ITN 200 FINAL QUESTIONS STUDY GUIDE

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Ramona, the chief technical officer of an engineering company, needs to install software on 32-bit computers using GPO. The system network consists of over 500 computers and has a mix of 32-bit and 64-bit computers. How can Ramona ensure that the software is installed only on the 32-bit computers? By using a WMI filter By using the Security Filtering option By setting Group Policy preferences By modifying Software Settings under Group Policy

By using a WMI filter

Skyfelt Graphics is a company that does not own any of the hardware or operating systems on which it creates and runs its Web app containers. These components are owned, maintained, and operated by a cloud provider. Which of the following cloud delivery models is Skyfelt using? Software as a Service Platform as a Service Infrastructure as a Service Mobile as a Service

Platform as a Service

Which of the following RAID level configurations is not supported by Windows Server 2019? RAID level 0 RAID level 1 RAID level 2 RAID level 5

RAID level 2

Ava, a system administrator, configures 45 remote access clients to use the VPN server in the organization using the SSTP protocol. On any day, the number of users that work remotely does not exceed 15, so AVA configures the SSTP VPN protocol for 25 connections on the server. One day, owing to extreme weather, many employees are asked to work from home. When more than 25 users try to connect to the organization's servers, they are not allowed access. Ava uses the Routing and Remote Access tool to increase the number of connections for the SSTP protocol to 45. When she asks these additional users to confirm if they have received access, the users tell her that they are unable to connect to the organization's servers. If some or all of these users were able to remotely connect on a previous occasion, what is the most likely issue in this scenario? The number of connections for the SSTP protocol does not exceed the number of remote access clients. The remote access server was not rebooted after the recent changes. The client systems are running the latest version of Windows 10. The other protocols do not have updates to the number of connections.

The remote access server was not rebooted after the recent changes.

You download multiple container images from Docker Hub and create containers using the docker run command. After a few days, you notice that the list of containers that you have run is quite large. Which of the following commands can you use to shorten this list? docker rmi image docker stop container docker rm container docker container prune

docker container prune

Which of the following is a term given to the software component in the operating system that connects to the SAN device via iSCSI? iSCSI target iSCSI initiator HBA MPIO

iSCSI initiator

Emory install the WSL feature on a Web server. Next, she installs an Ubuntu Linux distribution and creates a new Linux user account, EmoryJ. She logs into the Ubuntu system using this user account. Which of the following is true of this scenario? --Emory can use the EmoryJ user account to run administrative commands as the root user. --By default, EmoryJ is assigned the Administrator or super user of the Linux system. --Emory can use the password assigned to EmoryJ to log into the Linux system as the super user. --By default, each administrative command should be prefixed with the su command.

Emory can use the EmoryJ user account to run administrative commands as the root user.

If multiple GPOs are linked to the same site, domain, or OU, they will be applied in a random order. True False

False

Remote users must manually initiate a VPN connection each time they wish to connect to the resources in their organization when using DirectAccess. True False

False

The IUSRS group in an Active Directory domain or workgroup is used to provide anonymous access to both website and Web app content. True False

False

The Remote Desktop app uses Secure Socket Tunneling Protocol (SSTP) to transfer desktop graphics, keystrokes, and mouse movements to and from the remote access server. True False

False

The modern partition table is called the Master Boot Record (MBR) and uses storage devices that are larger than 2 TB. True False

False

To run a Windows Web app in a public cloud using SaaS, you will need to create, configure, and maintain the associated Windows Server 2019 virtual machine on the public cloud provider's hypervisor. True False

False

Trimming erases sections of the volatile memory chips on an SSD that no longer contain data, consolidating the existing data into fewer memory locations. True False

False

WPA3 is immune to wireless cracking tools because it uses a Wi-Fi password in a different way than WPA2 does. True False

False

When a CA public/private key pair expires, a system administrator must generate a new CA public/private key pair the same day to ensure a smooth transition. True False

False

When configuring the authentication methods for a remote access server, you should select the option Allow remote systems to connect without authentication. True False

False

Rory is managing the Remote Desktop connections to a collection, CollectionX. Two users, Aaron_T and Kwan_J have active connections. If Rory is able to view and interact with Kwan-J's desktop, which of the following statements is true? Rory used the Log off option. Rory used the Disconnect option. Rory used the Send Message option. Rory used the Shadow option.

Rory used the Shadow option.

Which of the following statements is true of SAN devices? SAN devices are the same as network-attached storage. SAN devices use SAN protocols to manage and format filesystems. SAN devices use hardware RAID externally to provide fault tolerance for the storage device that they contain. SAN devices are functionally like an external USB drive.

