CIS 017 Modules Review (1-12)

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

DHCP servers respond to DHCPDISCOVER packets received from DHCP clients or DHCP relay agents with a DHCPACK packet. A. True B. False

B. False

On systems that have a UEFI BIOS, the UEFI system partition is the boot partition. A. True B. False

B. False

To allow users within a branch office to print to a network-attached printer within a main office, you must enable Branch Office Direct Printing. A. True B. False

B. False

When creating a RAID volume using Server Manager, each storage device is automatically converted to a dynamic disk. A. True B. False

B. False

When you select the List in the directory option within printer properties, a shared printer object is created within the OU that you specify within Active Directory. A. True B. False

B. False

You wish to create a RAID level 5 volume using the Disk Management tool. How many storage devices can you use in the volume? A. 3 B. 7 C. 32 D. There is no limit.

C

You are about to move an EFS-encrypted file called SecureData.xml from a folder on an NTFS volume to a folder on a ReFS volume. Which of the following statements are true regarding the permissions and encryption on the file following the move operation? A. SecureData.xml will retain its original permissions following the move operation B. SecureData.xml will remain encrypted following the move operation C. SecureData.xml will inherit the permissions from the target folder following the move operation D. The SecureData.xml will be not be encrypted following the move operation

C and D

What can you create in Event Viewer to display specific types of events from one or more event logs?

Custom view

Which of the following VPN authentication methods is considered the most secure?

EAP

Which of the following trust relationships can be created between two domains in separate Active Directory forests?

External trusts

Organizations that allow Remote Desktop sessions from remote access clients that are not licensed by the organization should choose a Per Device licensing mode when configuring Remote Desktop Services.

False

Performance baselines are typically created only after installing a new Windows Server 2019 system.

False

The Windows Subsystem for Linux (WSL) allows you to execute Web apps in a virtual machine on Windows Server 2019.

False

You wish to add a copy of the global catalog to a domain controller within Active Directory Sites and Services. For which object must you right-click and select Properties?

NTDS Settings

Which of the following cloud delivery models uses containers exclusively to run Web apps?

PaaS

Which of the following Remote Desktop Services role services uses HTTPS to provide encryption for all RDP packets?

Remote Desktop Gateway

At minimum, which Remote Desktop Services role services must you install to provide session-based desktop deployment across multiple remote access servers? (Choose all that apply.)

Remote Desktop Session Host, Remote Desktop Connection Broker, & Remote Desktop Licensing

You have created a template user account within Active Directory Users and Computers. What must you do to create additional user accounts based on this template user account?

Right-click the template user account, and click Copy

Which of the following can be easily identified on the Processes tab of Task Manager? (Choose all that apply.)

Rogue processes & Memory Leaks

11-3) You have created a new Group Policy Object (GPO). To which of the following objects can this GPO be linked?

Site Domain OU

Which two resource records can you create in a zone to provide the FQDN of an email server for the zone, as well as associate this FQDN with an IPv6 address? A. MX B. A C. CNAME D. AAAA

A and D

Which of the following are print server configuration tasks that you normally perform before adding shared printers within the Print Management tool? A. Add manufacturer-supplied printer drivers for the print devices within your organization B. Add a PRINT$ shared folder C. Verify the ports and forms available on your print server, and add additional ones, if necessary D. Configure default printer and print server permissions

A, C, and D

Which of the following spooling formats can be used by the GDI print API? A. EMF B. XPS C. RAW D. TEXT

A, C, and D

DHCP servers can be configured to dynamically update host and PTR records for legacy DHCP clients and DHCP clients that do not use a Microsoft operating system. A. True B. False

A. True

Documents are rendered into print jobs on the print client by default. A. True B. False

A. True

NetBIOS name records are automatically created on a WINS server by computers that are configured to use the WINS server. A. True B. False

A. True

Which of the following performance counters can be used to identify jabbering hardware?

% Interrupt Time

Which DHCP option number provides a default gateway router? A. 003 B. 004 C. 006 D. 015

A

What two items must you configure using Server Manager in order to share storage to other systems using iSCSI? A. iSCSI virtual disk B. clustered storage pool C. iSCSI target D. iSCSI initiator

A and C

Which of the following can be used to set the compress attribute for an NTFS file? A. Set-ItemProperty B. cipher.exe C. compress.exe D. compact.exe

A and D

Which of the following occurs when you join a computer to an Active Directory domain? (Choose all that apply.)

A computer account is created within Active Directory, if one has not been prestaged. The Domain Users group is added to the local Users group The Domain Admins group is added to the local Administrators group

Both NFS and SMB shared folders can be published to Active Directory. A. True B. False

A. True

To prevent a DHCP server from leasing an IPv4 address that has been manually configured on a computer on the network, you can configure a DHCP server to send one or more ping requests to an IPv4 address before leasing it. A. True B. False

A. True

You can use soft quotas to provide warnings to users that exceed folder quotas, while not restricting their ability to add content to a folder. A. True B. False

A. True

You can use the Set-ACL cmdlet within Windows PowerShell to configure entries within a DACL or SACL. A. True B. False

A. True

Which resource record stores zone transfer settings? A. NS B. PTR C. A D. SOA

D

Which of the following steps is not a common troubleshooting procedure?

