Server chapter 2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Alina is using Windows PowerShell on a Windows Server 2019 system for the first time. She wants a list of all emdlets in PowerShell, so she types the following command: PS C: IUsers\Administrator>Get-Command | More Why does Alina use the pipe symbol ( in this command? a. To create a customized Windows PowerShell session b. To control execution in the same way as the -whatif option c. To create an output file called More in which the results of Get-Command are stored *To send the output from Get-Command to More, which displays the output page-by-page

*d. To senr the output frombthe Get-Command to more, which displays the output page-by-page

Abu is creating a virtual machine template to enable rapid server deployment at his organization. He creates a virtual machine named VM1. On VM1, he installs Windows Server 2019 and names the server SERVERX. Next, he installs server roles and features and adds third-party software. He then runs the System Preparation Tool. What will this tool most likely to do? a. Rename the virtual machine VM1 5. Remove the computer name SERVERX c. Uninstall server roles and features d. Uninstall third-party software

5. Remove the computer name SERVERX

Which feature of Windows Server 2019 is designed to foil malware by preventing programs from using system memory space? a. Data Execution Prevention b. Processor Scheduling c. Flushing d. Windows Registry

A. Data execution preventoin

Andrei enabled the Live Migration feature of Hyper-V during its installation. He selects a virtual machine called VM1 within Hyper-V Manager and clicks on Move within the Actions pane. Next, he selects "Move the virtual machine's storage." Which of the following is true of this scenario? MI's virtual hard disk files will be moved to the destination server. b. VMI's virtual machine configuration files will be moved to the destination server. c. VMI's virtual hard disk files and virtual machine configuration files will be moved to the destination server. d. VMI will be copied to the destination server and renamed as VM2.

A. MI's virtual machine configuration files will be moved to the destination server

Shae is using a Windows Server 2019 operating system. She recently spilled hot chocolate on her keyboard. which damaged the keyboard. She purchased a new keyboard and connected it to her computer. To her surprise, she was able to use the keyboard without any further action from her side. Which of the following features allowed Shoe to start using the keyboard straightaway? a. Plug and Play (PhP) b. Remote Desktop Protocol (RDP) c. Gateway Server Mode d. Devices and Printers utility

A. Plug and play (pnp)

Installing the Hyper-V role will install the Hyper-V hypervisor, Hyper-V Manager console, and Hyper V Powershell emdlets. a. True b. False

A. True

To replicate a virtual machine, it is sufficient that replication is enabled on the Hyper-V host of the virtual machine that is being replicated. a. True b. False

B. False

You need multiple boot images on a WDS server, one for each operating system. a. True b. False

B. False

Fareeda, a system administrator, is configuring the security settings for a Generation 2 virtual machine called VM1. She enables the Trusted Platform Module (TPM). Next, she wants to encrypt the virtual hard disks for VMI so that other virtual machines are restricted from using these hard disks. If the virtual hard disks are successfully encrypted, which of the following statements must be true? a. Secure Boot is disabled by default in Generation 2 virtual machines. b. Fareeda enabled shielding in the security settings for VMI. c. Fareeda selected the option to Encrypt state and virtual machine traffic. d. BitLocker contains the encryption keys.

B. Freeda enabled shielding in the security settings for VM1

Lehana is creating a new virtual machine using the New Virtual Machine Wizard. After choosing the name WindowsServer2019VM for her virtual machine, she proceeds to the next step. She chooses Generation 1 when prompted to pick the generation for the virtual machine. Which of the following reasons justifies Lehana's choice? a. The generation of the virtual machine can be changed later, so this choice does not matter. b The guest operating system on the virtual machine is a 32-bit version of Windows 7. c. The virtual machine will need to emulate a UEFI BIOS to provide faster boot time. d. The virtual machine will need to emulate a Serial Attached SCSI disk.