SAN devices are functionally like an external USB drive.

Merlyn, a developer at Enigma Designs, wants to host a Windows Web app in a public cloud. She prefers to build the app and host it with a public cloud provider. She does not want to deal with the back-end configuration such as setting up the Windows Server 2019, IIS, and Web app frameworks. Which of the following options should Merlyn choose? PaaS SaaS IaaS MaaS

SaaS

Soha wants to build a Web app that analyzes financial details of users and provides them with investment advice. She will be running this app on a public cloud using IIS. If Soha wants to take advantage of applications pools to improve security of her Web app, which of the following should she do? She should generate a group of dynamic-link libraries. She should allow access to the app only using NFS. She should use object storage instead of block storage. She should create the Web app using ASP.NET.

She should create the Web app using ASP.NET.

Which of the following is true of Group Policy Objects (GPOs)? They do not apply to Active Directory groups. They are not strictly enforced. They allow users to configure settings that are applied by GPOs. They are limited to 500 or less users or computers.

They do not apply to Active Directory groups.

Wilmer is creating a new remote access policy for the sales department in the organization. On the Specify Conditions screen of the wizard to create new policies, Wilmer selects the option to grant or deny access according to user dial-in properties. In which of the following circumstances will this permission be used? When a client is authenticated using an unencrypted authentication method When the Idle Timeout and Session Timeout constraints are set to 5 minutes When the access permission on the same screen is set to Access denied When a user account has the Control access through NPS Network Policy option set

When a user account has the Control access through NPS Network Policy option set

How much storage space is reserved on a storage device to convert a storage disk to a dynamic disk using a Windows tool? 1 KB 10 KB 1 MB 10 MB

1 MB

Sonia is configuring a RAID level 5 array with five disks. Each disk has the capacity to store 3 TB of data. What is the total storage size that Sonia can use to store data? 3 TB 8 TB 12 TB 15 TB

12 TB

You are configuring a Windows Server 2016 VPN server using L2TP and NAT. Which of the following is one of the ports that needs to be opened on the firewall for this configuration to work? 1723/TCP 443/TCP 500/TCP 1701/TCP

1701/TCP

What is the level of encryption of the public/private key pair that is contained in the domain-server-CA in Microsoft Server 2019? 256-bit encryption 257-bit encryption 1024 -bit encryption 2048-bit encryption

2048-bit encryption

Which of the following is a requirement for using Storage Spaces Direct? A 10 GB Ethernet network interface with remote-direct memory access (RDMA) support is a must. More than 20 servers must be available. The number of SSDs used should not be more than one. The servers should be from different Active Directory domains.

A 10 GB Ethernet network interface with remote-direct memory access (RDMA) support is a must.

Amber is a hacker who steals information when people enter their personal details on specific websites. She intercepts the public key as it is sent from the Web server to the Web browser and substitutes her own public key in its place. This enables her to intercept the communication and decrypt the symmetric encryption key using her private key. Which type of hacking attack is Amber perpetrating? A denial-of-service attack A man-in-the-middle attack A drive-by attack A malware attack

A man-in-the-middle attack

Sam, an administrator, sends out an HR policy file to Vicky, Mohammad, Charle, and Reena. They save the HR policy file on their home directories under a shared folder of Windows Server 2019 with different file names. As a result, the same copies of the file are present multiple times with different names. Reena opens and saves the file after making minor changes. What will happen to the files when Sam enables the Data Deduplication Service on Windows Server 2019? A copy of Reena's file is created with a new file name. All the files get deleted when the Data Deduplication Service is enabled. A new copy of Reena's file is created and associated with the same file name. None of the files are deleted as they have different file names.

A new copy of Reena's file is created and associated with the same file name.

Fatima is configuring a Windows Server 2019 system as a RADIUS server for use with 802.1X Wireless. She has configured the Network Policy and Access Services server role. What is the next step Fatima should take once the server role has been configured? Configure the Configure 802.1X wizard Activate the server in Active Directory Edit or remove existing RADIUS clients Choose the EAP authentication method

Activate the server in Active Directory

Aria is setting up a Remote Desktop Services server to allow users remote access to the server. At what point in the installation process should Aria reboot the server? Before installing the Remote Desktop Services server role After selecting the role services that Aria wants to install After choosing the desktop deployment type After selecting deployment options

After selecting the role services that Aria wants to install

Yosef has configured Windows Server 2019 as an enterprise CA and deployed a GPO to enroll all the users for certificates. He chooses the setting that will enroll the users when they boot their computers. When he checks whether all users and computers have been enrolled, he finds that five users were not enrolled for the certificate. Yosef was able to manually enroll those users for certificates.Which of the following permissions to the certificate template is most likely to be missing for the five users who did not get enrolled? Read Write Enroll Autoenroll

