Networking and Servers Final

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

You are investigating strange traffic on your network and wish to resolve an IP address to a DNS name. What resource record should you use to perform a reverse lookup?

A PTR record A PTR record resolves an IP address to an FQDN. This is the record that you need to use to perform a reverse lookup.

Which of the following organizations should consider using Azure Active Directory?

An organization that subscribes to Office 365 services An organization that subscribes to Office 355 would benefit from using Azure Active Directory. It is an Active Directory service within the Microsoft Azure cloud. It provides the same single sign-on features of Active Directory, but it is designed to allow access to cloud applications such as Office 365.

You are in the process of installing Windows Server 2019 Standard Edition on your computer. You have downloaded the corresponding ISO file and burned it to a DVD. Which of the following steps should you take next?

Change the boot order in the BIOS. Once you have the installation media, a DVD in this scenario, you should change the boot order in the BIOS to boot from the DVD before other storage devices.

Which of the following statements about directory partitions is true?

Changes to a domain partition on a domain controller are only replicated to domain controllers within the same domain. When a change is made to the domain partition on a domain controller, such as the addition of a user object, that change is replicated to other domain controllers within the same domain only.

Which feature of Windows Server 2019 is designed to foil malware by preventing programs from using system memory space?

Data Execution Prevention Data Execution Prevention (DEP) is a performance and security option in Windows Server 2019 that helps foil malware, such as computer viruses, Trojan horses, and worms by preventing such programs from using system memory space.

When using the Best Practices Analyzer (BPA) to verify server roles, what severity level indicates the role does not meet best practices and problems can be expected?

Error

Live Migration cannot be enabled if the Hyper-V host operating system is joined to an Active Directory domain.

False Live Migration can only be enabled if the Hyper-V host operating system is joined to an Active Directory domain.

Storage pinning is the process of planning hardware for a specific server within an organization.

False. Planning hardware for a specific server given its use within an organization is often called capacity planning. Storage pinning is an intelligent storage feature that allows you to force specific data to be stored on a particular device.

Felipe requests the system administrator, Lucida, to change the font settings on a shared desktop system. Felipe wants a larger font size when he logs onto this computer but doesn't want it to affect other users. Which Registry root key should Lucida access to change the font size?

HKEY_CURRENT_USER Lucida can change the font size by accessing the HKEY_CURRENT_USER key. This key contains data on color combinations, font sizes and type, the keyboard layout, the taskbar, clock configuration, and other profile settings for the current user.

Which of the following is a component that enables users to search and locate a shared folder in the Active Directory?

LDAP LDAP is a component of the Active Directory that enables users to search and locate folders.

Imran is associating a drive letter to a filesystem so that the drive letter can be accessed by the operating system. What is the term given to the process that Imran is carrying out?

Mounting The term "mounting" refers to the process of associating a drive letter or folder to a filesystem so that the drive letter or folder can be accessed by the operating system.

Natalie is a graphic designer who frequently works with large files. These files, which are stored on an NTFS filesystem, measure 500 MB on average. She uses a software application to create backups of her work, and she had not faced any issues with backing up her files until recently. During a recent backup, she noticed that a newly created folder was not backed up. Identify the most likely cause for this issue.

Natalie did not enable the archive attribute on the folder. The archive attribute indicates that a file or folder needs to be backed up. Newly created folders do not have the archive attribute enabled by default. The most likely cause for the issue is that Natalie did not enable the archive attribute on the folder.

A user, Petra.T, is trying to access their system while the global catalog server for the domain is offline. What is the most likely outcome?

Petra.T will be allowed to log in to the system with cached credentials. If a global catalog cannot be contacted, the user will not be able to complete the authentication process and log into the domain but may be able to use cached credentials to access their system.

Which type of virtual switch in Hyper-V can only have virtual machines connected to it?

Private

Rebecca is configuring a RAID with two storage devices. If she saves a file, the file will be divided into two sections, with each section written to separate storage devices concurrently, in half of the amount of time it would take to save the entire file on one storage device. Which of the following RAID levels is Rebecca configuring?

RAID level 0 In RAID level 0, an individual file is divided into sections and saved concurrently on two or more storage devices, one section per storage device.

Danielle creates a new scope, Sales LAN, for a DHCP server in her organization. She wants to assign the same IP address to a printer in the sales department every time. Which of the following folders should Danielle use to configure this option?

Reservations Reservations allow you to provide the same IP address each time a DHCPDISCOVER is received from a DHCP client that has a certain MAC address. Reservations are often created for network-attached printers, servers, and network devices that must receive an IP address from a DHCP server that does not change over time.

Identify a vital service provided by secondary DNS servers.

Secondary DNS servers respond to DNS lookup requests using read-only zone files. Secondary DNS servers contain a read-only copy of the zone file from the primary DNS server that they can use to respond to DNS lookup requests.

