remote Desktop Licensing

Which task should you perform in Task Manager before stopping a problematic process for a program that was created by your organization? a. Right-click the process and click Create dump file b. Right-click the process and click Search online c. Right-click the process and click Analyze wait chain d. Right-click the process and click UAC virtualization

a. Right-click the process and click Create dump file

Which of the following can be easily identified on the Processes tab of Task Manager? (Choose all that apply.) a. Rogue processes b. The number of bytes a process is sending to and from the network c. The files that a process is using d. Memory leaks

a. Rogue processes d. Memory leaks

Which of the following actions can be performed to solve a performance problem? (Choose all that apply.) a. Stop and disable unnecessary services b. Move applications to other systems c. Add additional hardware d. Upgrade hardware devices with bus mastering versions

a. Stop and disable unnecessary services b. Move applications to other systems c. Add additional hardware d. Upgrade hardware devices with bus mastering versions

Group Policy settings apply to which of the following objects? (Choose all that apply.) a. Users b. Computers c. Groups d. OUs

a. Users b. Computers

You are tasked with deploying a private cloud in your organization that needs to host both Windows and Linux Web apps using a SaaS delivery model on a single Windows Server 2019 system. What technology should you configure on the Windows Server 2019 system? a. WSL b. LCOW c. Hyper-V d. Docker EE

a. WSL

Which of the following statements regarding the functionality of WSUS are true? (Choose all that apply.) a. WSUS prevents Microsoft Update traffic from saturating the bandwidth on an organization's Internet connection. b. Group Policy is used to direct domain computers to a WSUS server for updates. c. Updates can be manually or automatically approved for distribution on a WSUS server. d. A WSUS server can be configured to remove updates from computers that have installed them.

a. WSUS prevents Microsoft Update traffic from saturating the bandwidth on an organization's Internet connection. b. Group Policy is used to direct domain computers to a WSUS server for updates. c. Updates can be manually or automatically approved for distribution on a WSUS server. d. A WSUS server can be configured to remove updates from computers that have installed them.

Which of the following must you configure to ensure that a particular group of remote access servers grants Remote Desktop access only to members of the Accounting group? a. RemoteAccess b. RemoteApp c. Collection d. Connection Broker

c. Collection

What section of a remote access policy contains characteristics that must be met for remote access, such as Session Timeout? a. Conditions b. Criteria c. Constraints d. Settings

c. Constraints

Which of the following Windows Defender features can be used to limit the files, folders and processes that ransomware can modify? a. Core isolation b. Memory integrity c. Controlled folder access d. Secure boot

c. Controlled folder access

Which of the following steps is not a common troubleshooting procedure? a. Test possible solutions b. Isolate the problem c. Delegate responsibility d. Collect information

c. Delegate responsibility

To which of the following groups should you assign NTFS/ReFS permissions for Web app content in order to provide anonymous user access? a. IUSRS b. .NET_USRS c. IIS_IUSRS d. WWWUSRS

c. IIS_IUSRS

Which of the following is not considered a remote access technology? a. DirectAccess b. L2TP c. PPPoE d. Remote Desktop

c. PPPoE

In an 802.1X Wireless configuration, which component generates the encryption keys used for WPA? a. WAP b. Wireless client c. RADIUS server d. Domain controller

c. RADIUS server

Which docker command displays container images available on Docker Hub? a. docker images b. docker container images c. docker search d. docker pull

c. docker search

Which of the following port numbers is used to obtain updates from a WSUS server using HTTPS? a. 80 b. 443 c. 8530 d. 8531

d. 8531

In a continuous deployment scenario, which software creates a container or virtual machine on a cloud server to test the functionality of a new Web app version? a. Orchestration b. Code repository c. Workflow d. Build automation

d. Build automation

Which of the following IIS configuration features is used to specify the default webpage or Web app file that a client views? a. Directory Browsing b. Handler Mappings c. Request Filtering d. Default Document

d. Default Document

Which of the following components represents a specific hardware device or software component that can be monitored? a. Performance object b. Performance alert c. Performance counter d. Instance

d. Instance

Which of the following options on the Advanced Boot Options menu can be used to start a system that failed to boot previously due to incorrect settings in the Windows Registry, or a recently added device driver? a. Safe Mode b. Debugging Module c. Disable Driver Signature Enforcement d. Last Known Good Configuration (advanced)

d. Last Known Good Configuration (advanced)

As a server administrator, which of the following actions can you perform on a Remote Desktop connection to provide interactive user support for the user of the session? a. Send Message b. Disconnect c. Duplicate d. Shadow

d. Shadow

Which of the following commands can be used to display containers that are no longer running? a. docker ps b. docker list c. docker images d. docker ps -a

d. docker ps -a


Ensembles d'études connexes

MIS Chapter 8, MIS Chapter 7, MIS Chapter 9

View Set

Chapter 5 Network and Transport Layers

View Set

The Scientific Revolution 10:The Renaissance and Reformation

View Set

IGGY: Chapter 57 Inflammatory Intestinal Disorders

View Set

Chapter 4 and 5 social studies test

View Set

Mitos sobre Cristobal Colon y sus viajes

View Set