Autoenroll

David, a system administrator, has created specific GPOs for every department in his organization based on the permissions required by the various departments. However, he needs to apply the Default Domain Policy for some managers but not for the rest of the users. How can David ensure that the Default Domain Policy is applied only to specific managers' accounts? --By using the Block Inheritance setting on the domain-level GPO --By using the Enforced setting on the OU-level GPOs for the OUs that contain the managers' accounts --By removing the Authenticated Users group from the Security Filtering section and adding the managers' accounts --By using a WMI filter to check for conditions under which the Default Domain Policy must be applied

By removing the Authenticated Users group from the Security Filtering section and adding the managers' accounts

Parker runs the net start svsvc command at a Command Prompt to scan volume errors. He finds a corrupted spot on a volume. How can Parker directly go to the corrupted spot identified by the Spot Verifier service? By using the /r option with the chkdsk command By using the /spotfix option with the chkdsk command By using the /c option with the chkdsk command By using the /x option with the chkdsk command

By using the /spotfix option with the chkdsk command

Rishab is looking for ways to manage duplicate file content on his organization's shared drive. He enables data deduplication for this purpose. To save computing resources, he wants to change the settings such that data deduplication occurs in the evening. What must Rishab do to make this change? Enter the file extensions to be excluded Click the Add button under Deduplication Settings Click Set Deduplication Schedule Select the Apply button under Deduplication Settings

Click Set Deduplication Schedule

Tara, an administrator, has added storage devices to the storage pool and selected the RAID level for the virtual disk using Server Manager. She wishes to allocate more space than is required for the current amount of data such that the system only uses the actual space it needs, enabling the actual size to grow with data. What would you do to achieve Tara's wish? Create several thin-provisioned virtual disks Create several thick-provisioned virtual disks Create several fixed-provisioned virtual disks of combined capacity smaller than the storage pool Create several virtual disks of combined capacity smaller than the storage pool​

Create several thin-provisioned virtual disks

You are asked to create seven partitions in a storage device that uses an MBR. The device already has two partitions. However, you are also told that you cannot create more than a certain number of partitions on the storage device using an MBR. What would your next step be? Use the drive letters A and B to label the partitions Create the partitions and label one of the partitions as extended Use a storage device that is more than 7 TB in size and uses an MBR Convert the device to GPT

Create the partitions and label one of the partitions as extended

Damien is configuring DirectAccess for a group of users in his organization. One of the requirements is that the users should be able to access the resources in their organization's network through VPN, but they should use the default gateway on their physical network interface to access websites that are not on the organization's network. Which of the following options should Damien configure on the Enable DirectAccess Wizard? --Damien should not select the Use force tunneling option. --Damien should select the Use force tunneling option. --Damien should select the Enable DirectAccess for mobile computers only option. --Damien should not select the Enable DirectAccess for mobile computers only option.

Damien should not select the Use force tunneling option.

An organization separates its client computers from its servers in a DMZ. The client computers are allowed access to the Internet by connecting to the DMZ. The DMZ is connected to a NAT router. In this scenario, what is the device that will allow the NAT router to connect to the ISP using a last mile technology? Next Generation Firewall Demarcation point Remote access server Point-to-Point Protocol over Ethernet (PPPoE)

Demarcation point

The users at Trembot Information Systems currently need to manually initiate a VPN connection when remotely accessing the organization's servers. Samir, a system administrator at Trembot, receives a request from multiple remote users to simplify the process of accessing the organization's servers. Which of the following options should Samir use? Layer Two Tunneling Protocol DirectAccess Next Generation Firewall Virtual Private Networks

DirectAccess

Asher, a system administrator, wants to run containers on Windows Server 2019. He chooses to install Docker using the Windows containers component. Which of the following is a service that will help Asher manage and run Docker containers on the server? Docker daemon Docker client Docker Hub DockerProvider

Docker daemon

Britta, a system administrator, is managing a website that is running on an IIS web server. Recently, the website was redesigned, and some portions of the website were deleted. Search engines carry links to these deleted portions for specific searches. Britta wants to ensure that when users click on links to deleted portions of the website, they're redirected to a section of the website. Which of the following IIS configuration features should Britta use? Directory Browsing Request Filtering Handler Mappings Error Pages

Error Pages

Merjem, a PhD student, is writing her thesis. She takes regular backup of her files and data. When taking backup, she chooses the Faster backup performance option in the Optimize Backup Performance window. Which of the following is true of the backup process in the given scenario? Every backup overwrites the previous backup. Every backup only backs up data that has been modified since the previous backup. The backup process will provide the fastest option at the time of restoring data. The backup process backs up the all the specified data every time.