Delegate responsibility

Which of the following VPN protocols uses IPSec to encrypt network traffic? (Choose all that apply.)

IKEv2 & L2TP

11-11) Which certificate template permissions must you grant to a user or computer before they are auto-enrolled for a certificate using Group Policy? (Choose all that apply.)

Read Enroll Autoenroll

Which task should you perform in Task Manager before stopping a problematic process for a program that was created by your organization?

Right-click the process and click Create dump file

Remote access servers can be configured as RADIUS clients.

True

Which of the following hardware devices does a Generation 1 virtual machine emulate? (Choose all that apply.) a. IDE hard disk b. SCSI hard disk c. UEFI BIOS d. Serial ports

a. IDE hard disk b. SCSI hard disk (legacy) d. Serial ports

Commands within Windows PowerShell are referred to as cmdlets. (true or false)

true

Which of the following actions can be performed to solve a performance problem? (Choose all that apply.)

All of the Above: Stop and disable unnecessary services, Move applications to other systems, Add additional hardware, & Upgrade hardware devices with bus mastering versions

A user complains that they are unable to contact a specific server in your organization. You remember that you recently modified the A record for this server on your organization's Active Directory-integrated DNS server. Which troubleshooting step should you try first to remedy the issue? A. Clear the DNS cache on the DNS server B. Clear the DNS cache on the user's computer C. Run the nslookup command on the user's computer D. Restart the DNS Server service

B

Which of the following represents the maximum amount of time that a DNS server or resolver is allowed to cache the result of a forward lookup? A. Zone transfer B. TTL C. Root hints D. PTR

B

Which of the following settings within printer properties allows print device notifications to be sent to the print server? A. Enable printer pooling B. Enable bidirectional support C. Enable notifications and logs D. Allow printer notifications

B

You would like to share a folder that uses the access-based enumeration feature. What must you do? A. Share the folder using SMB by accessing folder properties. B. Share the folder using SMB using Server Manager. C. Share the folder using NFS by accessing folder properties. D. Share the folder using NFS using Server Manager.

B

Which of the following Linux distributions are supported for use with WSL? (Choose all that apply.)

Fedora, Ubuntu, OpenSUSE Leap & Debian GNU/Linux

As a server administrator, which of the following actions can you perform on a Remote Desktop connection to provide interactive user support for the user of the session?

Shadow

A baseline is a set of performance information for a system during normal times of operation.

True

Resource Monitor allows you to identify the storage devices and files that a single process is accessing.

True

You must be a member of the Enterprise Admins group in order to add a trust relationship.

True

11-17) Which of the following port numbers is used to obtain updates from a WSUS server using HTTPS?

8531

What must you configure in IIS Manager to allow users to access a help desk ticketing system Web app using the URL https://www.sample.com/helpdesk? (Choose all that apply.)

A helpdesk virtual directory & An HTTPS protocol binding

Which of the following are authoritative DNS server types? A. Primary B. Active Directory-integrated primary C. Secondary D. Caching-only

A, B, and C

Another server administrator has configured an iSCSI SAN device to provide storage to your Windows Server 2019 system. What must you configure on your Windows Server 2019 system in order to connect to this storage? A. iSCSI HBA B. iSCSI initiator C. iSCSI target D. MPIO

B

When configuring the Storage Spaces component of Windows Server 2019 using Server Manager, which of the following statements is true? A. The primordial storage pool contains all storage devices on a system B. RAID volumes are created on a virtual disk that utilizes space in a storage pool comprised of storage devices C. Virtual disks implement a level of RAID and can use thin or thick provisioning D. The maximum number of storage devices that you can add to a single storage pool is 32

B and C

DHCP reservations must use the DHCP options from their scope. A. True B. False

B. False

Separator pages can be configured to reduce the cost of printing for an organization. A. True B. False

B. False

You have configured a new storage pool in Server Manager that contains 5 storage devices and would like to configure a single virtual disk that uses all of the available capacity from this pool. What RAID type should you select in the New Virtual Disk Wizard if you wish to ensure that your virtual disk remains fault tolerant in the event that two storage devices fail at the same time? A. Simple B. Striped C. Mirror D. Parity

C

Your organization maintains a shared folder called PrivateHR that only the HumanResources-G and Domain Admins groups have access to. You wish to audit each time a member of the HumanResources-G group successfully modifies or deletes a file within this folder. What must you do? A. Configure an audit entry within the SACL of the PrivateHR folder that allows the Modify permission for the HumanResources-G group B. Configure the audit attribute on the PrivateHR folder C. Configure an audit entry within the SACL of the PrivateHR folder that audits the Modify permission for the HumanResources-G group D. Enable success auditing for the system using an audit policy

C and D

Websites on a Web server provide the front end for most Web apps.

True

11-1) Group Policy settings apply to which of the following objects?

Users Computers

11-6) Which section of a GPO contains the most security-related settings for the Windows operating system?

Computer Configuration, Windows Settings

Which of the following domain functional levels provides Kerberos armoring? (Choose all that apply.)

