Advanced Computer Network Tech

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A limitation of Windows PowerShell is that it cannot be used to install or remove Windows roles. True False

False

By default, the only site created within a new forest does not contain any domain controller. True False

False

Decision constructs such as If and Switch allow you to perform a task multiple times. True False

False

For zones that allow dynamic updates, you do not need to create CNAME and MX records or host records that provide for round robin or netmask ordering. True False

False

Remote users must manually initiate a VPN connection each time they wish to connect to the resources in their organization when using DirectAccess. True False

False

The IUSRS group in an Active Directory domain or workgroup is used to provide anonymous access to both website and Web app content. True False

False

The modern partition table is called the Master Boot Record (MBR) and uses storage devices that are larger than 2 TB. True False

False

Azure Active Directory can be configured to trust an organization's Active Directory forest, or mirror it using a synchronization service. True False

True

Performance Monitor allows one to track how individual system resources are being used. True False

True

Selecting a shared printer within the Print Management console and clicking on More Actions, Properties from the Actions menu, you will be able to change the printer name, location, and comment. True False

True

The System File Checker is useful in recovering system files that have been corrupted. True False

True

The subnet mask cannot be modified once a scope is created. True False

True

Which of the following is a requirement for using Storage Spaces Direct? a. A 10 GB Ethernet network interface with remote-direct memory access (RDMA) support is a must. b. More than 20 servers must be available. c. The servers should be from different Active Directory domains. d. The number of SSDs used should not be more than one.

a. A 10 GB Ethernet network interface with remote-direct memory access (RDMA) support is a must.

Which of the following statements is true of the ownership of a file or folder? a. An administrator can take ownership of a file or folder without being granted the permission to do so. b. The account that creates a file or a folder gets its ownership only when the administrator grants ownership to that account. c. The owner of a file or folder cannot modify all the permissions for that file or folder. d. Ownership of individual files and folders cannot be transferred by anyone with the Take ownership permission.

a. An administrator can take ownership of a file or folder without being granted to do so

Which of the following statements about directory partitions is true? a. Changes to a domain partition on a domain controller are only replicated to domain controllers within the same domain. b. Schema partitions store the structure and layout of the forest, including the names of each domain and their trust relationships. c. The largest section of the Active Directory database is the configuration partition. d. If any change is made to a configuration partition, the change is also replicated in the schema partition.

a. Changes to a domain partition on a domain controller are only replicated to domain controllers within the same domain.

Merjem, a PhD student, is writing her thesis. She takes regular backup of her files and data. When taking backup, she chooses the Faster backup performance option in the Optimize Backup Performance window. Which of the following is true of the backup process in the given scenario? a. Every backup only backs up data that has been modified since the previous backup. b. The backup process will provide the fastest option at the time of restoring data. c. The backup process backs up the all the specified data every time. d. Every backup overwrites the previous backup.

a. Every backup only backs up data that has been modified since the previous backup.

Thandiwe is using a server running the Windows Server 2019 operating system. She notices some of the server's services are not functioning as intended. She suspects that a recent update may have caused this issue. While troubleshooting, she intends to look up the list of recently installed updates. She runs the following command: X | ogv Complete the command by selecting the missing component identified by X. a. Get-HotFix b. select -last 1 c. More d. Get-WindowsFeature

a. Get-HotFix

Latanya, a system administrator, is creating computer objects. She uses the Active Directory Users and Computers tool instead of the Active Directory Administrative Center. What is the most likely reason for not using the Active Directory Administrative Center? a. It uses a minimal color interface that is similar to the one provided by Server Manager. b. It can only be used to manage OU, user, group, and computer objects, but not to create these objects. c. It does not support features introduced within Windows Server 2008 R2 and later functional levels. d. It is a command line tool similar to Windows PowerShell that requires the use of cmdlets.

a. It uses a minimal color interface that is similar to the one provided by Server Manager.

Jenaro installed the Windows Admin Center on a Windows Server 2019 system called SERVERX. He intends to manage other servers using SERVERX. If SERVERX has Web server software installed using port 443, which of the following must be true? a. Jenaro can connect to the Windows Admin Center only by appending the port number to the URL. b. Jenaro should avoid modifying the local computer's trusted host settings. c. SERVERX does not have an existing HTTPS certificate, so the Windows Admin Center can use port 443. d. SERVERX is also a domain controller and has the Active Directory Domain Services role installed.

a. Jenaro can connect to the Windows Admin Center only by appending the port number to the URL.

Michaela is configuring Remote Desktop Services in her organization. She specifies the Remote Desktop Licensing server and proceeds to select the licensing mode. If Michaela selects the Per User licensing mode, which of the following statements is true? a. Michaela's organization allows users to connect remotely using their personal computers. b. Michaela expects users to connect from both laptops and desktops. c. Michaela has installed an HTTPS encryption certificate for Remote Desktop Web Access. d. The Remote Desktop Licensing role service is not installed on the remote server.

a. Michaela's organization allows users to connect remotely using their personal computers.