Every backup only backs up data that has been modified since the previous backup.

Kyra has set up a remote access server (RAS) in her organization. She has also configured VPN access on the NAT router. Next, she needs to set up the client systems that will be allowed to access the RAS. Kyra wants to ensure that the client and server communicate using the most secure authentication method. Which of the following methods should Kyra ensure is supported on both the client and the server? Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2) Extensible Authentication Protocol (EAP)

Extensible Authentication Protocol (EAP)

Ezra wants to install Docker on a Windows Server 2019 server. He has two options to download and install the Docker Enterprise Edition—either Microsoft or Docker. He chooses to download the package using the DockerProvider Windows PowerShell module. Which of the following justifies Ezra's choice? Ezra wants a stable version of Docker EE. Ezra wants a version of Docker EE provided by Microsoft. Ezra intends to run Windows containers on the server. Ezra intends to run Linux containers on the server.

Ezra intends to run Linux containers on the server.

Kenshin builds a collaboration tool using ASP.NET that allows users to discuss and share files with each other. The files are stored in a Web server on a platform managed by a cloud service provider. Which of the following IIS role services is integral to the file-sharing feature in Kenshin's Web app? FTP Server Web Server Common HTTP Features Web Server Performance IIS Management Tools

FTP Server

Block storage can easily be shared by several different Web apps, virtual machines, or containers. True False

False

Having heard the data theft suffered by a competing company by a man-in-the-middle attack, Finn asks Talia, his server administrator, to implement measures to prevent such attacks in his company. Which of the following should Talia do to ensure that Finn's company is protected from such attacks? Hire the services of a third-party Certification Authority Configure the Block Inheritance setting at OU-level GPOs Run the gpupdate /force command in a Command Prompt window. Run the gpresult /r command in Windows PowerShell.

Hire the services of a third-party Certification Authority

Zuber is configuring Windows Server 2019 as an iSCSI SAN device. He has successfully created an iSCSI virtual disk and a new iSCSI target. He is trying to connect his system to the new iSCSI target but he is facing a connection issue. What must be the cause for the connection issue? IQN is not present in the access server list. CHAP authentication is not enabled. DSM is not be added to the system. JBOD is not enabled in the system.

IQN is not present in the access server list.

VLX Learning Media provides IT training solutions to corporates. For the lab activities in these training sessions, the company runs the lab setup on virtual machines. These virtual machines are hosted by another company, VirtualFMZ, on its servers, but VLX installs and manages the virtual machines, including the different software applications that are required for various training offerings. Which of the following cloud delivery models is exemplified in this scenario? Software as a Service Platform as a Service Infrastructure as a Service Mobile as a Service

Infrastructure as a Service

After configuring the role services on the Remote Desktop server, Jabez creates a collection for the Marketing group in the organization. He specifies multiple remote access servers for the collection. One of the users, Marion, complains to Jabez that whenever she connects to a Remote Desktop session and customizes the settings, these settings are not available to her on her next Remote Desktop session. If Jabez is able to fix this issue while maintaining load balancing, which of the following statements is true? --Jabez removed Marion from the Marketing group and added her to another group. --Jabez removed the Remote Desktop Connection Broker service. --Jabez created a shared folder that is accessible to remote servers in the collection. --Jabez rebooted the remote access server.

Jabez created a shared folder that is accessible to remote servers in the collection.

You are configuring a remote access server in your organization. You install the Direct Access and VPN (RAS) role service along with the Routing role service. On the next configuration screen, which of the following services should you select? LAN routing Demand-dial connections NAT Dial-up access

LAN routing

Michaela is configuring Remote Desktop Services in her organization. She specifies the Remote Desktop Licensing server and proceeds to select the licensing mode. If Michaela selects the Per User licensing mode, which of the following statements is true? --Michaela expects users to connect from both laptops and desktops. --Michaela's organization allows users to connect remotely using their personal computers. --The Remote Desktop Licensing role service is not installed on the remote server. --Michaela has installed an HTTPS encryption certificate for Remote Desktop Web Access.

Michaela's organization allows users to connect remotely using their personal computers.

Imran is associating a drive letter to a filesystem so that the drive letter can be accessed by the operating system. What is the term given to the process that Imran is carrying out? Journaling Formatting Mounting Spanning

Mounting

While copying files between folders, it is possible to retrace and complete the transfer in case of a power failure if an NTFS-based filesystem is being used. The same cannot be said for a FAT32 filesystem. What do you think could be the reason for this difference? NTFS is a filesystem, while FAT32 is not. FAT32 keeps track of information being written, while NTFS does not. FAT32 is only used as a removable device, while NTFS is not. NTFS is a journaling filesystem, while FAT32 is not.