Windows Server 2012 Windows Server 2012 R2 Windows Server 2016

What command could you execute within PowerShell to learn about the syntax of the Get-WMIObject cmdlet? (Choose all that apply.) a. help Get-WMIObject b. Get-Help Get-WMIObject c. get-help Get-WMIObject d. Get-Help Get-WMIObject -online

a. help Get-WMIObject b. Get-Help Get-WMIObject c. get-help Get-WMIObject d. Get-Help Get-WMIObject -online ALL OF THESE WORK d. does same thing as others but pulls info from Internet

Which action should you choose for a virtual machine within the Actions pane in order to obtain the Virtual Machine Connection window? a. Start b. Connect c. View d. Ctrl+Alt+Del

b. Connect

What term is used to refer to a logical grouping of computers that participate in Active Directory single sign-on? a. Group Policy b. Domain c. Domain controller d. Azure Active Directory

b. Domain

Which of the following Hyper-V features allows a virtual machine to use additional physical memory within a server, provided that it is available? a. Smart caching b. Dynamic memory c. Smart paging d. Shielding

b. Dynamic memory

Which of the following is not a question that should be asked when planning a Windows Server 2019 installation? a. What are the storage needs of the server? b. Who will be supporting the server? c. How many users are expected to connect to the server? d. What services will the server run?

b. Who will be supporting the server?

Which of the following PowerShell constructs is best to use when you wish to perform a specific action based on the value of a single variable? a. if b. switch c. do...while d. for

b. switch

Your system has three physical storage devices. Windows Server 2019 is installed on the first physical storage device. What can you do to increase the performance of the system as much as possible? a. Move the paging file to the second physical storage device b. Move the paging file to the third physical storage device c. Create a paging file on the second and third physical storage devices d. Create a paging file on the second and third physical storage devices and remove the page file from the first storage device

d. Create a paging file on the second and third physical storage devices and remove the page file from the first storage device

Which of the following management tools is not installed by default on Windows Server 2019? a. Server Manager b. MMC c. Windows PowerShell d. Windows Admin Center

d. Windows Admin Center

Which of the following aliases can be used to switch to a different PowerShell provider? a. sp b. ps c. cd d. sl

d. sl - sl = set location

Which of the following commands can be used to display containers that are no longer running?

docker ps -a

Which command can you execute to create a container from the microsoft/iis container image that runs in the background and automatically maps port 80 in the container to a port above 32767 on the underlying operating system?

docker run -d -P microsoft/iis

Which docker command displays container images available on Docker Hub?

docker search

(T/F) PowerShell console files use the .ps1 extension

false - powershell console files have a .psc1 extension - .ps1 is a powershell script file

To install a Windows Server 2019 virtual machine, you typically attach an ISO image file that contains the installation media to a virtual DVD drive within the virtual machine settings. (true or false)

true

Which of the following IIS configuration features is used to specify the default webpage or Web app file that a client views?

Default Document

11-9) Which term refers to the process whereby a user or computer obtains a certificate from a CA?

Enrollment

What name format is used to specify the iSCSI initiators that are permitted to connect to an iSCSI target? A. IQN B. FQDN C. IDN D. UNC

A

You have submitted a print job to a shared printer that uses a different layout than is supported by the print device. After noticing that your print job was not printed, you open the print queue and see your print job with a Paused status. What action can you select from the Documents menu to ensure that the print job is printed, even if the layout is not ideal? A. Resume B. Unhold C. Restart D. Cancel

A

You notice that printouts from small print jobs are inserted within the printouts of large print jobs on a print device within your organization. What option can you select within printer properties to resolve the issue? A. Start printing after last page is spooled B. Hold mismatched documents C. Print directly to the printer D. Keep printed documents

A

A single user complains that their print job is printing garbled text on hundreds of pages on the printer. What are two possible causes of this issue? A. The user selected wrong document layout options within their software application when printing the document B. The printer driver has become corrupted on the print client C. The printer driver has become corrupted on the print server D. The shared printer is configured with an improper spooling form

A and B

Which of the following are valid reasons to deploy a WINS server? A. To reduce NetBIOS name broadcasts on LANs in an organization B. To allow computers in one LAN to resolve NetBIOS names in another LAN C. To resolve NetBIOS names to IPv6 addresses D. To provide legacy Windows clients access to an Active Directory domain

A and B

Which of the following basic NTFS/ReFS permissions allows you to delete a file? A. Full control B. Modify C. Write D. Read and execute

A and B

Which of the following statements regarding backup performance options for Windows Server Backup are true? A. Full backups provide the fastest restoration of data B. Incremental backups take less time to perform than full backups C. Up to 6 incremental backups can be performed following a full backup D. Full backups back up files that have the archive attribute set

A and B

Which of the following features are provided by the File Server Resource Manager server role? A. File screens B. Access-based enumeration C. Folder quotas D. User quotas

A and C

You would like to provide a central shared folder that users can access to view all other shared folders within the organization. What must you do? ( A. Install the DFS Namespaces role and configure a DFS namespace B. Configure a replication group C. Add targets to the DFS namespace for each shared folder D. Install the DFS Replication role on each file server

A and C

Which two of the following tasks can you perform to provide fault tolerance for two DHCP servers in the DMZ? A. Ensure that DHCP relay agents in the organization are configured with the IP address of both DHCP servers B. Ensure that half of the DHCP relay agents in the organization are configured with the IP address of the first DHCP server, and the other half are configured with the IP address of the second DHCP server C. Configure the two DHCP servers as replication partners D. Configure DHCP failover in either load balance or hot standby mode for all scopes

