Configuring Windows Server 2019 for MindTap/Cengage

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What is the term for programs and system software that can query WMI? Question options: a) WMI infrastructure b) WMI consumers c) WMI providers d) WMI classes

(Eckert, 2-7c) a. Incorrect. WMI infrastructure refers to the components of the operating system that respond to WMI queries. b. Correct. WMI consumers are the programs and system software that can query WMI. WMI infrastructure refers to the components of the operating system that respond to these WMI queries. c. Incorrect. WMI providers are part of the WMI infrastructure. WMI infrastructure refers to the components of the operating system that respond to WMI queries. d. Incorrect. WMI classes are part of the WMI infrastructure. WMI infrastructure refers to the components of the operating system that respond to WMI queries.

How to use this Quizlet (Flip over)

Questions come from the Quizzes (Eckert, X-Xx). ← Points to a page in the book One of these letters will be bolded with the correct answer. And the rationale for each question option is given (very useful).

Dillon wants to create a PowerShell script that automatically opens a bunch of websites whenever his system boots. He downloads a script from an Internet forum for PowerShell scripts and runs it. The script executes without warnings or asking for any additional confirmation. What is the most likely execution policy on Dillon's system? Question options: a) Restricted b) AllSigned c) Unrestricted d) Bypass

(Eckert, 2-7d) a. Incorrect. If the execution policy is set to Restricted, Dillon will not be able to run any scripts on the system. b. Incorrect. If the execution policy is set to AllSigned, Dillon will only be able to run scripts that are signed by a trusted publisher. c. Incorrect. If the execution policy is set to Unrestricted, Dillon will be prompted for confirmation before execution. d. Correct. The execution policy on Dillon's system is most likely set to Bypass, which is the reason he can execute the downloaded script without any additional prompts.

Janice has set up a Windows Server 2019 lab environment to practice labs related to her training. The base operating system is Windows 10. She has three Windows Server virtual machines running. If one of the virtual machines is running inside another virtual machine, which of the following must also be true? Question options: a) Janice is using a Type-2 hypervisor to control both virtual machines. b) Janice has enabled nested virtualization on the Windows 10 operating system. c) Janice has enabled nested virtualization on the Windows Server operating system. d) Janice is using the Windows Server 2012 R2 Edition in the virtual machines.

(Eckert, 1-1a) a. Incorrect. The feature that allows one virtual machine to run inside another virtual machine is called nested virtualization. This is a feature of hypervisors such as Hyper-V, a Type-1 hypervisor. b. Correct. The ability to run one virtual machine inside another virtual machine is called nested virtualization. This feature must be enabled on the underlying operating system, which is Windows 10. c. Incorrect. Enabling nested virtualization on any of the Windows Server operating systems will have an impact in this scenario. d. Incorrect. For nested virtualization to work, the virtual machine that contains the second virtual machine should be running Windows 10, Windows Server 2016, or Windows Server 2019.

Identify the true statement about Type 2 hypervisors. Question options: a) They can run independent of a host operating system. b) They can interact with the hardware directly. c) They can run multiple operating systems on a single host. d) They self-contain a small operating system.

(Eckert, 1-1a) a. Incorrect. Type 2 hypervisors act as a conduit between host operating systems and virtual machines, so they cannot run independent of a host operating system. b. Incorrect. While Type 1 hypervisors can interact with the hardware directly, Type 2 hypervisors interact with the hardware through an operating system. c. Correct. Type 2 hypervisors can run multiple operating systems, called virtual machines, on an underlying host operating system. d. Incorrect. Type 1 hypervisors contain a small operating system so that they can interact with the hardware directly. This is not the case with Type 2 hypervisors.

Which of the following statements regarding the use of system and user environment variables is accurate? Question options: a) User environment variables are always set first. b) System environment variables are always set first. c) User environment variables apply to any user logged onto the computer. d) System environment variables can be applied on a per-user basis.

(Eckert, 2-5b) a. Incorrect. User environment variables are set after system environment variables. b. Correct. System environment variables are always set first, followed by user environment variables, which override any conflicting system environment variables. c. Incorrect. System environment variables apply to any user logged onto the computer. d. Incorrect. Unlike system environment variables that are applied to any user logged onto the computer, user environment variables can be defined on a per-user basis.

Which of the following statements is true of a client on a computer network? Question options: a) It is a server that is located within the physical premises of an organization. b) It is a computer that shares resources in response to a request from another computer. c) It is a computer that requests for resources from another computer on the network. d) It is a server that is located outside an organization's premises and accessed via the Internet.

a. Incorrect. A server that is located within the physical premises of an organization is an on-premise server. b. Incorrect. A computer that shares resources in response to a request from another computer is called a server. c. Correct. A client is a computer that requests for resources from another computer on a network. The computer that responds to this request is called a server. d. Incorrect. A server that is located outside an organization's premises and accessed via the Internet is called a cloud server.

Eileen is a Web app developer. All the apps that Eileen builds run in Linux containers on the cloud. She currently uses a Windows 7 operating system. Why should Eileen consider upgrading to Windows 10? Question options: a) Windows 10 automatically encrypts Linux containers. b) Windows 10 provides Server Core and Nano Server options. c) Windows 10 has the Windows Server Azure Network Adapter. d) Windows 10 has Windows Subsystem for Linux.

(Eckert, 1-2h) a. Incorrect. Windows 10 does not encrypt Linux containers automatically. b. Incorrect. Server Core and Nano Server are Windows Server 2019 options and not Windows 10 options. c. Incorrect. The Windows Server Azure Network Adapter is a Windows Azure feature and is not a feature of Windows 10. d. Correct. The Windows Subsystem for Linux feature of Windows 10, a new feature in Windows Server 2019, allows users to create and test Linux apps on Windows 10 systems.