NTFS is a journaling filesystem, while FAT32 is not.

Kelsan Informatics has its client computers connected to a router through which the clients can access the organization's servers in the DMZ. The DMZ is connected to a NAT router that is connected to the Internet. In addition to providing access to the Internet, the NAT router also offers additional capabilities, such as traffic throttling, intrusion prevention, and malware filtering. What is the term for this type of NAT router? Next Generation Firewall Last mile technology Demarcation point Point-to-Point Protocol over Ethernet (PPPoE)

Next Generation Firewall

Runako wants to build a social networking website and host it using a PaaS provider. The social networking website will have users posting and sharing large quantities of media such as videos and images. He is currently evaluating the storage options that the app will need. Which of the following storage options should Runako use and why? Block storage, because it is less expensive than object storage Object storage, because it allows a Web app to directly store objects Persistent volume, because it is faster than block storage Block storage, because it is faster than object storage

Object storage, because it allows a Web app to directly store objects

Madison is using the Backup Schedule Wizard from the Actions pane of the Windows Server Backup tool. He selects the backup configuration as Custom and specifies the items to be backed up. While adding the items to be backed up, he happens to select the System state option. What does this option create a backup of? Operating system settings The entire system Virtual hard disk files Boot and recovery volumes

Operating system settings

After downloading a container image from Docker Hub, you create multiple containers using the docker run command. After a few minutes, you download another container image and create multiple containers. Upon noticing that you are running out of system resources, you decide to stop some containers. Which of the following commands is the best choice to view the containers that are currently running? PS C:\> docker ps -a PS C:\> docker ps -d PS C:\> docker ps PS C:\> docker container prune

PS C:\> docker ps

Mateo uses the following command to search Docker Hub for containers that have IIS installed: PS C:\> docker search iis. The search returns the following options: microsoft/aspnet, microsoft/iis, nanoserver/iis. Mateo wants to download the latest version of the microsoft/iis container from Docker Hub. Which of the following commands can Mateo run to achieve this result? PS C:\> docker tag microsoft/iis latest PS C:\> docker pull microsoft/iis PS C:\> latest docker pull microsoft/iis PS C:\> docker tag microsoft/iis iis

PS C:\> docker pull microsoft/iis

XM GraFix, a graphics design company, has bought new design software. Mason, the system administrator, wants to install the software on all the computers in the design department. However, not all the designers need the software. Using the GPO, Mason uses a deployment method that allows the users to install the program from the network when they need it. Which of the following methods of deployment has Mason most likely used in the given scenario? --Published the software under Software Settings in the Computer Configuration --Published the software under Software Settings in the User Configuration --Assigned the software under Software Settings in the Computer Configuration --Assigned the software under Software Settings in the User Configuratio

Published the software under Software Settings in the User Configuration

Rebecca is configuring a RAID with three storage devices. If she saves a file, the file will be divided into three sections, with each section written to separate storage devices concurrently, in a third of the amount of time it would take to save the entire file on one storage device. Which of the following RAID levels is Rebecca configuring? RAID level 0 RAID level 1 RAID level 2 RAID level 5

RAID level 0

Kim has completed configuring DirectAccess on a remote access server in his organization. He also configures the users' computers and enables DirectAccess. While the laptop users are able to use DirectAccess, desktop users email Kim to let him know that they're unable to use DirectAccess. If Kim is able to resolve this issue successfully, which of the following options on the Remote Access Setup pane did Kim use? Remote Access Server Remote Clients Infrastructure Servers Application Servers

Remote Clients

What role service available through Remote Desktop Services enables clients to establish an encrypted connection to virtual desktops and RemoteApp programs to an RDS server through the Internet using HTTPS? Remote Desktop Licensing Remote Desktop Virtualization Host Remote Desktop Web Access Remote Desktop Gateway

Remote Desktop Gateway

Zahara is accessing an application installed on her organization's remote access server from her laptop. She saves output from the application into a file on the server. She opens the saved file on the server and prints it using her local printer. Which of the following protocols is employed in this scenario? Remote Desktop Protocol Password Authentication Protocol Point-to-Point Tunneling Protocol Layer Two Tunneling Protocol