While copying files between folders, it is possible to retrace and complete the transfer in case of a power failure if an NTFS-based filesystem is being used. The same cannot be said for a FAT32 filesystem. What do you think could be the reason for this difference? a. NTFS is a journaling filesystem, while FAT32 is not. b. FAT32 keeps track of information being written, while NTFS does not. c. FAT32 is only used as a removable device, while NTFS is not. d. NTFS is a filesystem, while FAT32 is not.

a. NTFS is a journaling filesystem, while FAT32 is not.

One of the disks on your computer is running low on storage space. You notice that there is unallocated space in the spanned volume. How will you use the unallocated space to increase storage space? a. Right-click the volume on that disk and click Extend Volume to increase the size of the volume using the unallocated space b. Right-click the system or boot partition in the Disk Management tool, click Add Mirror, and select the second storage device c. Right-click the volume, click Reactivate Volume once the storage device is available, and use the unallocated space d. Right-click a RAID level 1 volume and click Remove Mirror to remove the volume while retaining the data from one disk you specify

a. Right-click the volume on that disk and click Extend Volume to increase the size of the volume using the unallocated space

Martha is configuring the Network Policy and Access Services server role to configure a Windows Server 2019 system as a RADIUS server so that it can be used with the 802.1X Wireless. After this, she is facing some issues activating the server in Active Directory. She thinks that there were issues with the installation. Which of the following event logs should Martha check to examine events specific to the installation? a. Setup b. System c. Application d. Security

a. Setup

Gyaltsen is a system administrator who is managing the operation of virtual machines at her company. One of her key responsibilities is to ensure maximum uptime of virtual machines. She uses replication to ensure this. She is configuring replication for a virtual machine called VM1 on SERVERX to be replicated to SERVERY. If the replication is successful, which of the following tasks did Gyaltsen most likely complete? a. She enabled replication on SERVERY. b. She enabled the Kerberos protocol for replication on SERVERY. c. She enabled replication on SERVERX. d. She enabled the Credential Security Support Provider protocol for replication on SERVERX.

a. She enabled replication on SERVERY.

Candace works as a system administrator at Capnia Systems, a product company with over 250 employees. She receives an email from her boss that says that one of the servers is running slow. The server is running the Standard Edition of Windows Server 2019, and the hardware includes HDDs and SSDs. Upon investigation, she finds that some frequently accessed files are being stored on HDDs, while other smaller and infrequently used files are stored on SSDs. Which feature should Candace enable to improve the efficiency of the server? a. Storage tiering b. Data deduplication c. Capacity planning d. Storage pinning

a. Storage tiering

Which of the following commands can be used within Windows PowerShell to view and manage print jobs within the print queue for a printer? a. Suspend-PrinJob b. Set-Printer printername-restart c. http://serverx/printers d. Restart-Service spooler-force

a. Suspend-PrinJob

Rhonda's company has a rack containing one email server, file server, web server, firewall server, UPS, SAN, and management station. Owing to a thunderstorm, a ten-block radius surrounding the company faces a power outage. Rhonda, who is working from home, tries sending an email to a colleague, but the email does not get sent. Which of the following is the most likely cause for this issue? a. The blackout took down the Internet, so Rhonda can't reach the email server. b. The blackout caused all the servers on the rack to shut down because there is no power supply. c. The management station on the rack malfunctioned. d. The SAN on the rack malfunctioned.

a. The blackout took down the Internet, so Rhonda can't reach the email server.

Devansh creates a checkpoint on his virtual machine before making some Windows Registry changes. After making these changes, he runs a test to verify that the virtual machine is working as intended. He notices some unintended effects of the Registry changes. Devansh applies the checkpoint to revert the virtual machine to its state before the Registry changes were made. Which of the following is true of this scenario? a. The checkpoint file that is used to reverse the changes will be deleted from the system. b. The modifications within the checkpoint file will be merged into the virtual hard disk. c. The checkpoint file will replace the current virtual hard disk file. d. Devansh can choose to reverse the Windows Registry modifications while retaining other modifications.

a. The checkpoint file that is used to reverse the changes will be deleted from the system.

To prevent man-in-the-middle attacks, Janet, a network administrator, configures a GPO such that all the traffic sent toward a specific database server is encrypted using IPSec. While most of her colleagues are able to successfully connect to the database via the IPSec authentication process, the connection is not successful for some computers. What do you see to be the problem here? a. The computers did not have an IPSec certificate. b. The rule type was set to Isolation instead of Server-to-server. c. The IP addresses of the computers were not added under Endpoint 1. d. The connection between the failed computers and the server was protected with IPSec.

a. The computers did not have an IPSec certificate.