Caylin, an IT administrator, receives an email from a coworker that the company website, eloxnet.com, is not accessible. She decides to check if there is an issue that is preventing access to the website. Which of the following PowerShell cmdlets should Caylin run first? Question options: a) Test-NetConnection b) Get-NetIPConfiguration c) Get-NetAdapterStatistics d) Set-NetFirewallProfile

(Eckert, 2-7b) a. Correct. Caylin should use the Test-NetConnection cmdlet. She can run the cmdlet to identify problems with IP configuration, firewall configuration, and name resolution. b. Incorrect. Caylin should use the Test-NetConnection cmdlet. Using Get-NetIPConfiguration will only give Caylin information about the IP configuration. c. Incorrect. Using Get-NetAdapterStatistics will give Caylin information about the network statistics. However, the more useful cmdlet is the Test-NetConnection cmdlet. d. Incorrect. Set-NetFirewallProfile is used to configure firewall settings. This may not be useful in troubleshooting the current issue.

Don is the system administrator for an organization that conducts virtual IT training sessions. Each participant, during these training sessions, creates multiple unique applications to address various problems. The applications have different hardware resource requirements. Don needs to set up a virtual lab with twenty Windows operating systems on 1 TB storage space for two different training programs. Help Don choose the right size of the virtual hard disk files. Question options: a) Don should use thin provisioning and fix the size of each virtual disk to 60 GB. b) Don should use thick provisioning and fix the size of each virtual disk to 100 GB. c) Don should use thin provisioning. d) Don should use thick provisioning.

(Eckert, 1-1a). a. Incorrect. With thin provisioning, the size of the virtual disk file is not fixed. Also, if each disk is 60 GB, there will only be space for seventeen virtual hard disks. There will not be enough space for the remaining three virtual hard disks or operating systems. b. Incorrect. One TB of storage can accommodate only ten virtual disks of 100 GB storage capacity. This means that setting the size of each virtual disk to 100 GB will leave Don with a shortage of space for ten operating systems. c. Correct. Using thin provisioning will help the disk expand space to the appropriate needs of each user. d. Incorrect. Using thick provisioning restricts users to a limited space that may restrict some users who need more storage space for their labs.

Walter Wells, Inc., a company that builds robotic process automation (RPA) applications, uses Windows Server 2016 to run several Linux and Windows virtual machines. Which of the following statements, if true, would make upgrading to Windows Server 2019 a good choice? Question options: a) Walter Wells spends a considerable amount of money on encrypting Linux virtual machines. b) Walter Wells does not use storage replicas or storage spaces. c) Walter Wells is considering removing all the Linux virtual machines and switching entirely to Windows. d) Walter Wells currently outsources its hardware maintenance operations to an external vendor.

(Eckert, 1-2b) a. Correct. If Walter Wells spends money on encrypting Linux virtual machines, switching to Windows Server 2019 is a good choice. Windows Server 2019, unlike previous versions, provides encryption for Linux machines out of the box. b. Incorrect. If Walter Wells does not use these features, the company may not consider these as factors when upgrading to the newer version which has improved storage replicas and storage spaces. c. Incorrect. Switching completely to Windows from Linux offers no advantage when adopting Windows Server 2019. The latest version of Windows Server offers greater support and security than previous versions when using Linux. d. Incorrect. This is irrelevant. Whether the hardware is maintained internally or by a vendor should not influence the decision to upgrade Windows Server.

Mahmood works as a full stack web developer at Insignia Informatics. As one of the senior developers, Mahmood is often tasked with testing web applications built by his team. Often, he finds himself testing multiple web applications simultaneously over a short period. Mahmood uses a separate virtual machine to run each application in isolation. This often causes a resource crunch because each virtual machine uses large amounts of system resources, and Mahmood cannot be as productive as he wants to be. What would you advise Mahmood? Question options: a) Avoid sandboxing in a testing environment b) Run these web applications in containers c) Increase the scalability of the system d) Use nested virtualization instead

(Eckert, 1-2d). a. Incorrect. Sandboxing is one of the requirements in this scenario. If Mahmood did not need to sandbox the applications, he wouldn't set up virtual machines. b. Correct. Containers contain a subset of an operating system essential to running the web applications. This means that containers use fewer resources than virtual machines. c. Incorrect. This is not the most effective method for resolving this problem. Using containers is a better method. d. Incorrect. Nested virtualization will not reduce the resource crunch caused by the number of virtual machines. Using containers is a better solution.

Remtax offers tax consulting services over the Internet. It assists people in preparing their income tax returns. In which of the following scenarios should Remtax use Windows Server Core or Nano Server? Question options: a) The server will not be dedicated to a specific function but will serve multiple functions. b) The server will be managed by a novice administrator that fulfills other roles in the company. c) The server will be dedicated to web services and accessed via the Internet. d) The server will also function as an Active Directory domain controller.

(Eckert, 1-2f) a. Incorrect. Windows Server Core and Nano Server are best suited to serving a specialized function rather than multiple functions. b. Incorrect. Nano Server administration is usually carried out from a remote computer using Windows PowerShell cmdlets. This might not be suitable for a novice administrator. c. Correct. Widows Server Core and Nano Server are small footprint installations that are best suited to run web services accessible via the Internet. Nano Server is ideal for use within cloud environments. d. Incorrect. Nano Server has a smaller footprint than Windows Server Core and supports only four server roles, which does not include the Active Directory role.