Remote Desktop Protocol

Asa is working from home. She launches an application from the Start menu on her computer. The application is running on the remote access server in her organization. She is able to see and manipulate the application's graphical interface on her computer without running a full graphical desktop of the remote server. Which of the following Remote Desktop services server role allows this behavior of the application? Remote Desktop Gateway Remote Desktop Licensing Remote Desktop Virtualization Host Remote Desktop Web Access

Remote Desktop Web Access

Hiro is working remotely. His current role requires him to access his organization's resources that are running on the remote access server. He opens the Microsoft Outlook application that is running on the remote access server on his system. He is able to manipulate actions within the application on his system. If Hiro was able to launch Microsoft Outlook directly from his computer, without accessing the desktop of the remote server, which of the following options is he using? Remote Desktop app Virtual Private Network RemoteApp DirectAccess

RemoteApp

Valentina decides to install the Docker EE package on a Windows server. She wants to download the latest stable version of the package, so she chooses to install Docker using the DockerMsftProvider module. She enters the following commands in the Windows PowerShell window: PS C:\> Install-Module -Name DockerMsftProvider -XXXX psgallery -Force PS C:\> Install-Package -Name docker -ProviderName DockerMsftProvider Identify the correct code that should replace XXXX. Repository RequiredVersion preview DockerProvider

Repository

How do you create a RAID level 1 volume with two disks in the Disk Management tool? --Right-click on the disk that you want to configure as a RAID volume and then click New Mirrored Volume to create a RAID level 1 volume with two disks --Right-click on the disk that you want to configure as a RAID volume and then click New Spanned Volume to create a RAID level 1 volume with two disks --Right-click on the disk that you want to configure as a RAID volume and then click New Striped Volume to create a RAID level 1 volume with two disks --Right-click on the disk that you want to configure as a RAID volume and then click Shrink Volume to create a RAID level 1 volume with two disks

Right-click on the disk that you want to configure as a RAID volume and then click New Mirrored Volume to create a RAID level 1 volume with two disks

One of the disks on your computer is running low on storage space. You notice that there is unallocated space in the spanned volume. How will you use the unallocated space to increase storage space? --Right-click the volume, click Reactivate Volume once the storage device is available, and use the unallocated space --Right-click the volume on that disk and click Extend Volume to increase the size of the volume using the unallocated space --Right-click a RAID level 1 volume and click Remove Mirror to remove the volume while retaining the data from one disk you specify --Right-click the system or boot partition in the Disk Management tool, click Add Mirror, and select the second storage device

Right-click the volume on that disk and click Extend Volume to increase the size of the volume using the unallocated space

Pablo is a system administrator in training. He is trying to manually defragment the F: volume in Becky's system. Help Pablo identify the correct method to perform manual defragmentation. ​ Right-click the volume, click Properties, highlight the Tools tab, and click the Optimize button. Right-click the volume, click Properties, highlight the Tools tab, and click the Check button. Write the "Repair-Volume-DriveLetter F -Scan" command in Windows PowerShell. Write the "Optimize-Volume -DriveLetter" command in Windows PowerShell.

Right-click the volume, click Properties, highlight the Tools tab, and click the Optimize button.

Lin chooses to run a Windows Web app in a public cloud environment using IaaS. She wants to optimize the cost of running the application on the cloud. Which of the following options should Lin choose? She should install the Datacenter Edition of Windows Server 2019. She should start with maximum recommended configuration. She should purchase more block storage than object storage. She should install a small footprint virtual machine.

She should install a small footprint virtual machine.

Lashonda, a system administrator, installs a remote access server in her organization. The remote access server is connected directly to the demarc. Additionally, the remote access server is configured as a NAT router. When configuring the remote access server, which of the following is Lashonda most likely to do? She will select the Demand-dial connections service. She will select the LAN routing service. She will install the Web Application Proxy role service. She will select the Dial-up access service.

She will select the Demand-dial connections service.

Identify the option that can be used to create storage pools that include storage devices from different servers on a network. Storage Spaces Direct A combination of hard disks and SDDs A thin-provisioning virtual disk The primordial storage pool

Storage Spaces Direct

Alonso, a system administrator, has configured and deployed a new GPO at the domain level in his organization. However, when he checks after a few hours, two of the OUs in the Active Directory do not reflect the change. What is the most likely reason the new GPO configuration did not apply to the two OUs? --The OUs were under another domain. --The Block Inheritance setting prevented the OUs from applying the GPOs. --The users under the OUs declined the domain-level setting when prompted. --The GPO link was configured with the Enforced setting.

The Block Inheritance setting prevented the OUs from applying the GPOs.

