ITN 200 Midterm Preparation

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

5-1) Which of the following occurs when you encrypt a file using EFS within a domain environment?(Choose all that apply.)

A symmetric encryption key is generated and used to encrypt the file contents A copy of the symmetric encryption key is stored within the file metadata and asymmetrically encrypted with recovery agent's public key A copy of the symmetric encryption key is stored within the file metadata and asymmetrically encrypted with your public key

Which component of Microsoft Defender can be used to provide cloud-based threat analysis within Windows Server 2019?

ATP

5-16) You would like to provide a central shared folder that users can access to view all other shared folders within the organization. What must you do?(Choose all that apply.)

Add targets to the DFS namespace for each shared folder install the DFS Namespaces role and configure a DFS namespace

Which of the following are valid methods for executing the superscript.ps1 file within PowerShell, assuming it is in your current directory, C:\Scripts? (Choose all that apply.)

C:\Scripts\superscript.ps1, ./superscript.ps1, .\superscript.ps1

You are in the process of installing Windows Server 2019 Standard Edition on your computer. You have downloaded the corresponding ISO file and burned it to a DVD. Which of the following steps should you take next?

Change the boot order in the BIOS.

Your system has three physical storage devices. Windows Server 2019 is installed on the first physical storage device. What can you do to increase the performance of the system as much as possible

Create a paging file on the second and third physical storage devices and remove the page file from the first storage device

Your domain consists of two separate physical locations. Each location contains several domain controllers, and you have noticed that domain controller replication traffic consumes a large amount of your Internet bandwidth. What can you do within Active Directory Sites and Services to ensure that replication occurs outside of business hours? (Choose all that apply.)

Create a site object for each physical location and ensure that domain controller objects are placed within the correct site object. In the properties of a site link object, configure a replication schedule that excludes business hours.

Which of the following utilities can be used to manually install a new device that is not fully PnP-compliant?

Devices and Printers utility

What term is used to refer to a logical grouping of computers that participate in Active Directory single sign-on?

Domain

Don is the system administrator for an organization that conducts virtual IT training sessions. Each participant, during these training sessions, creates multiple unique applications to address various problems. The applications have different hardware resource requirements. Don needs to set up a virtual lab with twenty Windows operating systems on 1 TB storage space for two different training programs. Help Don choose the right size of the virtual hard disk files.

Don should use thin provisioning.

5-7) Your organization maintains a shared folder called PrivateHR that only the HumanResources-G and Domain Admins groups have access to. You wish to audit each time a member of the HumanResources-G group successfully modifies or deletes a file within this folder. What must you do? (Choose all that apply.)

Enable success auditing for the system using an audit policy Configure an audit entry within the SACL of the PrivateHR folder that audits the Modify permission for the HumanResources-G group

Which of the following can be used to open a new Windows PowerShell prompt that is connected to a remote computer (provided that winRM is enabled)?

Enter-PSSession computername

Which of the following trust relationships can be created between two domains in separate Active Directory forests?

External trusts

(T/F) Both Generations 1 and 2 virtual machines support Secure Boot.

False

(T/F) Replication must be enabled on your Hyper-V host before you are able to copy the contents of a virtual machine to a target Hyper-V host.

False

5-10) The View effective access tab within the Advanced Security Settings window for a folder or file can be used to view the groups that have access to a particular folder or file.True or False?

False

5-17) You are configuring a DFS replication group to synchronize folder contents between four file servers. To minimize the network bandwidth used by DFS replication, you should choose a Full mesh topology for your replication group. True or False?

False

Creating OUs within the Active Directory database is also called prestaging.

False

Domain controllers store local user accounts within a SAM database and domain user accounts within Active Directory.

False

In the following example, three loops will be executed.$args = "one","two","three","four"foreach ($i in $args) {write $i -foregroundcolor magenta}

False

PowerShell console files use the .ps1 extension.

False

Servers that exist within a data center that is publicly accessible on the Internet are referred to as on-premises servers. True or False?

False

The Active Directory Recycle Bin can be enabled using the Active Directory Domains and Trusts tool.

False

The Sigverif tool can be used to verify and repair corrupt system files.

False

The minimum memory required for a graphical Windows Server 2019 installation is 512 MB. True or False?

False

Windows Server 2019 supports up to 64 physical processors and 128 logical processors. True or False?

False

You can use the Install-ADDSDomain cmdlet within Windows PowerShell to configure a new forest root domain.

False

Which functions does the global catalog provide? (Choose all that apply.)

Fast object searching Universal group membership Domain authentication using UPNs

Which of the following features can be configured within Control Panel? (Choose all that apply.)

File caching and flushing, Environment variables, Power options, Startup and recovery options

Which of the following statements is true of a client on a computer network?

It is a computer that requests for resources from another computer on the network.

5-4) Which of the following basic NTFS/ReFS permissions allows you to delete a file?(Choose all that apply.)

Modify Full control

You wish to add a copy of the global catalog to a domain controller within Active Directory Sites and Services. For which object must you right-click and select Properties?