Candace works as a system administrator at Capnia Systems, a product company with over 250 employees. She receives an email from her boss that says that one of the servers is running slow. The server is running the Standard Edition of Windows Server 2019, and the hardware includes HDDs and SSDs. Upon investigation, she finds that some frequently accessed files are being stored on HDDs, while other smaller and infrequently used files are stored on SSDs. Which feature should Candace enable to improve the efficiency of the server? Question options: a) Storage pinning b) Storage tiering c) Capacity planning d) Data deduplication

(Eckert, 1-3b) a. Incorrect. Storage tiers allow the automatic movement of data to different storage tiers or devices. However, an administrator can override this behavior through storage pinning by pinning a file to a storage tier. b. Correct. Storage tiering is an intelligent storage feature that automatically moves frequently used data to faster storage devices such as SSDs. You can use the same feature to move infrequently used data to a slower storage device. c. Incorrect. Capacity planning refers to the process of identifying the resources and hardware that a specific server will use or need. This is a manual activity carried out by seeking inputs from multiple stakeholders. d. Incorrect. Data deduplication is a feature on the NTFS filesystem that is used to save storage space by reducing the number of redundant files. When enabled, this feature allows duplicate files to be stored only once on a volume.

Which of the following is true of Storage Server 2019? a) It can have a maximum memory of 24 TB. b) It can host unlimited virtual machines. c) It cannot be purchased from Microsoft directly. d) It can be download for free and used in any environment.

(Eckert, 1-3d). a. Incorrect. The Standard Edition of Windows Server 2019 limits the maximum memory to 24 TB. b. Incorrect. The Datacenter Edition of Windows Server 2019 offers the possibility of unlimited virtual machines. c. Correct. Windows Storage Server 2019 cannot be purchased directly from Microsoft. Instead, original equipment manufacturers (OEMs) that create storage solutions for organizations can offer Windows Storage Server 2019 on the server-based products they sell. d. Incorrect. Microsoft Hyper-V Server 2019 is free to download and use in your environment.

Tamara wants to install Server Core on a virtual machine on her Windows Server 2019 computer. She tries installing it but fails. Which of the following is most likely to have caused the installation failure? Question options: a) Server Core cannot be installed on personal computers. b) Tamara's computer does not contain an optical drive. c) Server Core requires at least a 1.4 GHz 64-bit processor. d) Tamara's computer has 30 GB free hard disk space.

(Eckert, 1-4) a. Incorrect. Server Core can be installed on personal computers if the required specifications are met. b. Incorrect. Tamara does not need an optical drive. She can install Server Core from a USB drive. c. Incorrect. This statement is correct. However, considering that Windows Server 2019 is installed on Tamara's system, we can be assured that the system meets this specification. d. Correct. If Tamara's computer has less than 32 GB of free space, she will not be able to install Server Core. The minimum requirement for a Server Core installation is 32 GB.

Where can the most up-to-date list of compatible hardware available for Windows Server 2019 be found? Question options: a) Windows Admin Center b) Microsoft Management Console c) Windows Server Catalog d) Windows Server Configuration Wizard

(Eckert, 1-4) a. Incorrect. Windows Admin Center is a new Web-based management tool in Windows Server 2019. It can be used like the Server Manager to manage other Windows Server systems. b. Incorrect. Microsoft Management Console is a set of snap-in tools used to perform server configuration on Windows Server 2019. c. Correct. You can find the up-to-date list of compatible hardware for Windows Server 2019 on the Windows Server Catalog online. d. Incorrect. The Windows Server Configuration Wizard is used to configure server settings and perform server administration tasks.

You are in the process of installing Windows Server 2019 Standard Edition on your computer. You have downloaded the corresponding ISO file and burned it to a DVD. Which of the following steps should you take next? Question options: a) Change the boot order in the BIOS. b) Insert the DVD after turning on your computer. c) Copy the ISO image to a bootable USB drive. d) Download Burnaware or Rufus.

(Eckert, 1-5b) a. Correct. Once you have the installation media, a DVD in this scenario, you should change the boot order in the BIOS to boot from the DVD before other storage devices. b. Incorrect. If the device is not set to boot from the DVD, inserting the DVD will not be useful. However, if your BIOS allows you to access a boot menu by pressing a key such as F12, you can insert the DVD after using that menu to modify the boot order. c. Incorrect. Since the ISO image is burned to a DVD, you don't need to copy it to a bootable USB drive. You can consider this option if your optical disk drive malfunctions. d. Incorrect. You don't need to download Burnaware or Rufus because you already have your installation media.

You are attempting to upgrade a server from Windows Server 2008 R2 to Windows Server 2019 Standard Edition. What must be done in order to accomplish the upgrade? Question options: a) The Windows Server 2019 disc provides a direct upgrade path for Server 2008 R2, so no additional steps are required to perform the upgrade. b) The server should be updated to the latest service pack for 2008 R2 and then upgraded to Server 2012 R2, after which the server can be upgraded to Server 2019. c) The server must run a special upgrade while Server 2008 R2 is running, requiring the migration of server roles to the new OS and merging of configuration files. d) The server can't be upgraded to Server 2019, as no upgrade path exists. You must perform a clean install.

(Eckert, 1-5c). a. Incorrect. Windows Server 2019 does not provide a direct upgrade path from Windows Server 2008 R2. b. Correct. Windows Server 2019 provides a direct upgrade option from Server 2012 R2. So, to upgrade Server 2008 R2 to Server 2019, it needs to be upgraded to Server 2012 R2 first. Before upgrading an operating system, you should also perform the latest updates. c. Incorrect. There is no direct upgrade path from Server 2008 R2 to Server 2019. d. Incorrect. There is no direct upgrade path from Server 2008 R2 to Server 2019. However, it can be upgraded to Server 2019 by first upgrading to Server 2012 R2.