B. The guest operating system on the virtual is a 32-bit version of windows 7

Dmitry installs the Hyper-V role using the Add Roles and Features Wizard. Upon completion, he is prompted to reboot the computer. However, his computer reboots twice. Why does Dmitry's computer reboot the second time? a. To allow Hyper-V to start the Kerberos b. To allow Hyper-V to start the host operating system c. To add Hyper-V in a Type 2 configuration d. To add Hyper-V in a Type I configuration

B. To allow Hyper-V to start the host operating system

What is the term for programs and system software that can query WMI? a. WMI infrastructure b. WMI consumers c. WMI providers d. WMI classes

B. WMI consumers

Kristian uses the following command on Windows PowerShell to view a list of all emdlets: PS C: WUsers\Administrator>Get-Command | More The command displays a subset of the total output and follows it with the word More. On clicking the return button, the next set of results is displayed. Kristian wants to exit this and return to the PowerShell prompt. Which of these keys should Kristian press? a. Up Arrow b. Home C. Q d. Tab

C. Q

the Registry changes were made. Which of the following is true of this scenario? a. The modifications within the checkpoint file will be merged into the virtual hard disk. b. Devansh can choose to reverse the Windows Registry modifications while retaining other modifications. c. The checkpoint file that is used to reverse the changes will be deleted from the system. d. The checkpoint file will replace the current virtual hard disk file.

C. The checkpoint file that is used to reverse the changes will be deleted from the system

Orana works for an organization that sets up several virtual machines on a day-to-day basis to be deployed for various clients. Orana is exploring various Hyper-V options that will simplify this process. Which of the following Hyper-V features should Orana use? a. Replication b. Live migration c. Virtual machine templates d. Production checkpoints

C. Virtual machine templates

Dillon wants to create a PowerShell script that automatically opens a bunch of websites whenever his system boots. He downloads a script from an Internet forum for PowerShell scripts and runs it. The script executes without warnings or asking for any additional confirmation. What is the most likely execution policy on Dillon's system? a. Restricted b. AllSigned c. Unrestricted d. Bypass

D. Bypass

Asmara, a system administrator, is performing routine maintenance checks on the Windows servers in her organization. As part of these checks, she is required to verify that drivers and system files on each server are not corrupted. Which of the following commands should Asmara run? a. sigverif b. regedit c. Get-Command | more d.sfc/scannow

D. Sfc/scannow

Achelle Electronics purchases hardware to set up 25 servers. The IT department must deploy Windows Server 2019 on these machines. Which of the following Hyper-V features should Achelle Electronics use? a. Replication b. Live migration c. Virtual machine templates d. Windows Deployment Services

D. Windows deployment services

Cmdlets are case-insensitive, so Get-Host and get-host are equivalent. a. True b. False

True

Haruko is a system administrator at Notion Source, a company that specializes in digital marketing. He is configuring Windows Server 2019 on SERVERX and adding multiple servers to Server Manager so that he can manage all the servers from the same console. He is trying to add SERVERY, a file server. Despite his efforts, he is unable to add this server to Server Manager. Which of the following is a likely reason that he is unable to add SERVERY to the console? * a. SERVERY is joined to the same Active Directory domain as SERVERX. * b. SERVERY is part of a workgroup, but the workgroup server is not on the trusted hosts list. * c.SERVERY has Windows Server 2016 installed, so it is not compatible with SERVER * d. SERVERX has the Welcome to Server Manager pane hidden from the Dashboard.

b. SERVERY is part of a workgroup, but the workgroup server is not on the trusted hosts list.

Ivan is the IT administrator at Alphina Systems. He wants to be able to plug and unplug his hardware devices without using the Safely Remove Hardware option. What should Ivan do? a Disable file caching and flushing b. Enable file caching and flushing c. Enable file caching and disable flushing d. Disable file caching and enable flushing

A. Disable fole caching and flushing

You are experiencing problems during the installation of Windows Server 2019. More specifically, critical file extensions have lost their associated program data. You need to restore the settings from a Registry backup. Where will the settings be found? a. HKEY CLASSES ROOT b. HEY_LOCAL_MACHINE c. HKEY_CURRENT_USER d. HKEY _CURRENT_CONFIG

A. HKEY CLASSES ROOT

Jenaro installed the Windows Admin Center on a Windows Server 2019 system called SERVERX. He intends to manage other servers using SERVERX. If SERVERX has Web server software installed using port 443, which of the following must be true? a. Jenaro can connect to the Windows Admin Center only by appending the port number to the URL. b. SERVERX is also a domain controller and has the Active Directory Domain Services role installed. c. SERVERX does not have an existing HTTPS certificate, so the Windows Admin Center can use port 443. d. Jenaro should avoid modifying the local computer's trusted host settings.