What happens if an encrypted file in an NTFS partition on a Windows 10 system is moved to a FAT32 partition on a Windows 7 system? a. The file is decrypted and placed onto the FAT32 volume. b. The file is moved but is only visible to Windows systems that can see EFS files. c. The file encryption is maintained on the new location. d. The file transfer does not occur because FAT32 cannot store encrypted files.

a. The file is decrypted and placed onto the FAT32 volume.

Your organization has installed a new application that fetches project details from a database installed on a Windows Server 2019 system to perform financial computations. A bug in the application causes the program to fetch details of incorrect project IDs. The network administrator tries reinstalling the operating system, but the issue remains to be fixed. Can you identify why reinstalling the operation system did not work? a. The issue was with the software and not the operating system. b. There was an issue in the installation of the operating system. c. The administrator changed the boot volume while installing the operating system. d. The problem was with a device driver and not with the operating system.

a. The issue was with the software and not the operating system.

You enable LCOW on a Windows Server 2019 system that already has IIS installed. The server is also used to run Windows containers. Next, you download and run some Linux containers. You disable LCOW and run the docker images command. What will be the result in this scenario? a. The list of Windows container images will be displayed. b. All container images on the system will be displayed. c. None of the container images on the system will be displayed. d. The list of Linux container images will be displayed.

a. The list of Windows container images will be displayed.

If a site cannot hold a copy of the global catalog, which of the following features can be enabled on the site to provide fast authentication? a. Universal Group Membership Caching b. User Principle Name c. Role seizure d. Flexible Single Master Operations

a. Universal Group Membership Caching

Martha, a support technician, is troubleshooting a problem with a shared printer. All her colleagues, including Flavio, had complained that the printer control codes appear on printouts. She identifies corrupt print drivers as the cause of the problem. She reinstalls the print driver on Flavio's computer, and he does not face this problem again. However, other people in her company still face the issue. What should Martha have done to mitigate this issue for everyone? a. Updated or reinstalled the printer driver on the print server b. Updated or reinstalled the printer driver on all the print clients individually c. Turned the printer off and turned it on again d. Changed the location of the spool folder

a. Updated or reinstalled the printer driver on the print server

Wilmer is creating a new remote access policy for the sales department in the organization. On the Specify Conditions screen of the wizard to create new policies, Wilmer selects the option to grant or deny access according to user dial-in properties. In which of the following circumstances will this permission be used? a. When a user account has the Control access through NPS Network Policy option set b. When a client is authenticated using an unencrypted authentication method c. When the access permission on the same screen is set to Access denied d. When the Idle Timeout and Session Timeout constraints are set to 5 minutes

a. When a user account has the Control access through NPS Network Policy option set

Stephen sets up manual enrollment for a user certificate from an enterprise CA. However, as he completes the process, he realizes that he has accidently set up the enrollment for a computer certificate rather than a user certificate. Which of the following commands did Stephen most likely type in the Command Prompt window? a. certlm.msc b. wf.msc c. gpedit.msc d. certmgr.msc

a. certlm.msc

Which of the following is a term given to the software component in the operating system that connects to the SAN device via iSCSI? a. iSCSI initiator b. HBA c. MPIO d. iSCSI target

a. iSCSI initiator

Sonia is configuring a RAID level 5 array with five disks. Each disk has the capacity to store 3 TB of data. What is the total storage size that Sonia can use to store data? a. 8 TB b. 12 TB c. 3 TB d. 15 TB

b. 12 TB

Sam, an administrator, sends out an HR policy file to Vicky, Mohammad, Charle, and Reena. They save the HR policy file on their home directories under a shared folder of Windows Server 2019 with different file names. As a result, the same copies of the file are present multiple times with different names. Reena opens and saves the file after making minor changes. What will happen to the files when Sam enables the Data Deduplication Service on Windows Server 2019? a. All the files get deleted when the Data Deduplication Service is enabled. b. A new copy of Reena's file is created and associated with the same file name. c. None of the files are deleted as they have different file names. d. A copy of Reena's file is created with a new file name.

b. A new copy of Reena's file is created and associated with the same file name.