Raphael has successfully installed the Essentials Edition of Windows Server 2019 on his computer. He's completing some post-installation configuration tasks including naming the server. He has four options. Which of the following names should Raphael pick for the newly installed server and why? Question options: a) Home-FileServer-Raphael because it contains his name and is at least 15 characters b) COR-WEB-12 because it contains allowed characters and is shorter than 15 characters c) TEL COMP F3 because it contains a mix of letters, numbers, and spaces d) W@$h!nGT0n, because it contains special characters, numbers, upper case letters, and lower case letters

(Eckert, 1-6d). a. Incorrect. Raphael should not pick this name because it's longer than 15 characters. The limit on NETBIOS names is 15 characters, so he should pick a shorter name. b. Correct. COR-WEB-12 is a good name because it only contains allowed characters and is shorter than 15 characters. The limit on NETBIOS names is 15 characters, so this is a good pick. c. Incorrect. Although server names can contain a mix of numbers and letters, they should not contain spaces. d. Incorrect. Although using special characters, numbers, uppercase letters, and lowercase letters sounds like a good idea because these are recommended for passwords, server names are not allowed to contain special

Haruko is a system administrator at Notion Source, a company that specializes in digital marketing. He is configuring Windows Server 2019 on SERVERX and adding multiple servers to Server Manager so that he can manage all the servers from the same console. He is trying to add SERVERY, a file server. Despite his efforts, he is unable to add this server to Server Manager. Which of the following is a likely reason that he is unable to add SERVERY to the console? Question options: a) SERVERY is joined to the same Active Directory domain as SERVERX. b) SERVERY is part of a workgroup, but the workgroup server is not on the trusted hosts list. c) SERVERY has Windows Server 2016 installed, so it is not compatible with SERVERX. d) SERVERX has the Welcome to Server Manager pane hidden from the Dashboard.

(Eckert, 2-1) a. Incorrect. If both servers are part of the same Active Directory domain, this would not be a hindrance. To add additional servers to Server Manager, you should ensure that these servers are joined to an Active Directory domain within your organization. b. Correct. If SERVERY is part of a workgroup, it can be added to Server Manager on SERVERX only once the workgroup server is added to the trusted hosts list. c. Incorrect. Server Manager supports the addition of Windows Server 2008 and later servers, including Windows Server 2016. d. Incorrect. This is irrelevant to the given scenario. Haruko can use the Manage menu to add or remove servers. To display the Welcome to Server Manager pane, he can navigate to View, Show Welcome Tile to display it again.

Emmitt, an IT administrator, is on a holiday when he receives a message from his boss about an issue with one of the servers running Windows Server 2019. Fortunately, Emmitt is carrying his laptop that is running a Windows 7 operating system. Emmitt accesses the server remotely and resolves the issue. Which of the following tools did Emmitt most likely use to access the server? Question options: a) Server Manager b) Remote Server Administration Tools c) Best Practices Analyzer d) Windows Admin Center

(Eckert, 2-1) a. Incorrect. Server Manager is available on systems running Windows Server. It is unlikely that Emmitt would be able to use this tool on his Windows 7 operating system. b. Incorrect. To access Windows Server 2019 using Remote Server Administration Tools, Emmitt needs to use a Windows 10 operating system. c. Incorrect. Windows 7 does not have the Best Practices Analyzer that can be used to connect remotely to a Windows Server. The Best Practices Analyzer is a feature of Server Manager and is used to verify server roles. d. Correct. Emmitt most likely used the Windows Admin Center by connecting to it via a browser to access the Windows Server. Windows Admin Center can be used to remotely manage Windows Server 2019 from any computer that has a modern Web browser.

Jenaro installed the Windows Admin Center on a Windows Server 2019 system called SERVERX. He intends to manage other servers using SERVERX. If SERVERX has Web server software installed using port 443, which of the following must be true? Question options: a) Jenaro can connect to the Windows Admin Center only by appending the port number to the URL. b) SERVERX is also a domain controller and has the Active Directory Domain Services role installed. c) SERVERX does not have an existing HTTPS certificate, so the Windows Admin Center can use port 443. d) Jenaro should avoid modifying the local computer's trusted host settings.

(Eckert, 2-2a) a. Correct. The Web server software on SERVERX is using port 443 for HTTPS access, so Jenaro most likely used another port for HTTPS traffic to the Windows Admin Center. This means that Jenaro must append the port number to the URL to connect to the Windows Admin Center. b. Incorrect. You cannot install the Windows Admin Center on a Windows Server that has the Active Directory Domain Services (AD DS) role installed and configured as a domain controller for Active Directory. c. Incorrect. The Web server software on SERVERX is using port 443, so the Windows Admin Center must use another port. d. Incorrect. Jenaro intends to manage other servers with the Windows Admin Center, so he should allow the Windows Admin Center to modify the local computer's trusted host settings.

Ryan, a server administrator, is attempting to install the Windows Admin Center on a server called SERVERX. However, he is unable to do so. Which is the following may be a reason for this? Question options: a) SERVERX is running a Windows Server 2016 operating system. b) SERVERX is the domain controller for the Active Directory. c) SERVERX does not have an existing HTTPS certificate. d) SERVERX has Web server software that is using port 443.