A and D

You wish to provide access to Web resources in another organization. However, the associated A records for these resources are stored in a zone file on a DNS server in the other organization that is not publicly registered. What can you configure on your organization's DNS server to allow access to these resources? A. A stub zone that forwards requests to the other organization's DNS server B. A conditional forwarder that forwards requests to the other organization's DNS server C. A primary zone that copies resource records from the zone on the other organization's DNS server D. A secondary zone that copies resource records from the zone on the other organization's DNS server

A, B, and D

Which of the following are requirements for each server in a Storage Spaces Direct configuration? A. Failover Clustering feature installed B. 64 GB of memory and at least two processors C. At least six additional storage devices (two or more of which are SSDs) D. 10 Gb Ethernet interface with RDMA support

A, C, and D

After storage tiers have been enabled for the storage used by a volume, you can use the Set-FileStorageTier cmdlet in Windows PowerShell to ensure that a specific file is always stored on a specified storage tier. A. True B. False

A. True

By supplying the device driver for an FC HBA during a Windows Server 2019 installation, you can choose to install Windows Server 2019 on FC SAN storage instead of a local storage device. A. True B. False

A. True

If a DNS server does not contain a zone file that contains the resource records for a lookup, and is not configured as a conditional or default forwarder, it will use its root hints file to perform a recursive query. A. True B. False

A. True

Only the NTFS filesystem supports all of the basic and advanced attributes for folders and files. A. True B. False

A. True

Scavenging can be configured to remove stale resource records that were added to a zone using dynamic update. A. True B. False

A. True

Users can access a webpage to view and manage their own print jobs provided that the Internet Printing component of the Print and Document Services role is installed on the print server. A. True B. False

A. True

When initializing a new storage device that has a capacity larger than 2 TB, you must use a GPT instead of an MBR. A. True B. False

A. True

When restoring a backup, you can choose to restore the data to a different location. A. True B. False

A. True

When you click the Optimize button for a simple volume in the Optimize Drives window, the underlying storage device is defragmented if it is a hard disk, or trimmed if it is an SSD. A. True B. False

A. True

Windows 10 PCs can be configured to print directly to a network-attached print device, or to a shared printer on print server that prints directly to a network-attached print device. A. True B. False

A. True

Windows systems that have the Client for NFS installed can access an NFS shared folder by browsing the network or specifying the shared folder's UNC. A. True B. False

A. True

You can configure auditing for a shared printer provided that the Audit object access policy setting is configured within a Group Policy that applies to the print server. A. True B. False

A. True

Which of the following are optional components of a DHCP scope? A. IP address exclusions B. DHCP options C. DHCP policy D. Reservation

All of the Above

Which of the following are reasons for creating multiple volumes on a single storage device? A. Allow for the use of more than one type of filesystem B. Reduce the chance that filesystem corruption will render all data on the storage device unusable C. Segregate different types of data D. Speed up access to stored data by keeping filesystems as small as possible

All of the Above

Which of the following commands can be used to restart the Print Spooler service within Windows PowerShell? A. Net-Restart PrintSpooler B. Restart-Service spooler -force C. Restart-PrintSpooler D. Set-Printer printername -restart

B

Which service can be started on a system to reduce the amount of time it takes to repair filesystem errors? A. Storage Spaces B. Spot Verifier C. Volume Repair D. Data Deduplication

B

You wish to grant a specific user the ability to view the read-only attribute on files within a particular folder on the system, but do not wish to grant any other access. What advanced permission should you assign to this user? A. Traverse folder/execute file B. Read attributes C. Read extended attributes D. Read permissions

B

Which of the following RAID volume types provide fault tolerance in the event of a single storage device failure? A. striping B. striping with parity C. mirroring D. JBOD

B and C

You have a large number of users that access the same files within a shared folder that is replicated to another shared folder on the network using DFS replication. Users often report problems with missing content in the files that they access within the shared folder, and that changes take a long time to propagate from one shared folder to the other. What two actions can you take to address these issues? A. Add a shared folder on a third file server to the replication group B. Disable remote differential compression (RDC) on the connections within the replication group C. Increase the size limit of the DFS staging folder for each member of the replication group D. Modify the replication group settings to use a Full mesh topology for replication

B and C

You wish to configure a Windows Server 2019 print server using the Print Management tool to share printers using SMB and LPD. What components must you select when installing the Print and Document Service server role? A. Print Management B. Print Server C. LPD Service D. Internet Printing

B and C

Which of the following occurs when you encrypt a file using EFS within a domain environment? A. An asymmetric private key is generated and used to encrypt the file contents. B. A copy of the symmetric encryption key is stored within the file metadata and asymmetrically encrypted with your public key. C. A symmetric encryption key is generated and used to encrypt the file contents. D. A copy of the symmetric encryption key is stored within the file metadata and asymmetrically encrypted with recovery agent's public key.

B, C, and D

The View effective access tab within the Advanced Security Settings window for a folder or file can be used to view the groups that have access to a particular folder or file. A. True B. False

B. False

The default lease time of 8 days for a DHCP scope is appropriate for networks that primarily contain mobile devices, but should be reduce for networks that primarily contain desktop PCs. A. True B. False

B. False

Windows computers contact their DNS server at boot time to create or update their host resource records. This feature is called zone transfer. A. True B. False

B. False

You are configuring a DFS replication group to synchronize folder contents between four file servers. To minimize the network bandwidth used by DFS replication, you should choose a Full mesh topology for your replication group. A. True B. False

B. False

You can only run the chkdsk command on NTFS and ReFS filesystems. A. True B. False

B. False

In a continuous deployment scenario, which software creates a container or virtual machine on a cloud server to test the functionality of a new Web app version?