Raymond and Lin are facing network issues on their computers. Rayna, the administrator, is troubleshooting the issue. She notices that Raymond and Lin's computers are using the same IP address, 192.167.1.85. If the organization's network uses a DHCP server, which of the following most likely caused this issue?

The IP addresses were configured manually. This is the most likely cause of failure. Rayna or another system administrator may have accidentally configured both computers with the same IP address.

What happens when a folder with NTFS permissions is copied to a shared folder on a FAT volume?

The folder inherits the share permissions but loses the NTFS permissions. FAT filesystems do not support NTFS permissions. However, the folder retains the share permissions.

Remtax offers tax consulting services over the Internet. It assists people in preparing their income tax returns. In which of the following scenarios should Remtax use Windows Server Core or Nano Server?

The server will be dedicated to web services and accessed via the Internet. Widows Server Core and Nano Server are small footprint installations that are best suited to run web services accessible via the Internet. Nano Server is ideal for use within cloud environments.

What are users who only have the List folder contents permission allowed to do?

They can list files in the folder or switch to a subfolder, view folder attributes and permissions, and execute files, but cannot view file contents. Users with the List folder contents permission can list (traverse) files in the folder or switch to a subfolder, view folder attributes and permissions, and execute files. However, they cannot view file contents.

Identify the true statement about Type 2 hypervisors.

They can run multiple operating systems on a single host. Type 2 hypervisors can run multiple operating systems, called virtual machines, on an underlying host operating system.

Dmitry installs the Hyper-V role using the Add Roles and Features Wizard. Upon completion, he is prompted to reboot the computer. However, his computer reboots twice. Why does Dmitry's computer reboot the second time?

To allow Hyper-V to start the host operating system Dmitry's computer reboots the second time to allow Hyper-V to start the host operating system that is used to manage virtual machines.

Andrei enabled the Live Migration feature of Hyper-V during its installation. He selects a virtual machine called VM1 within Hyper-V Manager and clicks on Move within the Actions pane. Next, he selects "Move the virtual machine's storage." Which of the following is true of this scenario?

VM1's virtual hard disk files will be moved to the destination server.

Chen is a freelance web developer who uses a Windows 10 computer. When she needs to test her web application on a different operating system, she sends it to her friend who has other operating systems installed on multiple devices. This is a time-consuming process. She's looking for a way to test the web application across different operating systems on her own computer. Which of the following features should she use?

Virtualization Virtualization will help Chen use multiple operating systems on her Windows 10 computer. She can use a hypervisor to run an operating system of her choice.

Eileen is a Web app developer. All the apps that Eileen builds run in Linux containers on the cloud. She currently uses a Windows 7 operating system. She would like to test Linux applications on her workstation. Why should Eileen consider upgrading to Windows 10?

Windows 10 has Windows Subsystem for Linux. The Windows Subsystem for Linux feature of Windows 10, a new feature in Windows Server 2019, allows users to create and test Linux apps on Windows 10 systems.

Emmitt, an IT administrator, is on a holiday when he receives a message from his boss about an issue with one of the servers running Windows Server 2019. Fortunately, Emmitt is carrying his laptop that is running a Windows 7 operating system. Remote control of the server (RDP) is blocked. Emmitt accesses the server remotely and resolves the issue. Which of the following tools did Emmitt most likely use natively to access the server?

Windows Admin Center Emmitt most likely used the Windows Admin Center by connecting to it via a browser to access the Windows Server. Windows Admin Center can be used to remotely manage Windows Server 2019 from any computer that has a modern Web browser.

Where can the most up-to-date list of compatible hardware available for Windows Server 2019 be found?

Windows Server Catalog You can find the up-to-date list of compatible hardware for Windows Server 2019 on the Windows Server Catalog online.

Which of the following is the most likely cause for missing resource records in a secondary zone?

Zone transfer issues Missing resource records in a secondary zone are often caused by zone transfer issues. Zone transfers may not occur successfully if the network bandwidth is saturated at the time the zone transfer was initiated.

Linwood is the IT manager of a small organization, Turtle Designs, with less than 50 employees. Caroline, his boss, asks him to set up a computer that will act as the central repository for the company's data. Linwood estimates the costs and suggests using an Internet-based service instead. What is Linwood recommending in this scenario?

A cloud-based server Linwood is recommending the use of a cloud-based server. A cloud- based server needs to be accessed via the Internet.

Alfons recently received a promotion to lead a team of 35 software engineers, testers, and business analysts. When he needs to send an email or meeting invite to his team, he realizes that he must type out the email IDs for all his team members. He approaches Priyanka from the IT team to help him make this process easier and more efficient. Which of the following features of Active Directory can Priyanka use to provide a solution?