(Eckert, 2-2a) a. Incorrect. The Windows Admin Center can be installed on Windows Server 2016. In addition, it can also be installed on Windows Server 2019 and Windows 10. b. Correct. The most likely reason is that SERVERX is the domain controller. You cannot install the Windows Admin Center on a Windows Server that has the Active Directory Domain Services (AD DS) role installed and configured as a domain controller for Active Directory. c. Incorrect. If SERVERX does not have an existing HTTPS certificate, Ryan can generate a self-signed SSL certificate during the installation process. d. Incorrect. If SERVERX has Web server software that is using port 443, Ryan can configure the Windows Admin Center to use another available port.

What is the use of adding tags to servers in the Windows Admin Center? Question options: a) Tags allow you to upload and download files to and from the filesystems on the server. b) Tags allow you to monitor and manage DHCP server configuration. c) Tags help configure additional areas of the system via MMC tools. d) Tags help identify servers and can be searched using the Search dialog box.

(Eckert, 2-2b) a. Incorrect. The Windows Admin Center contains tools in the navigation pane that help in server configuration. The Files tool allows you to upload and download files to and from the filesystems on the server. b. Incorrect. The Windows Admin Center contains tools in the navigation pane that help in server configuration. The DHCP tool allows you to monitor and manage DHCP server configuration. c. Incorrect. The Windows Admin Center contains tools in the navigation pane that help in server configuration. MMC tools are used in server administration but not trough tags. d. Correct. Tags help identify servers and can be searched using the Search dialog box. This is useful if you have many servers added to the Windows Admin Center.

Shae is using a Windows Server 2019 operating system. She recently spilled hot chocolate on her keyboard, which damaged the keyboard. She purchased a new keyboard and connected it to her computer. She assumed that she would have to download a driver to use the keyboard. To her surprise, she was able to use the keyboard without any further action from her side. Which of the following features allowed Shae to start using the keyboard straightaway? Question options: a) Plug and Play (PnP) b) Remote Desktop Protocol (RDP) c) Gateway Server Mode d) Devices and Printers utility

(Eckert, 2-3) a. Correct. The feature that allowed Shae to start using the keyboard straightaway is called Plug and Play (PnP). PnP allows your operating system to work with hardware devices to automatically detect and configure recently installed hardware to work with the operating system. b. Incorrect. Remote Desktop is a tool in the Windows Admin Center that provides access to a graphical desktop using Remote Desktop Protocol (RDP). c. Incorrect. When you install the Windows Admin Center on a Windows Server 2016 or 2019 system to provide remote Web access for administrations, it is said to function in gateway server mode, as it provides the ability to manage other Windows Server systems on the network. d. Incorrect. If the new keyboard did not support PnP, Shae would have to use the Devices and Printers utility to manually launch PnP or manually install the device without PnP.

Candice, a graphic designer, attaches a new portable hard disk to her computer. She can connect to the hard disk immediately without installing any drivers. After some time, she turns on the second monitor attached to her computer. The display malfunctions despite being connected to the computer and receiving adequate power supply. What is the most likely explanation for this issue? Question options: a) Candice did not open the Device Manager when attaching the hard disk. b) Hard disks are not PnP-friendly devices. c) Computers contain a limited number of IRQ lines. d) The display driver did not go through driver signing when Candice turned it on.

(Eckert, 2-3b) a. Incorrect. Candice does not need to open the Device Manager when attaching the hard disk. The Device Manager can be used to update the generic driver for hardware devices. b. Incorrect. If the hard disk was not PnP friendly, Candice would have not been able to access the hard disk without installing a driver. c. Correct. The video display, each disk drive, USB ports, and the sound card each use a dedicated IRQ to communicate with the processor. The recent addition of a hard disk drive may have left no available IRQ line for the display. d. Incorrect. This is a standard process that is applicable only when you install a new hardware device. When you install a new hardware device, Windows Server 2019 checks to make sure that the driver for that device has been verified as secure. When a driver is verified, a unique Microsoft digital signature is incorporated into it in a process called driver signing.

Asmara, a system administrator, is performing routine maintenance checks on the Windows servers in her organization. As part of these checks, she is required to verify that drivers and system files on each server are not corrupted. Which of the following commands should Asmara run? Question options: a) sigverif b) regedit c) Get-Command | more d) sfc/scannow

(Eckert, 2-4) a. Incorrect. Asmara needs to use the System File Checker to scan system files for integrity. The sigverif command opens the File Signature Verification window to check whether system files have a signature. b. Incorrect. The regedit command is used within the Start menu, Run dialog box, Command Prompt or PowerShell window to launch the Registry Editor. c. Incorrect. The Get-Command | more command can be used to see a list of all cmdlets within Windows PowerShell. You could run the following command: PS C:\Users\Administrator>Get-Command | more. d. Correct. You can run the System File Checker manually from a Command Prompt window (MS-DOS shell) or Windows PowerShell window by executing the sfc/scannow command to scan and replace damaged files.

Which feature of Windows Server 2019 is designed to foil malware by preventing programs from using system memory space? Question options: a) Data Execution Prevention b) Processor Scheduling c) Flushing d) Windows Registry

(Eckert, 2-5a) a. Correct. Data Execution Prevention (DEP) is a performance and security option in Windows Server 2019 that helps foil malware, such as computer viruses, Trojan horses, and worms by preventing such programs from using system memory space. b. Incorrect. Processor Scheduling is a feature that allows system administrators to configure how processor resources are allocated to programs. c. Incorrect. Flushing is a process that is used to free the memory used for cached data after that data is written to a disk. d. Incorrect. Windows Registry is a database containing all information the operating system needs about the entire system, including hardware and software.