NTDS Settings

Which two small footprint installation options are available for Windows Server 2019? (Choose two answers.)

Nano server Server core

Which Hyper-V feature allows you to install a virtual machine within another virtual machine?

Nested virtualization

Which of the following FSMO roles are stored on one domain controller within each domain? (Choose all that apply.)

PDC Emulator RID Master

Which of the following are hardware requirements for Hyper-V?

Processor with Intel VT or AMD-V and SLAT

5-5) You wish to grant a specific user the ability to view the read-only attribute on files within a particular folder on the system, but do not wish to grant any other access. What advanced permission should you assign to this user?

Read attributes

5-14) Which of the following NFS shared folder permissions allows computers to access an NFS shared folder and modify content?

Read-Write

What should be your first course of action when you see a device marked Unknown within Device Manager?

Right-click the Unknown device within Device Manager and choose Update driver. Supply the manufacturer-provided driver files if prompted.

You have created a template user account within Active Directory Users and Computers. What must you do to create additional user accounts based on this template user account?

Right-click the template user account, and click Copy

Which of the following are panes that you will see listed for a server, server group, or server role within Server Manager? (Choose all that apply.)

Services, Events, Roles and Features, Performance

5-3) Which of the following can be used to set the compress attribute for an NTFS file?(Choose all that apply.)

Set-ItemProperty compact.exe

5-13) You would like to share a folder that uses the access-based enumeration feature. What must you do?

Share the folder using SMB using Server Manager

Which Windows Server edition supports Windows Containers and up to two Hyper-V Containers?

Standard

Which of the following Windows Server 2019 editions are licensed per processor core? (Choose all that apply.)

Standard Datacenter

Which filesystem feature of Windows Server 2019 allows you to create large volumes that span multiple physical storage devices?

Storage Spaces

Which of the following tools within the navigation pane of the Windows Admin Center can be used to perform capacity planning?

System Insights

5-9) You are about to move an EFS-encrypted file called SecureData.xml from a folder on an NTFS volume to a folder on a ReFS volume. Which of the following statements are true regarding the permissions and encryption on the file following the move operation?(Choose all that apply.)

The SecureData.xml will be not be encrypted following the move operation SecureData.xml will inherit the permissions from the target folder following the move operation

5-11) You have shared a folder using SMB and assigned members of the Accounting group Full Control shared folder permission. One of the members of the Accounting group complains that they get an access denied message when attempting to access files within the shared folder. What are two possible causes of this issue?(Choose two answers.)

The shared folder is on an NTFS or ReFS volume, and the DACL on the files does not allow the user access The shared folder is on an NTFS or ReFS volume, and the DACL on the files denies access to a group to which the user belongs

Identify the true statement about Type 2 hypervisors.

They can run multiple operating systems on a single host.

(T/F) After importing a virtual machine template to create a new virtual machine, you should rename the new virtual machine

True

(T/F) Any changes to a guest operating system made after the creation of a checkpoint are stored within a .avhdx file in the same directory as the associated .vhdx file.

True

(T/F) Guest operating systems require VMBus drivers to support the virtualized hardware within a Generation 2 virtual machine.

True

(T/F) The physical network interface used by an external virtual switch is not configured using IP. Instead, it uses the Hyper-V Extensible Virtual Switch protocol to allow virtual network interfaces attached to the external virtual switch to use the physical network interface.

True

(T/F) Virtual machine checkpoints are often used prior to making an important configuration change within a guest operating system, such as installing software or device drivers.

True

(T/F) WDS can be used to install multiple physical or virtualized systems at the same time, provided those systems can boot from the network using PXE

True

5-12) Windows systems that have the Client for NFS installed can access an NFS shared folder by browsing the network or specifying the shared folder's UNC.True or False?

True

5-15) Both NFS and SMB shared folders can be published to Active Directory.True or False?

True

5-2) Only the NTFS filesystem supports all of the basic and advanced attributes for folders and files.True or False?

True

5-6) You can use the Set-ACL cmdlet within Windows PowerShell to configure entries within a DACL or SACL.True or False?

True

Before installing Active Directory on a Windows Server system to function as an additional domain controller within a forest, you must first ensure that the Windows Server is configured to contact a DNS server that contains the appropriate service records for the forest.

True

Clustering may be used with multiple Windows Server 2019 systems to enhance speed and fault tolerance for network services. True or False?

True

Commands within Windows PowerShell are referred to as cmdlets. True or False?

True

Containers are often used to host Web apps within cloud environments. True or False?

True

If a RODC is stolen, you can delete the computer account to reset affected user and computer accounts

True

If a global catalog cannot be placed within a branch office site, you can enable UGMC on the site to ensure branch office domain controllers provide fast authentication.

True

Server Manager can be used to monitor and manage other Windows Server 2008 and later systems.

True

Server Manager is typically used to perform most post-installation tasks on a graphical Windows Server 2019 system. True or False?