Fatima is configuring a Windows Server 2019 system as a RADIUS server for use with 802.1X Wireless. She has configured the Network Policy and Access Services server role. What is the next step Fatima should take once the server role has been configured? a. Configure the Configure 802.1X wizard b. Activate the server in Active Directory c. Edit or remove existing RADIUS clients d. Choose the EAP authentication method

b. Activate the server in Active Directory

David, a system administrator, has created specific GPOs for every department in his organization based on the permissions required by the various departments. However, he needs to apply the Default Domain Policy for some managers but not for the rest of the users. How can David ensure that the Default Domain Policy is applied only to specific managers' accounts? a. By using the Block Inheritance setting on the domain-level GPO b. By removing the Authenticated Users group from the Security Filtering section and adding the managers' accounts c. By using a WMI filter to check for conditions under which the Default Domain Policy must be applied d. By using the Enforced setting on the OU-level GPOs for the OUs that contain the managers' accounts

b. By removing the Authenticated Users group from the Security Filtering section and adding the managers' accounts

Rishab is looking for ways to manage duplicate file content on his organization's shared drive. He enables data deduplication for this purpose. To save computing resources, he wants to change the settings such that data deduplication occurs in the evening. What must Rishab do to make this change? a. Enter the file extensions to be excluded b. Click Set Deduplication Schedule c. Select the Apply button under Deduplication Settings d. Click the Add button under Deduplication Settings

b. Click Set Deduplication Schedule

Which of the following options is provided by the Print Management tool to quickly check the status of printers to identify any problems? a. The Advanced tab b. Custom filters c. Properties d. View Server

b. Custom filters

Which of the following options on a print queue webpage refreshes the list of print jobs within the print queue when selected? a. All Printers b. Document List c. Cancel All Documents d. Properties

b. Document List

VLX Learning Media provides IT training solutions to corporates. For the lab activities in these training sessions, the company runs the lab setup on virtual machines. These virtual machines are hosted by another company, VirtualFMZ, on its servers, but VLX installs and manages the virtual machines, including the different software applications that are required for various training offerings. Which of the following cloud delivery models is exemplified in this scenario? a. Mobile as a Service b. Infrastructure as a Service c. Platform as a Service d. Software as a Service

b. Infrastructure as a Service

Which of the following is a component that enables users to search and locate a shared folder in the Active Directory? a. SMB b. LDAP c. RAP d. NFS

b. LDAP

Which of the following options will allow a shared printer to be automatically published, allowing domain users to search for the Print window? a. Enable advanced printing b. List in the directory c. Branch Office Direct Printing d. Enable printer pooling

b. List in the directory

You are troubleshooting a network latency issue in your organization. You identify a router as the root cause of the problem. The router was rejecting IP packets sent from computers requesting a service from a Windows Server 2019 system. What will you do to solve this issue? a. Disable the firewall. b. Reboot the router. c. Reboot the computers sending the packets. d. Reinstall Windows Server 2019.

b. Reboot the router.

A computer is running multiple applications simultaneously. They all demand large amounts of processor time, which affects the processing speed of the system. Which of the following options will you use to identify and terminate the process that is consuming the highest processor time? a. Select the Services tab and restart stopped services b. Select the Processes tab of Task Manager and click the CPU column c. Check the User tab to identify the user who started all the processes d. Click the Memory column in the Processes tab of Task Manager

b. Select the Processes tab of Task Manager and click the CPU column

Which of the following tabs help configure the times that a printer is available to users, the printer priority, the printer driver, and spooling options? a. The Ports tab b. The Advanced tab c. The Sharing tab d. The Security tab

b. The Advanced tab

Raymond and Lin are facing network issues on their computers. Rayna, the administrator, is troubleshooting the issue. She notices that Raymond and Lin's computers are using the same IP address, 192.167.1.85. If the organization's network uses a DHCP server, which of the following most likely caused this issue? a. The IP addresses were configured by the DHCP server. b. The IP addresses were configured manually. c. The IP addresses were configured automatically. d. The IP addresses on both computers have expired.

b. The IP addresses were configured manually.

Chynna wants to create two different firewall rules that are applicable depending on whether a computer is connected to a corporate domain or a home network. Which of the following panes in the New Inbound Rule Wizard should Chynna select to specify the conditions that should be met before the rules can be applied? a. The Action pane b. The Profile pane c. The Rule Type pane d. The Protocol and Ports pane

b. The Profile pane

Aspen sets up the round robin feature in DNS for an FQDN server, server.domainA.com. She creates two identical Web servers with IP addresses 192.168.1.75 and 172.6.0.15 and associates two A records on the FQDN server with these IP addresses. The first A record is associated with the Web server having the IP address 192.168.1.75, and the second A record is associated with the Web server having the IP address 172.6.0.15. Aspen uses a client with the IP address 172.6.0.95 to perform a forward lookup of server.domainA.com. Which of the following is true of this scenario? a. The FQDN server will return one of the IP addresses because of the round robin feature setup. b. The client will contact the Web server with the address 172.6.0.15. c. The client will contact the Web server with the address 192.168.1.75. d. The FQDN server will return both IP addresses, 192.168.1.75 followed by 172.6.0.15.

b. The client will contact the Web server with the address 172.6.0.15.