A. Jenaro can connect to the windows admin center only by appending the port number to the URL

Caylin, an IT administrator, receives an email from a coworker that the company website, eloxnet.com, is not accessible. She decides to check if there is an issue that is preventing access to the website. Which of the following PowerShell cmdlets should Caylin run first? a. Test-NetConnection b. Get-NetiPConfiguration c. Get-NetAdapterStatistics d. Set-NetFirewallProfile

A. Test-NetConnection

The System File Checker is useful in recovering system files that have been corrupted. a. True b. False

A. True

Which of the following tools can be used to create an unattended answer file? a. Windows System Image Manager b. Windows Deployment Services c. System Preparation Tool d. Hyper-V Manager

A. Windows system image manager

Catelin creates a virtual machine template named WindowsServer2019VMTemplate. She wants to import this template, so she opens the Import Virtual Machine wizard in Hyper-V Manager on SERVERX and proceeds with the process. She specifies the location D:IVMS| Win2019VM 1 for the configuration files and virtual hard disks. When Catelin clicks Finish during the last step and the virtual machine is created, what name will it have? a. WindowsServer2019VMTemplate b. SERVERX c. Win2019VM1 d. It will not have a name.

A. WindowsServer2019VMTemplate

11. Deion is creating a new virtual machine using the New Virtual Machine Wizard. After choosing the generation for his virtual machine, he is prompted to select the memory and an optional choice to enable the use of dynamic memory. He consults a colleague, Kanesha, and they decide against enabling dynamic memory. What is the most likely reason that prompted this decision? A. Deion chose Generation 2 in the previous step. B. Deion intends to use this virtual machine in a nested virtualization configuration. C. Deion allocates 1024 MB of startup memory, which is sufficient to run most operating systems. D. Deion intends to run Windows Server 2019 on this virtual machine.

B. Deion intends to use this virtual machine in a nested virtualization configuration

A limitation of Windows PowerShell is that it cannot be used to install or remove Windows roles. a. True b. False

B. False

Decision constructs such as If and Switch allow you to perform a task multiple times. a. True b. False

B. False

Freya notices some performance issues with an important Generation 2 virtual machine. She realizes that the issue is caused by the presence of other virtual hard disks on the same physical disk. She has another physical hard disk on her system that is currently underutilized. She decides to use this disk as a pass-through disk to enhance the performance of the virtual machine. If Freya was able to accomplish this task successfully, which of the following must be true? a. Freya deleted the virtual disk from her system. Freya changed the physical disk's settings to take it offline. c. Freya removed the virtual hard drive from the virtual machine. d. Freya used the Browse option under the virtual hard drive settings.

B. Freya changed the physical disks settings to takr it offline

Thandiwe is using a server running the Windows Server 2019 operating system. She notices some of the server's services are not functioning as intended. She suspects that a recent update may have caused this issue. While troubleshooting, she intends to look up the list of recently installed updates. She runs the following command: X/ ogv Complete the command by selecting the missing component identified by X. a. More b. Get-HotFix c. select -last 1 d. Get-WindowsFeature

B. Get-Hotfix

Ryan, a server administrator, is attempting to install the Windows Admin Center on a server called SERVERX. However, he is unable to do so. Which is the following may be a reason for this? a. SERVERX is running a Windows Server 2016 operating system. b. SERVERX is the domain controller for the Active Directory. c. SERVERX does not have an existing HTTPS certificate. d. SERVERX has Web server software that is using port 443.