Build Automation

After noticing a RAID level 5 volume in Disk Management with a status of Failed Redundancy, you located and replaced the failed storage device with a new one. What must you do to return the volume status to Healthy? A. Nothing, as the data will automatically be rebuilt on the new storage device B. Right-click the RAID volume and click Reactivate Volume C. Right-click the RAID volume, click Repair Volume, and select the new storage device D. Delete and recreate the RAID volume, and then restore data from a backup

C

Several users are complaining that a particular printer is not printing their documents. What should be your first course of action? A. Restart the Print Spooler service on the print server B. Advise each user to restart the Print Spooler service on their print client and re-print their document C. View the Queue Status column for the printer within the Printers Not Ready custom filter within the Print Management console D. Update or replace the printer driver for the printer within the Print Management console

C

The manager of the Accounting department needs to be able to print to the shared printer within the Accounting department, as well as manage other user's print jobs within the print queue. What printer permissions must you assign to the manager on the shared printer at minimum? A. Print B. Manage Documents C. Print and Manage Documents D. Manage Documents and Manage Printers

C

Which of the following NFS shared folder permissions allows computers to access an NFS shared folder and modify content? A. Full Control B. Change C. Read-Write D. Modify

C

Which of the following Windows logs stores auditing events? A. System B. Application C. Security D. Auditing

C

You have shared a folder using SMB and assigned members of the Accounting group Full Control shared folder permission. One of the members of the Accounting group complains that they get an access denied message when attempting to access files within the shared folder. What are two possible causes of this issue? A. The shared folder is on an FAT32 or exFAT volume, and the DACL on the files denies access to a group to which the user belongs B. The shared folder is on an FAT32 or exFAT volume, and the DACL on the files does not allow the user access C. The shared folder is on an NTFS or ReFS volume, and the DACL on the files denies access to a group to which the user belongs D. The shared folder is on an NTFS or ReFS volume, and the DACL on the files does not allow the user access

C and D

What features does RADIUS provide for remote access connections?

Centralized logging, Remote access policies, & Centralized authentication

Which of the following must you configure to ensure that a particular group of remote access servers grants Remote Desktop access only to members of the Accounting group?

Collection

11-20) What can you configure in the Windows Defender Firewall with Advanced Security tool to automatically protect network traffic between computers using IPSec?

Connection Security Rules

What section of a remote access policy contains characteristics that must be met for remote access, such as Session Timeout?

Constraints

11-19) Which of the following Windows Defender features can be used to limit the files, folders and processes that ransomware can modify?

Controlled folder access

Your domain consists of two separate physical locations. Each location contains several domain controllers, and you have noticed that domain controller replication traffic consumes a large amount of your Internet bandwidth. What can you do within Active Directory Sites and Services to ensure that replication occurs outside of business hours? (Choose all that apply.)

Create a site object for each physical location and ensure that domain controller objects are placed within the correct site object. In the properties of a site link object, configure a replication schedule that excludes business hours.

Which of the following features must you install on a Windows print client in order to print to a shared printer using SMB? A. Internet Printing Client B. LPR Port Monitor C. SMB Printer Client D. None of the above

D

Which of the following formats can be used to print to a shared printer using IPP? A. servername:\sharedprintername B. servername:/sharedprintername C. \\servername\sharedprintername D. http://servername/printers/sharedprintername/.printer

D

You would like to ensure that an SMB shared printer is automatically configured on client computers within your organization. What must you do? A. Access the Sharing tab of the printer and select List in the directory. B. Create a shared printer object within Active Directory Users and Computers. C. Access the Advanced tab of the printer and select Auto deploy printer to client computers. D. Select the printer within the Print Management tool and click More Actions, Deploy with Group Policy from the Actions menu.

D

Your organization has two WINS servers to provide for NetBIOS name resolution. What can you do to ensure that each WINS server shares its NetBIOS name records with the other server? A. Configure WINS failover for the two WINS servers B. Provide the IP address of both WINS servers in IPv4 properties on each WINS client C. Configure the DNS server to use WINS lookup D. Configure the two servers as replication partners

D

What can you configure on a router to protect traffic destined for another network in the organization as it passes over the Internet?

Demand-dial interface

Which of the following group scopes can contain objects from any domain within the forest? (Choose all that apply.)

Domain local Universal

Which of the following network topologies should you choose if your DirectAccess remote access server is connected directly to the demarc, as well as to the DMZ?

Edge

11-12) Only schema version 1 certificate templates can be configured for auto-enrollment. True or False?

False

11-14) You must enroll each WAP for a certificate based on the RAS and IAS Server certificate template before they can be configured for 802.1X Wireless. True or False?

False

11-2) There are no GPOs created in an Active Directory domain by default. True or False?

False

After a container is running, you cannot configure its contents until the container is stopped.

False

Block storage is a cheaper alternative to object storage on public cloud providers.

False

Committed memory refers to the memory that is used by the Windows kernel and device drivers.