Maqsud installs IIS on a Windows Server 2019 server. To allows users to connect to Default Web Site using HTTPS, he installs an HTTPS encryption certificate on the Web server. Next, he configures Default Web Site to respond to HTTPS requests. However, when users connect to the website using HTTPS, they receive a security warning. Which of the following is most likely causing this issue? The TCP port number is set to 443 and not 80. The FQDN in the HTTPS certificate does not match the Web server FQDN. The HTTPS encryption certificate is installed on the Web server. The website is already configured to respond to HTTP requests.

The FQDN in the HTTPS certificate does not match the Web server FQDN.

You set up a Windows Server 2019 system and install the Docker EE package. The server also has IIS installed. Next, you enable LCOW and run a Linux container. Which of the following is true of this scenario? The Docker EE package was installed using DockerMsftProvider. The Web server is running Windows containers. The Linux kernel provided by Docker runs on the Hyper-V hypervisor. The Linux container runs on a Docker component called Docker Hub.

The Linux kernel provided by Docker runs on the Hyper-V hypervisor.

Which of the following is a necessary condition if you want to configure a reverse proxy instead of port forwarding on a NAT router to enable access to a remote access server? The remote access server should be outside the DMZ. The NAT router must be configured to forward remote access requests. The NAT router should be a Next Generation Firewall. The remote access server should be connected directly to the demarc.

The NAT router should be a Next Generation Firewall.

Sasha is configuring Windows Server 2019 as an enterprise CA. She installs the Active Directory Certificate Services server role and is prompted to choose the role services that she wishes to install. Which of the following role services should Sasha select to ensure that routers are allowed to obtain certificates? The Online Responder role service The Network Device Enrollment Service role service The Certificate Enrollment Policy Web Service role service The Certification Authority Web Enrollment role service

The Network Device Enrollment Service role service

TravelBugz is a website that reviews accommodations and holiday destinations. Users of the website can post their own reviews. Users can use the TravelBugz app too instead of the website if they want to. The app and website both directly access the Web app running on the cloud to store and retrieve data. Which of the following is true of this scenario? The TravelBugz website can be accessed from a browser using the TCP/IP protocol. The TravelBugz app communicates with the Web app using the TCP/IP protocol. The TravelBugz app communicates with the Web app using the HTTPS protocol. The app and website communicate with each other using the TCP/IP protocol.

The TravelBugz app communicates with the Web app using the TCP/IP protocol.

Viola, a system administrator, installs IIS on a Web server and creates two websites. She installs the necessary HTTPS encryption certificate on the server and proceeds to bind the HTTPS protocol to the first website using default settings. This binding is successful. Next, she proceeds to bind the HTTPS protocol to the second website. Which of the following is most likely to cause an issue when binding the HTTPS protocol to the second website? --The HTTPS encryption certificate should not be installed on the Web server. --IIS cannot run multiple websites simultaneously. --The first website is using port 443, so the second website cannot use the same port. --A Web server cannot be configured to host more than one website with HTTPS binding.

The first website is using port 443, so the second website cannot use the same port.

Shaw, a server administrator, uses an iSCSI SAN protocol to transfer data to and from SAN devices at a speed of up to 40 Gb/s. He configures one of the SAN devices to provide storage to Jasper's Windows Server 2019 system. What should Jasper configure in his system to be able to connect to the storage? The iSCSI target The iSCSI initiator HBA MPIO

The iSCSI target

You enable LCOW on a Windows Server 2019 system that already has IIS installed. The server is also used to run Windows containers. Next, you download and run some Linux containers. You disable LCOW and run the docker images command. What will be the result in this scenario? The list of Windows container images will be displayed. The list of Linux container images will be displayed. All container images on the system will be displayed. None of the container images on the system will be displayed.

The list of Windows container images will be displayed.

Nadia uses the Disk Management tool to create a simple volume in one of the disks. She specifies the simple volume size and chooses a drive letter. While selecting the formatting options, she modifies the default allocation unit size. What will happen if the allocation unit size is large? The performance of file sharing applications will increase. The performance of database applications will increase. The performance of file sharing applications will decrease. The performance of database applications will decrease.​

The performance of file sharing applications will increase.

Noortje, an employee of Cutleaf Productions, is working from home. She restarts her laptop to install an operating system update. After the restart, the Noortje is able to access the organization's file server without initiating a connection to the VPN. Which of the following is true of this scenario? --The remote access server also contains a network location server. --Noortje had established a VPN connection before the system was restarted. --Noortje is using a Windows 7 operating system. --The client is using IPv4 packets to authenticate to the remote access server.

The remote access server also contains a network location server.