Shaw, a server administrator, uses an iSCSI SAN protocol to transfer data to and from SAN devices at a speed of up to 40 Gb/s. He configures one of the SAN devices to provide storage to Jasper's Windows Server 2019 system. What should Jasper configure in his system to be able to connect to the storage? a. MPIO b. The iSCSI target c. HBA d. The iSCSI initiator

b. The iSCSI target

Nora is a data scientist and works with programs that routinely acquire a lot of data. After data analysis, she stores the raw data for future use. However, she does not want the Windows Search Service to include the data files every time she performs a search function. ​ Which of the following attributes should Nora deactivate to exclude the data files from searches? ​a. The archive attribute b. The index attribute c. The compress attribute d. The hidden attribute

b. The index attribute

Malaika purchased a print device that can be automatically configured by the system. The print device is PnP-capable, and it does not have a network interface. Which of these should Malaika use to connect the print device to the system? a. Wi-Fi b. USB c. Bluetooth d. Ethernet

b. USB

Walter Wells, Inc., a company that builds robotic process automation (RPA) applications, uses Windows Server 2016 to run several Linux and Windows virtual machines. Which of the following statements, if true, would make upgrading to Windows Server 2019 a good choice? a. Walter Wells currently outsources its hardware maintenance operations to an external vendor. b. Walter Wells spends a considerable amount of money on encrypting Linux virtual machines. c. Walter Wells does not use storage replicas or storage spaces. d. Walter Wells is considering removing all the Linux virtual machines and switching entirely to Windows.

b. Walter Wells spends a considerable amount of money on encrypting Linux virtual machines.

Imala, a research scientist, wants to encrypt a document that contains her research data as she does not want the content to be made public before it is published. She is using the Command Prompt window to configure the encrypt attribute. Which of the following commands should Imala use to configure the encrypt attribute? a. compact.exe b. cipher.exe c. dfsutil.exe d. fsutil.exe

b. cipher.exe

Which printer server configuration task is performed before shared printers are added within the Print Management tool? a. Deploy with Group Policy b. Render print jobs on client computers c. Add manufacturer-supplied printer drivers for the associated print device d. Change the printer name, location, and comment

c. Add manufacturer-supplied printer drivers for the associated print device

Which of the following organizations should consider using Azure Active Directory? a. An organization that uses IIS as a web server b. An organization that has a substantially onsite workforce c. An organization that subscribes to Office 365 services d. An organization that deploys Internet accessible services, such as FTP or DNS

c. An organization that subscribes to Office 365 services

Carlos is configuring a DHCP server in his organization. Some of the computers in his organization contain manually configured IP addresses. Currently, he is setting up the new server to configure IP addresses for users who operate their mobile devices on the organization's network. Which of the following decisions should Carlos reevaluate? a. Carlos sets the subnet mask as 255.255.255.0. b. Carlos provides a subnet delay of 100 milliseconds. c. Carlos sets the lease duration to 7 days. d. Carlos excludes certain IP addresses.

c. Carlos sets the lease duration to 7 days.

What is the first step in troubleshooting an issue where a single computer is unable to lease an address? a. Checking if the computer was manually configured with an IP address b. Verifying that the DHCP server is authorized c. Confirming that the computer has a physical connection to the network d. Ensuring that the DHCP service is running

c. Confirming that the computer has a physical connection to the network

Fareeda, a system administrator, is configuring the security settings for a Generation 2 virtual machine called VM1. She enables the Trusted Platform Module (TPM). Next, she wants to encrypt the virtual hard disks for VM1 so that other virtual machines are restricted from using these hard disks. If the virtual hard disks are successfully encrypted, which of the following statements must be true? a. Secure Boot is disabled by default in Generation 2 virtual machines. b. Fareeda selected the option to Encrypt state and virtual machine traffic. c. Fareeda enabled shielding in the security settings for VM1. d. BitLocker contains the encryption keys.

c. Fareeda enabled shielding in the security settings for VM1.

Felipe requests the system administrator, Lucida, to change the font settings on a shared desktop system. Felipe wants a larger font size when he logs onto this computer. Which Registry root key should Lucida access to change the font size? a. HKEY_CURRENT_CONFIG b. HKEY_CLASSES_ROOT c. HKEY_CURRENT_USER d. HKEY_LOCAL_MACHINE

c. HKEY_CURRENT_USER

Hiroshi is the system administrator at an organization that has offices spread across three locations, Boston, London, and Paris. The organization has an Active Directory domain, domainA.com, with two domain controllers in each location for the marketing business unit. The company expanded recently and added over 3000 new users across these locations. Hiroshi notices that this surge in users is causing Internet congestion because of the Active Directory replication. What is a cost-effective method of dealing with this issue? a. Hiroshi should remove all domain controllers and have only one domain controller for the domain. b. Hiroshi should reduce the number of domain controllers to just one per physical location. c. Hiroshi should create site objects and specify timed intervals for replication using site link objects. d. Hiroshi should create separate domains for each location to avoid the need for replication.

c. Hiroshi should create site objects and specify timed intervals for replication using site link objects.