Ivan is the IT administrator at Alphina Systems. He wants to be able to plug and unplug his hardware devices without using the Safely Remove Hardware option. What should Ivan do? Question options: a) Disable file caching and flushing b) Enable file caching and flushing c) Enable file caching and disable flushing d) Disable file caching and enable flushing

(Eckert, 2-5a) a. Correct. This will enable Ivan to easily hot swap a disk drive or controller without using the Safety Remove Hardware notification area icon, which warns that a device is in use. b. Incorrect. Ivan should disable both file caching and flushing. This will enable him to easily hot swap a disk drive or controller without using the Safety Remove Hardware notification area icon, which warns that a device is in use. c. Incorrect. Ivan should disable file caching as well. This will enable him to easily hot swap a disk drive or controller without using the Safety Remove Hardware notification area icon, which warns that a device is in use. d. Incorrect. Ivan should disable flushing as well. This will enable him to easily hot swap a disk drive or controller without using the Safety Remove Hardware notification area icon, which warns that a device is in use.

Raymond is a system administrator at Kelly Consulting. He's trying to automate some security features using Windows Server. One of the tasks he's trying to accomplish is automatically blocking any Outlook rules that are set to forward emails. Particularly, he's attempting to write a script that blocks any rules that automatically forward emails to external parties. Which of the following tools would be most effective in completing this task? Question options: a) Microsoft Management Console b) Azure Active Directory c) Windows PowerShell d) Windows Admin Center

(Keyword: scripts.) a. Incorrect. Microsoft Management Console is a set of snap-in tools used to perform server configuration on Windows Server 2019. These tools are not vital to Raymond's task. b. Incorrect. Azure Active Directory is an active directory service hosted within Microsoft's Azure cloud. This is not a Windows Server administration tool. c. Correct. Raymond can accomplish this task by writing automation scripts using commands called cmdlets within Windows PowerShell. d. Incorrect. Windows Admin Center is a Web-based management tool for Windows Server 2019. Raymond would not have to use this tool to complete his task.

Calvin has installed Windows Server 2019 on his personal computer to take part in training program. During one of his lab exercises, his computer crashes. Upon investigation, he finds that the server has not created a crash dump file. What is the most likely reason that Calvin's computer failed to create the dump file? Question options: a) The paging file is not located on the same disk as the operating system. b) The paging file is disabled on the computer. c) The initial paging file size is configured to a size that is 1.5 times the installed amount of RAM. d) The paging file is not placed on a RAID volume.

(Eckert, 2-5a) a. Incorrect. This is unlikely to cause failure in creating a dump file. It is a best practice to have the paging files on hard disks that do not contain the operating system. b. Correct. The most likely reason that Calvin's computer did not create a dump file is that the computer did not have a paging file. The paging file is important for computer performance and to create a crash dump file in the event of a crash. c. Incorrect. This is an unlikely reason to cause a server crash. A general rule is that the initial paging file size should be configured such that it is 1.5 times the amount of RAM installed in the server. d. Incorrect. This is unlikely to cause failure in creating a dump file. It is recommended to avoid placing paging files on RAID volumes for performance reasons.

You are experiencing problems during the installation of Windows Server 2019. More specifically, critical file extensions have lost their associated program data. You need to restore the settings from a Registry backup. Where will the settings be found? Question options: a) HKEY_CLASSES_ROOT b) HKEY_LOCAL_MACHINE c) HKEY_CURRENT_USER d) HKEY_CURRENT_CONFIG

(Eckert, 2-6a) a. Correct. You will find the relevant settings under the HKEY_CLASSES_ROOT key. This key holds data to associate file extensions with programs. This is a more extensive list than the one viewed under HKEY_CURRENT_USER. b. Incorrect. The HKEY_LOCAL_MACHINE key contains information about hardware components on the server. You need to use the settings under the HKEY_CLASSES_ROOT key instead. c. Incorrect. The HKEY_CURRENT_USER key contains information about the desktop configuration for the user currently signed into the system. You need to use the settings under the HKEY_CLASSES_ROOT key instead. d. Incorrect. The HKEY_CURRENT_CONFIG key has information about the current hardware profile. You need to use the settings under the HKEY_CLASSES_ROOT key instead.

Felipe requests the system administrator, Lucida, to change the font settings on a shared desktop system. Felipe wants a larger font size when he logs onto this computer. Which Registry root key should Lucida access to change the font size? Question options: a) HKEY_CLASSES_ROOT b) HKEY_LOCAL_MACHINE c) HKEY_CURRENT_USER d) HKEY_CURRENT_CONFIG

(Eckert, 2-6a) a. Incorrect. The HKEY_CLASSES_ROOT key holds data to associate file extensions with programs. Lucida needs to use the settings under the HKEY_CURRENT_USER key instead. b. Incorrect. The HKEY_LOCAL_MACHINE key contains information about hardware components on the server. Lucida needs to use the settings under the HKEY_CURRENT_USER key instead. c. Correct. Lucida can change the font size by accessing the HKEY_CURRENT_USER key. This key contains data on color combinations, font sizes and type, the keyboard layout, the taskbar, clock configuration, and other profile settings for the current user. d. Incorrect. The HKEY_CURRENT_CONFIG key has information about the current hardware profile. Lucida needs to use the settings under the HKEY_CURRENT_USER key instead.

Kristian uses the following command on Windows PowerShell to view a list of all cmdlets: PS C:\Users\Administrator>Get-Command | More The command displays a subset of the total output and follows it with the word More. On clicking the return button, the next set of results is displayed. Kristian wants to exit this and return to the PowerShell prompt. Which of these keys should Kristian press? Question options: a) Up Arrow b) Home c) Q d) Tab

(Eckert, 2-7a) a. Incorrect. Using the Up Arrow key will not exit the results. Up Arrow and Down Arrow are used to cycle through command history. b. Incorrect. Using the Home key will not exit the results. Home and End are used to jump to the beginning or end of the command line. c. Correct. Using the Q key will let Kristian exit the results and return to the PowerShell prompt. d. Incorrect. Using the Tab key will not exit the results. Tab is used to autocomplete cmdlet options much like the Tab completion feature available within the MS-DOS, UNIX, and Linux command prompts.