B. SERVERX is the domain controller for the active directory

Minato has created multiple virtual machines. He is using the Virtual Switch Manager to configure virtual switches. He wants to create an external virtual switch that will allow Hyper-V to manage network requests from these different machines. The purpose of this is to optimize performance across the network. Which of the following options should Minato enable? a. N-tier security b. Single-root 1/O virtualization c. Hyper-V Extensible Virtual Switch protocol d. Credential Security Support Provider

B. Single-root 1/0 virtualization

Which of the following statements regarding the use of system and user environment variables is accurate? a. User environment variables are always set first. b. System environment variables are always set first. c. User environment variables apply to any user logged onto the computer. d. System environment variables can be applied on a per-user basis.

B. System environment variables are always set first

Calvin has installed Windows Server 2019 on his personal computer to take part in training program. During one of his lab exercises, his computer crashes. Upon investigation, he finds that the server has not created a crash dump file. What is the most likely reason that Calvin's computer failed to create the dump file? a. The paging file is not located on the same disk as the operating system. b. The paging file is disabled on the computer. c. The initial paging file size is configured to a size that is 1.5 times the installed amount of RAM. d. The paging file is not placed on a RAID volume.

B. The paging file is disabled on the computer

Hamza installs the Windows Deployment Services role on SERVERX. He intends to use SERVERX to enable rapid server deployment across his organization's network. He wants SERVERX to be able to send WIM images to each computer on the network in response to their PXE requests. Which component of the Windows Deployment Services role provides this feature? a. Deployment Server b. Transport Server c. Single-root I/O virtualization d. Live migration

B. Transport server

Live Migration cannot be enabled if the Hyper-V host operating system is joined to an Active Directory domain. A.true B. False

B.false

Kristoffer creates a PowerShell script to automatically execute a set of tasks on system startup. He uses variables in his script to accomplish certain tasks. He is using a variable to filter out certain conditions during which the script should not execute. Which of the following names can Kristoffer use for the variable? a. $filter b. continue C. Scount d. *number

C. $Count

Candice, a graphic designer, attaches a new portable hard disk to her computer. She can connect to the hard disk immediately without installing any drivers. After some time, she turns on the second monitor attached to her computer. The display malfunctions despite being connected to the computer and receiving adequate power supply. What is the most likely explanation for this issue? a. Candice did not open the Device Manager when attaching the hard disk. b. Hard disks are not PnP-friendly devices. c. Computers contain a limited number of IRQ lines. d. The display driver did not go through driver signing when Candice turned it on.

C. Computers contain a limited number of IRQ lines.

Ananya is installing the Hyper-V role on a server. When prompted for the location of the virtual machine files, she changes the location from the default value to B: VMs. Where will the virtual machine configuration files be stored? a. C:IVMs b. E:lVMs c. E:IVMs| Virtual Machines d. E:IVMs|Config Files

C. E:IVMsI Virtual machines

Felipe requests the system administrator, Lucida, to change the font settings on a shared desktop system. Felipe wants a larger font size when he logs onto this computer. Which Registry root key should Lucida access to change the font size? a. HKEY_CLASSES ROOT b. HKEY _LOCAL MACHINE c. HKEY CURRENT _USER d. HKEY _CURRENT _CONFIG

C. HKEY_LOCAL machine

Isabella configures three virtual machines, VMI, VM2, and VM3, on a Windows Server 2019 host. The host and VMI are connected to a physical switch (external virtual switch). VM1 and VM2 are connected to a private virtual switch. VM2 and the host are connected to an internal virtual switch. VM3 is not connected to any switch. Isabella is building an application that provides clients access to confidential financial information in a secure database. Isabella chooses to run the application on the host server and decides to implement an N-tier security design to protect the database. Where should Isabella place the database? a. On the host server b. On VMI c. On VM2 d. On VM3

C. On VM2

Huong is the system administrator for a virtual machine that is used by over 500 employees. She wants to install some device drivers to enable support for a few hardware components. Before she installs the drivers, she wants to ensure that she can revert to the current version of the virtual machine if something goes wrong with the installation. Which of the following Hyper-V features should Huong use? a. Replication b. Nested virtualization c. Live migration d. Checkpoints