Imran is associating a drive letter to a filesystem so that the drive letter can be accessed by the operating system. What is the term given to the process that Imran is carrying out? a. Formatting b. Journaling c. Mounting d. Spanning

c. Mounting

Kristian uses the following command on Windows PowerShell to view a list of all cmdlets: PS C:\Users\Administrator>Get-Command | More The command displays a subset of the total output and follows it with the word More. On clicking the return button, the next set of results is displayed. Kristian wants to exit this and return to the PowerShell prompt. Which of these keys should Kristian press? a. Home b. Tab c. Q d. Up Arrow

c. Q

Rebecca is configuring a RAID with three storage devices. If she saves a file, the file will be divided into three sections, with each section written to separate storage devices concurrently, in a third of the amount of time it would take to save the entire file on one storage device. Which of the following RAID levels is Rebecca configuring? a. RAID level 5 b. RAID level 1 c. RAID level 0 d. RAID level 2

c. RAID level 0

A user is attempting to access a shared file. The file has Full control NTFS permissions and Read permissions at the share level. What is the effective permission for the user on the file? a. Read/Write b. Modify c. Read d. Full control

c. Read

Reno is facing some DNS server issues that he is unable to resolve using nslookup, DNS manager, and other general methods. He decides to use information from the DNS Server log to identify the issue. However, the information that was logged is insufficient to resolve the issue. Reno is able to identify the issue after enabling debug logging. What should Reno do next? a. Reno should delete all the log files. b. Reno should flush the DNS server cache. c. Reno should turn off debug logging. d. Reno should permanently enable debug logging.

c. Reno should turn off debug logging.

Danielle creates a new scope, Sales LAN, for a DHCP server in her organization. She wants to assign an IP address to a printer in the sales department. Which of the following folders should Danielle use to configure this option? a. Address Pool b. Address Leases c. Reservations d. Policies

c. Reservations

Ryan, a server administrator, is attempting to install the Windows Admin Center on a server called SERVERX. However, he is unable to do so. Which is the following may be a reason for this? a. SERVERX has Web server software that is using port 443. b. SERVERX does not have an existing HTTPS certificate. c. SERVERX is the domain controller for the Active Directory d. SERVERX is running a Windows Server 2016 operating system.

c. SERVERX is the domain controller for the Active Directory

Nodin, a trainee system administrator, is configuring a shared print device, PrinterA, on a colleague's computer. PrinterA is shared through ServerV. He uses the format below to successfully configure the print device. \\ServerV\PrinterA Identify the protocol that he most likely used. a. IPP b. LDP c. SMB d. SMS

c. SMB

Raven is adding FSMO roles to domain controllers in the domain1.com forest. The forest contains a single domain and three domain controllers, DC1, DC2, and DC3. DC1 contains a copy of the global catalog, and all three domain controllers have the latest version of Windows Server 2019 installed. Which of the following is a best practice that Raven should follow? a. She does not need to create the Domain Master role because DC1 contains a copy of the global catalog. b. She should use DC2 or DC3 as the Domain Naming Master. c. She should create the Domain Naming Master role on DC1. d. She should create three Domain Naming Master roles, one for each domain controller.

c. She should create the Domain Naming Master role on DC1.

Soha wants to build a Web app that analyzes financial details of users and provides them with investment advice. She will be running this app on a public cloud using IIS. If Soha wants to take advantage of applications pools to improve security of her Web app, which of the following should she do? a. She should generate a group of dynamic-link libraries. b. She should use object storage instead of block storage. c. She should create the Web app using ASP.NET. d. She should allow access to the app only using NFS.

c. She should create the Web app using ASP.NET.

What is the use of adding tags to servers in the Windows Admin Center? a. Tags allow you to monitor and manage DHCP server configuration. b. Tags help configure additional areas of the system via MMC tools. c. Tags help identify servers and can be searched using the Search dialog box. d. Tags allow you to upload and download files to and from the filesystems on the server.

c. Tags help identify servers and can be searched using the Search dialog box.

Denali wants to store information about all Windows updates on a specific Microsoft SQL Server for security reasons. Which of the following wizards can Denali use to set up SQL Server Connectivity to store update information? a. The Group Policy Results Wizard b. The Windows Server Updates Services Configuration Wizard c. The Add Roles and Features Wizard d. The Certificate Enrollment wizard

c. The Add Roles and Features Wizard

Nadia uses the Disk Management tool to create a simple volume in one of the disks. She specifies the simple volume size and chooses a drive letter. While selecting the formatting options, she modifies the default allocation unit size. What will happen if the allocation unit size is large? a. The performance of database applications will decrease. b. The performance of database applications will increase. c. The performance of file sharing applications will increase. d. The performance of file sharing applications will decrease.

c. The performance of file sharing applications will increase.