Thandiwe is using a server running the Windows Server 2019 operating system. She notices some of the server's services are not functioning as intended. She suspects that a recent update may have caused this issue. While troubleshooting, she intends to look up the list of recently installed updates. She runs the following command: X | ogv Complete the command by selecting the missing component identified by X. Question options: a) More b) Get-HotFix c) select -last 1 d) Get-WindowsFeature

(Eckert, 2-7b) a. Incorrect. More is an MS-DOS command that is used to display the output of a cmdlet in multiple pages. Using More in conjunction with ogv without any other cmdlet will not yield the desired result. b. Correct. Get-HotFix | ogv is the command that Thandiwe needs to run to return the list of recently installed updates. c. Incorrect. Get-HotFix | select -last 1 will display the latest update; select last -1 on its own will not deliver a result. d. Incorrect. Get-WindowsFeature is used to view, install, and removed Windows roles and features. It should not be used in this scenario.

Kristoffer creates a PowerShell script to automatically execute a set of tasks on system startup. He uses variables in his script to accomplish certain tasks. He is using a variable to filter out certain conditions during which the script should not execute. Which of the following names can Kristoffer use for the variable? Question options: a) $filter b) continue c) $count d) *number

(Eckert, 2-7d) a. Incorrect. Kristofer cannot use $filter because filter is a reserved keyword. Other keywords include break, continue, do, else, elseif, for, foreach, function, and filter. b. Incorrect. Kristofer cannot use continue because continue is a reserved keyword. Other keywords include break, continue, do, else, elseif, for, foreach, function, and filter. c. Correct. Kristofer can use $count because it follows the naming convention of using the $ symbol and does not violate any restrictions on variable naming conventions. d. Incorrect. Kristoffer should not use *number because it begins with an asterisk. Variable names should not contain special characters other than the $ symbol, which is used to start any variable name in Windows PowerShell.

Rhonda's company has a rack containing one email server, file server, web server, firewall server, UPS, SAN, and management station. Owing to a thunderstorm, a ten-block radius surrounding the company faces a power outage. Rhonda, who is working from home, tries sending an email to a colleague, but the email does not get sent. Which of the following is the most likely cause for this issue? Question options: a) The SAN on the rack malfunctioned. b) The management station on the rack malfunctioned. c) The blackout caused all the servers on the rack to shut down because there is no power supply. d) The blackout took down the Internet, so Rhonda can't reach the email server.

a. Incorrect. A malfunctioning SAN is unlikely to impede Rhonda's ability to send an email. b. Incorrect. The management station is used to configure to the server initially. Even if it malfunctioned, it would not be the reason for the failed delivery of her email. c. Incorrect. The rack has a UPS, which would continue to supply power to servers on the rack if normal power supply is disrupted. d. Correct. The most likely cause is that the blackout took down the Internet. In the absence of the Internet, Rhonda would not be able to connect to the email server located on her company's premises.

Chen is a freelance web developer who uses a Windows 10 computer. When she needs to test her web application on a different operating system, she sends it to her friend who has other operating systems installed on multiple devices. This is a time-consuming process. She's looking for a way to test the web application across different operating systems on her own computer. Which of the following features should she use? Question options: a) Journaling b) Virtualization c) Sandboxing d) Deduplication

a. Incorrect. Journaling is a feature of NTFS and is irrelevant to the feature required by Chen in this scenario. b. Correct. Virtualization will help Chen use multiple operating systems on her Windows 10 computer. She can use a hypervisor to run an operating system of her choice. c. Incorrect. Although Chen may use sandboxing when testing a web application, she needs to implement virtualization to solve the current problem. d. Incorrect. Deduplication is a feature of NTFS that is not relevant to Chen's current requirements. Data deduplication allows NTFS to store duplicated files once to save space.

Linwood is the IT manager of a small organization, Turtle Designs, with less than 50 employees. Caroline, his boss, asks him to set up a computer that will act as the central repository for the company's data. Linwood estimates the costs and suggests using an Internet-based service instead. What is Linwood recommending in this scenario? Question options: a) An on-premise server b) A cloud-based server c) A client d) A network

a. Incorrect. Linwood is recommending the opposite of an on-premise server, which is a cloud-based server. An on-premise server is locally located and can be accessed using the local network. b. Correct. Linwood is recommending the use of a cloud-based server. A cloud-based server needs to be accessed via the Internet. c. Incorrect. A client is a computer that requests for resources from another computer on a network. The computer that responds to this request is called a server. d. Incorrect. Servers and clients communicate with each other over a network. While a network is necessary, it is an implied requirement in this scenario and not explicitly stated by Linwood.

Malaika uses the Edge browser on her computer to access a website. The browser sends a request to another computer over the Internet, which returns web page data that is displayed on the browser. Which of these entities is the server? Question options: a) Malaika's computer b) The Edge browser c) The website address d) The responding computer

a. Incorrect. Malaika's computer is the client. A PC that requests for a resource is the client. b. Incorrect. The browser is the tool that Malaika's computer, or the client, uses to request the server for resources. c. Incorrect. The website address is neither client nor server. It is a unique identifier for a website on the Internet. d. Correct. The computer that responds to the request from Malaika's computer is the server.