False

Creating OUs within the Active Directory database is also called prestaging.

False

DirectAccess supports Windows 7 and later remote access clients by default.

False

Domain controllers store local user accounts within a SAM database and domain user accounts within Active Directory.

False

Reliability Monitor displays a system stability index value for each day based on the values of specific performance counters.

False

Split tunneling is used to ensure that all network traffic generated by a remote access client passes through a VPN to a remote access server.

False

The Active Directory Recycle Bin can be enabled using the Active Directory Domains and Trusts tool.

False

The Linux Containers on the Windows (LCOW) feature of Windows Server 2019 allows you to run Linux containers only if Docker EE was obtained using the DockerMsftProvider Windows PowerShell module.

False

The Remote Access role service in Windows Server 2019 provides for DirectAccess and VPN remote access, as well as RADIUS.

False

The Remote Desktop Licensing role service cannot be installed on the same computer as the Remote Desktop Session Host service.

False

The docker command is also called the Docker daemon.

False

There are five event levels available in an event log: Information, Warning, Error, Audit Success, and Audit Failure.

False

You can use the Install-ADDSDomain cmdlet within Windows PowerShell to configure a new forest root domain.

False

Which functions does the global catalog provide? (Choose all that apply.)

Fast object searching Universal group membership Domain authentication using UPNs

Your organization develops a containerized Linux Web app that is run on a public cloud provider. To minimize cloud costs, a continuous deployment process is not used. Instead, Web app developers must add new versions of their Linux Web app to a container and test its functionality locally before running it on the public cloud provider. What could you configure on an existing Windows Server 2019 system to allow the Web app developers in your organization to test new versions of their containerized Linux Web app? (Choose all that apply.)

Hyper-V, Docker EE & LCOW

To which of the following groups should you assign NTFS/ReFS permissions for Web app content in order to provide anonymous user access?

IIS_IUSRS

Which of the following components represents a specific hardware device or software component that can be monitored?

Instance

Which of the following options on the Advanced Boot Options menu can be used to start a system that failed to boot previously due to incorrect settings in the Windows Registry, or a recently added device driver?

Last Known Good Configuration (advanced)

On which part of the maintenance cycle do server administrators spend the most time?

Monitoring

Which of the following PowerShell cmdlets can be used to move or seize a FSMO role?

Move-ADDirectoryServerOperationMasterRole

Which of the following FSMO roles are stored on one domain controller within each domain? (Choose all that apply.)

PDC Emulator RID Master

Which of the following is not considered a remote access technology?

PPPoE

Which two tools are commonly used to create performance baselines? (Choose two answers.)

Performance Monitor & Data Collector Sets

Which of the following can be included in a data collector set? (Choose all that apply.)

Performance counter, Event trace provider, & Windows Registry key

11-8) Which of the following is not included in a certificate?

Private Key

11-5) You wish to configure a GPO that allows users in your organization to install a package using the Programs and Features section of Control Panel. Which software deployment method should you choose when configuring the Software Settings section of a GPO?

Publish the software in the User Configuration

11-13) In an 802.1X Wireless configuration, which component generates the encryption keys used for WPA?

RADIUS server

You have configured a remote access server in your DMZ for IKEv2 VPN access. Which ports on your NAT router must you configure for port forwarding to this remote access server? (Choose all that apply.)

TCP port 1701, UDP port 500, & UDP port 4500

11-10) Group Policy can be configured to auto-enroll certificates for users and computers based on the permissions in a certificate template on an enterprise CA. True or False?

True

11-16) To reduce the amount of storage that is consumed by updates on a WSUS server, you should configure the WSUS server to only synchronize updates for products that are deployed in your organization. True or False?

True

11-18) Firewall profiles contain a series of firewall rules that apply to a computer when it is connected to a particular type of network (public, private, domain). True or False?

True

11-4) Group Policy preferences can be used to configure Windows features, but are only interpreted by Windows 7, Windows Server 2008, and later computers by default. True or False?

True

11-7) You can import administrative template files into a GPO to allow Group Policy to configure third-party software settings. True or False?

True

Before installing Active Directory on a Windows Server system to function as an additional domain controller within a forest, you must first ensure that the Windows Server is configured to contact a DNS server that contains the appropriate service records for the forest.

True

DirectAccess uses HTTPS to authenticate remote access users, and IPSec to create an encrypted tunnel for network traffic between the remote access client and server.

True

Each Linux container run on Windows Server 2019 using LCOW is automatically run as a Hyper-V container that executes on a Linux kernel provided by the LinuxKit component of Docker EE.

True

Each server role and feature that is added to a Windows Server 2019 system also adds additional performance objects and counters.

True

If a RODC is stolen, you can delete the computer account to reset affected user and computer accounts

True

If a global catalog cannot be placed within a branch office site, you can enable UGMC on the site to ensure branch office domain controllers provide fast authentication.

True

Many organizations store system documentation in help desk ticketing software.

True

Nano Server containers must be run as a Hyper-V container on Windows Server 2019.

True

Searching an event description or event ID online can generate a list of possible causes and associated solutions for a problem.

True

The schema and configuration partitions of the Active Directory database are replicated forest-wide.

True

The user permission necessary for VPN remote access can be granted in the properties of a user account or remote access policy.