True

Some software issues require that you modify the value of an entry within the Windows Registry to fix a system problem.

True

System environment variables apply to any user logged onto the system.

True

The Tab key can be used to auto complete a PowerShell cmdlet as you are typing it.

True

The Test-NetConnection cmdlet can be used to test network connectivity to a target computer.

True

The Windows Admin Center allows you to obtain a Windows PowerShell session within your Web browser.

True

The schema and configuration partitions of the Active Directory database are replicated forest-wide.

True

To install a Windows Server 2019 virtual machine, you typically attach an ISO image file that contains the installation media to a virtual DVD drive within the virtual machine settings. True or False?

True

You can start the Windows Server Configuration Wizard within Server Core by running the sconfig.cmd command. True or False?

True

You must be a member of the Enterprise Admins group in order to add a trust relationship.

True

Which default folder under a domain within Active Directory Users and Computers contains the Administrator user account and Domain Admins group?

Users

Which of the following tasks are typically performed following a Windows Server 2019 installation? (Choose all that apply.)

Verify the correct time and time zone information Activate the Windows Server 2019 operating system Configure the appropriate computer name and domain membership Set IP configuration on network interfaces

Walter Wells, Inc., a company that builds robotic process automation (RPA) applications, uses Windows Server 2016 to run several Linux and Windows virtual machines. Which of the following statements, if true, would make upgrading to Windows Server 2019 a good choice?

Walter Wells spends a considerable amount of money on encrypting Linux virtual machines.

Which of the following is not a question that should be asked when planning a Windows Server 2019 installation?

Who will be supporting the server?

Which of the following management tools is not installed by default on Windows Server 2019?

Windows Admin Center

Which of the following domain functional levels provides Kerberos armoring? (Choose all that apply.)

Windows Server 2012 Windows Server 2012 R2 Windows Server 2016

To create a virtual machine template, what actions must you perform at minimum? (Choose all that apply.)

a. Create a new virtual machine and install a guest operating system within it c. Run the System Preparation Tool within the guest operating system to remove unique identifiers d. Export the virtual machine to a folder on the filesystem

Which of the following hardware devices does a Generation 1 virtual machine emulate? (Choose all that apply.)

a. IDE hard disk b. SCSI hard disk (legacy) d. Serial ports

Which of the following Hyper-V features requires that your host operating system be joined to an Active Directory domain? (Choose all that apply.)

a. Live migration c. Replication

After creating a production checkpoint of a virtual machine, you would like to revert the virtual machine to the state it was in prior to the checkpoint. What should you select within the Actions pane of Hyper-V Manager after selecting your checkpoint within the Checkpoints pane?

a. apply

Which two files must you import within the Windows Deployment Services tool to provide for remote installation?

a. install.wim d. boot.wim

To which of the following virtual switches can a host operating system connect? (Choose all that apply.)

a. internal b. external

Which of the following occurs when you join a computer to an Active Directory domain? (Choose all that apply.)

b. A computer account is created within Active Directory, if one has not been prestaged. c. The Domain Users group is added to the local Users group. d. The Domain Admins group is added to the local Administrators group

Which action should you choose for a virtual machine within the Actions pane in order to obtain the Virtual Machine Connection window?

b. Connect

Which of the following group scopes can contain objects from any domain within the forest? (Choose all that apply.)

b. Domain local d. Universal

Your server has an additional SSD that you wish to use exclusively within a virtual machine as a pass-through disk to increase performance. What must you do to achieve this? (Choose two answers.)

b. Ensure that the SSD is set to an Offline state within the Disk Management tool. d. In the properties of the virtual machine, select an existing virtual hard disk, choose Physical hard disk, and select the SSD.

Which of the following operating systems are supported for use within a Generation 2 virtual machine? (Choose all that apply.)

c. Ubuntu 14.04 d. FreeBSD 9.1

Which of the following commands may be used to start Hyper-V Manager?

c. virtmgmt.msc

Which of the following Hyper-V features allows a virtual machine to use additional physical memory within a server, provided that it is available?

d. Dynamic memory

(T/F) Virtual machine settings are stored within a .vhdx file.

false- this is the virtual hard disk file, and VM settings are stored in a separate file from the hard disk file

What command could you execute within PowerShell to learn about the syntax of the Get-WMIObject cmdlet? (Choose all that apply.)

help Get-WMIObject, help Get-WMIObject, get-help Get-WMIObject, Get-Help Get-WMIObject -online

Which of the following aliases can be used to switch to a different PowerShell provider?

sl

Which of the following PowerShell constructs is best to use when you wish to perform a specific action based on the value of a single variable?

switch


Ensembles d'études connexes

Ch. 23 Fundamentals- Legal Implications Nursing

View Set

Assignment 18 - Diamond Simulants

View Set

Chapter 4. State Insurance Statutes, Rules, and Regulations (Primerica)

View Set

Weeks 8-9 Quiz- Personal Finance

View Set

Ch 13 Nurodevelopmental and neurocognitive disorders

View Set