Shweta, a system administrator at Status Wire, is configuring Windows Server 2019 using Server Manager. She wants the Dashboard to display an alert whenever the server exceeds certain CPU usage. Which of the following panes should she use to configure this setting? Question options: a) Events b) Services c) Best Practices Analyzer d) Performance

a. Incorrect. Shweta cannot use the Events pane to configure this setting; she needs to use the Performance pane. The Events pane lists warning, error, and critical events from event logs on the associated servers for a specified period. b. Incorrect. Shweta cannot use the Services pane to configure this setting; she needs to use the Performance pane. Services lists the services that are installed on the associated servers. c. Incorrect. Shweta cannot use the Best Practices Analyzer pane to configure this setting; she needs to use the Performance pane. Best Practices Analyzer allows you to scan the associated servers and roles for configuration issues that do not follow Microsoft's recommendations. d. Correct. Shweta needs to use the Performance pane to configure this setting. The Performance pane allows you to see the performance of the associated servers as well as configure processor (CPU) usage and memory alerts.

What is the IP address that is assigned to the network loopback interface? Question options: a) 0.0.0.0 b) 255.255.255.255 c) 127.0.0.1 d) 10.0.0.0

a. Incorrect. The 0.0.0.0 IP address cannot be assigned to a host computer on a network because it refers to all networks or all computers on all networks. b. Incorrect. The 255.255.255.255 IP address cannot be assigned to a host computer on a network because it refers to all networks or all computers on all networks. c. Correct. 127.0.0.1 is the loopback address and is used to refer to the local system or localhost. It derives its name from its functionality. d. Incorrect. The 10.0.0.0 IP address is not distributed to computers on a network and is instead intended to be used on proxy servers or NAT routers.

Satish wants to install Windows Server 2019 Essentials Edition on his computer. The hardware specifications of his system are as follows: 3 GHz 64-bit processor, 16 GB memory, and 50 GB storage. If Satish installed the server using Rufus, which of the following is most likely true? Question options: a) Satish's computer does not meet the minimum storage requirements. b) Satish installed Server Core instead of the full version. c) Satish's computer does not have an optical disk drive. d) Satish has installed the server over the Internet from a remote device.

a. Incorrect. The installation was successful, so the computer meets the minimum storage requirements. The minimum storage requirement is 36 GB. b. Incorrect. There's no reasonable evidence to believe that Satish installed Server Core instead of the full version. The hardware specifications meet the requirement for the full version. c. Correct. In the absence of an optical disk drive, it is likely that Satish copied the Windows Server ISO image file to a bootable USB flash drive using Rufus. He then proceeded to install the server using this drive. d. Incorrect. There is no reason to believe that Satish's use of Rufus would have made him to install the server remotely. Rufus is a tool used to copy ISO image files to a bootable USB flash drive.

Alina is using Windows PowerShell on a Windows Server 2019 system for the first time. She wants a list of all cmdlets in PowerShell, so she types the following command: PS C:\Users\Administrator>Get-Command | More Why does Alina use the pipe symbol (|) in this command? Question options: a) To create a customized Windows PowerShell session b) To control execution in the same way as the -whatif option c) To create an output file called More in which the results of Get-Command are stored d) To send the output from Get-Command to More, which displays the output page-by-page

a. Incorrect. The pipe symbol is not used to create a customized PowerShell session. You can create a customized Windows PowerShell session by creating a PowerShell console file that has a .psc1 extension. You can then double-click this PowerShell console file to open Windows PowerShell. b. Incorrect. The pipe symbol is not used to control execution. Common options to control execution include -whatif and -confirm. c. Incorrect. To create an output file, you need to use output redirection (>>). The pipe symbol does not create an output file in this scenario. d. Correct. Alina uses the pipe symbol ( | ) to send the results of the Get-Command cmdlet to the MS-DOS more command within PowerShell. The more command then displays the output page-by-page, because the output is too large to fit on one page. This process is called piping.

Nadira is testing an application that needs to work on multiple operating systems. For this purpose, she uses Hyper-V to set up a Windows Server 2019 virtual machine (named VM1) and a Linux-based virtual machine (named VM2) on her host Windows 10 operating system. She sets up a third virtual machine, Windows Server 2012 (named VM3), to test the compatibility of the application between Windows Server 2019 and 2012 versions. Which of the following must be true if VM3 was set up successfully using nested virtualization? Question options: a) Nadira removed VM2 to accommodate VM3. b) Nadira powered off VM1, ran a PowerShell command, and powered on VM1. c) Nadira ran the following PowerShell command: Get-VMNetworkAdapter -VMName VM3 | Set-VMNetworkAdapter -MacAddressSpoofing On. d) Nadira enabled nested virtualization in Windows 10 using a PowerShell command.

a. Incorrect. The presence of VM2, a Linux-based virtual machine, does not impact the setup of VM3, a Windows Server 2012 virtual machine. b. Correct. If VM3 was set up successfully, Nadira most likely would have set it up within VM1. To do this, she would first have to power off VM1 and run a PowerShell command to enable nested virtualization. c. Incorrect. This PowerShell command is used to enable network access for nested virtual machines within another virtual machine. Although Nadira may have run this command to allow VM3 to access the network, it has no bearing on VM3's creation. d. Incorrect. Nadira doesn't need to enable nested virtualization in Windows 10. If she installs VM3 within VM1, she needs to enable nested virtualization on that machine.


संबंधित स्टडी सेट्स

Industrialization, Immigration, Roaring 20's, Great Depression

View Set

AP Art History: South and Southeast Asia

View Set

Introduction to Hypothesis Testing quiz

View Set