True

11-15) Which of the following statements regarding the functionality of WSUS are true? (Choose all that apply.)

Updates can be manually or automatically approved for distribution on a WSUS server. Group Policy is used to direct domain computers to a WSUS server for updates. Wa. WSUS prevents Microsoft Update traffic from saturating the bandwidth on an organization's Internet connection A WSUS server can be configured to remove updates from computers that have installed them.

Which default folder under a domain within Active Directory Users and Computers contains the Administrator user account and Domain Admins group?

Users

You are tasked with deploying a private cloud in your organization that needs to host both Windows and Linux Web apps using a SaaS delivery model on a single Windows Server 2019 system. What technology should you configure on the Windows Server 2019 system?

WSL

After creating a production checkpoint of a virtual machine, you would like to revert the virtual machine to the state it was in prior to the checkpoint. What should you select within the Actions pane of Hyper-V Manager after selecting your checkpoint within the Checkpoints pane? a. Apply b. Revert c. Delete d. Delete Subtree

a. Apply - select revert if you highlight the virtual machine within virtual machine pane, and select revert from actions pane

Which of the following are valid methods for executing the superscript.ps1 file within PowerShell, assuming it is in your current directory, C:\Scripts? (Choose all that apply.) a. C:\Scripts\superscript.ps1 b. superscript.ps1 c. ./superscript.ps1 d. .\superscript.ps1

a. C:\Scripts\superscript.ps1 (full path) c. ./superscript.ps1 (forced relative path) d. .\superscript.ps1 (forced relative path)

To create a virtual machine template, what actions must you perform at minimum? (Choose all that apply.) a. Create a new virtual machine and install a guest operating system within it b. Install additional software components within the guest operating system c. Run the System Preparation Tool within the guest operating system to remove unique identifiers d. Export the virtual machine to a folder on the filesystem

a. Create a new virtual machine and install a guest operating system within it c. Run the System Preparation Tool within the guest operating system to remove unique identifiers d. Export the virtual machine to a folder on the filesystem

Which of the following can be used to open a new Windows PowerShell prompt that is connected to a remote computer (provided that winRM is enabled)? a. Enter-PSSession computername b. Invoke-Command computername c. Execute-Shell computername d. Enable-PSRemoting computername

a. Enter-PSSession computername

To which of the following virtual switches can a host operating system connect? (Choose all that apply.) a. Internal b. External c. Public d. Private

a. Internal b. External

Which of the following Hyper-V features requires that your host operating system be joined to an Active Directory domain? (Choose all that apply.) a. Live migration b. Checkpoints c. Replication d. Quality of Service (QoS)

a. Live migration c. Replication

Which two small footprint installation options are available for Windows Server 2019? (Choose two answers.) a. Nano Server b. Microsoft Hyper-V Server c. Server Core d. Essentials

a. Nano Server c. Server Core

Which Hyper-V feature allows you to install a virtual machine within another virtual machine? a. Nested virtualization b. SLAT c. Checkpoints d. Hyper-V containers

a. Nested virtualization

Which of the following are panes that you will see listed for a server, server group, or server role within Server Manager? (Choose all that apply.) a. Services b. Events c. Roles and Features d. Performance

a. Services b. Events c. Roles and Features (maybe?) d. Performance

Which filesystem feature of Windows Server 2019 allows you to create large volumes that span multiple physical storage devices? a. Storage Spaces b. ReFS c. Storage Migration Service d. Storage Replicas

a. Storage Spaces

Which of the following tasks are typically performed following a Windows Server 2019 installation? (Choose all that apply.) a. Verify the correct time and time zone information b. Activate the Windows Server 2019 operating system c. Configure the appropriate computer name and domain membership d. Set IP configuration on network interfaces

a. Verify the correct time and time zone information b. Activate the Windows Server 2019 operating system c. Configure the appropriate computer name and domain membership d. Set IP configuration on network interfaces

Which two files must you import within the Windows Deployment Services tool to provide for remote installation? a. install.wim b. PXE.wim c. bootmgmt.wim d. boot.wim

a. install.wim d. boot.wim

Which of the following commands can be used to start the Apache Web server in a Linux container or WSL Linux distribution on a Windows Server 2019 system?

apachectl start

Your server has an additional SSD that you wish to use exclusively within a virtual machine as a pass-through disk to increase performance. What must you do to achieve this? (Choose two answers.) a. Ensure that the SSD is set to an Online state within the Disk Management tool. b. Ensure that the SSD is set to an Offline state within the Disk Management tool. c. In the properties of the virtual machine, create a new virtual hard disk file that is stored on the drive letter that is used by the SSD. d. In the properties of the virtual machine, select an existing virtual hard disk, choose Physical hard disk, and select the SSD.

b. Ensure that the SSD is set to an Offline state within the Disk Management tool. d. In the properties of the virtual machine, select an existing virtual hard disk, choose Physical hard disk, and select the SSD.