Alina is using Windows PowerShell on a Windows Server 2019 system for the first time. She wants a list of all cmdlets in PowerShell, so she types the following command: PS C:\Users\Administrator>Get-Command | More Why does Alina use the pipe symbol (|) in this command? a. To create a customized Windows PowerShell session b. To control execution in the same way as the -whatif option c. To send the output from Get-Command to More, which displays the output page-by-page d. To create an output file called More in which the results of Get-Command are stored

c. To send the output from Get-Command to More, which displays the output page-by-page

You are configuring a Windows Server 2016 VPN server using L2TP and NAT. Which of the following is one of the ports that needs to be opened on the firewall for this configuration to work? a. 1723/TCP b. 443/TCP c. 500/TCP d. 1701/TCP

d. 1701/TCP

Your university has installed a shared printer, Print_MV, on SERVERX. To accommodate the large amount of print jobs generated by the students, the spool folder needs to be placed in a storage device with a large capacity. Which of the following tabs under the print server properties dialog box can be used for this purpose? a. Port b. Security c. Drivers d. Advanced

d. Advanced

Margret is a support technician working at Mercorp Inc. She tells the interns that the easiest way to stop a rogue process from causing performance issues is to right click the process in Task Manager and click End Task. An intern asks her what he should do if the specific process restarts even after selecting End Task. What can Margret tell the intern if the process issue is caused by a third-party application and it has no solution yet? a. Use the process ID and search online for information regarding the process b. Create a dump file and share it with the in-house development team c. Run the same process under a different user d. Check with the program vendor for an update

d. Check with the program vendor for an update

Keplez Informatics is headquartered in Sydney, Australia, and has smaller branch offices spread across the world. The RODC in one of the branch offices gets stolen. Shannon is the system administrator at Keplez Informatics. What is the appropriate security measure that Shannon should take? a. Disable user accounts in the branch office b. Shut down all RODCs c. Create a new RODC d. Delete the RODC computer account

d. Delete the RODC computer account

Alfons recently received a promotion to lead a team of 35 software engineers, testers, and business analysts. When he needs to send an email or meeting invite to his team, he realizes that he must type out the email IDs for all his team members. He approaches Priyanka from the IT team to help him make this process easier and more efficient. Which of the following features of Active Directory can Priyanka use to provide a solution? a. Selective authentication b. Universal Group Membership Caching c. User Principle Name d. Distribution groups

d. Distribution groups

Devika copies a file, TFPresentation, from a folder titled "Mach-2" to a folder titled "Mach-3" on the same NTFS disk volume. The Mach-2 folder allows Read access to the Editor group, while explicitly denying Write permission to the same group. The Mach-3 folder allows Full control to the Editor group. TFPresentation, the original file, has Modify permissions for the Editor group. What is the effective access of the Editor group on the copied file? a. Modify b. No access c. Read d. Full control

d. Full control

Kelsan Informatics has its client computers connected to a router through which the clients can access the organization's servers in the DMZ. The DMZ is connected to a NAT router that is connected to the Internet. In addition to providing access to the Internet, the NAT router also offers additional capabilities, such as traffic throttling, intrusion prevention, and malware filtering. What is the term for this type of NAT router? a. Demarcation point b. Point-to-Point Protocol over Ethernet (PPPoE) c. Last mile technology d. Next Generation Firewall

d. Next Generation Firewall

While installing Print and Document Services, Laurel selects an option available under "Role Services." After the printer is configured, her colleagues can access the shared printer using a UNC. Which option do you think Laurel selected? a. Shared Printer b. LPD Service c. Internet Printing d. Print Server

d. Print Server

What role service available through Remote Desktop Services enables clients to establish an encrypted connection to virtual desktops and RemoteApp programs to an RDS server through the Internet using HTTPS? a. Remote Desktop Web Access b. Remote Desktop Licensing c. Remote Desktop Virtualization Host d. Remote Desktop Gateway

d. Remote Desktop Gateway

Caylin, an IT administrator, receives an email from a coworker that the company website, eloxnet.com, is not accessible. She decides to check if there is an issue that is preventing access to the website. Which of the following PowerShell cmdlets should Caylin run first? a. Get-NetIPConfiguration b. Get-NetAdapterStatistics c. Set-NetFirewallProfile d. Test-NetConnection

d. Test-NetConnection

Joshua works as a systems administrator. A computer running Windows 2019 Server crashes. However, he is not able to find the root cause of the problem. If the root cause of the problem is processor overload, which of the following should Joshua investigate to troubleshoot the issue? a. The System event log b. The Application event log c. The Security event log d. The Hardware Events event log