D. Checkpoints

Yihana has configured a WDS server with the appropriate boot and install images. Next, she starts the WDS service to respond to PXE requests from other computers and virtual machines on the network. She wants to enable rapid server deployment using WDS to install Windows Server 2019 on these virtual machines and computers. If Yihana can successfully install the operating system, which of the following tasks has she completed? a. Turned off the DHCP service b. Turned off the WDS service on the WDS server c. Pressed F1 or Esc keys d. listed the network interface at the top of the boot order

D. Listed the network interfacr at the top of the boot order

Shweta, a system administrator at Status Wire, is configuring Windows Server 2019 using Server Manager. She wants the Dashboard to display an alert whenever the server exceeds certain CPU usage. Which of the following panes should she use to configure this setting? a. Events b. Services c. Best Practices Analyzer d. Performance

D. Performance

What is the advantage of using production checkpoints over standard checkpoints? a. Production checkpoints are applied without shutting down the guest operating system. b. Unlike production checkpoints, standard checkpoints use a backup service provided by the guest operating system. c. Unlike standard checkpoints, production checkpoints are created automatically whenever a virtual machine starts. d. Production checkpoints cause fewer problems than standard checkpoints when applied.

D. Production checkpoints cause fewer problems than standard checkpoints when applied

Gyaltsen is a system administrator who is managing the operation of virtual machines at her company. One of her key responsibilities is to ensure maximum uptime of virtual machines. She uses replication to ensure this. She is configuring replication for a virtual machine called VM1 on SERVERX to be replicated to SERVERY. If the replication is successful, which of the following tasks did Gyaltsen most likely complete? a. She enabled replication on SERVERX. b. She enabled the Credential Security Support Provider protocol for replication on SERVERX. c. She enabled the Kerberos protocol for replication on SERVERY. đ. She enabled replication on SERVERY.

D. She enabled replicatiom on SERVERY

What is the use of adding tags to servers in the Windows Admin Center? a. Tags allow you to upload and download files to and from the filesystems on the server. b. Tags allow you to monitor and manage DHCP server configuration. c. Tags help configure additional areas of the system via MMC tools. d. Tags help identify servers and can be searched using the Search dialog box.

D. Tags help identify servers and can be searched using the search dialog box

Rozalia installs the Windows Deployment Services (WDS) role on SERVERX. She intends to use SERVERX to enable rapid server deployment across her organization's network. She opens the Windows Deployment Services tool and notices a yellow warning icon on the SERVERX server object in the navigation pane. What does this indicate? a. The Deployment Server service is not running. b. The Transport Server service is not running. c. The WDS role was not installed successfully. d The WDS service is not yet configured.

D. The WDS service is not yet configured

Miguel is using the New Virtual Machine Wizard to create a new virtual machine for the first time. Which of the following statements is true if Miguel creates a virtual machine with default settings? a. The virtual machine will be a Generation 1 virtual machine. b. The virtual machine will be named VM1. c. The virtual machine will have 4 GB of memory, which is expandable up to 36 GB. d. The virtual machine will have a 127 GB dynamically expanding hard disk.

D. The virtual machine will have a 127 GB dynamically exapanding hard disk

Emmitt, an IT administrator, is on a holiday when he receives a message from his boss about an issue with one of the servers running Windows Server 2019. Fortunately, Emmitt is carrying his laptop that is running a Windows 7 operating system. Emmitt accesses the server remotely and resolves the issue. Which of the following tools did Emmitt most likely use to access the server? a. Server Manager b. Remote Server Administration Tools c. Best Practices Analyzer d. Windows Admin Center

D. Windows admin center


Ensembles d'études connexes

27.2 The effects of fiscal policy on real GDP and the price level

View Set

Gesprächs- und Verhandlungstechnik

View Set

(8257 - 8309) Engine Instrument Systems

View Set

Infectious disease and immunization chap 23

View Set

Chapter 3: Structure and Function of the Reproductive System

View Set