Giselle, a systems administrator, creates a file redirection GPO, in the User Configuration section that automatically saves files created by her colleagues to a shared network device instead of the local drives in their computers. However, the computers do not receive the configuration specified in the GPO. She runs the gpupdate /force command in the Command Prompt window of one of her colleagues' computer. Despite her effort, the computer does not receive the GPO, and she decides to rectify the issue the next day. To her surprise, she sees that the computer has been configured as per the GPO. What do you see as the issue with the GPO configuration? --The GPO was not backed up before the new settings were applied. --The settings can only be applied at the next login. --The computer had to be rebooted for the application of the GPO settings. --The Block Inheritance setting was enabled for the OU that the computers belonged to.

The settings can only be applied at the next login.

Gabriela attempts to create a virtual disk on a storage pool using Server Manager. However, she is unable to select the Create storage tiers on this virtual disk option. Why do you think she is not able to use the option? She enters the wrong virtual disk name. She is not using the New Virtual Disk Wizard. The system uses an SSD and not an HDD. The storage spool does not have sufficient space.

The system uses an SSD and not an HDD.

Amina, who works for a pharmaceutical company, configures and issues the Smartcard Logon certificate template with schema version 2. While most of the users get auto-enrolled, some of the users fail to obtain the certificate. Identify the most likely reason auto-enrollment failed for these users. Their operating system is Windows XP. They have the Block Inheritance setting at the OU level. The template did not have the Enforced setting. Their operating system is Windows 2000.

Their operating system is Windows 2000.

Theodore installs a Fedora Linux distribution on a Windows Server 2019 server. He initially uses the sudo command to perform system administration on the Linux system. Later, he opens a new command prompt and runs some more administrative commands. Which of the following must be true if Theodore did not use the sudo command during the second round of administrative changes? Theodore used the sudo command to open the Linux command prompt. Theodore used the sudo passwd root command. Theodore used the su command to run commands as the root user. Theodore used the pwd command.

Theodore used the sudo passwd root command.

Trang, a system administrator, is configuring a DHCP relay on the remote access server. She needs to configure the DHCP relay agent to listen for DHCPDISCOVER packets on a network interface. Which of the following statements is true of this scenario? --Trang should add a DHCP relay agent for IPv6 before proceeding with the next step. --Trang should reboot the remote access server before proceeding with the next step. --Trang should select the network interface that is connected to the DHCP clients. --Trang should select the network interface that is connected to the DMZ.

Trang should select the network interface that is connected to the DMZ.

A 257-bit encryption key is twice as difficult to guess compared to a 256-bit encryption key. True False

True

Container images that are based on Nano Server must be run as Hyper-V containers. True False

True

LCOW requires that each Linux container run on a separate Linux kernel and achieves this by automatically running each Linux container as a Hyper-V container. True False

True

Using a disk management tool, you can create a GPT on a disk that has an MBR when no partitions exist on a disk. True False

True

You can obtain a Remote Desktop session by navigating to https:// server/RdWeb in a Web browser, where server is the FQDN of the Remote Desktop Web Access server. True False

True

A server rack containing data files, databases, web content, etc. is stored on an external SAN, which is connected to the Windows Server 2019 operating system via iSCSI. Which of the following is not likely to be achieved with this configuration? Connection to Fibre Channel SAN devices Accessing multiple SAN devices Providing storage to other servers Using hardware RAID externally to provide fault tolerance

Using hardware RAID externally to provide fault tolerance

An organization has published applications on its web servers. The applications are accessible to users in the organization when they are authenticated via Active Directory. What RAS capability will allow the organization's applications to be accessible to users outside of the organization? Virtual Private Networks Web Application Proxy DirectAccess RemoteApp

Web Application Proxy

Isabella installs a Fedora Linux distribution on a Windows Server 2019 server. Next, she installs the Apache Web server on this system. Because the server is also running IIS that uses port 80, Isabella modifies the port number for the Apache Web server. Which of the following commands must Isabella run to ensure that she did not make a syntax error during the recent change? install apache2 apachect1 start apachect1 configtest vim file

apachect1 configtest

Stephen sets up manual enrollment for a user certificate from an enterprise CA. However, as he completes the process, he realizes that he has accidently set up the enrollment for a computer certificate rather than a user certificate. Which of the following commands did Stephen most likely type in the Command Prompt window? certmgr.msc certlm.msc wf.msc gpedit.msc

certlm.msc


Ensembles d'études connexes

Fahmy 3030 THE HUNCHBACK OF NOTRE DAME 1

View Set

Exam 1 - Selling (Ch.1-4 Quizzes)

View Set

Bio 111 Ch. 9 & 10 Mitosis and Meiosis

View Set

Spanish 2 - Lección 6 - Prueba de práctica

View Set