d. The Hardware Events event log

Which of the following settings in Windows defender should be enabled to prevent malware and network attacks from accessing high-security processes in systems that support core isolation? a. The controlled folder access setting b. The firewall rules setting c. The Block Inheritance setting d. The memory integrity setting

d. The memory integrity setting

You are attempting to upgrade a server from Windows Server 2008 R2 to Windows Server 2019 Standard Edition. What must be done in order to accomplish the upgrade? a. The Windows Server 2019 disc provides a direct upgrade path for Server 2008 R2, so no additional steps are required to perform the upgrade. b. The server can't be upgraded to Server 2019, as no upgrade path exists. You must perform a clean install. c. The server must run a special upgrade while Server 2008 R2 is running, requiring the migration of server roles to the new OS and merging of configuration files. d. The server should be updated to the latest service pack for 2008 R2 and then upgraded to Server 2012 R2, after which the server can be upgraded to Server 2019.

d. The server should be updated to the latest service pack for 2008 R2 and then upgraded to Server 2012 R2, after which the server can be upgraded to Server 2019.

Miguel is using the New Virtual Machine Wizard to create a new virtual machine for the first time. Which of the following statements is true if Miguel creates a virtual machine with default settings? a. The virtual machine will be a Generation 1 virtual machine. b. The virtual machine will have 4 GB of memory, which is expandable up to 36 GB. c. The virtual machine will be named VM1. d. The virtual machine will have a 127 GB dynamically expanding hard disk.

d. The virtual machine will have a 127 GB dynamically expanding hard disk.

Theodore installs a Fedora Linux distribution on a Windows Server 2019 server. He initially uses the sudo command to perform system administration on the Linux system. Later, he opens a new command prompt and runs some more administrative commands. Which of the following must be true if Theodore did not use the sudo command during the second round of administrative changes? a. Theodore used the pwd command. b. Theodore used the sudo command to open the Linux command prompt. c. Theodore used the su command to run commands as the root user. d. Theodore used the sudo passwd root command.

d. Theodore used the sudo passwd root command.

Hamza installs the Windows Deployment Services role on SERVERX. He intends to use SERVERX to enable rapid server deployment across his organization's network. He wants SERVERX to be able to send WIM images to each computer on the network in response to their PXE requests. Which component of the Windows Deployment Services role provides this feature? a. Deployment Server b. Single-root I/O virtualization c. Live migration d. Transport Server

d. Transport Server

Navin wants to reduce the chances of a data breach and monitor and control the traffic on his company's website. Instead of using a NAT router, he sets up an external server that acts as a filter between the organization's website and end users. Which of the following options must Navin select and configure when configuring WSUS? a. Synchronize from another Windows Server Update Services server b. Synchronize from Microsoft Update servers c. Store updates in the following location d. Use a proxy server when synchronizing

d. Use a proxy server when synchronizing

Orana works for an organization that sets up several virtual machines on a day-to-day basis to be deployed for various clients. Orana is exploring various Hyper-V options that will simplify this process. Which of the following Hyper-V features should Orana use? a. Live migration b. Replication c. Production checkpoints d. Virtual machine templates

d. Virtual machine templates

The new system administrator of XYZ company realizes that whenever updates are available for Windows, WSUS redirects computers to the Microsoft Update servers on the Internet to obtain updates instead of storing the update information on the WID. Which of the following is a likely reason for this issue? a. While configuring WSUS, the option Synchronize from another Windows Server Update Services server was selected. b. The WSUS installation is either incomplete or has not been installed properly. c. While installing WSUS, the option SQL Server Connectivity was selected. d. While installing WSUS, the option Store updates in the following location was deselected.

d. While installing WSUS, the option Store updates in the following location was deselected.

Emmitt, an IT administrator, is on a holiday when he receives a message from his boss about an issue with one of the servers running Windows Server 2019. Fortunately, Emmitt is carrying his laptop that is running a Windows 7 operating system. Emmitt accesses the server remotely and resolves the issue. Which of the following tools did Emmitt most likely use to access the server? a. Best Practices Analyzer b. Server Manager c. Remote Server Administration Tools d. Windows Admin Center

d. Windows Admin Center

Isabella installs a Fedora Linux distribution on a Windows Server 2019 server. Next, she installs the Apache Web server on this system. Because the server is also running IIS that uses port 80, Isabella modifies the port number for the Apache Web server. Which of the following commands must Isabella run to ensure that she did not make a syntax error during the recent change? a. apachect1 start b. vim file c. install apache2 d. apachect1 configtest

d. apachect1 configtest


संबंधित स्टडी सेट्स

ITC 283 Lesson 11, "Configuring Updates"

View Set

Ch. 10 Leading, Managing, Delegating

View Set

CHAPTER 8 Land and water in the Midwest

View Set

A&PII: Chapter 13 Lecture Homework

View Set