Which of the following features can be configured within Control Panel? (Choose all that apply.) a. File caching and flushing b. Environment variables c. Power options d. Startup and recovery options

b. Environment variables c. Power options d. Startup and recovery options a. not included because it is done specifically through device manager (textbook answer doesn't include this, but it is possible to access from control panel)

What should be your FIRST course of action when you see a device marked Unknown within Device Manager? a. Install the manufacturer-provided driver package on the system and reboot. b. Right-click the Unknown device within Device Manager and choose Update driver. Supply the manufacturer-provided driver files if prompted. c. Right-click the Unknown device within Device Manager and choose Uninstall device. Reboot your system afterwards. d. Right-click the Unknown device within Device Manager and choose Properties. Note whether there is a resource conflict.

b. Right-click the Unknown device within Device Manager and choose Update driver. Supply the manufacturer-provided driver files if prompted. a. Install the manufacturer-provided driver package on the system and reboot.??? ask professor about this question

Which Windows Server edition supports Windows Containers and up to two Hyper-V Containers? a. Essentials b. Standard c. Datacenter d. Storage Server

b. Standard

Which of the following Windows Server 2019 editions are licensed per processor core? (Choose all that apply.) a. Essentials b. Standard c. Datacenter d. Hyper-V Server

b. Standard c. Datacenter

Which component of Microsoft Defender can be used to provide cloud-based threat analysis within Windows Server 2019? a. Shielded virtual machines b. IIS c. ATP d. Windows Defender Firewall

c. ATP

Which of the following utilities can be used to manually install a new device that is not fully PnP-compliant? a. Windows PowerShell b. Device Manager c. Devices and Printers utility d. Server Manager

c. Devices and Printers utility

Which of the following are hardware requirements for Hyper-V? a. 64GB of memory b. Two network interfaces c. Processor with Intel VT or AMD-V and SLAT d. A 32-bit or 64-bit processor

c. Processor with Intel VT or AMD-V and SLAT

Which of the following tools within the navigation pane of the Windows Admin Center can be used to perform capacity planning? a. Performance b. Services c. System Insights d. Azure hybrid services

c. System Insights

Which of the following operating systems are supported for use within a Generation 2 virtual machine? (Choose all that apply.) a. 32-bit versions of Windows 7 b. 64-bit versions of Windows Server 2008 c. Ubuntu 14.04 d. FreeBSD 9.1

c. Ubuntu 14.04 d. FreeBSD 9.1 - the other two OSs are supported by gen 1 VMs

Which of the following commands may be used to start Hyper-V Manager? a. hyperv b. hyper-v c. virtmgmt.msc d. new-virtconsole

c. virtmgmt.msc

Windows Server 2019 supports up to 64 physical processors and 128 logical processors. (true or false)

f

Servers that exist within a data center that is publicly accessible on the Internet are referred to as on-premises servers (True or False)

false

The minimum memory required for a graphical Windows Server 2019 installation is 512 MB. (true or false)

false

(T/F) Virtual machine settings are stored within a .vhdx file.

false - this is the virtual hard disk file, and VM settings are stored in a separate file from the hard disk file

(T/F) Both Generations 1 and 2 virtual machines support Secure Boot.

false - gen 1 VMs do not support secure boot (only use BIOS)

(T/F) The Sigverif tool can be used to verify and repair corrupt system files.

false - system file checker (sfc/scannow) does this

(T/F) In the following example, three loops will be executed. $args = "one","two","three","four" foreach ($i in $args) {write $i -foregroundcolor magenta}

false - 4 loops will be executed, one for each item in $args

(T/F) Replication must be enabled on your Hyper-V host before you are able to copy the contents of a virtual machine to a target Hyper-V host.

false - replication must be enabled on the TARGET hyper-v host, not your own hyper-v host

(T/F) After importing a virtual machine template to create a new virtual machine, you should rename the new virtual machine

true

(T/F) Any changes to a guest operating system made after the creation of a checkpoint are stored within a .avhdx file in the same directory as the associated .vhdx file.

true

(T/F) Guest operating systems require VMBus drivers to support the virtualized hardware within a Generation 2 virtual machine.

true

(T/F) Server Manager can be used to monitor and manage other Windows Server 2008 and later systems.

true

(T/F) System environment variables apply to any user logged onto the system

true

(T/F) The Tab key can be used to auto complete a PowerShell cmdlet as you are typing it.

true

(T/F) The Test-NetConnection cmdlet can be used to test network connectivity to a target computer.

true

(T/F) The Windows Admin Center allows you to obtain a Windows PowerShell session within your Web browser.

true

(T/F) The physical network interface used by an external virtual switch is not configured using IP. Instead, it uses the Hyper-V Extensible Virtual Switch protocol to allow virtual network interfaces attached to the external virtual switch to use the physical network interface.

true

(T/F) Virtual machine checkpoints are often used prior to making an important configuration change within a guest operating system, such as installing software or device drivers.

true

(T/F) WDS can be used to install multiple physical or virtualized systems at the same time, provided those systems can boot from the network using PXE

true

Clustering may be used with multiple Windows Server 2019 systems to enhance speed and fault tolerance for network services. (true or false)

true

Containers are often used to host Web apps within cloud environments (true or false)

true

Server Manager is typically used to perform most post-installation tasks on a graphical Windows Server 2019 system. (true or false)

true

You can start the Windows Server Configuration Wizard within Server Core by running the sconfig.cmd command. (true or false)

true

(T/F) Some software issues require that you modify the value of an entry within the Windows Registry to fix a system problem.

true?


संबंधित स्टडी सेट्स

Physics Study Guide Ch. 29-36 + Homework

View Set

Sec 12: The Magic Words Are "Will you Help me?"

View Set