Distribution groups Implementing distribution groups will allow Alfons to send emails or meeting invites to his team without requiring him to type out individual email IDs. When you send an email to a distribution group, the email system sends it to all of the user accounts that are members of the distribution group.

Kettle Inc. from Florida merges with Blue Clu Networks from Minneapolis. Minisha, a system administrator, is granted the responsibility of configuring Active Directory across both locations to enable users from both locations to access common resources. If Minisha is able to accomplish this task successfully, which of the following must be true?

Minisha is a member of the Enterprise Admins group in both organizations. Minisha can accomplish this task successfully only if she is a member of the Enterprise Admins group.

Isabella configures three virtual machines, VM1, VM2, and VM3, on a Windows Server 2019 host. The host and VM1 are connected to a physical switch (external virtual switch). VM1 and VM2 are connected to a private virtual switch. VM2 and the host are connected to an internal virtual switch. VM3 is not connected to any switch. Isabella is building an application that provides clients access to confidential financial information in a secure database. Isabella chooses to run the application on the host server and decides to implement an N-tier security design to protect the database. Where should Isabella place the database?

On VM2 VM2 is the best choice to place the database because VM2 and the host are connected to an internal virtual switch. Any users trying to access the database in VM2 can only do so through the application running on the host. This type of data security design is called N-tier, as it requires that users pass through a number of systems (N) that implement security measures before gaining access to sensitive data.

How do you create a RAID level 1 volume with two disks in the Disk Management tool?

Right-click on the disk that you want to configure as a RAID volume and then click New Mirrored Volume to create a RAID level 1 volume with two disks The New Mirrored Volume option is used to create a RAID level 1 volume with 2 disks as three-way mirroring is not possible in the Disk Management tool.

Mahmood works as a full stack web developer at Insignia Informatics. As one of the senior developers, Mahmood is often tasked with testing web applications built by his team. Often, he finds himself testing multiple web applications simultaneously over a short period. Mahmood uses a separate virtual machine to run each application in isolation. This often causes a resource crunch because each virtual machine uses large amounts of system resources, and Mahmood cannot be as productive as he wants to be. What would you advise Mahmood?

Run these web applications in containers. Containers contain a subset of an operating system essential to running the web applications. This means that containers use fewer resources than virtual machines.

Haruko is a system administrator. He is configuring Windows Server 2019 on SERVERX and adding multiple servers to Server Manager so that he can manage all the servers from the same console. He is trying to add SERVERY, a file server. Despite his efforts, he is unable to add this server to Server Manager. Which of the following is a likely reason that he is unable to add SERVERY to the console?

SERVERY is part of a workgroup, but the workgroup server is not on the trusted hosts list. If SERVERY is part of a workgroup, it can be added to Server Manager on SERVERX only once the workgroup server is added to the trusted hosts list.

Miguel is using the New Virtual Machine Wizard to create a new virtual machine for the first time. Which of the following statements is true if Miguel creates a virtual machine with default settings?

The virtual machine will have 1 GB of memory.

Access to a shared folder on the network will use the most restrictive permissions, regardless of whether they are NTFS or share permissions.

True You must be granted both shared folder permissions and NTFS/ReFS permissions to access files within a shared folder on an NTFS or ReFS filesystem. For example, if you have a Read/Write share access to a shared folder and a Read NTFS/ReFS permission to a file within the shared folder, you will only be able to read the contents of the file even though you have a Write access to the folder.

Raymond is a system administrator at Kelly Consulting. He's trying to automate some security features using Windows Server. One of the tasks he's trying to accomplish is automatically blocking any Outlook rules that are set to forward emails. Particularly, he's attempting to write a script that blocks any rules that automatically forward emails to external parties. Which of the following tools would be most effective in completing this task?

Windows PowerShell Raymond can accomplish this task by writing automation scripts using commands called cmdlets within Windows PowerShell.

Catelin creates a virtual machine template named WindowsServer2019VMTemplate. She wants to import this template, so she opens the Import Virtual Machine wizard in Hyper-V Manager on SERVERX and proceeds with the process. She specifies the location D:\VMS\Win2019VM1 for the configuration files and virtual hard disks. When Catelin clicks Finish during the last step and the virtual machine is created, what name will it have?

WindowsServer2019VMTemplate When a new virtual machine is created based on the virtual machine template, it will be given the same name as the virtual machine template within Hyper-V Manager. Catelin should select it, click Rename in the Actions pane, and supply the same name chosen within the virtual machine folder paths, Win2019VM1.


Ensembles d'études connexes

Smartbook Recharge Chapter 14 ACCT 405

View Set

Russell Brandon General Psychology Exam 2

View Set

Consolidation Less than 100% Ownership

View Set

Chapter 6 - Small Business Entry: Paths to Entrepreneurship

View Set